Matthias Schonlau

According to our database1, Matthias Schonlau authored at least 19 papers between 1998 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
exKidneyBERT: a language model for kidney transplant pathology reports and the crucial role of extended vocabularies.
PeerJ Comput. Sci., 2024

2023
Multi-label classification of open-ended questions with BERT.
CoRR, 2023

2021
Optimal 1-NN prototypes for pathological geometries.
PeerJ Comput. Sci., 2021

Soft-Label Dataset Distillation and Text Dataset Distillation.
Proceedings of the International Joint Conference on Neural Networks, 2021

One Line To Rule Them All: Generating LO-Shot Soft-Label Prototypes.
Proceedings of the International Joint Conference on Neural Networks, 2021

SecDD: Efficient and Secure Method for Remotely Training Neural Networks (Student Abstract).
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

'Less Than One'-Shot Learning: Learning N Classes From M < N Samples.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
SecDD: Efficient and Secure Method for Remotely Training Neural Networks.
CoRR, 2020

2019
Pay attention and you won't lose it: a deep learning approach to sequence imputation.
PeerJ Comput. Sci., 2019

Nearest labelset using double distances for multi-label classification.
PeerJ Comput. Sci., 2019

The k conditional nearest neighbor algorithm for classification and class probability estimation.
PeerJ Comput. Sci., 2019

Improving Dataset Distillation.
CoRR, 2019

Deep Learning for System Trace Restoration.
Proceedings of the International Joint Conference on Neural Networks, 2019

2016
Using a Gaussian Process as a Nonparametric Regression Model.
Qual. Reliab. Eng. Int., 2016

2004
Visualizing non-hierarchical and hierarchical cluster analyses with clustergrams.
Comput. Stat., 2004

2000
Detecting masquerades in intrusion detection based on unpopular commands.
Inf. Process. Lett., 2000

Defection detection: using activity profiles to predict ISP customer vulnerability.
Proceedings of the sixth ACM SIGKDD international conference on Knowledge discovery and data mining, 2000

1998
Efficient Global Optimization of Expensive Black-Box Functions.
J. Glob. Optim., 1998

A Fast Computer Intrusion Detection Algorithm Based on Hypothesis Testing of Command Transition Probabilities.
Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining (KDD-98), 1998


  Loading...