586 citations to https://www.mathnet.ru/rus/tvp4645
-
Yang Du, Susu Zhang, Hua‐Hua Chang, “Compromised item detection: A Bayesian change‐point perspective”, Brit J Math & Statis, 76:1 (2023), 131
-
Xiaochuan Ma, Lifeng Lai, Shuguang Cui, “Bayesian Two-Stage Sequential Change Diagnosis via Sensor Arrays”, IEEE Trans. Inform. Theory, 69:11 (2023), 7276
-
Shamp W., Varbanov R., Chicken E., Linero A., Yang Yu., “Computationally Efficient Bayesian Sequential Function Monitoring”, J. Qual. Technol., 54:1 (2022), 1–19
-
Qining Zhang, Honghao Wei, Weina Wang, Lei Ying, Proceedings of the Twenty-Third International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing, 2022, 141
-
Neil Hwang, Jiarui Xu, Shirshendu Chatterjee, Sharmodeep Bhattacharyya, “The Bethe Hessian and Information Theoretic Approaches for Online Change-Point Detection in Network Data”, Sankhya A, 84:1 (2022), 283
-
Topi Halme, Eyal Nitzan, Visa Koivunen, “Bayesian Quickest Detection of Propagating Spatial Events”, IEEE Trans. Signal Process., 70 (2022), 5982
-
Yunxiao Chen, Yi-Hsuan Lee, Xiaoou Li, “Item Pool Quality Control in Educational Testing: Change Point Model, Compound Risk, and Sequential Detection”, Journal of Educational and Behavioral Statistics, 47:3 (2022), 322
-
Zeina Al Masry, Landy Rabehasaina, Ghislain Verdier, “Change-level detection for Lévy subordinators”, Stochastic Processes and their Applications, 147 (2022), 423
-
Eric Järpe, Quentin Gouchet, Lightweight Cryptographic Techniques and Cybersecurity Approaches, 2022
-
Kim Hammar, Rolf Stadler, “Intrusion Prevention Through Optimal Stopping”, IEEE Trans. Netw. Serv. Manage., 19:3 (2022), 2333