


Остановите войну!
for scientists:


default search action
Christopher Leckie
Christopher A. Leckie – Chris Leckie
Person information

- affiliation: University of Melbourne, School of Computing and Information Systems, Australia
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [i36]Hadi M. Dolatabadi, Sarah M. Erfani, Christopher Leckie:
The Devil's Advocate: Shattering the Illusion of Unexploitable Data using Diffusion Models. CoRR abs/2303.08500 (2023) - [i35]Marc Katzef, Andrew C. Cullen, Tansu Alpcan, Christopher Leckie, Justin Kopacz:
Failure-tolerant Distributed Learning for Anomaly Detection in Wireless Networks. CoRR abs/2303.13015 (2023) - [i34]Amila Silva, Ling Luo, Shanika Karunasekera, Christopher Leckie:
Unsupervised Domain-agnostic Fake News Detection using Multi-modal Weak Signals. CoRR abs/2305.11349 (2023) - 2022
- [j82]Marc Katzef
, Andrew C. Cullen
, Tansu Alpcan
, Christopher Leckie:
Generative Adversarial Networks for anomaly detection on decentralised data. Annu. Rev. Control. 53: 329-337 (2022) - [j81]Jiaman Ma
, Jeffrey Chan
, Sutharshan Rajasegarar, Christopher Leckie:
Multi-attention graph neural networks for city-wide bus travel time estimation using limited data. Expert Syst. Appl. 202: 117057 (2022) - [j80]Yousef Kowsar, Masud Moshtaghi, Eduardo Velloso, James C. Bezdek, Lars Kulik, Christopher Leckie:
Shape-Sphere: A metric space for analysing time series by their shape. Inf. Sci. 582: 198-214 (2022) - [j79]Emir Demirovic, Anna Lukina, Emmanuel Hebrard, Jeffrey Chan, James Bailey, Christopher Leckie, Kotagiri Ramamohanarao, Peter J. Stuckey:
MurTree: Optimal Decision Trees via Dynamic Programming and Search. J. Mach. Learn. Res. 23: 26:1-26:47 (2022) - [j78]Xuyun Zhang
, Lianyong Qi
, Wanchun Dou
, Qiang He
, Christopher Leckie, Ramamohanarao Kotagiri, Zoran Salcic
:
MRMondrian: Scalable Multidimensional Anonymisation for Big Data Privacy Preservation. IEEE Trans. Big Data 8(1): 125-139 (2022) - [j77]Yousef Kowsar
, Masud Moshtaghi
, Eduardo Velloso
, Christopher Leckie, Lars Kulik:
An Online Unsupervised Dynamic Window Method to Track Repeating Patterns From Sensor Data. IEEE Trans. Cybern. 52(6): 5148-5160 (2022) - [c190]Ali Ugur Guler, Emir Demirovic, Jeffrey Chan, James Bailey, Christopher Leckie, Peter J. Stuckey:
A Divide and Conquer Algorithm for Predict+Optimize with Non-convex Problems. AAAI 2022: 3749-3757 - [c189]Amila Silva, Ling Luo, Shanika Karunasekera, Christopher Leckie:
Noise-Robust Learning from Multiple Unsupervised Sources of Inferred Labels. AAAI 2022: 8315-8323 - [c188]Hadi M. Dolatabadi
, Sarah M. Erfani
, Christopher Leckie
:
COLLIDER: A Robust Training Framework for Backdoor Data. ACCV (6) 2022: 681-698 - [c187]Sandamal Weerasinghe, Tamas Abraham, Tansu Alpcan, Sarah M. Erfani, Christopher Leckie, Benjamin I. P. Rubinstein:
Local Intrinsic Dimensionality Signals Adversarial Perturbations. CDC 2022: 6118-6125 - [c186]Hadi M. Dolatabadi
, Sarah M. Erfani
, Christopher Leckie
:
ℓ ∞-Robustness and Beyond: Unleashing Efficient Adversarial Training. ECCV (11) 2022: 467-483 - [c185]Marc Katzef, Andrew C. Cullen, Tansu Alpcan, Christopher Leckie, Justin Kopacz:
Wireless Network Simulation to Create Machine Learning Benchmark Data. GLOBECOM 2022: 6378-6383 - [c184]Rahul Sharma, Chien Aun Chan, Christopher Leckie:
Hybrid Collaborative Architectures For Intrusion Detection In Multi-Access Edge Computing. NOMS 2022: 1-7 - [c183]Siqi Xia
, Sutharshan Rajasegarar
, Christopher Leckie
, Sarah M. Erfani
, Jeffrey Chan
:
Exploiting Redundancy in Network Flow Information for Efficient Security Attack Detection. NSS 2022: 105-119 - [c182]Qizhou Wang, Mahsa Salehi, Jia Shun Low, Wray L. Buntine, Christopher Leckie:
ENDASh: Embedding Neighbourhood Dissimilarity with Attribute Shuffling for Graph Anomaly Detection. PAKDD (2) 2022: 17-29 - [c181]Laurence A. F. Park, Mohadeseh Ganji, Emir Demirovic, Jeffrey Chan
, Peter J. Stuckey, James Bailey, Christopher Leckie, Rao Kotagiri:
Modelling Zeros in Blockmodelling. PAKDD (2) 2022: 187-198 - [i33]Hadi M. Dolatabadi, Sarah M. Erfani, Christopher Leckie:
Adversarial Coreset Selection for Efficient Robust Training. CoRR abs/2209.05785 (2022) - [i32]Hadi M. Dolatabadi, Sarah M. Erfani, Christopher Leckie:
COLLIDER: A Robust Training Framework for Backdoor Data. CoRR abs/2210.06704 (2022) - [i31]Maxwell T. West, Sarah M. Erfani, Christopher Leckie, Martin Sevior, Lloyd C. L. Hollenberg, Muhammad Usman
:
Benchmarking Adversarially Robust Quantum Machine Learning at Scale. CoRR abs/2211.12681 (2022) - [i30]Qizhou Wang, Guansong Pang, Mahsa Salehi, Wray L. Buntine, Christopher Leckie:
Cross-Domain Graph Anomaly Detection via Anomaly-aware Contrastive Alignment. CoRR abs/2212.01096 (2022) - 2021
- [j76]Amila Silva
, Yi Han, Ling Luo
, Shanika Karunasekera, Christopher Leckie:
Propagation2Vec: Embedding partial propagation networks for explainable fake news early detection. Inf. Process. Manag. 58(5): 102618 (2021) - [j75]Sandamal Weerasinghe
, Tansu Alpcan, Sarah M. Erfani
, Christopher Leckie:
Defending Support Vector Machines Against Data Poisoning Attacks. IEEE Trans. Inf. Forensics Secur. 16: 2566-2578 (2021) - [c180]Amila Silva, Ling Luo, Shanika Karunasekera, Christopher Leckie:
Embracing Domain Differences in Fake News: Cross-domain Fake News Detection using Multi-modal Data. AAAI 2021: 557-565 - [c179]Elaheh Alipour Chavary
, Sarah M. Erfani, Christopher Leckie:
Scalable Contrast Pattern Mining over Data Streams. CIKM 2021: 2842-2846 - [c178]Yi Han
, Shanika Karunasekera
, Christopher Leckie
:
Continual Learning for Fake News Detection from Social Media. ICANN (2) 2021: 372-384 - [c177]Marc Katzef, Andrew C. Cullen
, Tansu Alpcan, Christopher Leckie, Justin Kopacz:
Privacy-Preserving Collaborative SDR Networks for Anomaly Detection. ICC 2021: 1-6 - [c176]Sandamal Weerasinghe, Tamas Abraham, Tansu Alpcan, Sarah M. Erfani, Christopher Leckie, Benjamin I. P. Rubinstein:
Closing the BIG-LID: An Effective Local Intrinsic Dimensionality Defense for Nonlinear Regression Poisoning. IJCAI 2021: 3176-3184 - [c175]Elaheh Alipour Chavary
, Sarah M. Erfani, Christopher Leckie:
Mining Rare Recurring Events in Network Traffic using Second Order Contrast Patterns. IJCNN 2021: 1-8 - [c174]Qizhou Wang, Sarah M. Erfani, Christopher Leckie, Michael E. Houle:
A Dimensionality-Driven Approach for Unsupervised Out-of-distribution Detection. SDM 2021: 118-126 - [p2]Rahul Sharma, Chien Aun Chan, Christopher Leckie:
Evaluation of Collaborative Intrusion Detection System Architectures in Mobile Edge Computing. Mobile Edge Computing 2021: 359-384 - [i29]Amila Silva, Ling Luo, Shanika Karunasekera, Christopher Leckie:
Embracing Domain Differences in Fake News: Cross-domain Fake News Detection using Multi-modal Data. CoRR abs/2102.06314 (2021) - [i28]Yi Han, Amila Silva, Ling Luo, Shanika Karunasekera, Christopher Leckie:
Knowledge Enhanced Multi-modal Fake News Detection. CoRR abs/2108.04418 (2021) - [i27]Sandamal Weerasinghe, Tansu Alpcan, Sarah M. Erfani, Christopher Leckie, Benjamin I. P. Rubinstein:
Local Intrinsic Dimensionality Signals Adversarial Perturbations. CoRR abs/2109.11803 (2021) - [i26]Hadi M. Dolatabadi, Sarah M. Erfani, Christopher Leckie:
𝓁∞-Robustness and Beyond: Unleashing Efficient Adversarial Training. CoRR abs/2112.00378 (2021) - 2020
- [j74]Masoomeh Zameni
, Amin Sadri, Zahra Ghafoori, Masud Moshtaghi, Flora D. Salim, Christopher Leckie
, Kotagiri Ramamohanarao:
Unsupervised online change point detection in high-dimensional time series. Knowl. Inf. Syst. 62(2): 719-750 (2020) - [j73]Yunzhe Jia
, James Bailey, Kotagiri Ramamohanarao, Christopher Leckie
, Xingjun Ma
:
Exploiting patterns to explain individual predictions. Knowl. Inf. Syst. 62(3): 927-950 (2020) - [j72]Zahra Ghafoori
, Sarah M. Erfani
, James C. Bezdek
, Shanika Karunasekera, Christopher Leckie:
LN-SNE: Log-Normal Distributed Stochastic Neighbor Embedding for Anomaly Detection. IEEE Trans. Knowl. Data Eng. 32(4): 815-820 (2020) - [c173]Emir Demirovic, Peter J. Stuckey, Tias Guns, James Bailey, Christopher Leckie, Kotagiri Ramamohanarao, Jeffrey Chan:
Dynamic Programming for Predict+Optimise. AAAI 2020: 1444-1451 - [c172]Hadi Mohaghegh Dolatabadi, Sarah M. Erfani, Christopher Leckie:
Invertible Generative Modeling using Linear Rational Splines. AISTATS 2020: 4236-4246 - [c171]Amila Silva, Yi Han, Ling Luo, Shanika Karunasekera, Christopher Leckie:
Embedding Partial Propagation Network for Fake News Early Detection. CIKM (Workshops) 2020 - [c170]Amila Silva
, Shanika Karunasekera, Christopher Leckie, Ling Luo:
METEOR: Learning Memory and Time Efficient Representations from Multi-modal Data Streams. CIKM 2020: 1375-1384 - [c169]Marc Katzef
, Andrew C. Cullen
, Tansu Alpcan
, Christopher Leckie
, Justin Kopacz
:
Distributed Generative Adversarial Networks for Anomaly Detection. GameSec 2020: 3-22 - [c168]Jiaman Ma, Jeffrey Chan
, Sutharshan Rajasegarar
, Goce Ristanoski, Christopher Leckie:
Multi-Attention 3D Residual Neural Network for Origin-Destination Crowd Flow Prediction. ICDM 2020: 1160-1165 - [c167]Yi Han, David Hubczenko, Paul Montague, Olivier Y. de Vel, Tamas Abraham, Benjamin I. P. Rubinstein, Christopher Leckie, Tansu Alpcan, Sarah M. Erfani:
Adversarial Reinforcement Learning under Partial Observability in Autonomous Computer Network Defence. IJCNN 2020: 1-8 - [c166]Li Li, Sarah M. Erfani, Chien Aun Chan, Christopher Leckie:
Discovery of contrast corridors from trajectory data in heterogeneous dynamic cellular networks. IJCNN 2020: 1-8 - [c165]Rishabh Ramteke, Peter J. Stuckey, Jeffrey Chan, Kotagiri Ramamohanarao, James Bailey, Christopher Leckie, Emir Demirovic:
Improving Single and Multi-View Blockmodelling by Algebraic Simplification. IJCNN 2020: 1-7 - [c164]Rahul Sharma, Chien Aun Chan, Christopher Leckie:
Evaluation of Centralised vs Distributed Collaborative Intrusion Detection Systems in Multi-Access Edge Computing. Networking 2020: 343-351 - [c163]Hadi Mohaghegh Dolatabadi, Sarah M. Erfani, Christopher Leckie:
AdvFlow: Inconspicuous Black-box Adversarial Attacks using Normalizing Flows. NeurIPS 2020 - [c162]Yi Han
, Shanika Karunasekera
, Christopher Leckie
:
Image Analysis Enhanced Event Detection from Geo-Tagged Tweet Streams. PAKDD (1) 2020: 398-410 - [c161]Amila Silva
, Ling Luo, Shanika Karunasekera, Christopher Leckie:
OMBA: User-Guided Product Representations for Online Market Basket Analysis. ECML/PKDD (1) 2020: 55-71 - [c160]Zahra Ghafoori, Christopher Leckie:
Deep Multi-sphere Support Vector Data Description. SDM 2020: 109-117 - [i25]Hadi Mohaghegh Dolatabadi, Sarah M. Erfani, Christopher Leckie:
Invertible Generative Modeling using Linear Rational Splines. CoRR abs/2001.05168 (2020) - [i24]Yi Han
, Shanika Karunasekera, Christopher Leckie:
Image Analysis Enhanced Event Detection from Geo-tagged Tweet Streams. CoRR abs/2002.04208 (2020) - [i23]Amila Silva
, Ling Luo, Shanika Karunasekera, Christopher Leckie:
OMBA: User-Guided Product Representations for Online Market Basket Analysis. CoRR abs/2006.10396 (2020) - [i22]Hadi M. Dolatabadi, Sarah M. Erfani, Christopher Leckie:
Black-box Adversarial Example Generation with Normalizing Flows. CoRR abs/2007.02734 (2020) - [i21]Yi Han, Shanika Karunasekera, Christopher Leckie:
Graph Neural Networks with Continual Learning for Fake News Detection from Social Media. CoRR abs/2007.03316 (2020) - [i20]Hadi M. Dolatabadi, Sarah M. Erfani, Christopher Leckie:
AdvFlow: Inconspicuous Black-box Adversarial Attacks using Normalizing Flows. CoRR abs/2007.07435 (2020) - [i19]Amila Silva
, Shanika Karunasekera, Christopher Leckie, Ling Luo:
METEOR: Learning Memory and Time Efficient Representations from Multi-modal Data Streams. CoRR abs/2007.11847 (2020) - [i18]Emir Demirovic, Anna Lukina, Emmanuel Hebrard, Jeffrey Chan, James Bailey, Christopher Leckie, Kotagiri Ramamohanarao, Peter J. Stuckey:
MurTree: Optimal Classification Trees via Dynamic Programming and Search. CoRR abs/2007.12652 (2020) - [i17]Sandamal Weerasinghe, Sarah M. Erfani, Tansu Alpcan, Christopher Leckie, Justin Kopacz:
Defending Regression Learners Against Poisoning Attacks. CoRR abs/2008.09279 (2020) - [i16]Sandamal Weerasinghe, Tansu Alpcan, Sarah M. Erfani, Christopher Leckie:
Defending Distributed Classifiers Against Data Poisoning Attacks. CoRR abs/2008.09284 (2020) - [i15]Elaheh Alipour Chavary, Sarah M. Erfani, Christopher Leckie:
Improving Scalability of Contrast Pattern Mining for Network Traffic Using Closed Patterns. CoRR abs/2011.14830 (2020) - [i14]Ali Ugur Guler, Emir Demirovic, Jeffrey Chan, James Bailey, Christopher Leckie, Peter J. Stuckey:
Divide and Learn: A Divide and Conquer Approach for Predict+Optimize. CoRR abs/2012.02342 (2020)
2010 – 2019
- 2019
- [j71]Jiaojiao Jiang
, Steve Versteeg, Jun Han, Md. Arafat Hossain
, Jean-Guy Schneider, Christopher Leckie
, Zeinab Farahmandpour:
P-Gram: Positional N-Gram for the Clustering of Machine-Generated Messages. IEEE Access 7: 88504-88516 (2019) - [j70]Zhanghan Tang
, Margreta Kuijper
, Michelle S. Chong
, Iven Mareels
, Christopher Leckie
:
Linear system security - Detection and correction of adversarial sensor attacks in the noise-free case. Autom. 101: 53-59 (2019) - [j69]Masud Moshtaghi, James C. Bezdek, Sarah M. Erfani, Christopher Leckie
, James Bailey:
Online cluster validity indices for performance monitoring of streaming data clustering. Int. J. Intell. Syst. 34(4): 541-563 (2019) - [j68]Kwan Hui Lim
, Jeffrey Chan
, Shanika Karunasekera, Christopher Leckie
:
Tour recommendation and trip planning using location-based social media: a survey. Knowl. Inf. Syst. 60(3): 1247-1275 (2019) - [j67]Sandamal Weerasinghe
, Sarah M. Erfani, Tansu Alpcan, Christopher Leckie
:
Support vector machines resilient against training data integrity attacks. Pattern Recognit. 96 (2019) - [j66]Punit Rathore
, Zahra Ghafoori, James C. Bezdek
, Marimuthu Palaniswami
, Christopher Leckie
:
Approximating Dunn's Cluster Validity Indices for Partitions of Big Data. IEEE Trans. Cybern. 49(5): 1629-1641 (2019) - [c159]Jia Shun Low, Zahra Ghafoori, Christopher Leckie:
Online K-Means Clustering with Lightweight Coresets. Australasian Conference on Artificial Intelligence 2019: 191-202 - [c158]Jia Shun Low, Zahra Ghafoori, James C. Bezdek, Christopher Leckie:
Seeding on Samples for Accelerating K-Means Clustering. BDIOT 2019: 41-45 - [c157]Yi Han
, Shanika Karunasekera, Christopher Leckie, Aaron Harwood:
Multi-spatial Scale Event Detection from Geo-tagged Tweet Streams via Power-law Verification. IEEE BigData 2019: 1131-1136 - [c156]Amila Silva
, Shanika Karunasekera, Christopher Leckie, Ling Luo:
USTAR: Online Multimodal Embedding for Modeling User-Guided Spatiotemporal Activity. IEEE BigData 2019: 1211-1217 - [c155]Li Li
, Sarah M. Erfani, Chien Aun Chan, Christopher Leckie:
Multi-scale Trajectory Clustering to Identify Corridors in Mobile Networks. CIKM 2019: 2253-2256 - [c154]Emir Demirovic, Peter J. Stuckey, James Bailey, Jeffrey Chan
, Chris Leckie
, Kotagiri Ramamohanarao, Tias Guns
:
An Investigation into Prediction + Optimisation for the Knapsack Problem. CPAIOR 2019: 241-257 - [c153]Masoomeh Zameni, Zahra Ghafoori, Amin Sadri, Christopher Leckie
, Kotagiri Ramamohanarao:
Change Point Detection for Streaming High-Dimensional Time Series. DASFAA (3) 2019: 515-519 - [c152]Yousef Kowsar, Eduardo Velloso, Lars Kulik, Christopher Leckie:
LiftSmart: a monitoring and warning wearable for weight trainers. UbiComp/ISWC Adjunct 2019: 298-301 - [c151]Chien Aun Chan, Ming Yan
, André F. Gygax
, Wenwen Li, Li Li, Chih-Lin I, Jinyao Yan, Christopher Leckie
:
Big Data Driven Predictive Caching at the Wireless Edge. ICC Workshops 2019: 1-6 - [c150]Emir Demirovic, Peter J. Stuckey, James Bailey, Jeffrey Chan, Christopher Leckie, Kotagiri Ramamohanarao, Tias Guns
:
Predict+Optimise with Ranking Objectives: Exhaustively Learning Linear Functions. IJCAI 2019: 1078-1085 - [c149]Fateme Fahiman, Sarah M. Erfani, Christopher Leckie:
Robust and Accurate Short-Term Load Forecasting: A Cluster Oriented Ensemble Learning Approach. IJCNN 2019: 1-8 - [c148]Li Li
, Chien Aun Chan, Sarah M. Erfani, Christopher Leckie:
Adaptive Edge Caching based on Popularity and Prediction for Mobile Networks. IJCNN 2019: 1-10 - [c147]Meng Yang, Sutharshan Rajasegarar
, Sarah M. Erfani, Christopher Leckie:
Deep Learning and One-class SVM based Anomalous Crowd Detection. IJCNN 2019: 1-8 - [c146]Yunzhe Jia, James Bailey, Kotagiri Ramamohanarao, Christopher Leckie
, Michael E. Houle:
Improving the Quality of Explanations with Local Embedding Perturbations. KDD 2019: 875-884 - [c145]Zahra Ghafoori, James C. Bezdek, Christopher Leckie, Shanika Karunasekera:
Unsupervised and Active Learning Using Maximin-Based Anomaly Detection. ECML/PKDD (1) 2019: 90-106 - [i13]Yi Han
, David Hubczenko, Paul Montague, Olivier Y. de Vel, Tamas Abraham, Benjamin I. P. Rubinstein, Christopher Leckie, Tansu Alpcan, Sarah M. Erfani:
Adversarial Reinforcement Learning under Partial Observability in Software-Defined Networking. CoRR abs/1902.09062 (2019) - [i12]Yi Han, Shanika Karunasekera, Christopher Leckie, Aaron Harwood:
Power-law Verification for Event Detection at Multi-spatial Scales from Geo-tagged Tweet Streams. CoRR abs/1906.05063 (2019) - [i11]Amila Silva, Shanika Karunasekera, Christopher Leckie, Ling Luo:
USTAR: Online Multimodal Embedding for Modeling User-Guided Spatiotemporal Activity. CoRR abs/1910.10335 (2019) - 2018
- [j65]Dheeraj Kumar
, Zahra Ghafoori, James C. Bezdek, Christopher Leckie
, Kotagiri Ramamohanarao, Marimuthu Palaniswami:
Dealing with Inliers in Feature Vector Data. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 26(Supplement-2): 25-45 (2018) - [j64]Kwan Hui Lim
, Jeffrey Chan
, Christopher Leckie
, Shanika Karunasekera:
Personalized trip recommendation for tourists based on user interests, points of interest visit durations and visit recency. Knowl. Inf. Syst. 54(2): 375-406 (2018) - [j63]Dheeraj Kumar
, Huayu Wu, Sutharshan Rajasegarar
, Christopher Leckie
, Shonali Krishnaswamy, Marimuthu Palaniswami
:
Fast and Scalable Big Data Trajectory Clustering for Understanding Urban Mobility. IEEE Trans. Intell. Transp. Syst. 19(11): 3709-3722 (2018) - [j62]Zahra Ghafoori
, Sarah M. Erfani, Sutharshan Rajasegarar
, James C. Bezdek
, Shanika Karunasekera, Christopher Leckie
:
Efficient Unsupervised Parameter Estimation for One-Class Support Vector Machines. IEEE Trans. Neural Networks Learn. Syst. 29(10): 5057-5070 (2018) - [c144]Minh Tuan Doan, Jianzhong Qi
, Sutharshan Rajasegarar
, Christopher Leckie
:
Scalable Bottom-up Subspace Clustering using FP-Trees for High Dimensional Data. IEEE BigData 2018: 106-111 - [c143]Meng Yang, Lida Rashidi, Sutharshan Rajasegarar
, Christopher Leckie
, Aravinda S. Rao
, Marimuthu Palaniswami
:
Crowd Activity Change Point Detection in Videos via Graph Stream Mining. CVPR Workshops 2018: 215-223 - [c142]Meng Yang, Lida Rashidi, Aravinda S. Rao
, Sutharshan Rajasegarar
, Mohadeseh Ganji, Marimuthu Palaniswami
, Christopher Leckie
:
Cluster-Based Crowd Movement Behavior Detection. DICTA 2018: 1-8 - [c141]Yi Han
, Benjamin I. P. Rubinstein
, Tamas Abraham
, Tansu Alpcan
, Olivier Y. de Vel, Sarah M. Erfani
, David Hubczenko, Christopher Leckie
, Paul Montague:
Reinforcement Learning for Autonomous Defence in Software-Defined Networking. GameSec 2018: 145-165 - [c140]Sandamal Weerasinghe, Tansu Alpcan, Sarah M. Erfani, Christopher Leckie
, Peyam Pourbeik, Jack Riddle:
Deep Learning Based Game-Theoretical Approach to Evade Jamming Attacks. GameSec 2018: 386-397 - [c139]Sandamal Weerasinghe, Sarah M. Erfani, Tansu Alpcan, Christopher Leckie
, Jack Riddle:
Detection of Anomalous Communications with SDRs and Unsupervised Adversarial Learning. LCN 2018: 469-472 - [c138]Milad Chenaghlou, Masud Moshtaghi, Christopher Leckie
, Mahsa Salehi:
Online Clustering for Evolving Data Streams with Online Anomaly Detection. PAKDD (2) 2018: 508-521 - [c137]Mohadeseh Ganji, Jeffrey Chan
, Peter J. Stuckey, James Bailey, Christopher Leckie
, Kotagiri Ramamohanarao, Laurence A. F. Park:
Semi-supervised Blockmodelling with Pairwise Guidance. ECML/PKDD (2) 2018: 158-174 - [c136]Masoomeh Zameni, Mengyi He, Masud Moshtaghi, Zahra Ghafoori, Christopher Leckie
, James C. Bezdek, Kotagiri Ramamohanarao:
Urban Sensing for Anomalous Event Detection: - Distinguishing Between Legitimate Traffic Changes and Abnormal Traffic Variability. ECML/PKDD (3) 2018: 553-568 - [c135]Meng Yang, Lida Rashidi, Sutharshan Rajasegarar
, Christopher Leckie
:
Graph Stream Mining Based Anomalous Event Analysis. PRICAI (1) 2018: 891-903 - [c134]Mohadeseh Ganji, Jeffrey Chan, Peter J. Stuckey, James Bailey, Christopher Leckie, Kotagiri Ramamohanarao, Ian Davidson:
Image Constrained Blockmodelling: A Constraint Programming Approach. SDM 2018: 19-27 - [c133]Punit Rathore
, Zahra Ghafoori, James C. Bezdek, Marimuthu Palaniswami
, Christopher Leckie
:
Estimating Generalized Dunn's Cluster Validity Indices for Big Data. SMC 2018: 656-661 - [c132]Xuyun Zhang, Mahsa Salehi, Christopher Leckie
, Yun Luo, Qiang He, Rui Zhou, Rao Kotagiri:
Density Biased Sampling with Locality Sensitive Hashing for Outlier Detection. WISE (2) 2018: 269-284 - [i10]Masud Moshtaghi, James C. Bezdek, Sarah M. Erfani, Christopher Leckie, James Bailey:
Online Cluster Validity Indices for Streaming Data. CoRR abs/1801.02937 (2018) - [i9]Yi Han, Benjamin I. P. Rubinstein, Tamas Abraham, Tansu Alpcan, Olivier Y. de Vel, Sarah M. Erfani, David Hubczenko, Christopher Leckie, Paul Montague:
Reinforcement Learning for Autonomous Defence in Software-Defined Networking. CoRR abs/1808.05770 (2018) - [i8]Minh Tuan Doan, Jianzhong Qi, Sutharshan Rajasegarar, Christopher Leckie:
Scalable Bottom-up Subspace Clustering using FP-Trees for High Dimensional Data. CoRR abs/1811.02722 (2018) - 2017
- [j61]Rodrigo N. Calheiros
, Kotagiri Ramamohanarao, Rajkumar Buyya
, Christopher Leckie
, Steve Versteeg:
On the effectiveness of isolation-based anomaly detection in cloud data centers. Concurr. Comput. Pract. Exp. 29(18) (2017) - [j60]Masud Moshtaghi, Sarah M. Erfani, Christopher Leckie
, James C. Bezdek:
Exponentially Weighted Ellipsoidal Model for Anomaly Detection. Int. J. Intell. Syst. 32(9): 881-899 (2017) - [j59]Tarique Anwar
, Chengfei Liu
, Hai Le Vu
, Christopher Leckie
:
Partitioning road networks using density peak graphs: Efficiency vs. accuracy. Inf. Syst. 64: 22-40 (2017) - [j58]Yi Han
, Jeffrey Chan
, Tansu Alpcan, Christopher Leckie
:
Using Virtual Machine Allocation Policies to Defend against Co-Resident Attacks in Cloud Computing. IEEE Trans. Dependable Secur. Comput. 14(1): 95-108 (2017) - [j57]Dheeraj Kumar
, James C. Bezdek, Sutharshan Rajasegarar
, Christopher Leckie
, Marimuthu Palaniswami
:
A visual-numeric approach to clustering and anomaly detection for trajectory data. Vis. Comput. 33(3): 265-281 (2017) - [c131]Sarah M. Erfani, Mahsa Baktashmotlagh, Masud Moshtaghi, Vinh Nguyen, Christopher Leckie, James Bailey, Kotagiri Ramamohanarao:
From Shared Subspaces to Shared Landmarks: A Robust Multi-Source Classification Approach. AAAI 2017: 1854-1860 - [c130]Yuantian Miao, Lei Pan
, Sutharshan Rajasegarar
, Jun Zhang, Christopher Leckie
, Yang Xiang:
Distributed Detection of Zero-Day Network Traffic Flows. AusDM 2017: 173-191 - [c129]