Cited By
View all- Balaji JMin CJaved FZhu Y(2018)AvatarProceedings of the Second Workshop on Data Management for End-To-End Machine Learning10.1145/3209889.3209892(1-10)Online publication date: 15-Jun-2018
- Young WMemory AGoldberg HSenator T(2014)Detecting Unknown Insider Threat ScenariosProceedings of the 2014 IEEE Security and Privacy Workshops10.1109/SPW.2014.42(277-288)Online publication date: 17-May-2014
- Shen QBoongoen T(2012)Fuzzy Orders-of-Magnitude-Based Link Analysis for Qualitative Alias DetectionIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2010.25524:4(649-664)Online publication date: 1-Apr-2012