Charles K. Nicholas

Orcid: 0000-0001-9494-7139

Affiliations:
  • University of Maryland, USA


According to our database1, Charles K. Nicholas authored at least 97 papers between 1982 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Neural Normalized Compression Distance and the Disconnect Between Compression and Classification.
CoRR, 2024

Domain-Specific Retrieval-Augmented Generation Using Vector Stores, Knowledge Graphs, and Tensor Factorization.
CoRR, 2024

Catch'em all: Classification of Rare, Prominent, and Novel Malware Families.
CoRR, 2024

Adaptive Quantum Optimized Centroid Initialization.
CoRR, 2024

Catch'em all: Classification of Rare, Prominent, and Novel Malware Families.
Proceedings of the 12th International Symposium on Digital Forensics and Security, 2024

Cyber-Security Knowledge Graph Generation by Hierarchical Nonnegative Matrix Factorization.
Proceedings of the 12th International Symposium on Digital Forensics and Security, 2024

An Efficient PDF Malware Detection Method Using Highly Compact Features.
Proceedings of the ACM Symposium on Document Engineering 2024, 2024

2023
Semi-Supervised Classification of Malware Families Under Extreme Class Imbalance via Hierarchical Non-Negative Matrix Factorization with Automatic Model Selection.
ACM Trans. Priv. Secur., November, 2023

A Feature Set of Small Size for the PDF Malware Detection.
CoRR, 2023

Can Feature Engineering Help Quantum Machine Learning for Malware Detection?
CoRR, 2023

IMCDCF: An Incremental Malware Detection Approach Using Hidden Markov Models.
CoRR, 2023

MOTIF: A Malware Reference Dataset with Ground Truth Family Labels.
Comput. Secur., 2023

MalwareDNA: Simultaneous Classification of Malware, Malware Families, and Novel Malware.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2023

Quantum Optimized Centroid Initialization.
Proceedings of the Future Technologies Conference, 2023

A PDF Malware Detection Method Using Extremely Small Training Sample Size.
Proceedings of the ACM Symposium on Document Engineering 2023, 2023

AVScan2Vec: Feature Learning on Antivirus Scan Data for Production-Scale Malware Corpora.
Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security, 2023

Small Effect Sizes in Malware Detection? Make Harder Train/Test Splits!
Proceedings of the Conference on Applied Machine Learning in Information Security, 2023

MalDICT: Benchmark Datasets on Malware Behaviors, Platforms, Exploitation, and Packers.
Proceedings of the Conference on Applied Machine Learning in Information Security, 2023

Evaluating Representativeness in PDF Malware Datasets: A Comparative Study and a New Dataset.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
FedSPLIT: One-Shot Federated Recommendation System Based on Non-negative Joint Matrix Factorization and Knowledge Distillation.
CoRR, 2022

Rank-1 Similarity Matrix Decomposition For Modeling Changes in Antivirus Consensus Through Time.
CoRR, 2022

One-Shot Federated Group Collaborative Filtering.
Proceedings of the 21st IEEE International Conference on Machine Learning and Applications, 2022

A Quantum Algorithm to Locate Unknown Hashgrams.
Proceedings of the Future Technologies Conference, 2022

SeNMFk-SPLIT: large corpora topic modeling by semantic non-negative matrix factorization with automatic model selection.
Proceedings of the 22nd ACM Symposium on Document Engineering, 2022

Minimizing Compute Costs: When Should We Run More Expensive Malware Analysis?
Proceedings of the Conference on Applied Machine Learning in Information Security, 2022

Out of Distribution Data Detection Using Dropout Bayesian Neural Networks.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
MOTIF: A Large Malware Reference Dataset with Ground Truth Family Labels.
CoRR, 2021

Leveraging Uncertainty for Improved Static Malware Detection Under Extreme False Positive Constraints.
CoRR, 2021

Evading Malware Classifiers via Monte Carlo Mutant Feature Discovery.
CoRR, 2021

Document engineering issues in malware analysis.
Proceedings of the DocEng '21: ACM Symposium on Document Engineering 2021, 2021

COVID-19 multidimensional kaggle literature organization.
Proceedings of the DocEng '21: ACM Symposium on Document Engineering 2021, 2021

A Framework for Cluster and Classifier Evaluation in the Absence of Reference Labels.
Proceedings of the AISec@CCS 2021: Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security, 2021

Searching for Selfie in TLS 1.3 with the Cryptographic Protocol Shapes Analyzer.
Proceedings of the Protocols, Strands, and Logic, 2021

2020
A Survey of Machine Learning Methods and Challenges for Windows Malware Classification.
CoRR, 2020

A Quantum Algorithm To Locate Unknown Hashes For Known N-Grams Within A Large Malware Corpus.
CoRR, 2020

Cluster Quality Analysis Using Silhouette Score.
Proceedings of the 7th IEEE International Conference on Data Science and Advanced Analytics, 2020

COVID-19 Kaggle Literature Organization.
Proceedings of the DocEng '20: ACM Symposium on Document Engineering 2020, Virtual Event, CA, USA, September 29, 2020

Automatic Yara Rule Generation Using Biclustering.
Proceedings of the AISec@CCS 2020: Proceedings of the 13th ACM Workshop on Artificial Intelligence and Security, 2020

A New Burrows Wheeler Transform Markov Distance.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
KiloGrams: Very Large N-Grams for Malware Classification.
CoRR, 2019

PyLZJD: An Easy to Use Tool for Machine Learning.
Proceedings of the 18th Python in Science Conference 2019 (SciPy 2019), Austin, Texas, July 8, 2019

2018
An investigation of byte n-gram features for malware classification.
J. Comput. Virol. Hacking Tech., 2018

Lempel-Ziv Jaccard Distance, an effective alternative to ssdeep and sdhash.
Digit. Investig., 2018

Toward Metric Indexes for Incremental Insertion and Querying.
CoRR, 2018

Hash-Grams: Faster N-Gram Features for Classification and Malware Detection.
Proceedings of the ACM Symposium on Document Engineering 2018, 2018

Engineering a Simplified 0-Bit Consistent Weighted Sampling.
Proceedings of the 27th ACM International Conference on Information and Knowledge Management, 2018

Static Malware Detection & Subterfuge: Quantifying the Robustness of Machine Learning and Current Anti-Virus.
Proceedings of the AAAI Symposium on Adversary-Aware Learning Techniques and Trends in Cybersecurity (ALEC 2018) co-located with the Association for the Advancement of Artificial Intelligence 2018 Fall Symposium Series (AAAI-FSS 2018), 2018

Malware Detection by Eating a Whole EXE.
Proceedings of the Workshops of the The Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
What can N-grams learn for malware detection?
Proceedings of the 12th International Conference on Malicious and Unwanted Software, 2017

An Alternative to NCD for Large Sequences, Lempel-Ziv Jaccard Distance.
Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada, August 13, 2017

Document Engineering Issues in Malware Analysis.
Proceedings of the 2017 ACM Symposium on Document Engineering, 2017

Learning the PE Header, Malware Detection with Minimal Domain Knowledge.
Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, 2017

Malware Classification and Class Imbalance via Stochastic Hashed LZJD.
Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, 2017

2016
Document Engineering Issues in Malware Analysis.
Proceedings of the 2016 ACM Symposium on Document Engineering, 2016

2015
Document Engineering Issues in Document Analysis.
Proceedings of the 2015 ACM Symposium on Document Engineering, 2015

2013
Document engineering education: workshop report.
SIGWEB Newsl., 2013

Change-link 2.0: a digital forensic tool for visualizing changes to shadow volume data.
Proceedings of the 10th Workshop on Visualization for Cyber Security, 2013

2009
Addressing morphological variation in alphabetic languages.
Proceedings of the 32nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 2009

Translation Corpus Source and Size in Bilingual Retrieval.
Proceedings of the Human Language Technologies: Conference of the North American Chapter of the Association of Computational Linguistics, Proceedings, May 31, 2009

2008
Don't have a stemmer?: be un+concern+ed.
Proceedings of the 31st Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 2008

Topological analysis of an online social network for older adults.
Proceedings of the Proceeding of the 2008 ACM Workshop on Search in Social Media, 2008

2007
Building initial partitions through sampling techniques.
Eur. J. Oper. Res., 2007

2006
Sampling Methods for Building Initial Partitions.
Proceedings of the Grouping Multidimensional Data - Recent Advances in Clustering, 2006

2005
Data Driven Similarity Measures for <i>k</i>-Means Like Clustering Algorithms.
Inf. Retr., 2005

2004
Finding aliases on the web using latent semantic analysis.
Data Knowl. Eng., 2004

2003
Text mining with information-theoretic clustering.
Comput. Sci. Eng., 2003


2002
Related, but not Relevant: Content-Based Collaborative Filtering in TREC-8.
Inf. Retr., 2002

ITtalks: A Case Study in the Semantic Web and DAML+OIL.
IEEE Intell. Syst., 2002

Agents Making Sense of the Semantic Web.
Proceedings of the Innovative Concepts for Agent-Based Systems, 2002

CARROTT 11 and the TREC 11 Web Track.
Proceedings of The Eleventh Text REtrieval Conference, 2002

Integrating Distributed Information Sources with CARROT II.
Proceedings of the Cooperative Information Agents VI, 6th International Workshop, 2002

2001
Case Study: Visualization and Information Retrieval Techniques for Network Intrusion Detection.
Proceedings of the 3rd Joint Eurographics - IEEE TCVG Symposium on Visualization, 2001

Ranking Retrieval Systems without Relevance Judgments.
Proceedings of the SIGIR 2001: Proceedings of the 24th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 2001

ITTALKS: A Case Study in the Semantic Web and DAML.
Proceedings of SWWS'01, The first Semantic Web Working Symposium, Stanford University, California, USA, July 30, 2001

ITTALKS: An Application of Agents in the Semantic Web.
Proceedings of the Engineering Societies in the Agents World II, 2001

2000
Performance and Scalability of a Large-Scale N-gram Based Information Retrieval System.
J. Digit. Inf., 2000

Collaborative filtering and the generalized vector space model.
Proceedings of the SIGIR 2000: Proceedings of the 23rd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 2000

1999
Workshop on Recommender Systems: Algorithms and Evaluation.
SIGIR Forum, 1999

Interactive Volumetric Information Visualization for Document Corpus Management.
Int. J. Digit. Libr., 1999

Techniques for Gigabyte-Scale N-gram Based Information Retrieval on Personal Computers.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999

1998
Spotting Topics with the Singular Value Decomposition.
Proceedings of the Principles of Digital Document Processing, 4th International Workshop, 1998

1997
Agent Development Support for Tcl.
Proceedings of the Fifth Annual Tcl/Tk Workshop 1997, 1997

Visualizing Document Authorship Using n-grams and Latent Semantic Indexing.
Proceedings of the Workshop on New Paradigms in Information Visualization and Manipulation, 1997

TKQML: A Scripting Tool for Building Agents.
Proceedings of the Intelligent Agents IV, 1997

1996
TELLTALE: Experiments in a Dynamic Hypertext Environment for Degraded and Multilingual Data.
J. Am. Soc. Inf. Sci., 1996

Using Statistical Properties of Text to Create Metadata.
Proceedings of the 1st IEEE Metadata Conference 1996, MD 1996, Silver Spring, 1996

1995
Reliability of WWW Name Servers.
Comput. Networks ISDN Syst., 1995

An Approach to Large Scale Distributed Information Systems Using Statistical Properties of Text to Guide Agent Search.
Proceedings of the CIKM 1995 Intelligent Information Agents Workshop, 1995

1993
Information and Knowledge Management: Guest Editors' Introduction.
Int. J. Cooperative Inf. Syst., 1993

Snitch: Augmenting Hypertext Documents with a Semantic Net.
Int. J. Cooperative Inf. Syst., 1993

Canto: a Hypertext Data Model.
Electron. Publ., 1993

Generating a Dynamic Hypertext Environment with n-gram Analysis.
Proceedings of the CIKM 93, 1993

1992
On the Interchangeability of SGML and ODA.
Electron. Publ., 1992

1989
Chameleon: A System for Solving the Data-Translation Problem.
IEEE Trans. Software Eng., 1989

1987
A Software Architecture for Supporting the Exchange of Electronic Manuscripts.
Commun. ACM, 1987

1982
Guest Layer in Distributed Processing Support on Local Operating Systems.
Proceedings of the Proceedings of the 3rd International Conference on Distributed Computing Systems, 1982


  Loading...