Niklas Lavesson

Orcid: 0000-0002-0535-1761

According to our database1, Niklas Lavesson authored at least 71 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Naming the Pain in Machine Learning-Enabled Systems Engineering.
CoRR, 2024

Adversarial Machine Learning in Industry: A Systematic Literature Review.
Comput. Secur., 2024

ML-Enabled Systems Model Deployment and Monitoring: Status Quo and Problems.
Proceedings of the Software Quality as a Foundation for Security, 2024

2023

Explaining rifle shooting factors through multi-sensor body tracking.
Intell. Data Anal., 2023

Status Quo and Problems of Requirements Engineering for Machine Learning: Results from an International Survey.
Proceedings of the Product-Focused Software Process Improvement, 2023

2022
Detecting ditches using supervised learning on high-resolution digital elevation models.
Expert Syst. Appl., 2022

Green Accelerated Hoeffding Tree.
CoRR, 2022

2021
Multi-View Data Analysis Techniques for Monitoring Smart Building Systems.
Sensors, 2021

Energy-aware very fast decision tree.
Int. J. Data Sci. Anal., 2021

Energy modeling of Hoeffding tree ensembles.
Intell. Data Anal., 2021

DIGITNET: A Deep Handwritten Digit Detection and Recognition Method Using a New Historical Handwritten Digit Dataset.
Big Data Res., 2021

Hit Detection in Sports Pistol Shooting.
Proceedings of the Swedish Artificial Intelligence Society Workshop, 2021

AI Transformation in the Public Sector: Ongoing Research.
Proceedings of the Swedish Artificial Intelligence Society Workshop, 2021

2020
Representative Image Selection for Data Efficient Word Spotting.
Proceedings of the Document Analysis Systems - 14th IAPR International Workshop, 2020

2019
Learning Character Recognition with Graph-Based Privileged Information.
Proceedings of the 2019 International Conference on Document Analysis and Recognition, 2019

Higher Order Mining for Monitoring District Heating Substations.
Proceedings of the 2019 IEEE International Conference on Data Science and Advanced Analytics, 2019

A Case for Guided Machine Learning.
Proceedings of the Machine Learning and Knowledge Extraction, 2019

2018
Efficient document image binarization using heterogeneous computing and parameter tuning.
Int. J. Document Anal. Recognit., 2018

How to Measure Energy Consumption in Machine Learning Algorithms.
Proceedings of the ECML PKDD 2018 Workshops, 2018

A Minimum Spanning Tree Clustering Approach for Outlier Detection in Event Sequences.
Proceedings of the 17th IEEE International Conference on Machine Learning and Applications, 2018

User Feedback and Uncertainty in User Guided Binarization.
Proceedings of the 2018 IEEE International Conference on Data Mining Workshops, 2018

Evolutionary Clustering Techniques for Expertise Mining Scenarios.
Proceedings of the 10th International Conference on Agents and Artificial Intelligence, 2018

Hoeffding Trees with Nmin Adaptation.
Proceedings of the 5th IEEE International Conference on Data Science and Advanced Analytics, 2018

Document Image Binarization Using Recurrent Neural Networks.
Proceedings of the 13th IAPR International Workshop on Document Analysis Systems, 2018

2017
Is it ethical to avoid error analysis?
CoRR, 2017

Energy Efficiency in Machine Learning: A position paper.
Proceedings of the 30th Annual Workshop of the Swedish Artificial Intelligence Society, 2017

Identification of Energy Hotspots: A Case Study of the Very Fast Decision Tree.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

2016
Hashtags and followers - An experimental study of the online social network Twitter.
Soc. Netw. Anal. Min., 2016

A mixture-of-experts approach for gene regulatory network inference.
Int. J. Data Min. Bioinform., 2016

Large-scale information retrieval in software engineering - an experience report from industrial application.
Empir. Softw. Eng., 2016

Handwriting image enhancement using local learning windowing, Gaussian Mixture Model and k-means clustering.
Proceedings of the 2016 IEEE International Symposium on Signal Processing and Information Technology, 2016

2015
Improved concept drift handling in surgery prediction and other applications.
Knowl. Inf. Syst., 2015

Consensus Decision Making in Random Forests.
Proceedings of the Machine Learning, Optimization, and Big Data, 2015

Tree-Based Response Surface Analysis.
Proceedings of the Machine Learning, Optimization, and Big Data, 2015

Energy Efficiency in Data Stream Mining.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

2014
Detecting serial residential burglaries using clustering.
Expert Syst. Appl., 2014

A method for evaluation of learning components.
Autom. Softw. Eng., 2014

2013
Comparative Analysis of Voting Schemes for Ensemble-based Malware Detection.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013

Preface.
Inf. Serv. Use, 2013

Open data for anomaly detection in maritime surveillance.
Expert Syst. Appl., 2013

Comparison of Clustering Approaches for Gene Expression Data.
Proceedings of the Twelfth Scandinavian Conference on Artificial Intelligence, 2013

2012
Similarity assessment for removal of noisy end user license agreements.
Knowl. Inf. Syst., 2012

E-Mail Prioritization using Online Social Network Profile Distance.
Int. J. Comput. Sci. Appl., 2012

Veto-based Malware Detection.
Proceedings of the Seventh International Conference on Availability, 2012

E-mail Classification Using Social Network Information.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Learning to detect spyware using end user license agreements.
Knowl. Inf. Syst., 2011

Preface.
Inf. Serv. Use, 2011

Measuring profile distance in online social networks.
Proceedings of the International Conference on Web Intelligence, Mining and Semantics, 2011

Extended Abstract: Detecting Scareware by Mining Variable Length Instruction Sequences.
Proceedings of the Eleventh Scandinavian Conference on Artificial Intelligence, 2011

User-oriented Assessment of Classification Model Understandability.
Proceedings of the Eleventh Scandinavian Conference on Artificial Intelligence, 2011

Clustering of Multiple Microarray Experiments Using Information Integration.
Proceedings of the Information Technology in Bio- and Medical Informatics, 2011

Detecting Scareware by Mining Variable Length Instruction Sequences.
Proceedings of the Information Security South Africa Conference 2011, 2011

Informed Software Installation Through License Agreement Categorization.
Proceedings of the Information Security South Africa Conference 2011, 2011

Trustworthy opportunistic sensing: A Social Computing Paradigm.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2011

Your best might not be good enough: Ranking in collaborative social search engines.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011

CudaRF: A CUDA-based implementation of Random Forests.
Proceedings of the 9th IEEE/ACS International Conference on Computer Systems and Applications, 2011

Accurate Adware Detection Using Opcode Sequence Extraction.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Learning Machine Learning: A Case Study.
IEEE Trans. Educ., 2010

APPrOVE: Application-oriented validation and evaluation of supervised learners.
Proceedings of the 5th IEEE International Conference on Intelligent Systems, 2010

A hybrid computational method for the identification of cell cycle-regulated genes.
Proceedings of the 5th IEEE International Conference on Intelligent Systems, 2010

Predicting the Risk of Future Hospitalization.
Proceedings of the Database and Expert Systems Applications, 2010

Detection of Spyware by Mining Executable Files.
Proceedings of the ARES 2010, 2010

2009
AMORI: A Metric-Based One Rule Inducer.
Proceedings of the SIAM International Conference on Data Mining, 2009

Identification of Surgery Indicators by Mining Hospital Data: A Preliminary Study.
Proceedings of the Database and Expert Systems Applications, 2009

Analysis of Speed Sign Classification Algorithms Using Shape Based Segmentation of Binary Images.
Proceedings of the Computer Analysis of Images and Patterns, 13th International Conference, 2009

2008
Spyware Prevention by Classifying End User License Agreements.
Proceedings of the New Challenges in Applied Intelligence Technologies, 2008

On the Metric-based Approach to Supervised Concept Learning.
PhD thesis, 2008

Generic Methods for Multi-criteria Evaluation.
Proceedings of the SIAM International Conference on Data Mining, 2008

2007
Evaluating learning algorithms and classifiers.
Int. J. Intell. Inf. Database Syst., 2007

2006
Quantifying the Impact of Learning Algorithm Parameter Tuning.
Proceedings of the Proceedings, 2006


  Loading...