Paulo Shakarian

Orcid: 0000-0002-3159-4660

According to our database1, Paulo Shakarian authored at least 110 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Diversity Measures: Domain-Independent Proxies for Failure in Language Model Queries.
Proceedings of the 18th IEEE International Conference on Semantic Computing, 2024

Scalable Semantic Non-Markovian Simulation Proxy for Reinforcement Learning.
Proceedings of the 18th IEEE International Conference on Semantic Computing, 2024

2023
Neuro Symbolic Reasoning and Learning
Springer Briefs in Computer Science, Springer, ISBN: 978-3-031-39178-1, 2023

Rule-Based Error Detection and Correction to Operationalize Movement Trajectory Classification.
CoRR, 2023

A Neuro-symbolic Approach to Argument Comparison in Structured Argumentation.
Proceedings of the 7th Workshop on Advances in Argumentation in Artificial Intelligence (AI^3 2023) co-located with the 22nd International Conference of the Italian Association for Artificial Intelligence (AIxIA 2023), 2023

An Independent Evaluation of ChatGPT on Mathematical Word Problems (MWP).
Proceedings of the AAAI 2023 Spring Symposium on Challenges Requiring the Combination of Machine Learning and Knowledge Engineering (AAAI-MAKE 2023), 2023

PyReason: Software for Open World Temporal Logic.
Proceedings of the AAAI 2023 Spring Symposium on Challenges Requiring the Combination of Machine Learning and Knowledge Engineering (AAAI-MAKE 2023), 2023

2022
Argumentation-Based Query Answering under Uncertainty with Application to Cybersecurity.
Big Data Cogn. Comput., 2022

Extensions to Generalized Annotated Logic and an Equivalent Neural Architecture.
Proceedings of the Fourth International Conference on Transdisciplinary AI, 2022

2021
Identification of Pathogenic Social Media Accounts - From Data to Intelligence to Prediction
Springer Briefs in Computer Science, Springer, ISBN: 978-3-030-61430-0, 2021

Exploring geographic hotspots using topological data analysis.
Trans. GIS, 2021

2020
A Logic Programming Approach to Predict Enterprise-Targeted Cyberattacks.
Proceedings of the Data Science in Cybersecurity and Cyberthreat Intelligence, 2020

Measuring Time-Constrained Influence to Predict Adoption in Online Social Networks.
ACM Trans. Soc. Comput., 2020

A Feature-Driven Approach for Identifying Pathogenic Social Media Accounts.
Proceedings of the 3rd International Conference on Data Intelligence and Security, 2020

Inductive and Deductive Reasoning to Assist in Cyber-Attack Prediction.
Proceedings of the 10th Annual Computing and Communication Workshop and Conference, 2020

2019
Using network motifs to characterize temporal network evolution leading to diffusion inhibition.
Soc. Netw. Anal. Min., 2019

Mining user interaction patterns in the darkweb to predict enterprise cyber incidents.
Soc. Netw. Anal. Min., 2019

Understanding Information Flow in Cascades Using Network Motifs.
CoRR, 2019

Leveraging Motifs to Model the Temporal Dynamics of Diffusion Networks.
Proceedings of the Companion of The 2019 World Wide Web Conference, 2019

Less is More: Semi-Supervised Causal Inference for Detecting Pathogenic Users in Social Media.
Proceedings of the Companion of The 2019 World Wide Web Conference, 2019

Reasoning About Future Cyber-Attacks Through Socio-Technical Hacking Information.
Proceedings of the 31st IEEE International Conference on Tools with Artificial Intelligence, 2019

An End-to-End Framework to Identify Pathogenic Social Media Accounts on Twitter.
Proceedings of the 2nd International Conference on Data Intelligence and Security, 2019

Detection of Violent Extremists in Social Media.
Proceedings of the 2nd International Conference on Data Intelligence and Security, 2019

Hawkes Process for Understanding the Influence of Pathogenic Social Media Accounts.
Proceedings of the 2nd International Conference on Data Intelligence and Security, 2019

Can social influence be exploited to compromise security: an online experimental evaluation.
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019

Impact of social influence on adoption behavior: an online controlled experimental evaluation.
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019

Reasoning about sequential cyberattacks.
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019

A hybrid KRR-ML approach to predict malicious email campaigns.
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019

Cyber Threat Analysis with Structured Probabilistic Argumentation.
Proceedings of the 3rd Workshop on Advances In Argumentation In Artificial Intelligence co-located with the 18th International Conference of the Italian Association for Artificial Intelligence (AI*IA 2019), 2019

2018
Defending Against Chained Cyber-Attacks by Adversarial Agents.
Proceedings of the Guide to Vulnerability Analysis for Computer Networks and Systems, 2018

Dark-Web Cyber Threat Intelligence: From Data to Intelligence to Prediction.
Inf., 2018

Strongly Hierarchical Factorization Machines and ANOVA Kernel Regression.
Proceedings of the 2018 SIAM International Conference on Data Mining, 2018

Predicting Hacker Adoption on Darkweb Forums Using Sequential Rule Mining.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

Early Identification of Pathogenic Social Media Accounts.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

Finding Cryptocurrency Attack Indicators Using Temporal Logic and Darkweb Data.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

DARKMENTION: A Deployed System to Predict Enterprise-Targeted External Cyberattacks.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

Detecting Pathogenic Social Media Accounts without Content or Network Structure.
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018

Mining Key-Hackers on Darkweb Forums.
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018

Community Finding of Malware and Exploit Vendors on Darkweb Marketplaces.
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018

Finding Novel Event Relationships in Temporal Data.
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018

At-risk system identification via analysis of discussions on the darkweb.
Proceedings of the 2018 APWG Symposium on Electronic Crime Research, 2018

Predicting enterprise cyber incidents using social network analysis on the darkweb hacker forums.
Proceedings of the 2018 International Conference on Cyber Conflict, 2018

DarkEmbed: Exploit Prediction With Neural Language Models.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
Understanding and forecasting lifecycle events in information cascades.
Soc. Netw. Anal. Min., 2017

Semi-supervised learning for detecting human trafficking.
Secur. Informatics, 2017

Crisis and Collective Problem Solving in Dark Web: An Exploration of a Black Hat Forum.
Proceedings of the 8th International Conference on Social Media & Society, 2017

Temporal Analysis of Influence to Predict Users' Adoption in Online Social Networks.
Proceedings of the Social, Cultural, and Behavioral Modeling, 2017

Early Warnings of Cyber Threats in Online Discussions.
Proceedings of the 2017 IEEE International Conference on Data Mining Workshops, 2017

Measuring cyber attribution in games.
Proceedings of the 2017 APWG Symposium on Electronic Crime Research, 2017

Proactive identification of exploits in the wild through vulnerability mentions online.
Proceedings of the 2017 International Conference on Cyber Conflict, 2017

2016
Toward early and order-of-magnitude cascade prediction in social networks.
Soc. Netw. Anal. Min., 2016

A quantitative approach to belief revision in structured probabilistic argumentation.
Ann. Math. Artif. Intell., 2016

Belief revision in structured probabilistic argumentation - Model and application to cyber security.
Ann. Math. Artif. Intell., 2016

Modeling cyber-attacks on industrial control systems.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

Darknet and deepnet mining for proactive cybersecurity threat intelligence.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

Product offerings in malicious hacker markets.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

A non-parametric learning approach to identify online human trafficking.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

MIST: Missing Person Intelligence Synthesis Toolkit.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016

Argumentation models for cyber attribution.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016

An empirical evaluation of social influence metrics.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016

A comparison of methods for cascade prediction.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016

Socio-Cultural Modeling for Cyber Threat Actors.
Proceedings of the Artificial Intelligence for Cyber Security, 2016

Data Driven Game Theoretic Cyber Threat Mitigation.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

Toward Argumentation-Based Cyber Attribution.
Proceedings of the Artificial Intelligence for Cyber Security, 2016

Exploring Malicious Hacker Forums.
Proceedings of the Cyber Deception, Building the Scientific Foundation, 2016

Cyber-Deception and Attribution in Capture-the-Flag Exercises.
Proceedings of the Cyber Deception, Building the Scientific Foundation, 2016

2015
Diffusion in Social Networks
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-23105-1, 2015

Cyber Attribution: An Argumentation-Based Approach.
Proceedings of the Cyber Warfare - Building the Scientific Foundation, 2015

Cyber Attacks and Public Embarrassment: A Survey of Some Notable Hacks.
CoRR, 2015

A Multidisciplinary Survey of Social Network Diffusion Models.
IEEE Intell. Informatics Bull., 2015

Mining for Causal Relationships: A Data-Driven Study of the Islamic State.
Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2015

Early Identification of Violent Criminal Gang Members.
Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2015

KSGM: Keynode-driven Scalable Graph Matching.
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015

Cyber-Deception and Attribution in Capture-the-Flag Exercises.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

Malware Task Identification: A Data Driven Approach.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

Toward Order-of-Magnitude Cascade Prediction.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

2014
An Argumentation-Based Framework to Address the Attribution Problem in Cyber-Warfare.
CoRR, 2014

Workshop on Social Influence - SI 2014 - Introduction.
Proceedings of the Social Informatics - SocInfo 2014 International Workshops, Barcelona, 2014

Keeping Intruders at Large - A Graph-theoretic Approach to Reducing the Probability of Successful Network Intrusions.
Proceedings of the SECRYPT 2014, 2014

Reducing gang violence through network influence based targeting of social programs.
Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2014

Keeping Intruders at Bay: A Graph-theoretic Approach to Reducing the Probability of Successful Network Intrusions.
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014

Belief Revision in Structured Probabilistic Argumentation.
Proceedings of the Foundations of Information and Knowledge Systems, 2014

Power grid defense against malicious cascading failure.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2014

A Network-Based Approach for Identifying Cancer Causing Pathogens.
Proceedings of the 2014 ACM Southeast Regional Conference, Kennesaw, GA, USA, March 28, 2014

2013
Reasoning about Complex Networks: A Logic Programming Approach.
Theory Pract. Log. Program., 2013

Using Generalized Annotated Programs to Solve Social Network Diffusion Optimization Problems.
ACM Trans. Comput. Log., 2013

A scalable heuristic for viral marketing under the tipping model.
Soc. Netw. Anal. Min., 2013

MANCaLog: A Logic for Multi-Attribute Network Cascades (Technical Report)
CoRR, 2013

The Dragon and the Computer: Why Intellectual Property Theft is Compatible with Chinese Cyber-Warfare Doctrine.
CoRR, 2013

A novel analytical method for evolutionary graph theory problems.
Biosyst., 2013

Geospatial optimization problems.
Proceedings of the 2nd IEEE Network Science Workshop, 2013

Mining for geographically disperse communities in social networks by leveraging distance modularity.
Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2013

MANCaLog: a logic for multi-attribute network cascades.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013

Social network intelligence analysis to combat street gang violence.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

Mining for Spatially-Near Communities in Geo-Located Social Networks.
Proceedings of the 2013 AAAI Fall Symposia, Arlington, Virginia, USA, November 15-17, 2013, 2013

2012
Annotated Probabilistic Temporal Logic: Approximate Fixpoint Implementation.
ACM Trans. Comput. Log., 2012

Adversarial Geospatial Abduction Problems.
ACM Trans. Intell. Syst. Technol., 2012

Spreaders in the Network SIR Model: An Empirical Study
CoRR, 2012

A review of evolutionary graph theory with applications to game theory.
Biosyst., 2012

Shaping Operations to Attack Robust Terror Networks.
Proceedings of the 2012 International Conference on Social Informatics (SocialInformatics), 2012

A Probabilistic Framework for Localization of Attackers in MANETs.
Proceedings of the Computer Security - ESORICS 2012, 2012

Large Social Networks Can Be Targeted for Viral Marketing with Small Seed Sets.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012

2011
Region-Based Geospatial Abduction with Counter-IED Applications.
Proceedings of the Counterterrorism and Open Source Intelligence, 2011

Spatio-Temporal Reasoning About Agent Behavior.
PhD thesis, 2011

Annotated probabilistic temporal logic.
ACM Trans. Comput. Log., 2011

GAPs: Geospatial Abduction Problems.
ACM Trans. Intell. Syst. Technol., 2011

Towards Shrink-Wrapped Security: Practically Incorporating Context Into Security Services.
Proceedings of the 2nd International Conference on Ambient Systems, 2011

Abductive Inference for Combat: Using SCARE-S2 to Find High-Value Targets in Afghanistan.
Proceedings of the Twenty-Third Conference on Innovative Applications of Artificial Intelligence, 2011

2010
A Scalable Framework for Modeling Competitive Diffusion in Social Networks.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Using Generalized Annotated Programs to Solve Social Network Optimization Problems.
Proceedings of the Technical Communications of the 26th International Conference on Logic Programming, 2010


  Loading...