no code implementations • 5 Mar 2021 • Julian Busch, Anton Kocheturov, Volker Tresp, Thomas Seidl
Malicious software (malware) poses an increasing threat to the security of communication systems as the number of interconnected mobile devices increases exponentially.
1 code implementation • 27 Sep 2020 • Julian Busch, Evgeniy Faerman, Matthias Schubert, Thomas Seidl
Consequently, our model benefits from a constant number of parameters and a constant-size memory footprint, allowing it to scale to considerably larger datasets.
1 code implementation • 4 Mar 2020 • Julian Busch, Jiaxing Pi, Thomas Seidl
We find that our models outperform competitors on all datasets in terms of accuracy with statistical significance.
no code implementations • 15 Feb 2018 • Evgeniy Faerman, Felix Borutta, Julian Busch, Matthias Schubert
Precisely, we propose a new node embedding which is based on the class labels in the local neighborhood of a node.