Author of the publication

Method and System for Detecting Anomalous User Behaviors: An Ensemble Approach.

, , , , , , and . SEKE, page 263-262. KSI Research Inc. and Knowledge Systems Institute Graduate School, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Dynamic Boosted Ensemble Learning Method Based on Random Forest., , , , , , , and . CoRR, (2018)CoBOT: static C/C++ bug detection in the presence of incomplete code., , , , , , , , , and 1 other author(s). ICPC, page 385-388. ACM, (2018)DeepLink: A Code Knowledge Graph Based Deep Learning Approach for Issue-Commit Link Recovery., , , , , , and . SANER, page 434-444. IEEE, (2019)Capturing source code semantics via tree-based convolution over API-enhanced AST., , and . CF, page 174-182. ACM, (2019)A Data Collaboration Model for Collaborative Design Based on C-Net., , , , and . SEKE, page 541-544. Knowledge Systems Institute Graduate School, (2012)Formal Definition and Detection Algorithm for Passive Event in RFID Middleware., , , , , and . APWeb/WAIM, volume 5446 of Lecture Notes in Computer Science, page 538-543. Springer, (2009)Refining Traceability Links Between Vulnerability and Software Component in a Vulnerability Knowledge Graph., , , , , , , , and . ICWE, volume 10845 of Lecture Notes in Computer Science, page 33-49. Springer, (2018)Attention Enhanced Chinese Word Embeddings., , , , and . ICANN (1), volume 11139 of Lecture Notes in Computer Science, page 154-165. Springer, (2018)BuOA: An Achitecture Style for Modular Web Applications., , , , and . APSEC, page 802-807. IEEE, (2012)Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions., , , , , , , and . SOUPS, page 27-41. USENIX Association, (2016)