Mikhail Petrovskiy

Orcid: 0000-0002-1236-398X

According to our database1, Mikhail Petrovskiy authored at least 25 papers between 2003 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Predicting COVID-19-Induced Lung Damage Based on Machine Learning Methods.
Program. Comput. Softw., 2022

Adaptive Sampling for Weighted Log-Rank Survival Trees Boosting.
Proceedings of the Pattern Recognition Applications and Methods, 2022

Survival Analysis Algorithms based on Decision Trees with Weighted Log-rank Criteria.
Proceedings of the 11th International Conference on Pattern Recognition Applications and Methods, 2022

2021
Continuous Keystroke Dynamics-Based User Authentication Using Modified Hausdorff Distance.
Proceedings of the Database Systems for Advanced Applications. DASFAA 2021 International Workshops, 2021

2020
An Approach for Complex Event Streams Processing and Forecasting.
Proceedings of the 26th Conference of Open Innovations Association, 2020

2019
Machine Learning Methods for Detecting and Monitoring Extremist Information on the Internet.
Program. Comput. Softw., 2019

2018
Novelty Detection Using Elliptical Fuzzy Clustering in a Reproducing Kernel Hilbert Space.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2018, 2018

2017
Pattern Based Information Retrieval Approach to Discover Extremist Information on the Internet.
Proceedings of the Mining Intelligence and Knowledge Exploration, 2017

Convolutional Neural Networks for Unsupervised Anomaly Detection in Text Data.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2017 - 18th International Conference, Guilin, China, October 30, 2017

2016
One-Class Models for Continuous Authentication Based on Keystroke Dynamics.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2016, 2016

2015
Applying text mining methods for data loss prevention.
Program. Comput. Softw., 2015

2014
Applying non-negative matrix factorization methods to discover user;s resource access patterns for computer security tasks.
Proceedings of the 14th International Conference on Hybrid Intelligent Systems, 2014

Hybrid method for active authentication using keystroke dynamics.
Proceedings of the 14th International Conference on Hybrid Intelligent Systems, 2014

2011
Automatic text summarization using latent semantic analysis.
Program. Comput. Softw., 2011

Using NMF-based text summarization to improve supervised and unsupervised classification.
Proceedings of the 11th International Conference on Hybrid Intelligent Systems, 2011

2006
A data mining approach to learning probabilistic user behavior models from database access log.
Proceedings of the ICSOFT 2006, 2006

Paired Comparisons Method for Solving Multi-Label Learning Problem.
Proceedings of the 6th International Conference on Hybrid Intelligent Systems (HIS 2006), 2006

Linear Methods for Reduction from Ranking to Multilabel Classification.
Proceedings of the AI 2006: Advances in Artificial Intelligence, 2006

2005
Enterprise Anti-Spam Solution Based on Machine Learning Approach.
Proceedings of the ICEIS 2005, 2005

Probability Estimation in Error Correcting Output Coding Framework Using Game Theory.
Proceedings of the AI 2005: Advances in Artificial Intelligence, 2005

2004
A game theory approach to pairwise classification with support vector machines.
Proceedings of the 2004 International Conference on Machine Learning and Applications, 2004

2003
Outlier Detection Algorithms in Data Mining Systems.
Program. Comput. Softw., 2003

A Fuzzy Kernel-Based Method for Real-Time Network Intrusion Detection.
Proceedings of the Innovative Internet Community Systems, Third International Workshop, 2003

Convolution Kernels for Outliers Detection in Relational Data.
Proceedings of the Intelligent Data Engineering and Automated Learning, 2003

A Hybrid Method for Patterns Mining and Outliers Detection in the Web Usage Log.
Proceedings of the Web Intelligence, 2003


  Loading...