Author of the publication

LogAnomaly: Unsupervised Detection of Sequential and Quantitative Anomalies in Unstructured Logs.

, , , , , , , , , , and . IJCAI, page 4739-4745. ijcai.org, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Wresting Control from BGP: Scalable Fine-Grained Route Control., , , , , and . USENIX Annual Technical Conference, page 295-308. USENIX, (2007)Why It Takes So Long to Connect to a WiFi Access Point., , , , , , , , and . CoRR, (2017)TowerDefense: Deployment strategies for battling against IP prefix hijacking., , , , and . ICNP, page 134-143. IEEE Computer Society, (2010)Learning thresholds for PV change detection from operators' labels., , , , , , , , and . IPCCC, page 1-9. IEEE Computer Society, (2015)FOCUS: Shedding light on the high search response time in the wild., , , , , , , and . INFOCOM, page 1-9. IEEE, (2016)PHAS: A Prefix Hijack Alert System., , , , , and . USENIX Security Symposium, USENIX Association, (2006)AdCell: Ad Allocation in Cellular Networks., , , , and . ESA, volume 6942 of Lecture Notes in Computer Science, page 311-322. Springer, (2011)Rapid Deployment of Anomaly Detection Models for Large Number of Emerging KPI Streams., , , , , , and . IPCCC, page 1-8. IEEE, (2018)Robust and Unsupervised KPI Anomaly Detection Based on Conditional Variational Autoencoder., , and . IPCCC, page 1-9. IEEE, (2018)Scalable VPN routing via relaying., , , , and . SIGMETRICS, page 61-72. ACM, (2008)