Masud Moshtaghi
TitleCited byYear
Clustering ellipses for anomaly detection
M Moshtaghi, TC Havens, JC Bezdek, L Park, C Leckie, S Rajasegarar, ...
Pattern Recognition 44 (1), 55-69, 2011
682011
Anomaly detection by clustering ellipsoids in wireless sensor networks
M Moshtaghi, S Rajasegarar, C Leckie, S Karunasekera
2009 International Conference on Intelligent Sensors, Sensor Networks and …, 2009
542009
Anomaly detection in environmental monitoring networks [application notes]
JC Bezdek, S Rajasegarar, M Moshtaghi, C Leckie, M Palaniswami, ...
IEEE Computational Intelligence Magazine 6 (2), 52-58, 2011
382011
Incremental elliptical boundary estimation for anomaly detection in wireless sensor networks
M Moshtaghi, C Leckie, S Karunasekera, JC Bezdek, S Rajasegarar, ...
2011 IEEE 11th international conference on data mining, 467-476, 2011
372011
An efficient hyperellipsoidal clustering algorithm for resource-constrained environments
M Moshtaghi, S Rajasegarar, C Leckie, S Karunasekera
Pattern Recognition 44 (9), 2197-2209, 2011
292011
Mining micro-blogs: Opportunities and challenges
Y Liao, M Moshtaghi, B Han, S Karunasekera, R Kotagiri, T Baldwin, ...
Computational social networks, 129-159, 2012
272012
Evolving fuzzy rules for anomaly detection in data streams
M Moshtaghi, JC Bezdek, C Leckie, S Karunasekera, M Palaniswami
IEEE Transactions on Fuzzy Systems 23 (3), 688-700, 2014
262014
A relevance weighted ensemble model for anomaly detection in switching data streams
M Salehi, CA Leckie, M Moshtaghi, T Vaithianathan
Pacific-Asia Conference on Knowledge Discovery and Data Mining, 461-473, 2014
242014
An adaptive elliptical anomaly detection model for wireless sensor networks
M Moshtaghi, C Leckie, S Karunasekera, S Rajasegarar
Computer Networks 64, 195-207, 2014
242014
Ellipsoidal neighbourhood outlier factor for distributed anomaly detection in resource constrained networks
S Rajasegarar, A Gluhak, MA Imran, M Nati, M Moshtaghi, C Leckie, ...
Pattern recognition 47 (9), 2867-2879, 2014
232014
Streaming analysis in wireless sensor networks
M Moshtaghi, JC Bezdek, TC Havens, C Leckie, S Karunasekera, ...
Wireless Communications and Mobile Computing 14 (9), 905-921, 2014
232014
A support platform for event detection using social intelligence
T Baldwin, P Cook, B Han, A Harwood, S Karunasekera, M Moshtaghi
Proceedings of the Demonstrations at the 13th Conference of the European …, 2012
202012
Statistical models for unobtrusively detecting abnormal periods of inactivity in older adults
M Moshtaghi, I Zukerman, RA Russell
User Modeling and User-Adapted Interaction 25 (3), 231-265, 2015
162015
Online clustering of multivariate time-series
M Moshtaghi, C Leckie, JC Bezdek
Proceedings of the 2016 SIAM international conference on data mining, 360-368, 2016
132016
The generalized c index for internal fuzzy cluster validity
JC Bezdek, M Moshtaghi, T Runkler, C Leckie
IEEE Transactions on Fuzzy Systems 24 (6), 1500-1512, 2016
122016
Profiling pedestrian distribution and anomaly detection in a dynamic environment
MT Doan, S Rajasegarar, M Salehi, M Moshtaghi, C Leckie
Proceedings of the 24th ACM International on Conference on Information and …, 2015
122015
Sensor data boundary estimation for anomaly detection in wireless sensor networks
S Suthaharan, C Leckie, M Moshtaghi, S Karunasekera, S Rajasegarar
The 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems …, 2010
122010
Detecting unseen anomalies in weight training exercises
Y Kowsar, M Moshtaghi, E Velloso, L Kulik, C Leckie
Proceedings of the 28th Australian Conference on Computer-Human Interaction …, 2016
102016
Robust domain generalisation by enforcing distribution invariance
S Erfani, M Baktashmotlagh, M Moshtaghi, V Nguyen, C Leckie, J Bailey, ...
Proceedings of the Twenty-Fifth International Joint Conference on Artificial …, 2016
102016
Employing distance-based semantics to interpret spoken referring expressions
I Zukerman, SN Kim, T Kleinbauer, M Moshtaghi
Computer Speech & Language 34 (1), 154-185, 2015
92015
The system can't perform the operation now. Try again later.
Articles 1–20