A survey of techniques for event detection in twitter F Atefeh, W Khreich Computational Intelligence 31 (1), 132-164, 2015 | 960 | 2015 |
A survey of techniques for incremental learning of HMM parameters W Khreich, E Granger, A Miri, R Sabourin Information Sciences 197, 105--130, 2012 | 145 | 2012 |
Iterative Boolean combination of classifiers in the ROC space: An application to anomaly detection with HMMs W Khreich, E Granger, A Miri, R Sabourin Pattern Recognition 43 (8), 2732-2752, 2010 | 140 | 2010 |
An anomaly detection system based on variable N-gram features and one-class SVM W Khreich, B Khosravifar, A Hamou-Lhadj, C Talhi Information and Software Technology 91, 186-197, 2017 | 114 | 2017 |
Adaptive ROC-based ensembles of HMMs applied to anomaly detection W Khreich, E Granger, A Miri, R Sabourin Pattern Recognition 45 (1), 208-230, 2012 | 79 | 2012 |
A host-based anomaly detection approach by representing system calls as states of kernel modules SS Murtaza, W Khreich, A Hamou-Lhadj, M Couture 2013 IEEE 24th International Symposium on Software Reliability Engineering …, 2013 | 69 | 2013 |
On the memory complexity of the forward–backward algorithm W Khreich, E Granger, A Miri, R Sabourin Pattern Recognition Letters 31 (2), 91-99, 2010 | 67 | 2010 |
Mining trends and patterns of software vulnerabilities SS Murtaza, W Khreich, A Hamou-Lhadj, AB Bener Journal of Systems and Software 117, 218-228, 2016 | 60 | 2016 |
Combining hidden markov models for improved anomaly detection W Khreich, E Granger, R Sabourin, A Miri 2009 IEEE International Conference on Communications, 1-6, 2009 | 49 | 2009 |
Anomaly detection techniques based on kappa-pruned ensembles MS Islam, W Khreich, A Hamou-Lhadj IEEE Transactions on Reliability 67 (1), 212-229, 2018 | 43 | 2018 |
Combining heterogeneous anomaly detectors for improved software security W Khreich, SS Murtaza, A Hamou-Lhadj, C Talhi Journal of Systems and Software 137, 415-429, 2018 | 38 | 2018 |
A trace abstraction approach for host-based anomaly detection SS Murtaza, W Khreich, A Hamou-Lhadj, S Gagnon 2015 IEEE symposium on computational intelligence for security and defense …, 2015 | 27 | 2015 |
Gender bias in text: Origin, taxonomy, and implications J Doughman, W Khreich, M El Gharib, M Wiss, Z Berjawi Proceedings of the 3rd Workshop on Gender Bias in Natural Language …, 2021 | 25 | 2021 |
Total ADS: Automated software anomaly detection system SS Murtaza, A Hamou-Lhadj, W Khreich, M Couture 2014 IEEE 14th International Working Conference on Source Code Analysis and …, 2014 | 20 | 2014 |
A comparison of techniques for on-line incremental learning of HMM parameters in anomaly detection W Khreich, E Granger, A Miri, R Sabourin 2009 IEEE Symposium on Computational Intelligence for Security and Defense …, 2009 | 18 | 2009 |
Fusion of biometric systems using boolean combination: an application to iris-based authentication E Granger, W Khreich, R Sabourin, DO Gorodnichy International journal of biometrics 4 (3), 291-315, 2012 | 16 | 2012 |
Boolean combination of classifiers in the ROC space W Khreich, E Granger, A Miri, R Sabourin 2010 20th International Conference on Pattern Recognition, 4299-4303, 2010 | 14 | 2010 |
An international social inclusion index with application in the Organization for Economic Co-Operation and Development countries Z Hassan, W Khreich, IH Osman Decision Analytics Journal 3, 100047, 2022 | 12 | 2022 |
An anomaly detection system based on ensemble of detectors with effective pruning techniques A Soudi, W Khreich, A Hamou-Lhadj 2015 IEEE International Conference on Software Quality, Reliability and …, 2015 | 11 | 2015 |
Domain Adaptation Techniques for Machine Translation and their Evaluation in a Real-World Setting B Sankaran, M Razmara, A Farzindar, W Khreich, F Popowich, A Sarkar Advances in Artificial Intelligence, 158-169, 2012 | 9 | 2012 |