Wael Khreich

Orcid: 0000-0002-2241-8665

According to our database1, Wael Khreich authored at least 27 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Commit-time defect prediction using one-class classification.
J. Syst. Softw., February, 2024

Inter-model interpretability: Self-supervised models as a case study.
Array, 2024

2022
A Deep Dive into Deep Cluster.
CoRR, 2022

Inter-model Interpretability: Self-supervised Models as a Case Study.
CoRR, 2022

Gender Bias in Text: Labeled Datasets and Lexicons.
CoRR, 2022

2018
Anomaly Detection Techniques Based on Kappa-Pruned Ensembles.
IEEE Trans. Reliab., 2018

Combining heterogeneous anomaly detectors for improved software security.
J. Syst. Softw., 2018

2017
An anomaly detection system based on variable N-gram features and one-class SVM.
Inf. Softw. Technol., 2017

2016
Mining trends and patterns of software vulnerabilities.
J. Syst. Softw., 2016

A novel approach in household electricity consumption forecasting.
Proceedings of the 2016 IEEE Canadian Conference on Electrical and Computer Engineering, 2016

2015
A Survey of Techniques for Event Detection in Twitter.
Comput. Intell., 2015

An Anomaly Detection System Based on Ensemble of Detectors with Effective Pruning Techniques.
Proceedings of the 2015 IEEE International Conference on Software Quality, 2015

A trace abstraction approach for host-based anomaly detection.
Proceedings of the 2015 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2015

2014
Total ADS: Automated Software Anomaly Detection System.
Proceedings of the 14th IEEE International Working Conference on Source Code Analysis and Manipulation, 2014

2013
A host-based anomaly detection approach by representing system calls as states of kernel modules.
Proceedings of the IEEE 24th International Symposium on Software Reliability Engineering, 2013

Monitoring system calls for anomaly detection in modern operating systems.
Proceedings of the IEEE 24th International Symposium on Software Reliability Engineering, 2013

2012
Adaptive ROC-based ensembles of HMMs applied to anomaly detection.
Pattern Recognit., 2012

A survey of techniques for incremental learning of HMM parameters.
Inf. Sci., 2012

Fusion of biometric systems using Boolean combination: an application to iris-based authentication.
Int. J. Biom., 2012

Domain Adaptation Techniques for Machine Translation and Their Evaluation in a Real-World Setting.
Proceedings of the Advances in Artificial Intelligence, 2012

2011
Incremental Boolean Combination of Classifiers.
Proceedings of the Multiple Classifier Systems - 10th International Workshop, 2011

Exploring the upper bound performance limit of iris biometrics using score calibration and fusion.
Proceedings of the 2011 IEEE Workshop on Computational Intelligence in Biometrics and Identity Management, 2011

2010
On the memory complexity of the forward-backward algorithm.
Pattern Recognit. Lett., 2010

Iterative Boolean combination of classifiers in the ROC space: An application to anomaly detection with HMMs.
Pattern Recognit., 2010

Boolean Combination of Classifiers in the ROC Space.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

2009
Combining Hidden Markov Models for Improved Anomaly Detection.
Proceedings of IEEE International Conference on Communications, 2009

A comparison of techniques for on-line incremental learning of HMM parameters in anomaly detection.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2009


  Loading...