default search action
Vladimir Mulukha
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Stanislav Kirpichenko, Lev V. Utkin, Andrei V. Konstantinov, Vladimir Muliukha:
BENK: The Beran Estimator with Neural Kernels for Estimating the Heterogeneous Treatment Effect. Algorithms 17(1): 40 (2024) - 2023
- [j5]Lev V. Utkin, Andrey Y. Ageev, Andrei V. Konstantinov, Vladimir Muliukha:
Improved Anomaly Detection by Using the Attention-Based Isolation Forest. Algorithms 16(1): 19 (2023) - [j4]Andrei V. Konstantinov, Lev V. Utkin, Vladimir Muliukha:
Multiple Instance Learning with Trainable Soft Decision Tree Ensembles. Algorithms 16(8): 358 (2023) - [j3]Andrei V. Konstantinov, Lev V. Utkin, Vladimir Muliukha:
LARF: Two-Level Attention-Based Random Forests with a Mixture of Contamination Models. Informatics 10(2): 40 (2023) - [c18]Andrei V. Konstantinov, Lev V. Utkin, Vladimir Muliukha, Vladimir S. Zaborovsky:
GBMILs: Gradient Boosting Models for Multiple Instance Learning. ICR 2023: 233-245 - [i1]Andrei V. Konstantinov, Lev V. Utkin, Alexey Lukashin, Vladimir Muliukha:
Neural Attention Forests: Transformer-Based Forest Improvement. CoRR abs/2304.05980 (2023) - 2021
- [c17]Andrei V. Konstantinov, Lev V. Utkin, Vladimir Muliukha:
Gradient Boosting Machine with Partially Randomized Decision Trees. FRUCT 2021: 167-173 - 2020
- [c16]Vladimir Muliukha, Alexey Lukashin, Lev V. Utkin, Mikhail Popov, Anna A. Meldo:
Anomaly Detection Approach in Cyber Security for User and Entity Behavior Analytics System. ESANN 2020: 251-256
2010 – 2019
- 2019
- [c15]Anna A. Meldo, Lev V. Utkin, Alexey Lukashin, Vladimir Muliukha, Vladimir S. Zaborovsky:
Database Acquisition for the Lung Cancer Computer Aided Diagnostic Systems. FRUCT 2019: 220-227 - [c14]Vladimir Muliukha, Alexey Lukashin, Alexander Ilyashenko:
An Intelligent Method for Comparing Shapes of Three-Dimensional Objects. FRUCT 2019: 234-240 - [c13]Polina Shorenko, Oleg Zayats, Alexander Ilyashenko, Vladimir Muliukha:
Preemptive Priority Queuing System with Randomized Push-Out Mechanism and Negative Customers. NEW2AN 2019: 305-317 - 2018
- [c12]Maria Korenevskaya, Oleg Zayats, Alexander Ilyashenko, Vladimir Muliukha:
The Phenomenon of Secondary Flow Explosion in Retrial Priority Queueing System with Randomized Push-Out Mechanism. NEW2AN 2018: 236-246 - 2017
- [c11]Vladimir Muliukha, Alexander Ilyashenko, Vladimir S. Zaborovsky, Andrey Novopasheniy:
Space experiment "Kontur-2": Applied methods and obtained results. FRUCT 2017: 244-253 - [c10]Alexander Ilyashenko, Oleg Zayats, Maria Korenevskaya, Vladimir Muliukha:
A Retrial Queueing System with Preemptive Priority and Randomized Push-Out Mechanism. NEW2AN 2017: 432-440 - [c9]Vladimir Muliukha, Vladimir S. Zaborovsky, Alexander Ilyashenko, Yuri Podgurski:
Communication Technologies in the Space Experiment "Kontur-2". NEW2AN 2017: 587-597 - 2016
- [c8]Alexander Ilyashenko, Oleg Zayats, Vladimir Muliukha:
Randomized Priorities in Queuing System with Randomized Push-Out Mechanism. NEW2AN 2016: 230-237 - 2015
- [j2]Vladimir Muliukha, Alexander Ilyashenko, Oleg Zayats, Vladimir S. Zaborovsky:
Preemptive queueing system with randomized push-out mechanism. Commun. Nonlinear Sci. Numer. Simul. 21(1-3): 147-158 (2015) - [j1]Vladimir Muliukha, Alexander Ilyashenko, Oleg Zayats, Vladimir S. Zaborovsky:
Corrigendum to "Preemptive queueing system with randomized push-out mechanism" [Commun Nonlinear Sci Numer Simulat 21 (2015) 147-158]. Commun. Nonlinear Sci. Numer. Simul. 28(Issues): 27 (2015) - [c7]Alexander Ilyashenko, Oleg Zayats, Vladimir Muliukha, Alexey Lukashin:
Alternating Priorities Queueing System with Randomized Push-Out Mechanism. NEW2AN 2015: 436-445 - [c6]Vladimir S. Zaborovsky, Vladimir Muliukha, Alexander Ilyashenko:
Cyber-Physical Approach in a Series of Space Experiments "Kontur". NEW2AN 2015: 745-758 - 2014
- [c5]Alexander Ilyashenko, Oleg Zayats, Vladimir Muliukha, Leonid Laboshin:
Further Investigations of the Priority Queuing System with Preemptive Priority and Randomized Push-Out Mechanism. NEW2AN 2014: 433-443 - [c4]Alexey Lukashin, Leonid Laboshin, Vladimir S. Zaborovsky, Vladimir Mulukha:
Distributed Packet Trace Processing Method for Information Security Analysis. NEW2AN 2014: 535-543 - [c3]Vladimir S. Zaborovsky, Mikhail Guk, Vladimir Muliukha, Alexander Ilyashenko:
Cyber-Physical Approach to the Network-Centric Robot Control Problems. NEW2AN 2014: 619-629 - 2011
- [c2]Vladimir S. Zaborovsky, Alexey Lukashin, Sergey Kupreenko, Vladimir Mulukha:
Dynamic access control in cloud services. SMC 2011: 1400-1404 - 2010
- [c1]Vladimir S. Zaborovsky, Vladimir Mulukha, Sergey Kouprienko, Oleg Zayats:
Traffic Management and Security Based on Priority Queueing and Multicore Firewall Implementation. Security and Management 2010: 30-35
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint