Folgen
William Eberle
William Eberle
Bestätigte E-Mail-Adresse bei tntech.edu
Titel
Zitiert von
Zitiert von
Jahr
Genetic algorithms in feature and instance selection
CF Tsai, W Eberle, CY Chu
Knowledge-Based Systems 39, 240-247, 2013
2742013
Insider threat detection using a graph-based approach
W Eberle, J Graves, L Holder
Journal of Applied Security Research 6 (1), 32-81, 2010
1932010
Discovering structural anomalies in graph-based data
W Eberle, L Holder
Seventh IEEE international conference on data mining workshops (ICDMW 2007 …, 2007
1872007
Anomaly detection in data represented as graphs
W Eberle, L Holder
Intelligent Data Analysis 11 (6), 663-689, 2007
1752007
Smart grid energy fraud detection using artificial neural networks
V Ford, A Siraj, W Eberle
2014 IEEE symposium on computational intelligence applications in smart grid …, 2014
1502014
Explainable artificial intelligence approaches: A survey
SR Islam, W Eberle, SK Ghafoor, M Ahmed
arXiv preprint arXiv:2101.09429, 2021
902021
Towards quantification of explainability in explainable artificial intelligence methods
SR Islam, W Eberle, SK Ghafoor
The thirty-third international flairs conference, 2020
562020
A novel classifier ensemble approach for financial distress prediction
D Liang, CF Tsai, AJ Dai, W Eberle
Knowledge and Information Systems 54, 437-462, 2018
542018
Mining for Structural Anomalies in Graph-based Data.
W Eberle, LB Holder
DMIN 7, 376-389, 2007
462007
Domain knowledge aided explainable artificial intelligence for intrusion detection and response
SR Islam, W Eberle, SK Ghafoor, A Siraj, M Rogers
arXiv preprint arXiv:1911.09853, 2019
452019
Graph-based approaches to insider threat detection
W Eberle, L Holder
Proceedings of the 5th annual workshop on cyber security and information …, 2009
432009
Detecting dos attack in smart home iot devices using a graph-based approach
R Paudel, T Muncy, W Eberle
2019 IEEE international conference on big data (big data), 5249-5258, 2019
382019
Applying graph-based anomaly detection approaches to the discovery of insider threats
W Eberle, L Holder
2009 IEEE International Conference on Intelligence and Security Informatics …, 2009
382009
Data preprocessing issues for incomplete medical datasets
MW Huang, WC Lin, CW Chen, SW Ke, CF Tsai, W Eberle
Expert Systems 33 (5), 432-438, 2016
352016
Learning to detect representative data for large scale instance selection
WC Lin, CF Tsai, SW Ke, CW Hung, W Eberle
Journal of Systems and Software 106, 1-8, 2015
332015
Infusing domain knowledge in ai-based" black box" models for better explainability with application in bankruptcy prediction
SR Islam, W Eberle, S Bundy, SK Ghafoor
arXiv preprint arXiv:1905.11474, 2019
292019
Mining illegal insider trading of stocks: A proactive approach
SR Islam, SK Ghafoor, W Eberle
2018 IEEE international conference on big data (Big Data), 1397-1406, 2018
242018
Anomaly detection of elderly patient activities in smart homes using a graph-based approach
R Paudel, W Eberle, LB Holder
Proceedings of the 2018 International Conference on Data Science, 163-169, 2018
242018
Novel graph based anomaly detection using background knowledge
S Velampalli, W Eberle
The thirtieth international flairs conference, 2017
222017
Identifying threats using graph-based anomaly detection
W Eberle, L Holder, D Cook
Machine Learning in Cyber Trust: Security, Privacy, and Reliability, 73-108, 2009
222009
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20