Christopher Leckie

Orcid: 0000-0002-4388-0517

Affiliations:
  • University of Melbourne, School of Computing and Information Systems, Australia


According to our database1, Christopher Leckie authored at least 309 papers between 1991 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Round Trip Translation Defence against Large Language Model Jailbreaking Attacks.
CoRR, 2024

Be Persistent: Towards a Unified Solution for Mitigating Shortcuts in Deep Learning.
CoRR, 2024

An Interpretable Low-complexity Model for Wireless Channel Estimation.
CoRR, 2024

OIL-AD: An Anomaly Detection Framework for Sequential Decision Sequences.
CoRR, 2024

Detecting Anomalous Agent Decision Sequences Based on Offline Imitation Learning.
Proceedings of the 23rd International Conference on Autonomous Agents and Multiagent Systems, 2024

2023
Adversarial Coreset Selection for Efficient Robust Training.
Int. J. Comput. Vis., December, 2023

Electrical Model-Free Voltage Calculations Using Neural Networks and Smart Meter Data.
IEEE Trans. Smart Grid, July, 2023

Towards quantum enhanced adversarial robustness in machine learning.
Nat. Mac. Intell., June, 2023

Open-Set Graph Anomaly Detection via Normal Structure Regularisation.
CoRR, 2023

Unsupervised Domain-agnostic Fake News Detection using Multi-modal Weak Signals.
CoRR, 2023

Failure-tolerant Distributed Learning for Anomaly Detection in Wireless Networks.
CoRR, 2023

The Devil's Advocate: Shattering the Illusion of Unexploitable Data using Diffusion Models.
CoRR, 2023

It's PageRank All The Way Down: Simplifying Deep Graph Networks.
Proceedings of the 2023 SIAM International Conference on Data Mining, 2023

Probabilistic Distributed Intrusion Detection For Zero-Trust Multi-Access Edge Computing.
Proceedings of the NOMS 2023, 2023

Online Trajectory Anomaly Detection Based on Intention Orientation.
Proceedings of the International Joint Conference on Neural Networks, 2023

Robust Wireless Network Anomaly Detection with Collaborative Adversarial Autoencoders.
Proceedings of the IEEE International Conference on Communications, 2023

Predict-Then-Optimise Strategies for Water Flow Control (Short Paper).
Proceedings of the 29th International Conference on Principles and Practice of Constraint Programming, 2023

A Group Formation Game for Local Anomaly Detection.
Proceedings of the 62nd IEEE Conference on Decision and Control, 2023

EnSpeciVAT: Enhanced SpecieVAT for Cluster Tendency Identification in Graphs.
Proceedings of the Advanced Data Mining and Applications - 19th International Conference, 2023

Cross-Domain Graph Anomaly Detection via Anomaly-Aware Contrastive Alignment.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
An Online Unsupervised Dynamic Window Method to Track Repeating Patterns From Sensor Data.
IEEE Trans. Cybern., 2022

MRMondrian: Scalable Multidimensional Anonymisation for Big Data Privacy Preservation.
IEEE Trans. Big Data, 2022

MurTree: Optimal Decision Trees via Dynamic Programming and Search.
J. Mach. Learn. Res., 2022

Shape-Sphere: A metric space for analysing time series by their shape.
Inf. Sci., 2022

Multi-attention graph neural networks for city-wide bus travel time estimation using limited data.
Expert Syst. Appl., 2022

Benchmarking Adversarially Robust Quantum Machine Learning at Scale.
CoRR, 2022

Generative Adversarial Networks for anomaly detection on decentralised data.
Annu. Rev. Control., 2022

ENDASh: Embedding Neighbourhood Dissimilarity with Attribute Shuffling for Graph Anomaly Detection.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2022

Modelling Zeros in Blockmodelling.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2022

Exploiting Redundancy in Network Flow Information for Efficient Security Attack Detection.
Proceedings of the Network and System Security - 16th International Conference, 2022

Hybrid Collaborative Architectures For Intrusion Detection In Multi-Access Edge Computing.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022

Wireless Network Simulation to Create Machine Learning Benchmark Data.
Proceedings of the IEEE Global Communications Conference, 2022

ℓ <sub>∞</sub>-Robustness and Beyond: Unleashing Efficient Adversarial Training.
Proceedings of the Computer Vision - ECCV 2022, 2022

Local Intrinsic Dimensionality Signals Adversarial Perturbations.
Proceedings of the 61st IEEE Conference on Decision and Control, 2022

COLLIDER: A Robust Training Framework for Backdoor Data.
Proceedings of the Computer Vision - ACCV 2022, 2022

Noise-Robust Learning from Multiple Unsupervised Sources of Inferred Labels.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

A Divide and Conquer Algorithm for Predict+Optimize with Non-convex Problems.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Defending Support Vector Machines Against Data Poisoning Attacks.
IEEE Trans. Inf. Forensics Secur., 2021

Propagation2Vec: Embedding partial propagation networks for explainable fake news early detection.
Inf. Process. Manag., 2021

Local Intrinsic Dimensionality Signals Adversarial Perturbations.
CoRR, 2021

Knowledge Enhanced Multi-modal Fake News Detection.
CoRR, 2021

A Dimensionality-Driven Approach for Unsupervised Out-of-distribution Detection.
Proceedings of the 2021 SIAM International Conference on Data Mining, 2021

Mining Rare Recurring Events in Network Traffic using Second Order Contrast Patterns.
Proceedings of the International Joint Conference on Neural Networks, 2021

Closing the BIG-LID: An Effective Local Intrinsic Dimensionality Defense for Nonlinear Regression Poisoning.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021

Privacy-Preserving Collaborative SDR Networks for Anomaly Detection.
Proceedings of the ICC 2021, 2021

Continual Learning for Fake News Detection from Social Media.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2021, 2021

Scalable Contrast Pattern Mining over Data Streams.
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021

Embracing Domain Differences in Fake News: Cross-domain Fake News Detection using Multi-modal Data.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

Evaluation of Collaborative Intrusion Detection System Architectures in Mobile Edge Computing.
Mobile Edge Computing, 2021

2020
LN-SNE: Log-Normal Distributed Stochastic Neighbor Embedding for Anomaly Detection.
IEEE Trans. Knowl. Data Eng., 2020

Unsupervised online change point detection in high-dimensional time series.
Knowl. Inf. Syst., 2020

Exploiting patterns to explain individual predictions.
Knowl. Inf. Syst., 2020

Divide and Learn: A Divide and Conquer Approach for Predict+Optimize.
CoRR, 2020

Improving Scalability of Contrast Pattern Mining for Network Traffic Using Closed Patterns.
CoRR, 2020

Defending Distributed Classifiers Against Data Poisoning Attacks.
CoRR, 2020

Defending Regression Learners Against Poisoning Attacks.
CoRR, 2020

MurTree: Optimal Classification Trees via Dynamic Programming and Search.
CoRR, 2020

Graph Neural Networks with Continual Learning for Fake News Detection from Social Media.
CoRR, 2020

Black-box Adversarial Example Generation with Normalizing Flows.
CoRR, 2020

Deep Multi-sphere Support Vector Data Description.
Proceedings of the 2020 SIAM International Conference on Data Mining, 2020

OMBA: User-Guided Product Representations for Online Market Basket Analysis.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2020

Image Analysis Enhanced Event Detection from Geo-Tagged Tweet Streams.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2020

AdvFlow: Inconspicuous Black-box Adversarial Attacks using Normalizing Flows.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

Evaluation of Centralised vs Distributed Collaborative Intrusion Detection Systems in Multi-Access Edge Computing.
Proceedings of the 2020 IFIP Networking Conference, 2020

Improving Single and Multi-View Blockmodelling by Algebraic Simplification.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Discovery of contrast corridors from trajectory data in heterogeneous dynamic cellular networks.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Adversarial Reinforcement Learning under Partial Observability in Autonomous Computer Network Defence.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Multi-Attention 3D Residual Neural Network for Origin-Destination Crowd Flow Prediction.
Proceedings of the 20th IEEE International Conference on Data Mining, 2020

Distributed Generative Adversarial Networks for Anomaly Detection.
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020

METEOR: Learning Memory and Time Efficient Representations from Multi-modal Data Streams.
Proceedings of the CIKM '20: The 29th ACM International Conference on Information and Knowledge Management, 2020

Embedding Partial Propagation Network for Fake News Early Detection.
Proceedings of the CIKM 2020 Workshops co-located with 29th ACM International Conference on Information and Knowledge Management (CIKM 2020), 2020

Invertible Generative Modeling using Linear Rational Splines.
Proceedings of the 23rd International Conference on Artificial Intelligence and Statistics, 2020

Dynamic Programming for Predict+Optimise.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Approximating Dunn's Cluster Validity Indices for Partitions of Big Data.
IEEE Trans. Cybern., 2019

Support vector machines resilient against training data integrity attacks.
Pattern Recognit., 2019

Tour recommendation and trip planning using location-based social media: a survey.
Knowl. Inf. Syst., 2019

Online cluster validity indices for performance monitoring of streaming data clustering.
Int. J. Intell. Syst., 2019

Power-law Verification for Event Detection at Multi-spatial Scales from Geo-tagged Tweet Streams.
CoRR, 2019

Adversarial Reinforcement Learning under Partial Observability in Software-Defined Networking.
CoRR, 2019

Linear system security - Detection and correction of adversarial sensor attacks in the noise-free case.
Autom., 2019

P-Gram: Positional N-Gram for the Clustering of Machine-Generated Messages.
IEEE Access, 2019

Unsupervised and Active Learning Using Maximin-Based Anomaly Detection.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2019

Improving the Quality of Explanations with Local Embedding Perturbations.
Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2019

Deep Learning and One-class SVM based Anomalous Crowd Detection.
Proceedings of the International Joint Conference on Neural Networks, 2019

Adaptive Edge Caching based on Popularity and Prediction for Mobile Networks.
Proceedings of the International Joint Conference on Neural Networks, 2019

Robust and Accurate Short-Term Load Forecasting: A Cluster Oriented Ensemble Learning Approach.
Proceedings of the International Joint Conference on Neural Networks, 2019

Predict+Optimise with Ranking Objectives: Exhaustively Learning Linear Functions.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

Big Data Driven Predictive Caching at the Wireless Edge.
Proceedings of the 17th IEEE International Conference on Communications Workshops, 2019

LiftSmart: a monitoring and warning wearable for weight trainers.
Proceedings of the 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2019 ACM International Symposium on Wearable Computers, 2019

Change Point Detection for Streaming High-Dimensional Time Series.
Proceedings of the Database Systems for Advanced Applications, 2019

An Investigation into Prediction + Optimisation for the Knapsack Problem.
Proceedings of the Integration of Constraint Programming, Artificial Intelligence, and Operations Research, 2019

Multi-scale Trajectory Clustering to Identify Corridors in Mobile Networks.
Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019

USTAR: Online Multimodal Embedding for Modeling User-Guided Spatiotemporal Activity.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

Multi-spatial Scale Event Detection from Geo-tagged Tweet Streams via Power-law Verification.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

Seeding on Samples for Accelerating K-Means Clustering.
Proceedings of the 3rd International Conference on Big Data and Internet of Things, 2019

Online K-Means Clustering with Lightweight Coresets.
Proceedings of the AI 2019: Advances in Artificial Intelligence, 2019

2018
Efficient Unsupervised Parameter Estimation for One-Class Support Vector Machines.
IEEE Trans. Neural Networks Learn. Syst., 2018

Fast and Scalable Big Data Trajectory Clustering for Understanding Urban Mobility.
IEEE Trans. Intell. Transp. Syst., 2018

Personalized trip recommendation for tourists based on user interests, points of interest visit durations and visit recency.
Knowl. Inf. Syst., 2018

Dealing with Inliers in Feature Vector Data.
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2018

Online Cluster Validity Indices for Streaming Data.
CoRR, 2018

Density Biased Sampling with Locality Sensitive Hashing for Outlier Detection.
Proceedings of the Web Information Systems Engineering - WISE 2018, 2018

Estimating Generalized Dunn's Cluster Validity Indices for Big Data.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2018

Image Constrained Blockmodelling: A Constraint Programming Approach.
Proceedings of the 2018 SIAM International Conference on Data Mining, 2018

Graph Stream Mining Based Anomalous Event Analysis.
Proceedings of the PRICAI 2018: Trends in Artificial Intelligence, 2018

Urban Sensing for Anomalous Event Detection: - Distinguishing Between Legitimate Traffic Changes and Abnormal Traffic Variability.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2018

Semi-supervised Blockmodelling with Pairwise Guidance.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2018

Online Clustering for Evolving Data Streams with Online Anomaly Detection.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2018

Detection of Anomalous Communications with SDRs and Unsupervised Adversarial Learning.
Proceedings of the 43rd IEEE Conference on Local Computer Networks, 2018

Deep Learning Based Game-Theoretical Approach to Evade Jamming Attacks.
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018

Reinforcement Learning for Autonomous Defence in Software-Defined Networking.
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018

Cluster-Based Crowd Movement Behavior Detection.
Proceedings of the 2018 Digital Image Computing: Techniques and Applications, 2018

Crowd Activity Change Point Detection in Videos via Graph Stream Mining.
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2018

Scalable Bottom-up Subspace Clustering using FP-Trees for High Dimensional Data.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2017
A visual-numeric approach to clustering and anomaly detection for trajectory data.
Vis. Comput., 2017

Using Virtual Machine Allocation Policies to Defend against Co-Resident Attacks in Cloud Computing.
IEEE Trans. Dependable Secur. Comput., 2017

Partitioning road networks using density peak graphs: Efficiency vs. accuracy.
Inf. Syst., 2017

Exponentially Weighted Ellipsoidal Model for Anomaly Detection.
Int. J. Intell. Syst., 2017

Linear system security - detection and correction of adversarial attacks in the noise-free case.
CoRR, 2017

Toward the Starting Line: A Systems Engineering Approach to Strong AI.
CoRR, 2017

On the effectiveness of isolation-based anomaly detection in cloud data centers.
Concurr. Comput. Pract. Exp., 2017

Personalized Itinerary Recommendation with Queuing Time Awareness.
Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2017

Clustering Aided Support Vector Machines.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2017

Improving load forecasting based on deep learning and K-shape clustering.
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017

A Pattern Tree Based Method for Mining Conditional Contrast Patterns of Multi-source Data.
Proceedings of the 2017 IEEE International Conference on Data Mining Workshops, 2017

LSHiForest: A Generic Framework for Fast Tree Isolation Based Ensemble Anomaly Analysis.
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017

Fast Memory Efficient Local Outlier Detection in Data Streams (Extended Abstract).
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017

An Efficient Method for Anomaly Detection in Non-Stationary Data Streams.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

An efficient visual assessment of cluster tendency tool for large-scale time series data sets.
Proceedings of the 2017 IEEE International Conference on Fuzzy Systems, 2017

Fuzzy c-Shape: A new algorithm for clustering finite time series waveforms.
Proceedings of the 2017 IEEE International Conference on Fuzzy Systems, 2017

Summarizing Significant Changes in Network Traffic Using Contrast Pattern Mining.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017

Distributed Detection of Zero-Day Network Traffic Flows.
Proceedings of the Data Mining, 2017

From Shared Subspaces to Shared Landmarks: A Robust Multi-Source Classification Approach.
Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, 2017

2016
Fast Memory Efficient Local Outlier Detection in Data Streams.
IEEE Trans. Knowl. Data Eng., 2016

Visual Assessment of Clustering Tendency for Incomplete Data.
IEEE Trans. Knowl. Data Eng., 2016

Adaptive Cluster Tendency Visualization and Anomaly Detection for Streaming Data.
ACM Trans. Knowl. Discov. Data, 2016

A Game Theoretical Approach to Defend Against Co-Resident Attacks in Cloud Computing: Preventing Co-Residence Using Semi-Supervised Learning.
IEEE Trans. Inf. Forensics Secur., 2016

The Generalized C Index for Internal Fuzzy Cluster Validity.
IEEE Trans. Fuzzy Syst., 2016

A Hybrid Approach to Clustering in Big Data.
IEEE Trans. Cybern., 2016

High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning.
Pattern Recognit., 2016

Network Energy Consumption Assessment of Conventional Mobile Services and Over-the-Top Instant Messaging Applications.
IEEE J. Sel. Areas Commun., 2016

Discovering outlying aspects in large datasets.
Data Min. Knowl. Discov., 2016

Online Clustering of Multivariate Time-series.
Proceedings of the 2016 SIAM International Conference on Data Mining, 2016

R1STM: One-class Support Tensor Machine with Randomised Kernel.
Proceedings of the 2016 SIAM International Conference on Data Mining, 2016

Node Re-Ordering as a Means of Anomaly Detection in Time-Evolving Graphs.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2016

Efficient query processing on road traffic network.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016

An improved scheme for privacy-preserving collaborative anomaly detection.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016

Pedestrian behaviour analysis using the microsoft kinect.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016

Unsupervised Parameter Estimation for One-Class Support Vector Machines.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2016

Detecting unseen anomalies in weight training exercises.
Proceedings of the 28th Australian Conference on Computer-Human Interaction, 2016

Anomaly detection in non-stationary data: Ensemble based self-adaptive OCSVM.
Proceedings of the 2016 International Joint Conference on Neural Networks, 2016

Robust Domain Generalisation by Enforcing Distribution Invariance.
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016

Anomalous Behavior Detection in Crowded Scenes Using Clustering and Spatio-Temporal Features.
Proceedings of the Intelligent Information Processing VIII, 2016

Trajectory Pattern Identification and Anomaly Detection of Pedestrian Flows Based on Visual Clustering.
Proceedings of the Intelligent Information Processing VIII, 2016

Training robust models using Random Projection.
Proceedings of the 23rd International Conference on Pattern Recognition, 2016

PersTour: A Personalized Tour Recommendation and Planning System.
Proceedings of the Late-breaking Results, 2016

Scalable Local-Recoding Anonymization using Locality Sensitive Hashing for Big Data Privacy Preservation.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016

Improving Personalized Trip Recommendation by Avoiding Crowds.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016

Large-scale strategic games and adversarial machine learning.
Proceedings of the 55th IEEE Conference on Decision and Control, 2016

Smart Sampling: A Novel Unsupervised Boosting Approach for Outlier Detection.
Proceedings of the AI 2016: Advances in Artificial Intelligence, 2016

Towards Next Generation Touring: Personalized Group Tours.
Proceedings of the Twenty-Sixth International Conference on Automated Planning and Scheduling, 2016

Improved Classification of Known and Unknown Network Traffic Flows Using Semi-supervised Machine Learning.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Evolving Fuzzy Rules for Anomaly Detection in Data Streams.
IEEE Trans. Fuzzy Syst., 2015

Ranking cell tracking systems without manual validation.
Pattern Recognit. Lett., 2015

Invariant backpropagation: how to train a transformation-invariant neural network.
CoRR, 2015

Assessing network energy consumption of mobile applications.
IEEE Commun. Mag., 2015

DP1SVM: A dynamic planar one-class support vector machine for Internet of Things environment.
Proceedings of the International Conference on Recent Advances in Internet of Things, 2015

Discovering the Impact of Urban Traffic Interventions Using Contrast Mining on Vehicle Trajectory Data.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2015

Scalable Outlying-Inlying Aspects Discovery via Feature Ranking.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2015

An Embedding Scheme for Detecting Anomalous Block Structured Graphs.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2015

Parking availability prediction for sensor-enabled car parks in smart cities.
Proceedings of the Tenth IEEE International Conference on Intelligent Sensors, 2015

Local outlier detection for data streams in sensor networks: Revisiting the utility problem invited paper.
Proceedings of the Tenth IEEE International Conference on Intelligent Sensors, 2015

Personalized Tour Recommendation Based on User Interests and Points of Interest Visit Durations.
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015

Big Data Analytics-Enhanced Cloud Computing: Challenges, Architectural Elements, and Future Directions.
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015

Detection of Deception in the Mafia Party Game.
Proceedings of the 2015 ACM on International Conference on Multimodal Interaction, Seattle, WA, USA, November 09, 2015

Pattern based anomalous user detection in cognitive radio networks.
Proceedings of the 2015 IEEE International Conference on Acoustics, 2015

Detecting Location-Centric Communities Using Social-Spatial Links with Temporal Constraints.
Proceedings of the Advances in Information Retrieval, 2015

Profiling Pedestrian Distribution and Anomaly Detection in a Dynamic Environment.
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015

Traffic forecasting in complex urban networks: Leveraging big data and machine learning.
Proceedings of the 2015 IEEE International Conference on Big Data (IEEE BigData 2015), Santa Clara, CA, USA, October 29, 2015

R1SVM: A Randomised Nonlinear Approach to Large-Scale Anomaly Detection.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

2014
Streaming analysis in wireless sensor networks.
Wirel. Commun. Mob. Comput., 2014

High-Resolution Monitoring of Atmospheric Pollutants Using a System of Low-Cost Sensors.
IEEE Trans. Geosci. Remote. Sens., 2014

Ellipsoidal neighbourhood outlier factor for distributed anomaly detection in resource constrained networks.
Pattern Recognit., 2014

Hyperspherical cluster based distributed anomaly detection in wireless sensor networks.
J. Parallel Distributed Comput., 2014

Estimating the number of hosts corresponding to an intrusion alert while preserving privacy.
J. Comput. Syst. Sci., 2014

An adaptive elliptical anomaly detection model for wireless sensor networks.
Comput. Networks, 2014

LICRE: unsupervised feature correlation reduction for lipidomics.
Bioinform., 2014

A Relevance Weighted Ensemble Model for Anomaly Detection in Switching Data Streams.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2014

Privacy-Preserving Collaborative Anomaly Detection for Participatory Sensing.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2014

Structure-Aware Distance Measures for Comparing Clusterings in Graphs.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2014

Smart car parking: Temporal clustering and anomaly detection in urban car parking.
Proceedings of the 2014 IEEE Ninth International Conference on Intelligent Sensors, 2014

Using trajectory features for upper limb action recognition.
Proceedings of the 2014 IEEE Ninth International Conference on Intelligent Sensors, 2014

Profiling spatial and temporal behaviour in sensor networks: A case study in energy monitoring.
Proceedings of the 2014 IEEE Ninth International Conference on Intelligent Sensors, 2014

High resolution spatio-temporal monitoring of air pollutants using wireless sensor networks.
Proceedings of the 2014 IEEE Ninth International Conference on Intelligent Sensors, 2014

Evaluating Spectral Unmixing Quality in the Absence of Reference Objects for Time Lapse Fluorescence Microscopy.
Proceedings of the 2014 IEEE International Conference on Data Mining Workshops, 2014

TRIBAC: Discovering Interpretable Clusters and Latent Structures in Graphs.
Proceedings of the 2014 IEEE International Conference on Data Mining, 2014

Spatio-temporal estimation with Bayesian maximum entropy and compressive sensing in communication constrained networks.
Proceedings of the IEEE International Conference on Communications, 2014

Virtual machine allocation policies against co-resident attacks in cloud computing.
Proceedings of the IEEE International Conference on Communications, 2014

Spatial Partitioning of Large Urban Road Networks.
Proceedings of the 17th International Conference on Extending Database Technology, 2014

2013
A time decoupling approach for studying forum dynamics.
World Wide Web, 2013

A Soft Modularity Function For Detecting Fuzzy Communities in Social Networks.
IEEE Trans. Fuzzy Syst., 2013

Measures for ranking cell trackers without manual validation.
Pattern Recognit., 2013

Analysing Virtual Machine Usage in Cloud Computing.
Proceedings of the IEEE Ninth World Congress on Services, 2013

Mining Labelled Tensors by Discovering both their Common and Discriminative Subspaces.
Proceedings of the 13th SIAM International Conference on Data Mining, 2013

A Bayesian Classifier for Learning from Tensorial Data.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2013

Privacy-preserving data aggregation in Participatory Sensing Networks.
Proceedings of the 2013 IEEE Eighth International Conference on Intelligent Sensors, 2013

Applications of Class-Conditional Conformal Predictor in Multi-class Classification.
Proceedings of the 12th International Conference on Machine Learning and Applications, 2013

Security Games for Virtual Machine Allocation in Cloud Computing.
Proceedings of the Decision and Game Theory for Security - 4th International Conference, 2013

Extension of iVAT to asymmetric matrices.
Proceedings of the FUZZ-IEEE 2013, 2013

Clustering and visualization of fuzzy communities in social networks.
Proceedings of the FUZZ-IEEE 2013, 2013

Discovering latent blockmodels in sparse and noisy graphs using non-negative matrix factorisation.
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013

clusiVAT: A mixed visual/numerical clustering algorithm for big data.
Proceedings of the 2013 IEEE International Conference on Big Data (IEEE BigData 2013), 2013

2012
ciForager: Incrementally discovering regions of correlated change in evolving graphs.
ACM Trans. Knowl. Discov. Data, 2012

Fuzzy c-Means Algorithms for Very Large Data.
IEEE Trans. Fuzzy Syst., 2012

AIC and BIC based approaches for SVM parameter value estimation with RBF kernels.
Proceedings of the 4th Asian Conference on Machine Learning, 2012

Improved Gaussian process classification via feature space rotation.
Neurocomputing, 2012

FSR: feature set reduction for scalable and accurate multi-class cancer subtype classification based on copy number.
Bioinform., 2012

Estimating the Number of Hosts Corresponding to an Address while Preserving Anonymity.
Proceedings of the Network and System Security - 6th International Conference, 2012

SeqiBloc: mining multi-time spanning blockmodels in dynamic graphs.
Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2012

Measures for clustering and anomaly detection in sets of higher dimensional ellipsoids.
Proceedings of the 2012 International Joint Conference on Neural Networks (IJCNN), 2012

On compressing weighted time-evolving graphs.
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012

Utilizing common substructures to speedup tensor factorization for mining dynamic graphs.
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012

An Efficient Adversarial Learning Strategy for Constructing Robust Classification Boundaries.
Proceedings of the AI 2012: Advances in Artificial Intelligence, 2012

2011
Approximate pairwise clustering for large data sets via sampling plus extension.
Pattern Recognit., 2011

An efficient hyperellipsoidal clustering algorithm for resource-constrained environments.
Pattern Recognit., 2011

Clustering ellipses for anomaly detection.
Pattern Recognit., 2011

Spatio-temporal modelling-based drift-aware wireless sensor networks.
IET Wirel. Sens. Syst., 2011

Self-similar characteristics of network intrusion attempts and the implications for predictability.
Concurr. Comput. Pract. Exp., 2011

Anomaly Detection in Environmental Monitoring Networks [Application Notes].
IEEE Comput. Intell. Mag., 2011

Meta-analysis of gene expression microarrays with missing replicates.
BMC Bioinform., 2011

An efficient approach to detecting concept-evolution in network data streams.
Proceedings of the Australasian Telecommunication Networks and Applications Conference, 2011

Incremental Elliptical Boundary Estimation for Anomaly Detection in Wireless Sensor Networks.
Proceedings of the 11th IEEE International Conference on Data Mining, 2011

2010
Network Traffic Analysis and SCADA Security.
Proceedings of the Handbook of Information and Communication Security, 2010

Enhanced Visual Analysis for Cluster Tendency Assessment and Data Partitioning.
IEEE Trans. Knowl. Data Eng., 2010

Centered hyperspherical and hyperellipsoidal one-class support vector machines for anomaly detection in sensor networks.
IEEE Trans. Inf. Forensics Secur., 2010

Critical infrastructure protection: Resource efficient sampling to improve detection of less frequent patterns in network traffic.
J. Netw. Comput. Appl., 2010

A survey of coordinated attacks and collaborative intrusion detection.
Comput. Secur., 2010

A bi-ordering approach to linking gene expression with clinical annotations in gastric cancer.
BMC Bioinform., 2010

Exploiting sequence similarity to validate the sensitivity of SNP arrays in detecting fine-scaled copy number variations.
Bioinform., 2010

iVAT and aVAT: Enhanced Visual Analysis for Cluster Tendency Assessment.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2010

Comparative Analysis of HTTP Anomaly Detection Algorithms: DFA vs N-Grams.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Sensor data boundary estimation for anomaly detection in wireless sensor networks.
Proceedings of the IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, 2010

Combining Real and Virtual Graphs to Enhance Data Clustering.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

Encoding Actions via Quantized Vocabulary of Averaged Silhouettes.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

Action Recognition Using Space-Time Shape Difference Images.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

Clustering elliptical anomalies in sensor networks.
Proceedings of the FUZZ-IEEE 2010, 2010

2009
Elliptical anomalies in wireless sensor networks.
ACM Trans. Sens. Networks, 2009

Automatically Determining the Number of Clusters in Unlabeled Data Sets.
IEEE Trans. Knowl. Data Eng., 2009

Collaborative Detection of Fast Flux Phishing Domains.
J. Networks, 2009

Decentralized multi-dimensional alert correlation for collaborative intrusion detection.
J. Netw. Comput. Appl., 2009

Using graph partitioning to discover regions of correlated spatio-temporal change in evolving graphs.
Intell. Data Anal., 2009

Protecting SIP server from CPU-based DoS attacks using history-based IP filtering.
IEEE Commun. Lett., 2009

Action recognition via multi-feature fusion and Gaussian process classification.
Proceedings of the IEEE Workshop on Applications of Computer Vision (WACV 2009), 2009

Approximate Spectral Clustering.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2009

Characterising the Evolution in Scanning Activity of Suspicious Hosts.
Proceedings of the Third International Conference on Network and System Security, 2009

Visualization of clusters in very large rectangular dissimilarity data.
Proceedings of the 4th International Conference on Autonomous Robots and Agents, 2009

A Query Based Approach for Mining Evolving Graphs.
Proceedings of the Eighth Australasian Data Mining Conference, AusDM 2009, Melbourne, 2009

Adapting Spectral Co-clustering to Documents and Terms Using Latent Semantic Analysis.
Proceedings of the AI 2009: Advances in Artificial Intelligence, 2009

2008
Anomaly detection in wireless sensor networks.
IEEE Wirel. Commun., 2008

An Efficient Clustering Scheme to Exploit Hierarchical Data in Network Traffic Analysis.
IEEE Trans. Knowl. Data Eng., 2008

Discovering correlated spatio-temporal changes in evolving graphs.
Knowl. Inf. Syst., 2008

Selective sampling for approximate clustering of very large data sets.
Int. J. Intell. Syst., 2008

Characteristic-Based Descriptors for Motion Sequence Recognition.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2008

Relieving hot spots in collaborative intrusion detection systems during worm outbreaks.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

CPU-based DoS attacks against SIP servers.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

Analysis and enhancement of on-demand routing in wireless sensor networks.
Proceedings of the 3rd ACM Workshop on Performance Monitoring and Measurement of Heterogeneous Wireless and Wired Networks, 2008

Dual clustering for categorization of action sequences.
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008

SpecVAT: Enhanced Visual Cluster Analysis.
Proceedings of the 8th IEEE International Conference on Data Mining (ICDM 2008), 2008

CESVM: Centered Hyperellipsoidal Support Vector Machine Based Anomaly Detection.
Proceedings of IEEE International Conference on Communications, 2008

Online drift correction in wireless sensor networks using spatio-temporal modeling.
Proceedings of the 11th International Conference on Information Fusion, 2008

Moving shape dynamics: A signal processing perspective.
Proceedings of the 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2008), 2008

2007
Information sharing for distributed intrusion detection systems.
J. Netw. Comput. Appl., 2007

Survey of network-based defense mechanisms countering the DoS and DDoS problems.
ACM Comput. Surv., 2007

A scalable sampling scheme for clustering in network traffic analysis.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007

Evaluation of a Decentralized Architecture for Large Scale Collaborative Intrusion Detection.
Proceedings of the Integrated Network Management, 2007

Hop-Count Monitoring: Detecting Sinkhole Attacks in Wireless Sensor Networks.
Proceedings of the 15th IEEE International Conference on Networks, 2007

The Curse of Ease of Access to the Internet.
Proceedings of the Information Systems Security, Third International Conference, 2007

Tensor Space Learning for Analyzing Activity Patterns from Video Sequences.
Proceedings of the Workshops Proceedings of the 7th IEEE International Conference on Data Mining (ICDM 2007), 2007

Quarter Sphere Based Distributed Anomaly Detection in Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2007

2006
Approximate clustering in very large relational data.
Int. J. Intell. Syst., 2006

Intrusion Detection for Routing Attacks in Sensor Networks.
Int. J. Distributed Sens. Networks, 2006

Echidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis.
Proceedings of the NETWORKING 2006, 2006

An evaluation technique for network intrusion detection systems.
Proceedings of the 1st International Conference on Scalable Information Systems, 2006

Discovering and Summarising Regions of Correlated Spatio-Temporal Change in Evolving Graphs.
Proceedings of the Workshops Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 2006

Mining Generalised Emerging Patterns.
Proceedings of the AI 2006: Advances in Artificial Intelligence, 2006

Approximate data mining in very large relational data.
Proceedings of the Database Technologies 2006, 2006

2005
Exploiting Traffic Localities for Efficient Flow State Lookup.
Proceedings of the NETWORKING 2005: Networking Technologies, 2005

Anomaly detection for Internet worms.
Proceedings of the Integrated Network Management, 2005

Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters.
Proceedings of the Computer Science 2005, 2005

2004
Efficient visualization of large routing topologies.
Int. J. Netw. Manag., 2004

Adaptive Clustering for Network Intrusion Detection.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2004

Proactively Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring.
Proceedings of the NETWORKING 2004, 2004

2003
Visualisation of power-law network topologies.
Proceedings of the 11th IEEE International Conference on Networks, 2003

Protection from distributed denial of service attacks using history-based IP filtering.
Proceedings of IEEE International Conference on Communications, 2003

Applying Reinforcement Learning to Packet Scheduling in Routers.
Proceedings of the Fifteenth Conference on Innovative Applications of Artificial Intelligence, 2003

Detecting reflector attacks by sharing beliefs.
Proceedings of the Global Telecommunications Conference, 2003

An efficient filter for denial-of-service bandwidth attacks.
Proceedings of the Global Telecommunications Conference, 2003

Policies for Sharing Distributed Probabilistic Beliefs.
Proceedings of the Computer Science 2003, 2003

Detecting Distributed Denial of Service Attacks by Sharing Distributed Beliefs.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003

2002
A probabilistic approach to detecting network scans.
Proceedings of the Management Solutions for the New Communications World, 2002

Adjusted Probabilistic Packet Marking for IP Traceback.
Proceedings of the NETWORKING 2002, 2002

Learning to Share Distributed Probabilistic Beliefs.
Proceedings of the Machine Learning, 2002

1999
An Evaluation of Criteria for Measuring the Quality of Clusters.
Proceedings of the Sixteenth International Joint Conference on Artificial Intelligence, 1999

1998
Inductive Learning of Search Control Rules for Planning.
Artif. Intell., 1998

1997
A Multi-Agent System for Distributed Fault Diagnosis.
Proceedings of the Second International Conference on the Practical Application of Intelligent Agents and Multi-Agent Technology, 1997

Locating Faults in Tree-Structured Networks.
Proceedings of the Fifteenth International Joint Conference on Artificial Intelligence, 1997

1996
The Development of an Interactive Fault Diagnosis Expert System for Telecommunication Applications.
Proceedings of the PRICAI'96: Topics in Artificial Intelligence, 1996

1993
An Inductive Approach to Learning Search Control Rules for Planning.
Proceedings of the 13th International Joint Conference on Artificial Intelligence. Chambéry, France, August 28, 1993

1991
Learning Search Control Rules for Planning: An Inductive Approach.
Proceedings of the Eighth International Workshop (ML91), 1991


  Loading...