default search action
Christopher Leckie
Person information
- affiliation: University of Melbourne, School of Computing and Information Systems, Australia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j87]Siqi Xia, Sutharshan Rajasegarar, Lei Pan, Christopher Leckie, Sarah M. Erfani, Jeffrey Chan:
LabelGen: An Anomaly Label Generative Framework for Enhanced Graph Anomaly Detection. IEEE Access 12: 121971-121982 (2024) - [j86]Amila Silva, Ling Luo, Shanika Karunasekera, Christopher Leckie:
Unsupervised Domain-Agnostic Fake News Detection Using Multi-Modal Weak Signals. IEEE Trans. Knowl. Data Eng. 36(11): 7283-7295 (2024) - [c205]Chen Wang, Sarah M. Erfani, Tansu Alpcan, Christopher Leckie:
Detecting Anomalous Agent Decision Sequences Based on Offline Imitation Learning. AAMAS 2024: 2543-2545 - [c204]Ziren Xiao, Christopher Leckie, Maria A. Rodriguez:
Intelligent Data Source Emission Rate Control for Optimising the Performance of Streaming Applications. CCGrid 2024: 266-272 - [c203]Hadi M. Dolatabadi, Sarah M. Erfani, Christopher Leckie:
Be Persistent: Towards a Unified Solution for Mitigating Shortcuts in Deep Learning. ECAI 2024: 2540-2547 - [c202]Chen Wang, Sarah M. Erfani, Tansu Alpcan, Christopher Leckie:
DeCoRTAD: Diffusion Based Conditional Representation Learning for Online Trajectory Anomaly Detection. ECAI 2024: 2757-2764 - [c201]Isura Manchanayaka, Zainab Zaidi, Shanika Karunasekera, Christopher Leckie:
Identifying Coordinated Activities on Online Social Networks Using Contrast Pattern Mining. IJCNN 2024: 1-9 - [c200]Yufan Kang, Jeffrey Chan, Wei Shao, Flora D. Salim, Christopher Leckie:
Long-Term Fairness in Ride-Hailing Platform. ECML/PKDD (9) 2024: 223-239 - [c199]Hadi M. Dolatabadi, Sarah M. Erfani, Christopher Leckie:
The Devil's Advocate: Shattering the Illusion of Unexploitable Data using Diffusion Models. SaTML 2024: 358-386 - [i46]Chen Wang, Sarah M. Erfani, Tansu Alpcan, Christopher Leckie:
OIL-AD: An Anomaly Detection Framework for Sequential Decision Sequences. CoRR abs/2402.04567 (2024) - [i45]Zainab Zaidi, Tansu Alpcan, Christopher Leckie, Sarah Efrain:
An Interpretable Low-complexity Model for Wireless Channel Estimation. CoRR abs/2402.07385 (2024) - [i44]Hadi M. Dolatabadi, Sarah M. Erfani, Christopher Leckie:
Be Persistent: Towards a Unified Solution for Mitigating Shortcuts in Deep Learning. CoRR abs/2402.11237 (2024) - [i43]Canaan Yung, Hadi Mohaghegh Dolatabadi, Sarah M. Erfani, Christopher Leckie:
Round Trip Translation Defence against Large Language Model Jailbreaking Attacks. CoRR abs/2402.13517 (2024) - [i42]Isura Manchanayaka, Zainab Razia Zaidi, Shanika Karunasekera, Christopher Leckie:
Using Causality to Infer Coordinated Attacks in Social Media. CoRR abs/2407.11690 (2024) - [i41]Isura Manchanayaka, Zainab Zaidi, Shanika Karunasekera, Christopher Leckie:
Identifying Coordinated Activities on Online Social Networks Using Contrast Pattern Mining. CoRR abs/2407.11697 (2024) - [i40]Yufan Kang, Jeffrey Chan, Wei Shao, Flora D. Salim, Christopher Leckie:
Long-term Fairness in Ride-Hailing Platform. CoRR abs/2407.17839 (2024) - [i39]Ching-Chun Chang, Kai Gao, Shuying Xu, Anastasia Kordoni, Christopher Leckie, Isao Echizen:
Psychometrics for Hypnopaedia-Aware Machinery via Chaotic Projection of Artificial Mental Imagery. CoRR abs/2410.05284 (2024) - 2023
- [j85]Hadi M. Dolatabadi, Sarah M. Erfani, Christopher Leckie:
Adversarial Coreset Selection for Efficient Robust Training. Int. J. Comput. Vis. 131(12): 3307-3331 (2023) - [j84]Maxwell T. West, Shu Lok Tsang, Jia Shun Low, Charles D. Hill, Christopher Leckie, Lloyd C. L. Hollenberg, Sarah M. Erfani, Muhammad Usman:
Towards quantum enhanced adversarial robustness in machine learning. Nat. Mac. Intell. 5(6): 581-589 (2023) - [j83]Vincenzo Bassi, Luis F. Ochoa, Tansu Alpcan, Christopher Leckie:
Electrical Model-Free Voltage Calculations Using Neural Networks and Smart Meter Data. IEEE Trans. Smart Grid 14(4): 3271-3282 (2023) - [c198]Qizhou Wang, Guansong Pang, Mahsa Salehi, Wray L. Buntine, Christopher Leckie:
Cross-Domain Graph Anomaly Detection via Anomaly-Aware Contrastive Alignment. AAAI 2023: 4676-4684 - [c197]Siqi Xia, Sutharshan Rajasegarar, Christopher Leckie, Sarah M. Erfani, Jeffrey Chan, Lei Pan:
EnSpeciVAT: Enhanced SpecieVAT for Cluster Tendency Identification in Graphs. ADMA (3) 2023: 323-337 - [c196]Zixin Ye, Tansu Alpcan, Christopher Leckie:
A Group Formation Game for Local Anomaly Detection. CDC 2023: 2086-2091 - [c195]Vincent Barbosa Vaz, James Bailey, Christopher Leckie, Peter J. Stuckey:
Predict-Then-Optimise Strategies for Water Flow Control (Short Paper). CP 2023: 42:1-42:10 - [c194]Marc Katzef, Andrew C. Cullen, Tansu Alpcan, Christopher Leckie:
Robust Wireless Network Anomaly Detection with Collaborative Adversarial Autoencoders. ICC 2023: 6343-6348 - [c193]Chen Wang, Sarah M. Erfani, Tansu Alpcan, Christopher Leckie:
Online Trajectory Anomaly Detection Based on Intention Orientation. IJCNN 2023: 1-8 - [c192]Rahul Sharma, Chien Aun Chan, Christopher Leckie:
Probabilistic Distributed Intrusion Detection For Zero-Trust Multi-Access Edge Computing. NOMS 2023: 1-9 - [c191]Dominic Jack, Sarah M. Erfani, Jeffrey Chan, Sutharshan Rajasegarar, Christopher Leckie:
It's PageRank All The Way Down: Simplifying Deep Graph Networks. SDM 2023: 172-180 - [i38]Hadi M. Dolatabadi, Sarah M. Erfani, Christopher Leckie:
The Devil's Advocate: Shattering the Illusion of Unexploitable Data using Diffusion Models. CoRR abs/2303.08500 (2023) - [i37]Marc Katzef, Andrew C. Cullen, Tansu Alpcan, Christopher Leckie, Justin Kopacz:
Failure-tolerant Distributed Learning for Anomaly Detection in Wireless Networks. CoRR abs/2303.13015 (2023) - [i36]Amila Silva, Ling Luo, Shanika Karunasekera, Christopher Leckie:
Unsupervised Domain-agnostic Fake News Detection using Multi-modal Weak Signals. CoRR abs/2305.11349 (2023) - [i35]Maxwell T. West, Shu Lok Tsang, Jia Shun Low, Charles D. Hill, Christopher Leckie, Lloyd C. L. Hollenberg, Sarah M. Erfani, Muhammad Usman:
Towards quantum enhanced adversarial robustness in machine learning. CoRR abs/2306.12688 (2023) - [i34]Qizhou Wang, Guansong Pang, Mahsa Salehi, Wray L. Buntine, Christopher Leckie:
Open-Set Graph Anomaly Detection via Normal Structure Regularisation. CoRR abs/2311.06835 (2023) - 2022
- [j82]Marc Katzef, Andrew C. Cullen, Tansu Alpcan, Christopher Leckie:
Generative Adversarial Networks for anomaly detection on decentralised data. Annu. Rev. Control. 53: 329-337 (2022) - [j81]Jiaman Ma, Jeffrey Chan, Sutharshan Rajasegarar, Christopher Leckie:
Multi-attention graph neural networks for city-wide bus travel time estimation using limited data. Expert Syst. Appl. 202: 117057 (2022) - [j80]Yousef Kowsar, Masud Moshtaghi, Eduardo Velloso, James C. Bezdek, Lars Kulik, Christopher Leckie:
Shape-Sphere: A metric space for analysing time series by their shape. Inf. Sci. 582: 198-214 (2022) - [j79]Emir Demirovic, Anna Lukina, Emmanuel Hebrard, Jeffrey Chan, James Bailey, Christopher Leckie, Kotagiri Ramamohanarao, Peter J. Stuckey:
MurTree: Optimal Decision Trees via Dynamic Programming and Search. J. Mach. Learn. Res. 23: 26:1-26:47 (2022) - [j78]Xuyun Zhang, Lianyong Qi, Wanchun Dou, Qiang He, Christopher Leckie, Ramamohanarao Kotagiri, Zoran Salcic:
MRMondrian: Scalable Multidimensional Anonymisation for Big Data Privacy Preservation. IEEE Trans. Big Data 8(1): 125-139 (2022) - [j77]Yousef Kowsar, Masud Moshtaghi, Eduardo Velloso, Christopher Leckie, Lars Kulik:
An Online Unsupervised Dynamic Window Method to Track Repeating Patterns From Sensor Data. IEEE Trans. Cybern. 52(6): 5148-5160 (2022) - [c190]Ali Ugur Guler, Emir Demirovic, Jeffrey Chan, James Bailey, Christopher Leckie, Peter J. Stuckey:
A Divide and Conquer Algorithm for Predict+Optimize with Non-convex Problems. AAAI 2022: 3749-3757 - [c189]Amila Silva, Ling Luo, Shanika Karunasekera, Christopher Leckie:
Noise-Robust Learning from Multiple Unsupervised Sources of Inferred Labels. AAAI 2022: 8315-8323 - [c188]Hadi M. Dolatabadi, Sarah M. Erfani, Christopher Leckie:
COLLIDER: A Robust Training Framework for Backdoor Data. ACCV (6) 2022: 681-698 - [c187]Sandamal Weerasinghe, Tamas Abraham, Tansu Alpcan, Sarah M. Erfani, Christopher Leckie, Benjamin I. P. Rubinstein:
Local Intrinsic Dimensionality Signals Adversarial Perturbations. CDC 2022: 6118-6125 - [c186]Hadi M. Dolatabadi, Sarah M. Erfani, Christopher Leckie:
ℓ ∞-Robustness and Beyond: Unleashing Efficient Adversarial Training. ECCV (11) 2022: 467-483 - [c185]Marc Katzef, Andrew C. Cullen, Tansu Alpcan, Christopher Leckie, Justin Kopacz:
Wireless Network Simulation to Create Machine Learning Benchmark Data. GLOBECOM 2022: 6378-6383 - [c184]Rahul Sharma, Chien Aun Chan, Christopher Leckie:
Hybrid Collaborative Architectures For Intrusion Detection In Multi-Access Edge Computing. NOMS 2022: 1-7 - [c183]Siqi Xia, Sutharshan Rajasegarar, Christopher Leckie, Sarah M. Erfani, Jeffrey Chan:
Exploiting Redundancy in Network Flow Information for Efficient Security Attack Detection. NSS 2022: 105-119 - [c182]Qizhou Wang, Mahsa Salehi, Jia Shun Low, Wray L. Buntine, Christopher Leckie:
ENDASh: Embedding Neighbourhood Dissimilarity with Attribute Shuffling for Graph Anomaly Detection. PAKDD (2) 2022: 17-29 - [c181]Laurence A. F. Park, Mohadeseh Ganji, Emir Demirovic, Jeffrey Chan, Peter J. Stuckey, James Bailey, Christopher Leckie, Rao Kotagiri:
Modelling Zeros in Blockmodelling. PAKDD (2) 2022: 187-198 - [i33]Hadi M. Dolatabadi, Sarah M. Erfani, Christopher Leckie:
Adversarial Coreset Selection for Efficient Robust Training. CoRR abs/2209.05785 (2022) - [i32]Hadi M. Dolatabadi, Sarah M. Erfani, Christopher Leckie:
COLLIDER: A Robust Training Framework for Backdoor Data. CoRR abs/2210.06704 (2022) - [i31]Maxwell T. West, Sarah M. Erfani, Christopher Leckie, Martin Sevior, Lloyd C. L. Hollenberg, Muhammad Usman:
Benchmarking Adversarially Robust Quantum Machine Learning at Scale. CoRR abs/2211.12681 (2022) - [i30]Qizhou Wang, Guansong Pang, Mahsa Salehi, Wray L. Buntine, Christopher Leckie:
Cross-Domain Graph Anomaly Detection via Anomaly-aware Contrastive Alignment. CoRR abs/2212.01096 (2022) - 2021
- [j76]Amila Silva, Yi Han, Ling Luo, Shanika Karunasekera, Christopher Leckie:
Propagation2Vec: Embedding partial propagation networks for explainable fake news early detection. Inf. Process. Manag. 58(5): 102618 (2021) - [j75]Sandamal Weerasinghe, Tansu Alpcan, Sarah M. Erfani, Christopher Leckie:
Defending Support Vector Machines Against Data Poisoning Attacks. IEEE Trans. Inf. Forensics Secur. 16: 2566-2578 (2021) - [c180]Amila Silva, Ling Luo, Shanika Karunasekera, Christopher Leckie:
Embracing Domain Differences in Fake News: Cross-domain Fake News Detection using Multi-modal Data. AAAI 2021: 557-565 - [c179]Elaheh Alipour Chavary, Sarah M. Erfani, Christopher Leckie:
Scalable Contrast Pattern Mining over Data Streams. CIKM 2021: 2842-2846 - [c178]Yi Han, Shanika Karunasekera, Christopher Leckie:
Continual Learning for Fake News Detection from Social Media. ICANN (2) 2021: 372-384 - [c177]Marc Katzef, Andrew C. Cullen, Tansu Alpcan, Christopher Leckie, Justin Kopacz:
Privacy-Preserving Collaborative SDR Networks for Anomaly Detection. ICC 2021: 1-6 - [c176]Sandamal Weerasinghe, Tamas Abraham, Tansu Alpcan, Sarah M. Erfani, Christopher Leckie, Benjamin I. P. Rubinstein:
Closing the BIG-LID: An Effective Local Intrinsic Dimensionality Defense for Nonlinear Regression Poisoning. IJCAI 2021: 3176-3184 - [c175]Elaheh Alipour Chavary, Sarah M. Erfani, Christopher Leckie:
Mining Rare Recurring Events in Network Traffic using Second Order Contrast Patterns. IJCNN 2021: 1-8 - [c174]Qizhou Wang, Sarah M. Erfani, Christopher Leckie, Michael E. Houle:
A Dimensionality-Driven Approach for Unsupervised Out-of-distribution Detection. SDM 2021: 118-126 - [p2]Rahul Sharma, Chien Aun Chan, Christopher Leckie:
Evaluation of Collaborative Intrusion Detection System Architectures in Mobile Edge Computing. Mobile Edge Computing 2021: 359-384 - [i29]Amila Silva, Ling Luo, Shanika Karunasekera, Christopher Leckie:
Embracing Domain Differences in Fake News: Cross-domain Fake News Detection using Multi-modal Data. CoRR abs/2102.06314 (2021) - [i28]Yi Han, Amila Silva, Ling Luo, Shanika Karunasekera, Christopher Leckie:
Knowledge Enhanced Multi-modal Fake News Detection. CoRR abs/2108.04418 (2021) - [i27]Sandamal Weerasinghe, Tansu Alpcan, Sarah M. Erfani, Christopher Leckie, Benjamin I. P. Rubinstein:
Local Intrinsic Dimensionality Signals Adversarial Perturbations. CoRR abs/2109.11803 (2021) - [i26]Hadi M. Dolatabadi, Sarah M. Erfani, Christopher Leckie:
𝓁∞-Robustness and Beyond: Unleashing Efficient Adversarial Training. CoRR abs/2112.00378 (2021) - 2020
- [j74]Masoomeh Zameni, Amin Sadri, Zahra Ghafoori, Masud Moshtaghi, Flora D. Salim, Christopher Leckie, Kotagiri Ramamohanarao:
Unsupervised online change point detection in high-dimensional time series. Knowl. Inf. Syst. 62(2): 719-750 (2020) - [j73]Yunzhe Jia, James Bailey, Kotagiri Ramamohanarao, Christopher Leckie, Xingjun Ma:
Exploiting patterns to explain individual predictions. Knowl. Inf. Syst. 62(3): 927-950 (2020) - [j72]Zahra Ghafoori, Sarah M. Erfani, James C. Bezdek, Shanika Karunasekera, Christopher Leckie:
LN-SNE: Log-Normal Distributed Stochastic Neighbor Embedding for Anomaly Detection. IEEE Trans. Knowl. Data Eng. 32(4): 815-820 (2020) - [c173]Emir Demirovic, Peter J. Stuckey, Tias Guns, James Bailey, Christopher Leckie, Kotagiri Ramamohanarao, Jeffrey Chan:
Dynamic Programming for Predict+Optimise. AAAI 2020: 1444-1451 - [c172]Hadi Mohaghegh Dolatabadi, Sarah M. Erfani, Christopher Leckie:
Invertible Generative Modeling using Linear Rational Splines. AISTATS 2020: 4236-4246 - [c171]Amila Silva, Yi Han, Ling Luo, Shanika Karunasekera, Christopher Leckie:
Embedding Partial Propagation Network for Fake News Early Detection. CIKM (Workshops) 2020 - [c170]Amila Silva, Shanika Karunasekera, Christopher Leckie, Ling Luo:
METEOR: Learning Memory and Time Efficient Representations from Multi-modal Data Streams. CIKM 2020: 1375-1384 - [c169]Marc Katzef, Andrew C. Cullen, Tansu Alpcan, Christopher Leckie, Justin Kopacz:
Distributed Generative Adversarial Networks for Anomaly Detection. GameSec 2020: 3-22 - [c168]Jiaman Ma, Jeffrey Chan, Sutharshan Rajasegarar, Goce Ristanoski, Christopher Leckie:
Multi-Attention 3D Residual Neural Network for Origin-Destination Crowd Flow Prediction. ICDM 2020: 1160-1165 - [c167]Yi Han, David Hubczenko, Paul Montague, Olivier Y. de Vel, Tamas Abraham, Benjamin I. P. Rubinstein, Christopher Leckie, Tansu Alpcan, Sarah M. Erfani:
Adversarial Reinforcement Learning under Partial Observability in Autonomous Computer Network Defence. IJCNN 2020: 1-8 - [c166]Li Li, Sarah M. Erfani, Chien Aun Chan, Christopher Leckie:
Discovery of contrast corridors from trajectory data in heterogeneous dynamic cellular networks. IJCNN 2020: 1-8 - [c165]Rishabh Ramteke, Peter J. Stuckey, Jeffrey Chan, Kotagiri Ramamohanarao, James Bailey, Christopher Leckie, Emir Demirovic:
Improving Single and Multi-View Blockmodelling by Algebraic Simplification. IJCNN 2020: 1-7 - [c164]Rahul Sharma, Chien Aun Chan, Christopher Leckie:
Evaluation of Centralised vs Distributed Collaborative Intrusion Detection Systems in Multi-Access Edge Computing. Networking 2020: 343-351 - [c163]Hadi Mohaghegh Dolatabadi, Sarah M. Erfani, Christopher Leckie:
AdvFlow: Inconspicuous Black-box Adversarial Attacks using Normalizing Flows. NeurIPS 2020 - [c162]Yi Han, Shanika Karunasekera, Christopher Leckie:
Image Analysis Enhanced Event Detection from Geo-Tagged Tweet Streams. PAKDD (1) 2020: 398-410 - [c161]Amila Silva, Ling Luo, Shanika Karunasekera, Christopher Leckie:
OMBA: User-Guided Product Representations for Online Market Basket Analysis. ECML/PKDD (1) 2020: 55-71 - [c160]Zahra Ghafoori, Christopher Leckie:
Deep Multi-sphere Support Vector Data Description. SDM 2020: 109-117 - [i25]Hadi Mohaghegh Dolatabadi, Sarah M. Erfani, Christopher Leckie:
Invertible Generative Modeling using Linear Rational Splines. CoRR abs/2001.05168 (2020) - [i24]Yi Han, Shanika Karunasekera, Christopher Leckie:
Image Analysis Enhanced Event Detection from Geo-tagged Tweet Streams. CoRR abs/2002.04208 (2020) - [i23]Amila Silva, Ling Luo, Shanika Karunasekera, Christopher Leckie:
OMBA: User-Guided Product Representations for Online Market Basket Analysis. CoRR abs/2006.10396 (2020) - [i22]Hadi M. Dolatabadi, Sarah M. Erfani, Christopher Leckie:
Black-box Adversarial Example Generation with Normalizing Flows. CoRR abs/2007.02734 (2020) - [i21]Yi Han, Shanika Karunasekera, Christopher Leckie:
Graph Neural Networks with Continual Learning for Fake News Detection from Social Media. CoRR abs/2007.03316 (2020) - [i20]Hadi M. Dolatabadi, Sarah M. Erfani, Christopher Leckie:
AdvFlow: Inconspicuous Black-box Adversarial Attacks using Normalizing Flows. CoRR abs/2007.07435 (2020) - [i19]Amila Silva, Shanika Karunasekera, Christopher Leckie, Ling Luo:
METEOR: Learning Memory and Time Efficient Representations from Multi-modal Data Streams. CoRR abs/2007.11847 (2020) - [i18]Emir Demirovic, Anna Lukina, Emmanuel Hebrard, Jeffrey Chan, James Bailey, Christopher Leckie, Kotagiri Ramamohanarao, Peter J. Stuckey:
MurTree: Optimal Classification Trees via Dynamic Programming and Search. CoRR abs/2007.12652 (2020) - [i17]Sandamal Weerasinghe, Sarah M. Erfani, Tansu Alpcan, Christopher Leckie, Justin Kopacz:
Defending Regression Learners Against Poisoning Attacks. CoRR abs/2008.09279 (2020) - [i16]Sandamal Weerasinghe, Tansu Alpcan, Sarah M. Erfani, Christopher Leckie:
Defending Distributed Classifiers Against Data Poisoning Attacks. CoRR abs/2008.09284 (2020) - [i15]Elaheh Alipour Chavary, Sarah M. Erfani, Christopher Leckie:
Improving Scalability of Contrast Pattern Mining for Network Traffic Using Closed Patterns. CoRR abs/2011.14830 (2020) - [i14]Ali Ugur Guler, Emir Demirovic, Jeffrey Chan, James Bailey, Christopher Leckie, Peter J. Stuckey:
Divide and Learn: A Divide and Conquer Approach for Predict+Optimize. CoRR abs/2012.02342 (2020)
2010 – 2019
- 2019
- [j71]Jiaojiao Jiang, Steve Versteeg, Jun Han, Md. Arafat Hossain, Jean-Guy Schneider, Christopher Leckie, Zeinab Farahmandpour:
P-Gram: Positional N-Gram for the Clustering of Machine-Generated Messages. IEEE Access 7: 88504-88516 (2019) - [j70]Zhanghan Tang, Margreta Kuijper, Michelle S. Chong, Iven Mareels, Christopher Leckie:
Linear system security - Detection and correction of adversarial sensor attacks in the noise-free case. Autom. 101: 53-59 (2019) - [j69]Masud Moshtaghi, James C. Bezdek, Sarah M. Erfani, Christopher Leckie, James Bailey:
Online cluster validity indices for performance monitoring of streaming data clustering. Int. J. Intell. Syst. 34(4): 541-563 (2019) - [j68]Kwan Hui Lim, Jeffrey Chan, Shanika Karunasekera, Christopher Leckie:
Tour recommendation and trip planning using location-based social media: a survey. Knowl. Inf. Syst. 60(3): 1247-1275 (2019) - [j67]Sandamal Weerasinghe, Sarah M. Erfani, Tansu Alpcan, Christopher Leckie:
Support vector machines resilient against training data integrity attacks. Pattern Recognit. 96 (2019) - [j66]Punit Rathore, Zahra Ghafoori, James C. Bezdek, Marimuthu Palaniswami, Christopher Leckie:
Approximating Dunn's Cluster Validity Indices for Partitions of Big Data. IEEE Trans. Cybern. 49(5): 1629-1641 (2019) - [c159]Jia Shun Low, Zahra Ghafoori, Christopher Leckie:
Online K-Means Clustering with Lightweight Coresets. Australasian Conference on Artificial Intelligence 2019: 191-202 - [c158]Jia Shun Low, Zahra Ghafoori, James C. Bezdek, Christopher Leckie:
Seeding on Samples for Accelerating K-Means Clustering. BDIOT 2019: 41-45 - [c157]Yi Han, Shanika Karunasekera, Christopher Leckie, Aaron Harwood:
Multi-spatial Scale Event Detection from Geo-tagged Tweet Streams via Power-law Verification. IEEE BigData 2019: 1131-1136 - [c156]Amila Silva, Shanika Karunasekera, Christopher Leckie, Ling Luo:
USTAR: Online Multimodal Embedding for Modeling User-Guided Spatiotemporal Activity. IEEE BigData 2019: 1211-1217 - [c155]Li Li, Sarah M. Erfani, Chien Aun Chan, Christopher Leckie:
Multi-scale Trajectory Clustering to Identify Corridors in Mobile Networks. CIKM 2019: 2253-2256 - [c154]Emir Demirovic, Peter J. Stuckey, James Bailey, Jeffrey Chan, Chris Leckie, Kotagiri Ramamohanarao, Tias Guns:
An Investigation into Prediction + Optimisation for the Knapsack Problem. CPAIOR 2019: 241-257 - [c153]Masoomeh Zameni, Zahra Ghafoori, Amin Sadri, Christopher Leckie, Kotagiri Ramamohanarao:
Change Point Detection for Streaming High-Dimensional Time Series. DASFAA (3) 2019: 515-519 - [c152]Yousef Kowsar, Eduardo Velloso, Lars Kulik, Christopher Leckie:
LiftSmart: a monitoring and warning wearable for weight trainers. UbiComp/ISWC Adjunct 2019: 298-301 - [c151]Chien Aun Chan, Ming Yan, André F. Gygax, Wenwen Li, Li Li, Chih-Lin I, Jinyao Yan, Christopher Leckie:
Big Data Driven Predictive Caching at the Wireless Edge. ICC Workshops 2019: 1-6 - [c150]Emir Demirovic, Peter J. Stuckey, James Bailey, Jeffrey Chan, Christopher Leckie, Kotagiri Ramamohanarao, Tias Guns:
Predict+Optimise with Ranking Objectives: Exhaustively Learning Linear Functions. IJCAI 2019: 1078-1085 - [c149]Fateme Fahiman, Sarah M. Erfani, Christopher Leckie:
Robust and Accurate Short-Term Load Forecasting: A Cluster Oriented Ensemble Learning Approach. IJCNN 2019: 1-8 - [c148]Li Li, Chien Aun Chan, Sarah M. Erfani, Christopher Leckie:
Adaptive Edge Caching based on Popularity and Prediction for Mobile Networks. IJCNN 2019: 1-10 - [c147]Meng Yang, Sutharshan Rajasegarar, Sarah M. Erfani, Christopher Leckie:
Deep Learning and One-class SVM based Anomalous Crowd Detection. IJCNN 2019: 1-8 - [c146]Yunzhe Jia, James Bailey, Kotagiri Ramamohanarao, Christopher Leckie, Michael E. Houle:
Improving the Quality of Explanations with Local Embedding Perturbations. KDD 2019: 875-884 - [c145]Zahra Ghafoori, James C. Bezdek, Christopher Leckie, Shanika Karunasekera:
Unsupervised and Active Learning Using Maximin-Based Anomaly Detection. ECML/PKDD (1) 2019: 90-106 - [i13]Yi Han, David Hubczenko, Paul Montague, Olivier Y. de Vel, Tamas Abraham, Benjamin I. P. Rubinstein, Christopher Leckie, Tansu Alpcan, Sarah M. Erfani:
Adversarial Reinforcement Learning under Partial Observability in Software-Defined Networking. CoRR abs/1902.09062 (2019) - [i12]Yi Han, Shanika Karunasekera, Christopher Leckie, Aaron Harwood:
Power-law Verification for Event Detection at Multi-spatial Scales from Geo-tagged Tweet Streams. CoRR abs/1906.05063 (2019) - [i11]Amila Silva, Shanika Karunasekera, Christopher Leckie, Ling Luo:
USTAR: Online Multimodal Embedding for Modeling User-Guided Spatiotemporal Activity. CoRR abs/1910.10335 (2019) - 2018
- [j65]Dheeraj Kumar, Zahra Ghafoori, James C. Bezdek, Christopher Leckie, Kotagiri Ramamohanarao, Marimuthu Palaniswami:
Dealing with Inliers in Feature Vector Data. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 26(Supplement-2): 25-45 (2018) - [j64]Kwan Hui Lim, Jeffrey Chan, Christopher Leckie, Shanika Karunasekera:
Personalized trip recommendation for tourists based on user interests, points of interest visit durations and visit recency. Knowl. Inf. Syst. 54(2): 375-406 (2018) - [j63]Dheeraj Kumar, Huayu Wu, Sutharshan Rajasegarar, Christopher Leckie, Shonali Krishnaswamy, Marimuthu Palaniswami:
Fast and Scalable Big Data Trajectory Clustering for Understanding Urban Mobility. IEEE Trans. Intell. Transp. Syst. 19(11): 3709-3722 (2018) - [j62]Zahra Ghafoori, Sarah M. Erfani, Sutharshan Rajasegarar, James C. Bezdek, Shanika Karunasekera, Christopher Leckie:
Efficient Unsupervised Parameter Estimation for One-Class Support Vector Machines. IEEE Trans. Neural Networks Learn. Syst. 29(10): 5057-5070 (2018) - [c144]Minh Tuan Doan, Jianzhong Qi, Sutharshan Rajasegarar, Christopher Leckie:
Scalable Bottom-up Subspace Clustering using FP-Trees for High Dimensional Data. IEEE BigData 2018: 106-111 - [c143]Meng Yang, Lida Rashidi, Sutharshan Rajasegarar, Christopher Leckie, Aravinda S. Rao, Marimuthu Palaniswami:
Crowd Activity Change Point Detection in Videos via Graph Stream Mining. CVPR Workshops 2018: 215-223 - [c142]Meng Yang, Lida Rashidi, Aravinda S. Rao, Sutharshan Rajasegarar, Mohadeseh Ganji, Marimuthu Palaniswami, Christopher Leckie:
Cluster-Based Crowd Movement Behavior Detection. DICTA 2018: 1-8 - [c141]Yi Han, Benjamin I. P. Rubinstein, Tamas Abraham, Tansu Alpcan, Olivier Y. de Vel, Sarah M. Erfani, David Hubczenko, Christopher Leckie, Paul Montague:
Reinforcement Learning for Autonomous Defence in Software-Defined Networking. GameSec 2018: 145-165 - [c140]Sandamal Weerasinghe, Tansu Alpcan, Sarah M. Erfani, Christopher Leckie, Peyam Pourbeik, Jack Riddle:
Deep Learning Based Game-Theoretical Approach to Evade Jamming Attacks. GameSec 2018: 386-397 - [c139]Sandamal Weerasinghe, Sarah M. Erfani, Tansu Alpcan, Christopher Leckie, Jack Riddle:
Detection of Anomalous Communications with SDRs and Unsupervised Adversarial Learning. LCN 2018: 469-472 - [c138]Milad Chenaghlou, Masud Moshtaghi, Christopher Leckie, Mahsa Salehi:
Online Clustering for Evolving Data Streams with Online Anomaly Detection. PAKDD (2) 2018: 508-521 - [c137]Mohadeseh Ganji, Jeffrey Chan, Peter J. Stuckey, James Bailey, Christopher Leckie, Kotagiri Ramamohanarao, Laurence A. F. Park:
Semi-supervised Blockmodelling with Pairwise Guidance. ECML/PKDD (2) 2018: 158-174 - [c136]Masoomeh Zameni, Mengyi He, Masud Moshtaghi, Zahra Ghafoori, Christopher Leckie, James C. Bezdek, Kotagiri Ramamohanarao:
Urban Sensing for Anomalous Event Detection: - Distinguishing Between Legitimate Traffic Changes and Abnormal Traffic Variability. ECML/PKDD (3) 2018: 553-568 - [c135]Meng Yang, Lida Rashidi, Sutharshan Rajasegarar, Christopher Leckie:
Graph Stream Mining Based Anomalous Event Analysis. PRICAI (1) 2018: 891-903 - [c134]Mohadeseh Ganji, Jeffrey Chan, Peter J. Stuckey, James Bailey, Christopher Leckie, Kotagiri Ramamohanarao, Ian Davidson:
Image Constrained Blockmodelling: A Constraint Programming Approach. SDM 2018: 19-27 - [c133]Punit Rathore, Zahra Ghafoori, James C. Bezdek, Marimuthu Palaniswami, Christopher Leckie:
Estimating Generalized Dunn's Cluster Validity Indices for Big Data. SMC 2018: 656-661 - [c132]Xuyun Zhang, Mahsa Salehi, Christopher Leckie, Yun Luo, Qiang He, Rui Zhou, Rao Kotagiri:
Density Biased Sampling with Locality Sensitive Hashing for Outlier Detection. WISE (2) 2018: 269-284 - [i10]Masud Moshtaghi, James C. Bezdek, Sarah M. Erfani, Christopher Leckie, James Bailey:
Online Cluster Validity Indices for Streaming Data. CoRR abs/1801.02937 (2018) - [i9]Yi Han, Benjamin I. P. Rubinstein, Tamas Abraham, Tansu Alpcan, Olivier Y. de Vel, Sarah M. Erfani, David Hubczenko, Christopher Leckie, Paul Montague:
Reinforcement Learning for Autonomous Defence in Software-Defined Networking. CoRR abs/1808.05770 (2018) - [i8]Minh Tuan Doan, Jianzhong Qi, Sutharshan Rajasegarar, Christopher Leckie:
Scalable Bottom-up Subspace Clustering using FP-Trees for High Dimensional Data. CoRR abs/1811.02722 (2018) - 2017
- [j61]Rodrigo N. Calheiros, Kotagiri Ramamohanarao, Rajkumar Buyya, Christopher Leckie, Steve Versteeg:
On the effectiveness of isolation-based anomaly detection in cloud data centers. Concurr. Comput. Pract. Exp. 29(18) (2017) - [j60]Masud Moshtaghi, Sarah M. Erfani, Christopher Leckie, James C. Bezdek:
Exponentially Weighted Ellipsoidal Model for Anomaly Detection. Int. J. Intell. Syst. 32(9): 881-899 (2017) - [j59]Tarique Anwar, Chengfei Liu, Hai Le Vu, Christopher Leckie:
Partitioning road networks using density peak graphs: Efficiency vs. accuracy. Inf. Syst. 64: 22-40 (2017) - [j58]Yi Han, Jeffrey Chan, Tansu Alpcan, Christopher Leckie:
Using Virtual Machine Allocation Policies to Defend against Co-Resident Attacks in Cloud Computing. IEEE Trans. Dependable Secur. Comput. 14(1): 95-108 (2017) - [j57]Dheeraj Kumar, James C. Bezdek, Sutharshan Rajasegarar, Christopher Leckie, Marimuthu Palaniswami:
A visual-numeric approach to clustering and anomaly detection for trajectory data. Vis. Comput. 33(3): 265-281 (2017) - [c131]Sarah M. Erfani, Mahsa Baktashmotlagh, Masud Moshtaghi, Vinh Nguyen, Christopher Leckie, James Bailey, Kotagiri Ramamohanarao:
From Shared Subspaces to Shared Landmarks: A Robust Multi-Source Classification Approach. AAAI 2017: 1854-1860 - [c130]Yuantian Miao, Lei Pan, Sutharshan Rajasegarar, Jun Zhang, Christopher Leckie, Yang Xiang:
Distributed Detection of Zero-Day Network Traffic Flows. AusDM 2017: 173-191 - [c129]Elaheh Alipour Chavary, Sarah M. Erfani, Christopher Leckie:
Summarizing Significant Changes in Network Traffic Using Contrast Pattern Mining. CIKM 2017: 2015-2018 - [c128]Fateme Fahiman, James C. Bezdek, Sarah M. Erfani, Marimuthu Palaniswami, Christopher Leckie:
Fuzzy c-Shape: A new algorithm for clustering finite time series waveforms. FUZZ-IEEE 2017: 1-8 - [c127]Timothy B. Iredale, Sarah M. Erfani, Christopher Leckie:
An efficient visual assessment of cluster tendency tool for large-scale time series data sets. FUZZ-IEEE 2017: 1-8 - [c126]Milad Chenaghlou, Masud Moshtaghi, Christopher Leckie, Mahsa Salehi:
An Efficient Method for Anomaly Detection in Non-Stationary Data Streams. GLOBECOM 2017: 1-6 - [c125]Mahsa Salehi, Christopher Leckie, James C. Bezdek, Tharshan Vaithianathan, Xuyun Zhang:
Fast Memory Efficient Local Outlier Detection in Data Streams (Extended Abstract). ICDE 2017: 51-52 - [c124]Xuyun Zhang, Wan-Chun Dou, Qiang He, Rui Zhou, Christopher Leckie, Kotagiri Ramamohanarao, Zoran A. Salcic:
LSHiForest: A Generic Framework for Fast Tree Isolation Based Ensemble Anomaly Analysis. ICDE 2017: 983-994 - [c123]Li Li, Sarah M. Erfani, Christopher Leckie:
A Pattern Tree Based Method for Mining Conditional Contrast Patterns of Multi-source Data. ICDM Workshops 2017: 916-923 - [c122]Fateme Fahiman, Sarah M. Erfani, Sutharshan Rajasegarar, Marimuthu Palaniswami, Christopher Leckie:
Improving load forecasting based on deep learning and K-shape clustering. IJCNN 2017: 4134-4141 - [c121]Goce Ristanoski, Rahul Soni, Sutharshan Rajasegarar, James Bailey, Christopher Leckie:
Clustering Aided Support Vector Machines. MLDM 2017: 322-334 - [c120]Kwan Hui Lim, Jeffrey Chan, Shanika Karunasekera, Christopher Leckie:
Personalized Itinerary Recommendation with Queuing Time Awareness. SIGIR 2017: 325-334 - [i7]Tansu Alpcan, Sarah M. Erfani, Christopher Leckie:
Toward the Starting Line: A Systems Engineering Approach to Strong AI. CoRR abs/1707.09095 (2017) - [i6]Zhanghan Tang, Margreta Kuijper, Michelle Chong, Iven Mareels, Christopher Leckie:
Linear system security - detection and correction of adversarial attacks in the noise-free case. CoRR abs/1711.05400 (2017) - 2016
- [j56]Xuan Vinh Nguyen, Jeffrey Chan, Simone Romano, James Bailey, Christopher Leckie, Kotagiri Ramamohanarao, Jian Pei:
Discovering outlying aspects in large datasets. Data Min. Knowl. Discov. 30(6): 1520-1555 (2016) - [j55]Ming Yan, Chien Aun Chan, Wenwen Li, Chih-Lin I, Sen Bian, André F. Gygax, Christopher Leckie, Kerry Hinton, Elaine Wong, Ampalavanapillai Nirmalathas:
Network Energy Consumption Assessment of Conventional Mobile Services and Over-the-Top Instant Messaging Applications. IEEE J. Sel. Areas Commun. 34(12): 3168-3180 (2016) - [j54]Sarah M. Erfani, Sutharshan Rajasegarar, Shanika Karunasekera, Christopher Leckie:
High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning. Pattern Recognit. 58: 121-134 (2016) - [j53]Dheeraj Kumar, James C. Bezdek, Marimuthu Palaniswami, Sutharshan Rajasegarar, Christopher Leckie, Timothy Craig Havens:
A Hybrid Approach to Clustering in Big Data. IEEE Trans. Cybern. 46(10): 2372-2385 (2016) - [j52]James C. Bezdek, Masud Moshtaghi, Thomas A. Runkler, Christopher Leckie:
The Generalized C Index for Internal Fuzzy Cluster Validity. IEEE Trans. Fuzzy Syst. 24(6): 1500-1512 (2016) - [j51]Yi Han, Tansu Alpcan, Jeffrey Chan, Christopher Leckie, Benjamin I. P. Rubinstein:
A Game Theoretical Approach to Defend Against Co-Resident Attacks in Cloud Computing: Preventing Co-Residence Using Semi-Supervised Learning. IEEE Trans. Inf. Forensics Secur. 11(3): 556-570 (2016) - [j50]Dheeraj Kumar, James C. Bezdek, Sutharshan Rajasegarar, Marimuthu Palaniswami, Christopher Leckie, Jeffrey Chan, Jayavardhana Gubbi:
Adaptive Cluster Tendency Visualization and Anomaly Detection for Streaming Data. ACM Trans. Knowl. Discov. Data 11(2): 24:1-24:40 (2016) - [j49]Mahsa Salehi, Christopher Leckie, James C. Bezdek, Tharshan Vaithianathan, Xuyun Zhang:
Fast Memory Efficient Local Outlier Detection in Data Streams. IEEE Trans. Knowl. Data Eng. 28(12): 3246-3260 (2016) - [j48]Laurence Anthony F. Park, James C. Bezdek, Christopher Leckie, Kotagiri Ramamohanarao, James Bailey, Marimuthu Palaniswami:
Visual Assessment of Clustering Tendency for Incomplete Data. IEEE Trans. Knowl. Data Eng. 28(12): 3409-3422 (2016) - [c119]Timothy Glennan, Christopher Leckie, Sarah M. Erfani:
Improved Classification of Known and Unknown Network Traffic Flows Using Semi-supervised Machine Learning. ACISP (2) 2016: 493-501 - [c118]Kwan Hui Lim, Jeffrey Chan, Christopher Leckie, Shanika Karunasekera:
Towards Next Generation Touring: Personalized Group Tours. ICAPS 2016: 412-420 - [c117]Mahsa Salehi, Xuyun Zhang, James C. Bezdek, Christopher Leckie:
Smart Sampling: A Novel Unsupervised Boosting Approach for Outlier Detection. Australasian Conference on Artificial Intelligence 2016: 469-481 - [c116]Tansu Alpcan, Benjamin I. P. Rubinstein, Christopher Leckie:
Large-scale strategic games and adversarial machine learning. CDC 2016: 4420-4426 - [c115]Xiaoting Wang, Christopher Leckie, Jeffrey Chan, Kwan Hui Lim, Tharshan Vaithianathan:
Improving Personalized Trip Recommendation by Avoiding Crowds. CIKM 2016: 25-34 - [c114]Xuyun Zhang, Christopher Leckie, Wanchun Dou, Jinjun Chen, Kotagiri Ramamohanarao, Zoran Salcic:
Scalable Local-Recoding Anonymization using Locality Sensitive Hashing for Big Data Privacy Preservation. CIKM 2016: 1793-1802 - [c113]Kwan Hui Lim, Xiaoting Wang, Jeffrey Chan, Shanika Karunasekera, Christopher Leckie, Yehui Chen, Cheong Loong Tan, Fu Quan Gao, Teh Ken Wee:
PersTour: A Personalized Tour Recommendation and Planning System. HT (Extended Proceedings) 2016 - [c112]Xuan Vinh Nguyen, Sarah M. Erfani, Sakrapee Paisitkriangkrai, James Bailey, Christopher Leckie, Kotagiri Ramamohanarao:
Training robust models using Random Projection. ICPR 2016: 531-536 - [c111]Li Li, Christopher Leckie:
Trajectory Pattern Identification and Anomaly Detection of Pedestrian Flows Based on Visual Clustering. Intelligent Information Processing 2016: 121-131 - [c110]Meng Yang, Sutharshan Rajasegarar, Aravinda S. Rao, Christopher Leckie, Marimuthu Palaniswami:
Anomalous Behavior Detection in Crowded Scenes Using Clustering and Spatio-Temporal Features. Intelligent Information Processing 2016: 132-141 - [c109]Sarah M. Erfani, Mahsa Baktashmotlagh, Masud Moshtaghi, Vinh Nguyen, Christopher Leckie, James Bailey, Kotagiri Ramamohanarao:
Robust Domain Generalisation by Enforcing Distribution Invariance. IJCAI 2016: 1455-1461 - [c108]Zahra Ghafoori, Sarah M. Erfani, Sutharshan Rajasegarar, Shanika Karunasekera, Christopher A. Leckie:
Anomaly detection in non-stationary data: Ensemble based self-adaptive OCSVM. IJCNN 2016: 2476-2483 - [c107]Yousef Kowsar, Masud Moshtaghi, Eduardo Velloso, Lars Kulik, Christopher Leckie:
Detecting unseen anomalies in weight training exercises. OZCHI 2016: 517-526 - [c106]Zahra Ghafoori, Sutharshan Rajasegarar, Sarah M. Erfani, Shanika Karunasekera, Christopher A. Leckie:
Unsupervised Parameter Estimation for One-Class Support Vector Machines. PAKDD (2) 2016: 183-195 - [c105]Junying Chen, Sutharshan Rajasegarar, Christopher Leckie, André F. Gygax:
Pedestrian behaviour analysis using the microsoft kinect. PerCom Workshops 2016: 1-6 - [c104]Lingjuan Lyu, Yee Wei Law, Sarah M. Erfani, Christopher Leckie, Marimuthu Palaniswami:
An improved scheme for privacy-preserving collaborative anomaly detection. PerCom Workshops 2016: 1-6 - [c103]Masoomeh Zameni, Masud Moshtaghi, Christopher Leckie:
Efficient query processing on road traffic network. PerCom Workshops 2016: 1-6 - [c102]Lida Rashidi, Andrey Kan, James Bailey, Jeffrey Chan, Christopher Leckie, Wei Liu, Sutharshan Rajasegarar, Kotagiri Ramamohanarao:
Node Re-Ordering as a Means of Anomaly Detection in Time-Evolving Graphs. ECML/PKDD (2) 2016: 162-178 - [c101]Sarah M. Erfani, Mahsa Baktashmotlagh, Sutharshan Rajasegarar, Vinh Nguyen, Christopher Leckie, James Bailey, Kotagiri Ramamohanarao:
R1STM: One-class Support Tensor Machine with Randomised Kernel. SDM 2016: 198-206 - [c100]Masud Moshtaghi, Christopher Leckie, James C. Bezdek:
Online Clustering of Multivariate Time-series. SDM 2016: 360-368 - [i5]Fateme Fahiman, James C. Bezdek, Sarah M. Erfani, Christopher Leckie, Marimuthu Palaniswami:
Fuzzy c-Shape: A new algorithm for clustering finite time series waveforms. CoRR abs/1608.01072 (2016) - [i4]Tansu Alpcan, Benjamin I. P. Rubinstein, Christopher Leckie:
Large-Scale Strategic Games and Adversarial Machine Learning. CoRR abs/1609.06438 (2016) - 2015
- [j47]Gerard Wong, Jeffrey Chan, Bronwyn A. Kingwell, Christopher Leckie, Peter J. Meikle:
LICRE: unsupervised feature correlation reduction for lipidomics. Bioinform. 31(4): 619 (2015) - [j46]Chien Aun Chan, Wenwen Li, Sen Bian, Chih-Lin I, André F. Gygax, Christopher Leckie, Ming Yan, Kerry Hinton:
Assessing network energy consumption of mobile applications. IEEE Commun. Mag. 53(11): 182-191 (2015) - [j45]Andrey Kan, John Markham, Rajib Chakravorty, James Bailey, Christopher Leckie:
Ranking cell tracking systems without manual validation. Pattern Recognit. Lett. 53: 38-43 (2015) - [j44]Masud Moshtaghi, James C. Bezdek, Christopher Leckie, Shanika Karunasekera, Marimuthu Palaniswami:
Evolving Fuzzy Rules for Anomaly Detection in Data Streams. IEEE Trans. Fuzzy Syst. 23(3): 688-700 (2015) - [c99]Sarah M. Erfani, Mahsa Baktashmotlagh, Sutharshan Rajasegarar, Shanika Karunasekera, Christopher Leckie:
R1SVM: A Randomised Nonlinear Approach to Large-Scale Anomaly Detection. AAAI 2015: 432-438 - [c98]Florin Schimbinschi, Xuan Vinh Nguyen, James Bailey, Christopher Leckie, Hai Le Vu, Rao Kotagiri:
Traffic forecasting in complex urban networks: Leveraging big data and machine learning. IEEE BigData 2015: 1019-1024 - [c97]Minh Tuan Doan, Sutharshan Rajasegarar, Mahsa Salehi, Masud Moshtaghi, Christopher Leckie:
Profiling Pedestrian Distribution and Anomaly Detection in a Dynamic Environment. CIKM 2015: 1827-1830 - [c96]Kwan Hui Lim, Jeffrey Chan, Christopher Leckie, Shanika Karunasekera:
Detecting Location-Centric Communities Using Social-Spatial Links with Temporal Constraints. ECIR 2015: 489-494 - [c95]Sutharshan Rajasegarar, Christopher Leckie, Marimuthu Palaniswami:
Pattern based anomalous user detection in cognitive radio networks. ICASSP 2015: 5605-5609 - [c94]Sergey Demyanov, James Bailey, Kotagiri Ramamohanarao, Christopher Leckie:
Detection of Deception in the Mafia Party Game. ICMI 2015: 335-342 - [c93]Rajkumar Buyya, Kotagiri Ramamohanarao, Christopher Leckie, Rodrigo N. Calheiros, Amir Vahid Dastjerdi, Steven Versteeg:
Big Data Analytics-Enhanced Cloud Computing: Challenges, Architectural Elements, and Future Directions. ICPADS 2015: 75-84 - [c92]Kwan Hui Lim, Jeffrey Chan, Christopher Leckie, Shanika Karunasekera:
Personalized Tour Recommendation Based on User Interests and Points of Interest Visit Durations. IJCAI 2015: 1778-1784 - [c91]Mahsa Salehi, Christopher Leckie, James C. Bezdek, Tharshan Vaithianathan:
Local outlier detection for data streams in sensor networks: Revisiting the utility problem invited paper. ISSNIP 2015: 1-6 - [c90]Yanxu Zheng, Sutharshan Rajasegarar, Christopher Leckie:
Parking availability prediction for sensor-enabled car parks in smart cities. ISSNIP 2015: 1-6 - [c89]Lida Rashidi, Sutharshan Rajasegarar, Christopher Leckie:
An Embedding Scheme for Detecting Anomalous Block Structured Graphs. PAKDD (2) 2015: 215-227 - [c88]Xuan Vinh Nguyen, Jeffrey Chan, James Bailey, Christopher Leckie, Kotagiri Ramamohanarao, Jian Pei:
Scalable Outlying-Inlying Aspects Discovery via Feature Ranking. PAKDD (2) 2015: 422-434 - [c87]Xiaoting Wang, Christopher Leckie, Hairuo Xie, Tharshan Vaithianathan:
Discovering the Impact of Urban Traffic Interventions Using Contrast Mining on Vehicle Trajectory Data. PAKDD (1) 2015: 486-497 - [c86]Alistair Shilton, Sutharshan Rajasegarar, Christopher Leckie, Marimuthu Palaniswami:
DP1SVM: A dynamic planar one-class support vector machine for Internet of Things environment. RIoT 2015: 1-6 - [i3]Sergey Demyanov, James Bailey, Kotagiri Ramamohanarao, Christopher Leckie:
Invariant backpropagation: how to train a transformation-invariant neural network. CoRR abs/1502.04434 (2015) - [i2]Rajkumar Buyya, Kotagiri Ramamohanarao, Christopher Leckie, Rodrigo N. Calheiros, Amir Vahid Dastjerdi, Steven Versteeg:
Big Data Analytics-Enhanced Cloud Computing: Challenges, Architectural Elements, and Future Directions. CoRR abs/1510.06486 (2015) - 2014
- [j43]Gerard Wong, Jeffrey Chan, Bronwyn A. Kingwell, Christopher Leckie, Peter J. Meikle:
LICRE: unsupervised feature correlation reduction for lipidomics. Bioinform. 30(19): 2832-2833 (2014) - [j42]Masud Moshtaghi, Christopher Leckie, Shanika Karunasekera, Sutharshan Rajasegarar:
An adaptive elliptical anomaly detection model for wireless sensor networks. Comput. Networks 64: 195-207 (2014) - [j41]Alif Wahid, Christopher Leckie, Chenfeng Vincent Zhou:
Estimating the number of hosts corresponding to an intrusion alert while preserving privacy. J. Comput. Syst. Sci. 80(3): 502-519 (2014) - [j40]Sutharshan Rajasegarar, Christopher Leckie, Marimuthu Palaniswami:
Hyperspherical cluster based distributed anomaly detection in wireless sensor networks. J. Parallel Distributed Comput. 74(1): 1833-1847 (2014) - [j39]Sutharshan Rajasegarar, Alexander Gluhak, Muhammad Ali Imran, Michele Nati, Masud Moshtaghi, Christopher Leckie, Marimuthu Palaniswami:
Ellipsoidal neighbourhood outlier factor for distributed anomaly detection in resource constrained networks. Pattern Recognit. 47(9): 2867-2879 (2014) - [j38]Sutharshan Rajasegarar, Timothy C. Havens, Shanika Karunasekera, Christopher Leckie, James C. Bezdek, Milan Jamriska, Ajith Gunatilaka, Alex Skvortsov, Marimuthu Palaniswami:
High-Resolution Monitoring of Atmospheric Pollutants Using a System of Low-Cost Sensors. IEEE Trans. Geosci. Remote. Sens. 52(7): 3823-3832 (2014) - [j37]Masud Moshtaghi, James C. Bezdek, Timothy C. Havens, Christopher Leckie, Shanika Karunasekera, Sutharshan Rajasegarar, Marimuthu Palaniswami:
Streaming analysis in wireless sensor networks. Wirel. Commun. Mob. Comput. 14(9): 905-921 (2014) - [c85]Tarique Anwar, Chengfei Liu, Hai Le Vu, Christopher Leckie:
Spatial Partitioning of Large Urban Road Networks. EDBT 2014: 343-354 - [c84]Yi Han, Jeffrey Chan, Tansu Alpcan, Christopher Leckie:
Virtual machine allocation policies against co-resident attacks in cloud computing. ICC 2014: 786-792 - [c83]Sutharshan Rajasegarar, Christopher Leckie, Marimuthu Palaniswami:
Spatio-temporal estimation with Bayesian maximum entropy and compressive sensing in communication constrained networks. ICC 2014: 4536-4541 - [c82]Jeffrey Chan, Christopher Leckie, James Bailey, Kotagiri Ramamohanarao:
TRIBAC: Discovering Interpretable Clusters and Latent Structures in Graphs. ICDM 2014: 737-742 - [c81]Liyan Liu, Andrey Kan, Jie H. S. Zhou, John F. Markham, Philip D. Hodgkin, Christopher Leckie:
Evaluating Spectral Unmixing Quality in the Absence of Reference Objects for Time Lapse Fluorescence Microscopy. ICDM Workshops 2014: 968-975 - [c80]Sutharshan Rajasegarar, Peng Zhang, Yang Zhou, Shanika Karunasekera, Christopher Leckie, Marimuthu Palaniswami:
High resolution spatio-temporal monitoring of air pollutants using wireless sensor networks. ISSNIP 2014: 1-6 - [c79]Lida Rashidi, Sutharshan Rajasegarar, Christopher Leckie, Michele Nati, Alexander Gluhak, Muhammad Ali Imran, Marimuthu Palaniswami:
Profiling spatial and temporal behaviour in sensor networks: A case study in energy monitoring. ISSNIP 2014: 1-7 - [c78]Xiaoting Wang, Sofia Suvorova, Tharshan Vaithianathan, Christopher Leckie:
Using trajectory features for upper limb action recognition. ISSNIP 2014: 1-6 - [c77]Yanxu Zheng, Sutharshan Rajasegarar, Christopher Leckie, Marimuthu Palaniswami:
Smart car parking: Temporal clustering and anomaly detection in urban car parking. ISSNIP 2014: 1-6 - [c76]Jeffrey Chan, Xuan Vinh Nguyen, Wei Liu, James Bailey, Christopher Leckie, Kotagiri Ramamohanarao, Jian Pei:
Structure-Aware Distance Measures for Comparing Clusterings in Graphs. PAKDD (1) 2014: 362-373 - [c75]Mahsa Salehi, Christopher A. Leckie, Masud Moshtaghi, Tharshan Vaithianathan:
A Relevance Weighted Ensemble Model for Anomaly Detection in Switching Data Streams. PAKDD (2) 2014: 461-473 - [c74]Sarah M. Erfani, Yee Wei Law, Shanika Karunasekera, Christopher Leckie, Marimuthu Palaniswami:
Privacy-Preserving Collaborative Anomaly Detection for Participatory Sensing. PAKDD (1) 2014: 581-593 - 2013
- [j36]Andrey Kan, Christopher Leckie, James Bailey, John Markham, Rajib Chakravorty:
Measures for ranking cell trackers without manual validation. Pattern Recognit. 46(11): 2849-2859 (2013) - [j35]Timothy C. Havens, James C. Bezdek, Christopher Leckie, Kotagiri Ramamohanarao, Marimuthu Palaniswami:
A Soft Modularity Function For Detecting Fuzzy Communities in Social Networks. IEEE Trans. Fuzzy Syst. 21(6): 1170-1175 (2013) - [j34]Andrey Kan, Jeffrey Chan, Conor Hayes, Bernie Hogan, James Bailey, Christopher Leckie:
A time decoupling approach for studying forum dynamics. World Wide Web 16(5-6): 595-620 (2013) - [c73]Dheeraj Kumar, Marimuthu Palaniswami, Sutharshan Rajasegarar, Christopher Leckie, James C. Bezdek, Timothy C. Havens:
clusiVAT: A mixed visual/numerical clustering algorithm for big data. IEEE BigData 2013: 112-117 - [c72]Jeffrey Chan, Wei Liu, Andrey Kan, Christopher Leckie, James Bailey, Kotagiri Ramamohanarao:
Discovering latent blockmodels in sparse and noisy graphs using non-negative matrix factorisation. CIKM 2013: 811-816 - [c71]Timothy C. Havens, James C. Bezdek, Christopher Leckie, Jeffrey Chan, Wei Liu, James Bailey, Kotagiri Ramamohanarao, Marimuthu Palaniswami:
Clustering and visualization of fuzzy communities in social networks. FUZZ-IEEE 2013 - [c70]Timothy C. Havens, James C. Bezdek, Christopher Leckie, Marimuthu Palaniswami:
Extension of iVAT to asymmetric matrices. FUZZ-IEEE 2013 - [c69]Yi Han, Tansu Alpcan, Jeffrey Chan, Christopher Leckie:
Security Games for Virtual Machine Allocation in Cloud Computing. GameSec 2013: 99-118 - [c68]Fan Shi, Cheng Soon Ong, Christopher Leckie:
Applications of Class-Conditional Conformal Predictor in Multi-class Classification. ICMLA (1) 2013: 235-239 - [c67]Sarah M. Erfani, Shanika Karunasekera, Christopher Leckie, Udaya Parampalli:
Privacy-preserving data aggregation in Participatory Sensing Networks. ISSNIP 2013: 165-170 - [c66]Wei Liu, Jeffrey Chan, James Bailey, Christopher Leckie, Fang Chen, Kotagiri Ramamohanarao:
A Bayesian Classifier for Learning from Tensorial Data. ECML/PKDD (2) 2013: 483-498 - [c65]James Bailey, Jeffrey Chan, Kotagiri Ramamohanarao, Christopher Leckie, Wei Liu:
Mining Labelled Tensors by Discovering both their Common and Discriminative Subspaces. SDM 2013: 614-622 - [c64]Yi Han, Jeffrey Chan, Christopher Leckie:
Analysing Virtual Machine Usage in Cloud Computing. SERVICES 2013: 370-377 - 2012
- [j33]Gerard Wong, Christopher Leckie, Adam Kowalczyk:
FSR: feature set reduction for scalable and accurate multi-class cancer subtype classification based on copy number. Bioinform. 28(2): 151-159 (2012) - [j32]Liang Wang, Christopher Leckie:
Improved Gaussian process classification via feature space rotation. Neurocomputing 83: 89-97 (2012) - [j31]Timothy C. Havens, James C. Bezdek, Christopher Leckie, Lawrence O. Hall, Marimuthu Palaniswami:
Fuzzy c-Means Algorithms for Very Large Data. IEEE Trans. Fuzzy Syst. 20(6): 1130-1146 (2012) - [j30]Jeffrey Chan, James Bailey, Christopher Leckie, Michael E. Houle:
ciForager: Incrementally discovering regions of correlated change in evolving graphs. ACM Trans. Knowl. Discov. Data 6(3): 11:1-11:50 (2012) - [c63]Wei Liu, Sanjay Chawla, James Bailey, Christopher Leckie, Kotagiri Ramamohanarao:
An Efficient Adversarial Learning Strategy for Constructing Robust Classification Boundaries. Australasian Conference on Artificial Intelligence 2012: 649-660 - [c62]Wei Liu, Jeffrey Chan, James Bailey, Christopher Leckie, Kotagiri Ramamohanarao:
Utilizing common substructures to speedup tensor factorization for mining dynamic graphs. CIKM 2012: 435-444 - [c61]Wei Liu, Andrey Kan, Jeffrey Chan, James Bailey, Christopher Leckie, Jian Pei, Kotagiri Ramamohanarao:
On compressing weighted time-evolving graphs. CIKM 2012: 2319-2322 - [c60]Sutharshan Rajasegarar, James C. Bezdek, Masud Moshtaghi, Christopher Leckie, Timothy C. Havens, Marimuthu Palaniswami:
Measures for clustering and anomaly detection in sets of higher dimensional ellipsoids. IJCNN 2012: 1-8 - [c59]Jeffrey Chan, Wei Liu, Christopher Leckie, James Bailey, Kotagiri Ramamohanarao:
SeqiBloc: mining multi-time spanning blockmodels in dynamic graphs. KDD 2012: 651-659 - [c58]Alif Wahid, Christopher Leckie, Chenfeng Vincent Zhou:
Estimating the Number of Hosts Corresponding to an Address while Preserving Anonymity. NSS 2012: 166-179 - [c57]Sergey Demyanov, James Bailey, Kotagiri Ramamohanarao, Christopher Leckie:
AIC and BIC based approaches for SVM parameter value estimation with RBF kernels. ACML 2012: 97-112 - [i1]Andrey Kan, Jeffrey Chan, Conor Hayes, Bernie Hogan, James Bailey, Christopher Leckie:
A Time Decoupling Approach for Studying Forum Dynamics. CoRR abs/1201.2277 (2012) - 2011
- [j29]Fan Shi, Gad Abraham, Christopher Leckie, Izhak Haviv, Adam Kowalczyk:
Meta-analysis of gene expression microarrays with missing replicates. BMC Bioinform. 12: 84 (2011) - [j28]James C. Bezdek, Sutharshan Rajasegarar, Masud Moshtaghi, Christopher Leckie, Marimuthu Palaniswami, Timothy C. Havens:
Anomaly Detection in Environmental Monitoring Networks [Application Notes]. IEEE Comput. Intell. Mag. 6(2): 52-58 (2011) - [j27]Alif Wahid, Christopher Leckie, Chenfeng Vincent Zhou:
Self-similar characteristics of network intrusion attempts and the implications for predictability. Concurr. Comput. Pract. Exp. 23(12): 1367-1385 (2011) - [j26]Maen Takruri, Sutharshan Rajasegarar, Subhash Challa, Christopher Leckie, Marimuthu Palaniswami:
Spatio-temporal modelling-based drift-aware wireless sensor networks. IET Wirel. Sens. Syst. 1(2): 110-122 (2011) - [j25]Masud Moshtaghi, Timothy C. Havens, James C. Bezdek, Laurence Anthony F. Park, Christopher Leckie, Sutharshan Rajasegarar, James M. Keller, Marimuthu Palaniswami:
Clustering ellipses for anomaly detection. Pattern Recognit. 44(1): 55-69 (2011) - [j24]Liang Wang, Christopher Leckie, Kotagiri Ramamohanarao, James C. Bezdek:
Approximate pairwise clustering for large data sets via sampling plus extension. Pattern Recognit. 44(2): 222-235 (2011) - [j23]Masud Moshtaghi, Sutharshan Rajasegarar, Christopher Leckie, Shanika Karunasekera:
An efficient hyperellipsoidal clustering algorithm for resource-constrained environments. Pattern Recognit. 44(9): 2197-2209 (2011) - [c56]Masud Moshtaghi, Christopher Leckie, Shanika Karunasekera, James C. Bezdek, Sutharshan Rajasegarar, Marimuthu Palaniswami:
Incremental Elliptical Boundary Estimation for Anomaly Detection in Wireless Sensor Networks. ICDM 2011: 467-476 - [c55]Sarah M. Erfani, Sutharshan Rajasegarar, Christopher Leckie:
An efficient approach to detecting concept-evolution in network data streams. ATNAC 2011: 1-7 - 2010
- [j22]Gerard Wong, Christopher Leckie, Kylie L. Gorringe, Izhak Haviv, Ian G. Campbell, Adam Kowalczyk:
Exploiting sequence similarity to validate the sensitivity of SNP arrays in detecting fine-scaled copy number variations. Bioinform. 26(8): 1007-1014 (2010) - [j21]Fan Shi, Christopher Leckie, Geoff MacIntyre, Izhak Haviv, Alex Boussioutas, Adam Kowalczyk:
A bi-ordering approach to linking gene expression with clinical annotations in gastric cancer. BMC Bioinform. 11: 477 (2010) - [j20]Chenfeng Vincent Zhou, Christopher Leckie, Shanika Karunasekera:
A survey of coordinated attacks and collaborative intrusion detection. Comput. Secur. 29(1): 124-140 (2010) - [j19]Abdun Naser Mahmood, Jiankun Hu, Zahir Tari, Christopher Leckie:
Critical infrastructure protection: Resource efficient sampling to improve detection of less frequent patterns in network traffic. J. Netw. Comput. Appl. 33(4): 491-502 (2010) - [j18]Sutharshan Rajasegarar, Christopher Leckie, James C. Bezdek, Marimuthu Palaniswami:
Centered hyperspherical and hyperellipsoidal one-class support vector machines for anomaly detection in sensor networks. IEEE Trans. Inf. Forensics Secur. 5(3): 518-533 (2010) - [j17]Liang Wang, Xin Geng, James C. Bezdek, Christopher Leckie, Kotagiri Ramamohanarao:
Enhanced Visual Analysis for Cluster Tendency Assessment and Data Partitioning. IEEE Trans. Knowl. Data Eng. 22(10): 1401-1414 (2010) - [c54]James C. Bezdek, Timothy C. Havens, James M. Keller, Christopher Leckie, Laurence Anthony F. Park:
Clustering elliptical anomalies in sensor networks. FUZZ-IEEE 2010: 1-8 - [c53]Liang Wang, Christopher Leckie, Kotagiri Ramamohanarao:
Combining Real and Virtual Graphs to Enhance Data Clustering. ICPR 2010: 790-793 - [c52]Liang Wang, Christopher Leckie:
Encoding Actions via Quantized Vocabulary of Averaged Silhouettes. ICPR 2010: 3657-3660 - [c51]Hao Qu, Liang Wang, Christopher Leckie:
Action Recognition Using Space-Time Shape Difference Images. ICPR 2010: 3661-3664 - [c50]Shan Suthaharan, Christopher Leckie, Masud Moshtaghi, Shanika Karunasekera, Sutharshan Rajasegarar:
Sensor data boundary estimation for anomaly detection in wireless sensor networks. MASS 2010: 546-551 - [c49]Li Lin, Christopher Leckie, Chenfeng Vincent Zhou:
Comparative Analysis of HTTP Anomaly Detection Algorithms: DFA vs N-Grams. NSS 2010: 113-119 - [c48]Liang Wang, Uyen T. V. Nguyen, James C. Bezdek, Christopher Leckie, Kotagiri Ramamohanarao:
iVAT and aVAT: Enhanced Visual Analysis for Cluster Tendency Assessment. PAKDD (1) 2010: 16-27 - [p1]Abdun Naser Mahmood, Christopher Leckie, Jiankun Hu, Zahir Tari, Mohammed Atiquzzaman:
Network Traffic Analysis and SCADA Security. Handbook of Information and Communication Security 2010: 383-405
2000 – 2009
- 2009
- [j16]Chenfeng Vincent Zhou, Christopher Leckie, Kotagiri Ramamohanarao:
Protecting SIP server from CPU-based DoS attacks using history-based IP filtering. IEEE Commun. Lett. 13(10): 800-802 (2009) - [j15]Jeffrey Chan, James Bailey, Christopher Leckie:
Using graph partitioning to discover regions of correlated spatio-temporal change in evolving graphs. Intell. Data Anal. 13(5): 755-793 (2009) - [j14]Chenfeng Vincent Zhou, Christopher Leckie, Shanika Karunasekera:
Decentralized multi-dimensional alert correlation for collaborative intrusion detection. J. Netw. Comput. Appl. 32(5): 1106-1123 (2009) - [j13]Chenfeng Vincent Zhou, Christopher Leckie, Shanika Karunasekera:
Collaborative Detection of Fast Flux Phishing Domains. J. Networks 4(1): 75-84 (2009) - [j12]Liang Wang, Christopher Leckie, Kotagiri Ramamohanarao, James C. Bezdek:
Automatically Determining the Number of Clusters in Unlabeled Data Sets. IEEE Trans. Knowl. Data Eng. 21(3): 335-350 (2009) - [j11]Sutharshan Rajasegarar, James C. Bezdek, Christopher Leckie, Marimuthu Palaniswami:
Elliptical anomalies in wireless sensor networks. ACM Trans. Sens. Networks 6(1): 7:1-7:28 (2009) - [c47]Laurence Anthony F. Park, Christopher Leckie, Kotagiri Ramamohanarao, James C. Bezdek:
Adapting Spectral Co-clustering to Documents and Terms Using Latent Semantic Analysis. Australasian Conference on Artificial Intelligence 2009: 301-311 - [c46]Andrey Kan, Jeffrey Chan, James Bailey, Christopher Leckie:
A Query Based Approach for Mining Evolving Graphs. AusDM 2009: 139-150 - [c45]Laurence Anthony F. Park, James C. Bezdek, Christopher Leckie:
Visualization of clusters in very large rectangular dissimilarity data. ICARA 2009: 251-256 - [c44]Alif Wahid, Christopher Leckie, Chenfeng Vincent Zhou:
Characterising the Evolution in Scanning Activity of Suspicious Hosts. NSS 2009: 344-350 - [c43]Liang Wang, Christopher Leckie, Kotagiri Ramamohanarao, James C. Bezdek:
Approximate Spectral Clustering. PAKDD 2009: 134-146 - [c42]Liang Wang, Hang Zhou, Sui-Chien Low, Christopher Leckie:
Action recognition via multi-feature fusion and Gaussian process classification. WACV 2009: 1-6 - 2008
- [j10]Liang Wang, James C. Bezdek, Christopher Leckie, Kotagiri Ramamohanarao:
Selective sampling for approximate clustering of very large data sets. Int. J. Intell. Syst. 23(3): 313-331 (2008) - [j9]Jeffrey Chan, James Bailey, Christopher Leckie:
Discovering correlated spatio-temporal changes in evolving graphs. Knowl. Inf. Syst. 16(1): 53-96 (2008) - [j8]Abdun Naser Mahmood, Christopher Leckie, Parampalli Udaya:
An Efficient Clustering Scheme to Exploit Hierarchical Data in Network Traffic Analysis. IEEE Trans. Knowl. Data Eng. 20(6): 752-767 (2008) - [j7]Sutharshan Rajasegarar, Christopher Leckie, Marimuthu Palaniswami:
Anomaly detection in wireless sensor networks. IEEE Wirel. Commun. 15(4): 34-40 (2008) - [c41]Liang Wang, Xin Geng, Christopher Leckie, Kotagiri Ramamohanarao:
Moving shape dynamics: A signal processing perspective. CVPR 2008 - [c40]Maen Takruri, Sutharshan Rajasegarar, Subhash Challa, Christopher Leckie, Marimuthu Palaniswami:
Online drift correction in wireless sensor networks using spatio-temporal modeling. FUSION 2008: 1-8 - [c39]Sutharshan Rajasegarar, Christopher Leckie, Marimuthu Palaniswami:
CESVM: Centered Hyperellipsoidal Support Vector Machine Based Anomaly Detection. ICC 2008: 1610-1614 - [c38]Liang Wang, Xin Geng, James C. Bezdek, Christopher Leckie, Kotagiri Ramamohanarao:
SpecVAT: Enhanced Visual Cluster Analysis. ICDM 2008: 638-647 - [c37]Joanna Cheng, Liang Wang, Christopher Leckie:
Dual clustering for categorization of action sequences. ICPR 2008: 1-4 - [c36]Daniel Peter Dallas, Christopher Leckie, Kotagiri Ramamohanarao:
Analysis and enhancement of on-demand routing in wireless sensor networks. PM2HW2N 2008: 173-179 - [c35]Ming Luo, Tao Peng, Christopher Leckie:
CPU-based DoS attacks against SIP servers. NOMS 2008: 41-48 - [c34]Chenfeng Vincent Zhou, Shanika Karunasekera, Christopher Leckie:
Relieving hot spots in collaborative intrusion detection systems during worm outbreaks. NOMS 2008: 49-56 - [c33]Liang Wang, Xiaozhe Wang, Christopher Leckie, Kotagiri Ramamohanarao:
Characteristic-Based Descriptors for Motion Sequence Recognition. PAKDD 2008: 369-380 - 2007
- [j6]Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao:
Survey of network-based defense mechanisms countering the DoS and DDoS problems. ACM Comput. Surv. 39(1): 3 (2007) - [j5]Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao:
Information sharing for distributed intrusion detection systems. J. Netw. Comput. Appl. 30(3): 877-899 (2007) - [c32]Sutharshan Rajasegarar, Christopher Leckie, Marimuthu Palaniswami, James C. Bezdek:
Quarter Sphere Based Distributed Anomaly Detection in Wireless Sensor Networks. ICC 2007: 3864-3869 - [c31]Liang Wang, Christopher Leckie, Xiaozhe Wang, Kotagiri Ramamohanarao, James C. Bezdek:
Tensor Space Learning for Analyzing Activity Patterns from Video Sequences. ICDM Workshops 2007: 63-68 - [c30]Kotagiri Ramamohanarao, Kapil Kumar Gupta, Tao Peng, Christopher Leckie:
The Curse of Ease of Access to the Internet. ICISS 2007: 234-249 - [c29]Daniel Peter Dallas, Christopher Leckie, Kotagiri Ramamohanarao:
Hop-Count Monitoring: Detecting Sinkhole Attacks in Wireless Sensor Networks. ICON 2007: 176-181 - [c28]Chenfeng Vincent Zhou, Shanika Karunasekera, Christopher Leckie:
Evaluation of a Decentralized Architecture for Large Scale Collaborative Intrusion Detection. Integrated Network Management 2007: 80-89 - [c27]Abdun Naser Mahmood, Christopher Leckie, Parampalli Udaya:
A scalable sampling scheme for clustering in network traffic analysis. Infoscale 2007: 38 - 2006
- [j4]Chong Eik Loo, Mun Yong Ng, Christopher Leckie, Marimuthu Palaniswami:
Intrusion Detection for Routing Attacks in Sensor Networks. Int. J. Distributed Sens. Networks 2(4): 313-332 (2006) - [j3]James C. Bezdek, Richard J. Hathaway, Jacalyn M. Huband, Christopher Leckie, Kotagiri Ramamohanarao:
Approximate clustering in very large relational data. Int. J. Intell. Syst. 21(8): 817-841 (2006) - [c26]James C. Bezdek, Richard J. Hathaway, Christopher Leckie, Kotagiri Ramamohanarao:
Approximate data mining in very large relational data. ADC 2006: 3-13 - [c25]Xiaoyuan Qian, James Bailey, Christopher Leckie:
Mining Generalised Emerging Patterns. Australian Conference on Artificial Intelligence 2006: 295-304 - [c24]Jeffrey Chan, James Bailey, Christopher Leckie:
Discovering and Summarising Regions of Correlated Spatio-Temporal Change in Evolving Graphs. ICDM Workshops 2006: 361-365 - [c23]Dana Zhang, Christopher Leckie:
An evaluation technique for network intrusion detection systems. Infoscale 2006: 23 - [c22]Abdun Naser Mahmood, Christopher Leckie, Parampalli Udaya:
Echidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis. Networking 2006: 1092-1098 - 2005
- [c21]Kingsly Leung, Christopher Leckie:
Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters. ACSC 2005: 333-342 - [c20]Yousof Al-Hammadi, Christopher Leckie:
Anomaly detection for Internet worms. Integrated Network Management 2005: 133-146 - [c19]Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao:
Exploiting Traffic Localities for Efficient Flow State Lookup. NETWORKING 2005: 1133-1145 - 2004
- [j2]Siew Cheong Au, Christopher Leckie, Ajeet Parhar, Gerard Wong:
Efficient visualization of large routing topologies. Int. J. Netw. Manag. 14(2): 105-118 (2004) - [c18]Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao:
Proactively Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring. NETWORKING 2004: 771-782 - [c17]Joshua Oldmeadow, Siddarth Ravinutala, Christopher Leckie:
Adaptive Clustering for Network Intrusion Detection. PAKDD 2004: 255-259 - 2003
- [c16]Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao:
Detecting Distributed Denial of Service Attacks by Sharing Distributed Beliefs. ACISP 2003: 214-225 - [c15]Christopher Leckie, Kotagiri Ramamohanarao:
Policies for Sharing Distributed Probabilistic Beliefs. ACSC 2003: 285-290 - [c14]Samuel Abdelsayed, David Glimsholt, Christopher Leckie, Simon Ryan, Samer Shami:
An efficient filter for denial-of-service bandwidth attacks. GLOBECOM 2003: 1353-1357 - [c13]Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao:
Detecting reflector attacks by sharing beliefs. GLOBECOM 2003: 1358-1362 - [c12]Herman L. Ferrá, Ken Lau, Christopher Leckie, Anderson Tang:
Applying Reinforcement Learning to Packet Scheduling in Routers. IAAI 2003: 79-84 - [c11]Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao:
Protection from distributed denial of service attacks using history-based IP filtering. ICC 2003: 482-486 - [c10]David Soen-Mun Chan, Khim Shiong Chua, Christopher Leckie, Ajeet Parhar:
Visualisation of power-law network topologies. ICON 2003: 69-74 - 2002
- [c9]Christopher Leckie, Kotagiri Ramamohanarao:
Learning to Share Distributed Probabilistic Beliefs. ICML 2002: 371-378 - [c8]Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao:
Adjusted Probabilistic Packet Marking for IP Traceback. NETWORKING 2002: 697-708 - [c7]Christopher Leckie, Kotagiri Ramamohanarao:
A probabilistic approach to detecting network scans. NOMS 2002: 359-372
1990 – 1999
- 1999
- [c6]Bhavani Raskutti, Christopher Leckie:
An Evaluation of Criteria for Measuring the Quality of Clusters. IJCAI 1999: 905-910 - 1998
- [j1]Christopher Leckie, Ingrid Zukerman:
Inductive Learning of Search Control Rules for Planning. Artif. Intell. 101(1-2): 63-98 (1998) - 1997
- [c5]Christopher Leckie, Michael Dale:
Locating Faults in Tree-Structured Networks. IJCAI (1) 1997: 434-439 - [c4]Chris Leckie, Rye Senjen, Belinda Ward, Ming Zhao:
A Multi-Agent System for Distributed Fault Diagnosis. PAAM 1997: 71-86 - 1996
- [c3]Ming Zhao, Christopher Leckie:
The Development of an Interactive Fault Diagnosis Expert System for Telecommunication Applications. PRICAI 1996: 59-70 - 1993
- [c2]Christopher Leckie, Ingrid Zukerman:
An Inductive Approach to Learning Search Control Rules for Planning. IJCAI 1993: 1100-1105 - 1991
- [c1]Christopher Leckie, Ingrid Zukerman:
Learning Search Control Rules for Planning: An Inductive Approach. ML 1991: 422-426
Coauthor Index
aka: Hadi Mohaghegh Dolatabadi
aka: Timothy Craig Havens
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 21:41 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint