Latifur Khan

Orcid: 0000-0002-9300-1576

Affiliations:
  • University of Texas at Dallas, USA


According to our database1, Latifur Khan authored at least 367 papers between 1999 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Dynamic Environment Responsive Online Meta-Learning with Fairness Awareness.
ACM Trans. Knowl. Discov. Data, July, 2024

Heterogeneous Domain Adaptation for Multistream Classification on Cyber Threat Data.
IEEE Trans. Dependable Secur. Comput., 2024

FedFusion: Adaptive Model Fusion for Addressing Feature Discrepancies in Federated Credit Card Fraud Detection.
IEEE Access, 2024

Extractive Question Answering for Spanish and Arabic Political Text.
Proceedings of the Social, Cultural, and Behavioral Modeling, 2024

Algorithmic Fairness Generalization under Covariate and Dependence Shifts Simultaneously.
Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2024

Banking Malware Detection: Leveraging Federated Learning with Conditional Model Updates and Client Data Heterogeneity.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

Blockchain Smart Contract Vulnerability Detection and Segmentation Using ML.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2024

ALERT: A Framework for Efficient Extraction of Attack Techniques from Cyber Threat Intelligence Reports Using Active Learning.
Proceedings of the Data and Applications Security and Privacy XXXVIII, 2024

Ensuring End-to-End IoT Data Security and Privacy Through Cloud-Enhanced Confidential Computing.
Proceedings of the Data and Applications Security and Privacy XXXVIII, 2024

VulPrompt: Prompt-Based Vulnerability Detection Using Few-Shot Graph Learning.
Proceedings of the Data and Applications Security and Privacy XXXVIII, 2024

An Education Program for Big Data Security and Privacy.
Proceedings of the 10th IEEE Conference on Big Data Security on Cloud, 2024

Leveraging Codebook Knowledge with NLI and ChatGPT for Zero-Shot Political Relation Classification.
Proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2024

2023
symbSODA: Configurable and Verifiable Orchestration Automation for Active Malware Deception.
ACM Trans. Priv. Secur., November, 2023

Advanced Persistent Threat Detection Using Data Provenance and Metric Learning.
IEEE Trans. Dependable Secur. Comput., 2023

Con2Mix: A semi-supervised method for imbalanced tabular security data.
J. Comput. Secur., 2023

Fairness-Aware Domain Generalization under Covariate and Dependence Shifts.
CoRR, 2023

Synthesizing Political Zero-Shot Relation Classification via Codebook Knowledge, NLI, and ChatGPT.
CoRR, 2023

An Automated Vulnerability Detection Framework for Smart Contracts.
CoRR, 2023

A Transparent Blockchain-Based College Admissions Platform.
Proceedings of the 8th IEEE International Conference on Smart Cloud, 2023

ConfliBERT-Arabic: A Pre-trained Arabic Language Model for Politics, Conflicts and Violence.
Proceedings of the 14th International Conference on Recent Advances in Natural Language Processing, 2023

Towards Fair Disentangled Online Learning for Changing Environments.
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023

WokeGPT: Improving Counterspeech Generation Against Online Hate Speech by Intelligently Augmenting Datasets Using a Novel Metric.
Proceedings of the International Joint Conference on Neural Networks, 2023

Cross Domain Vulnerability Detection using Graph Contrastive Learning.
Proceedings of the First Tiny Papers Track at ICLR 2023, 2023

The Design and Application of a Unified Ontology for Cyber Security.
Proceedings of the Information Systems Security - 19th International Conference, 2023

Smart Meter Modbus RS-485 Intrusion Detection by Federated Learning Approach.
Proceedings of the 15th International Conference on Computer and Automation Engineering, 2023

VulMAE: Graph Masked Autoencoders for Vulnerability Detection from Source and Binary Codes.
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023

Securing Smart Vehicles Through Federated Learning.
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023

Dual Contrastive Learning Framework for Incremental Text Classification.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2023, 2023

BERT Has More to Offer: BERT Layers Combination Yields Better Sentence Embeddings.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2023, 2023

SMET: Semantic Mapping of CVE to ATT&CK and Its Application to Cybersecurity.
Proceedings of the Data and Applications Security and Privacy XXXVII, 2023

Confidential Execution of Deep Learning Inference at the Untrusted Edge with ARM TrustZone.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023

The Design of an Ontology for ATT&CK and its Application to Cybersecurity.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023

ConfliBERT-Spanish: A Pre-trained Spanish Language Model for Political Conflict and Violence.
Proceedings of the 7th IEEE Congress on Information Science and Technology, 2023

2MiCo: A Contrastive Semi-Supervised Method with Double Mixup for Smart Meter Modbus RS-485 Communication Security.
Proceedings of the 9th Intl Conference on Big Data Security on Cloud, 2023

2022
Guest Editorial Introduction for the Special Section on Deep Learning Algorithms and Systems for Enhancing Security in Cloud Services.
ACM Trans. Internet Techn., 2022

SACCOS: A Semi-Supervised Framework for Emerging Class Detection and Concept Drift Adaption Over Data Streams.
IEEE Trans. Knowl. Data Eng., 2022

GCI: A GPU-Based Transfer Learning Approach for Detecting Cheats of Computer Game.
IEEE Trans. Dependable Secur. Comput., 2022

ConfliBERT: A Pre-trained Language Model for Political Conflict and Violence.
Proceedings of the 2022 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2022

CAPT: Contrastive Pre-Training based Semi-Supervised Open-Set Learning.
Proceedings of the 5th IEEE International Conference on Multimedia Information Processing and Retrieval, 2022

Adaptive Fairness-Aware Online Meta-Learning for Changing Environments.
Proceedings of the KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 14, 2022

Personalized Hashtag Recommendation with User-level Meta-learning.
Proceedings of the International Joint Conference on Neural Networks, 2022

Unified Spatio-Temporal Graph Neural Networks: Data-Driven Modeling for Social Science.
Proceedings of the International Joint Conference on Neural Networks, 2022

LPC: A Logits and Parameter Calibration Framework for Continual Learning.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2022, 2022

Controllable Fake Document Infilling for Cyber Deception.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2022, 2022

MCoM: A Semi-Supervised Method for Imbalanced Tabular Security Data.
Proceedings of the Data and Applications Security and Privacy XXXVI, 2022

Knowledge Mining in Cybersecurity: From Attack to Defense.
Proceedings of the Data and Applications Security and Privacy XXXVI, 2022

SentMod: Hidden Backdoor Attack on Unstructured Textual Data.
Proceedings of the 8th IEEE Intl Conference on Big Data Security on Cloud, 2022

A Federated Approach for Learning from Electronic Health Records.
Proceedings of the 8th IEEE Intl Conference on Big Data Security on Cloud, 2022

Confli-T5: An AutoPrompt Pipeline for Conflict Related Text Augmentation.
Proceedings of the IEEE International Conference on Big Data, 2022

Multi-CoPED: A Multilingual Multi-Task Approach for Coding Political Event Data on Conflict and Mediation Domain.
Proceedings of the AIES '22: AAAI/ACM Conference on AI, Ethics, and Society, Oxford, United Kingdom, May 19, 2022

2021
BiMorphing: A Bi-Directional Bursting Defense against Website Fingerprinting Attacks.
IEEE Trans. Dependable Secur. Comput., 2021

Crook-sourced intrusion detection as a service.
J. Inf. Secur. Appl., 2021

CLEAR: Contrastive-Prototype Learning with Drift Estimation for Resource Constrained Stream Mining.
Proceedings of the WWW '21: The Web Conference 2021, 2021

Attention-Based Spatial Guidance for Image-to-Image Translation.
Proceedings of the IEEE Winter Conference on Applications of Computer Vision, 2021

CIFDM: Continual and Interactive Feature Distillation for Multi-Label Stream Learning.
Proceedings of the SIGIR '21: The 44th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2021

Generating Point Cloud from Single Image in The Few Shot Scenario.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

Uncertainty-Aware Reliable Text Classification.
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021

An Episodic Learning based Geolocation Detection Framework for Imbalanced Data.
Proceedings of the International Joint Conference on Neural Networks, 2021

Identifying Tactics of Advanced Persistent Threats with Limited Attack Traces.
Proceedings of the Information Systems Security - 17th International Conference, 2021

VSCL: Automating Vulnerability Detection in Smart Contracts with Deep Learning.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021

Data-Driven Time Series Forecasting for Social Studies Using Spatio-Temporal Graph Neural Networks.
Proceedings of the GoodIT '21: Conference on Information Technology for Social Good, 2021

3M-Transformers for Event Coding on Organized Crime Domain.
Proceedings of the 8th IEEE International Conference on Data Science and Advanced Analytics, 2021

Cross-Domain Sentiment Classification with Attention-Assisted GAN.
Proceedings of the Third IEEE International Conference on Cognitive Machine Intelligence, 2021

A Novel Application of a Semi-Supervised Learning Approach to Identify Choroidal Tumors in Fundus Photographs.
Proceedings of the Third IEEE International Conference on Cognitive Machine Intelligence, 2021

Is there a Security Mindset and Can it be Taught?
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

Unsupervised Perturbation based Self-Supervised Adversarial Training.
Proceedings of the 7th IEEE International Conference on Big Data Security on Cloud, 2021

CoMe-KE: A New Transformers Based Approach for Knowledge Extraction in Conflict and Mediation Domain.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

Exploring the roles of social media data to identify the locations and severity of road traffic accidents.
Proceedings of the Fourth IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2021

SODA: A System for Cyber Deception Orchestration and Automation.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

Single View Point Cloud Generation via Unified 3D Prototype.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
MultiCon: A Semi-Supervised Approach for Predicting Drug Function from Chemical Structure Analysis.
J. Chem. Inf. Model., 2020

Deep Learning on Knowledge Graph for Recommender System: A Survey.
CoRR, 2020

Classified enhancement model for big data storage reliability based on Boolean satisfiability problem.
Clust. Comput., 2020

Few-Sample and Adversarial Representation Learning for Continual Stream Mining.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

At the Speed of Sound: Efficient Audio Scene Classification.
Proceedings of the 2020 on International Conference on Multimedia Retrieval, 2020

Prediction of Plantar Shear Stress Distribution by Conditional GAN with Attention Mechanism.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2020, 2020

Adaptive Multi-Region Network For Medical Image Analysis.
Proceedings of the IEEE International Conference on Image Processing, 2020

A Primal-Dual Subgradient Approach for Fair Meta Learning.
Proceedings of the 20th IEEE International Conference on Data Mining, 2020

Automating Cyberdeception Evaluation with Deep Learning.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

SetConv: A New Approach for Learning from Imbalanced Data.
Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing, 2020

HANKE: Hierarchical Attention Networks for Knowledge Extraction in Political Science Domain.
Proceedings of the 7th IEEE International Conference on Data Science and Advanced Analytics, 2020

Next - Location Prediction Using Federated Learning on a Blockchain.
Proceedings of the 2nd IEEE International Conference on Cognitive Machine Intelligence, 2020

Evolving Advanced Persistent Threat Detection using Provenance Graph and Metric Learning.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

Adaptive Margin Based Deep Adversarial Metric Learning.
Proceedings of the 6th IEEE International Conference on Big Data Security on Cloud, 2020

A Simple, Effective and Extendible Approach to Deep Multi-task Learning.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

Few Sample Learning without Data Storage for Lifelong Stream Mining (Student Abstract).
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

Secure IoT Data Analytics in Cloud via Intel SGX.
Proceedings of the 13th IEEE International Conference on Cloud Computing, 2020

2019
KateHyoung/UTDEventData: UTDEventData create 1.0.0.
Dataset, March, 2019

Secure data processing for IoT middleware systems.
J. Supercomput., 2019

UTDEventData: An R package to access political event data.
J. Open Source Softw., 2019

Editorial for Special Issue on "Big Data and Smart Cities".
Big Data Res., 2019

Multistream Classification for Cyber Threat Data with Heterogeneous Feature Space.
Proceedings of the World Wide Web Conference, 2019

Towards Self-Adaptive Metric Learning On the Fly.
Proceedings of the World Wide Web Conference, 2019

Secure Real-Time Heterogeneous IoT Data Management System.
Proceedings of the First IEEE International Conference on Trust, 2019

Metric Learning based Framework for Streaming Classification with Concept Evolution.
Proceedings of the International Joint Conference on Neural Networks, 2019

COMC: A Framework for Online Cross-domain Multistream Classification.
Proceedings of the International Joint Conference on Neural Networks, 2019

Robust High Dimensional Stream Classification with Novel Class Detection.
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019

Where Did the Political News Event Happen? Primary Focus Location Extraction in Different Languages.
Proceedings of the 5th IEEE International Conference on Collaboration and Internet Computing, 2019

Smart Contract Defense through Bytecode Rewriting.
Proceedings of the IEEE International Conference on Blockchain, 2019

Automated Verbal-Pattern Extraction from Political News Articles using CAMEO Event Coding Ontology.
Proceedings of the 5th IEEE International Conference on Big Data Security on Cloud, 2019

Co-Representation Learning Framework For the Open-Set Data Classification.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

SIM: Open-World Multi-Task Stream Classifier with Integral Similarity Metrics.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

Regression Prediction For Geolocation Aware Through Relative Density Ratio Estimation.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

Improving intrusion detectors by crook-sourcing.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

Multistream Classification with Relative Density Ratio Estimation.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
Adaptive Image Stream Classification via Convolutional Neural Network with Intrinsic Similarity Metrics.
CoRR, 2018

SPERG: Scalable Political Event Report Geoparsing in Big Data.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

A Complex Task Scheduling Scheme for Big Data Platforms Based on Boolean Satisfiability Problem.
Proceedings of the 2018 IEEE International Conference on Information Reuse and Integration, 2018

Decentralized IoT Data Management Using BlockChain and Trusted Execution Environment.
Proceedings of the 2018 IEEE International Conference on Information Reuse and Integration, 2018

Integrating Cyber Security and Data Science for Social Media: A Position Paper.
Proceedings of the 2018 IEEE International Parallel and Distributed Processing Symposium Workshops, 2018

Ensemble Direct Density Ratio Estimation for Multistream Classification.
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018

LogLens: A Real-Time Log Analysis System.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

SAT-based Important Data Reliability Enhancement Model for Big Data Storage.
Proceedings of the 2018 International Conference on Big Data and Computing, 2018

Distributed Framework for Political Event Coding in Real-Time.
Proceedings of the 2nd European Conference on Electrical Engineering and Computer Science, 2018

Automated Threat Report Classification over Multi-Source Data.
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018

Big IoT Data Stream Analytics with Issues in Privacy and Security.
Proceedings of the Fourth ACM International Workshop on Security and Privacy Analytics, 2018

BCD: Decomposing Binary Code Into Components Using Graph-Based Clustering.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Predicting Hospital Capacity and Efficiency.
Proceedings of the 11th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2018), 2018

GCI: A Transfer Learning Approach for Detecting Cheats of Computer Game.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

A Framework for Multistream Regression With Direct Density Ratio Estimation.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
Privacy and Security Challenges in GIS.
Proceedings of the Encyclopedia of GIS., 2017

Geospatial Semantic Web, Definition.
Proceedings of the Encyclopedia of GIS., 2017

APART: Automatic Political Actor Recommendation in Real-time.
Proceedings of the Social, Cultural, and Behavioral Modeling, 2017

Secure IoT Stream Data Management and Analytics with Intel SGX.
Proceedings of the 2017 Workshop on Automated Decision Making for Active Cyber Defense, 2017

A modeling framework for business process reengineering using big data analytics and a goal-orientation.
Proceedings of the 11th International Conference on Research Challenges in Information Science, 2017

A Scalable Spark-Based Fault Diagnosis Platform for Gearbox Fault Diagnosis in Wind Farms.
Proceedings of the 2017 IEEE International Conference on Information Reuse and Integration, 2017

Online Classification of Nonstationary Streaming Data with Dynamic Pitman-Yor Diffusion Trees.
Proceedings of the 29th IEEE International Conference on Tools with Artificial Intelligence, 2017

Efficient Multistream Classification Using Direct Density Ratio Estimation.
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017

Securing Data Analytics on SGX with Randomization.
Proceedings of the Computer Security - ESORICS 2017, 2017

FUSION: An Online Method for Multistream Classification.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017

SGX-BigMatrix: A Practical Encrypted Data Analytic Framework With Trusted Processors.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

SGX-Log: Securing System Logs With SGX.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

RePAIR: Recommend political actors in real-time from news websites.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

Unsupervised deep embedding for novel class detection over data stream.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

Focus location extraction from political news reports with bias correction.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

Multistream regression with asynchronous concept drift detection.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

IRIS: A goal-oriented big data analytics framework on Spark for better Business decisions.
Proceedings of the 2017 IEEE International Conference on Big Data and Smart Computing, 2017

2016
Recurring and Novel Class Detection Using Class-Based Ensemble for Evolving Data Stream.
IEEE Trans. Knowl. Data Eng., 2016

Online anomaly detection for multi-source VMware using a distributed streaming framework.
Softw. Pract. Exp., 2016

GISQAF: MapReduce guided spatial query processing and analytics system.
Softw. Pract. Exp., 2016

Data science in Asia (for PAKDD 2016).
Int. J. Data Sci. Anal., 2016

IoT Big Data Stream Mining.
Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2016

Near real-time atrocity event coding.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

A Data Driven Approach for the Science of Cyber Security: Challenges and Directions.
Proceedings of the 17th IEEE International Conference on Information Reuse and Integration, 2016

Emergency-Driven Assured Information Sharing in Secure Online Social Networks: A Position Paper.
Proceedings of the 2016 IEEE International Parallel and Distributed Processing Symposium Workshops, 2016

Efficient Sampling-Based Kernel Mean Matching.
Proceedings of the IEEE 16th International Conference on Data Mining, 2016

Efficient handling of concept drift and concept evolution over Stream Data.
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016

An Adaptive Framework for Multistream Classification.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016

Spark-Based Political Event Coding.
Proceedings of the Second IEEE International Conference on Big Data Computing Service and Applications, 2016

Sampling-based distributed Kernel mean matching using spark.
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016

Adaptive encrypted traffic fingerprinting with bi-directional dependence.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

SAND: Semi-Supervised Adaptive Novel Class Detection and Classification over Data Stream.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

2015
Implementation and performance evaluation of a scheduling algorithm for divisible load parallel applications in a cloud computing environment.
Softw. Pract. Exp., 2015

A Comparative Study of Markov Network Structure Learning Methods Over Data Streams.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2015

P2V: Effective Website Fingerprinting Using Vector Space Representations.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2015

Online Prediction of Chess Match Result.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2015

Semi Supervised Adaptive Framework for Classifying Evolving Data Stream.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2015

Honeypot based unauthorized data access detection in MapReduce systems.
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015

Real-Time Stream Data Analytics for Multi-purpose Social Media Applications.
Proceedings of the 2015 IEEE International Conference on Information Reuse and Integration, 2015

Detecting and Tracking Concept Class Drift and Emergence in Non-Stationary Fast Data Streams.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

2014
Towards a Systematic Study of the Covert Channel Attacks in Smartphones.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

SMV-Hunter: Large Scale, Automated Detection of SSL/TLS Man-in-the-Middle Vulnerabilities in Android Apps.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Real-time anomaly detection over VMware performance data using storm.
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014

Deploying malware detection software for smart phones.
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014

IEEE IRI 2014 tutorial: Big data management and mining.
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014

Incremental Ensemble Classifier Addressing Non-stationary Fast Data Streams.
Proceedings of the 2014 IEEE International Conference on Data Mining Workshops, 2014

Stream Mining Using Statistical Relational Learning.
Proceedings of the 2014 IEEE International Conference on Data Mining, 2014

Evolving stream classification using change detection.
Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, 2014

MapReduce guided approximate inference over graphical models.
Proceedings of the 2014 IEEE Symposium on Computational Intelligence and Data Mining, 2014

Spark-based anomaly detection over multi-source VMware performance data in real-time.
Proceedings of the 2014 IEEE Symposium on Computational Intelligence in Cyber Security, 2014

Statistical technique for online anomaly detection using Spark over heterogeneous data from multi-source VMware performance data.
Proceedings of the 2014 IEEE International Conference on Big Data (IEEE BigData 2014), 2014

Distributed Adaptive Importance Sampling on graphical models using MapReduce.
Proceedings of the 2014 IEEE International Conference on Big Data (IEEE BigData 2014), 2014

FSBD: A Framework for Scheduling of Big Data Mining in Cloud Computing.
Proceedings of the 2014 IEEE International Congress on Big Data, Anchorage, AK, USA, June 27, 2014

Evolving Big Data Stream Classification with MapReduce.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

GISQF: An Efficient Spatial Query Processing System.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

2013
Classification and Adaptive Novel Class Detection of Feature-Evolving Data Streams.
IEEE Trans. Knowl. Data Eng., 2013

MapIt: a case study for location driven knowledge discovery and mining.
Int. J. Data Min. Model. Manag., 2013

Evolving Insider Threat Detection Stream Mining Perspective.
Int. J. Artif. Intell. Tools, 2013

Author attribution on streaming data.
Proceedings of the IEEE 14th International Conference on Information Reuse & Integration, 2013

Behavioral sequence prediction for evolving data stream.
Proceedings of the IEEE 14th International Conference on Information Reuse & Integration, 2013

Rapidly Labeling and Tracking Dynamically Evolving Concepts in Data Streams.
Proceedings of the 13th IEEE International Conference on Data Mining Workshops, 2013

Host-Based Anomaly Detection Using Learning Techniques.
Proceedings of the 13th IEEE International Conference on Data Mining Workshops, 2013

MapReduce Based Frameworks for Classifying Evolving Data Stream.
Proceedings of the 13th IEEE International Conference on Data Mining Workshops, 2013

Predicted probability enhancement for multi-label text classification using class label pair association.
Proceedings of the 2013 IEEE Conference on Evolving and Adaptive Intelligent Systems, 2013

MapReduce-guided scalable compressed dictionary construction for evolving repetitive sequence streams.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

Big Data analysis to Characterize Workload using Machine Learning Algorithms for High Dimensional Performance Data.
Proceedings of the 39. International Computer Measurement Group Conference, 2013

Intelligent MapReduce Based Framework for Labeling Instances in Evolving Data Stream.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

Managing evolving code sets and integration of multiple data sources in health care analytics.
Proceedings of the 2013 International Workshop on Data Management & Analytics for Healthcare, 2013

Labeling Instances in Evolving Data Streams with MapReduce.
Proceedings of the IEEE International Congress on Big Data, 2013

2012
Multimodal concept fusion using semantic closeness for image concept disambiguation.
Multim. Tools Appl., 2012

Design and Implementation of a Data Mining System for Malware Detection.
J. Integr. Des. Process. Sci., 2012

Optmized ontology-driven query expansion using map-reduce framework to facilitate federated queries.
Comput. Syst. Sci. Eng., 2012

Tweeque: Spatio-Temporal Analysis of Social Networks for Location Mining Using Graph Partitioning.
Proceedings of the 2012 International Conference on Social Informatics (SocialInformatics), 2012

Unsupervised Ensemble Based Learning for Insider Threat Detection.
Proceedings of the 2012 International Conference on Privacy, 2012

Expanded Semantic Graph Representation for Matching Related Information of Interest across Free Text Documents.
Proceedings of the Sixth IEEE International Conference on Semantic Computing, 2012

Cloud-Centric Assured Information Sharing.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2012

Extracting semantic information structures from free text law enforcement data.
Proceedings of the 2012 IEEE International Conference on Intelligence and Security Informatics, 2012

Design and implementation of SNODSOC: Novel class detection for social network analysis.
Proceedings of the 2012 IEEE International Conference on Intelligence and Security Informatics, 2012

Secure information integration with a semantic web-based framework.
Proceedings of the IEEE 13th International Conference on Information Reuse & Integration, 2012

Novel Class Detection and Feature via a Tiered Ensemble Approach for Stream Mining.
Proceedings of the IEEE 24th International Conference on Tools with Artificial Intelligence, 2012

Stream Classification with Recurring and Novel Class Detection Using Class-Based Ensemble.
Proceedings of the 12th IEEE International Conference on Data Mining, 2012

Real-Time Anomaly Detection in Streams of Execution Traces.
Proceedings of the 14th International IEEE Symposium on High-Assurance Systems Engineering, 2012

A Machine Learning Approach to Android Malware Detection.
Proceedings of the 2012 European Intelligence and Security Informatics Conference, 2012

Measuring Relatedness and Augmentation of Information of Interest within Free Text Law Enforcement Documents.
Proceedings of the 2012 European Intelligence and Security Informatics Conference, 2012

Tutorial: Data Stream Mining and Its Applications.
Proceedings of the Database Systems for Advanced Applications, 2012

Tweecalization: Efficient and intelligent location mining in twitter using semi-supervised learning.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012

Cloud Guided Stream Classification Using Class-Based Ensemble.
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012

2011
Enhanced geographically typed semantic schema matching.
J. Web Semant., 2011

Cloud-based malware detection for evolving data streams.
ACM Trans. Manag. Inf. Syst., 2011

Classification and Novel Class Detection in Concept-Drifting Data Streams under Time Constraints.
IEEE Trans. Knowl. Data Eng., 2011

Heuristics-Based Query Processing for Large RDF Graphs Using Cloud Computing.
IEEE Trans. Knowl. Data Eng., 2011

Facing the reality of data stream classification: coping with scarcity of labeled data.
Knowl. Inf. Syst., 2011

Objective Risk Evaluation for Automated Security Management.
J. Netw. Syst. Manag., 2011

Ontology based policy interoperability in geo-spatial domain.
Comput. Stand. Interfaces, 2011

Geospatial Resource Description Framework (GRDF) and security constructs.
Comput. Stand. Interfaces, 2011

Insider Threat Detection Using Stream Mining and Graph Mining.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Estimating Twitter User Location Using Social Interactions-A Content Based Approach.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Content-Based Geospatial Schema Matching Using Semi-supervised Geosemantic Clustering and Hierarchy.
Proceedings of the 5th IEEE International Conference on Semantic Computing (ICSC 2011), 2011

Extraction of expanded entity phrases.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

Identification of related information of interest across free text documents.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

Subjectivity classification and analysis of the ASRS corpus.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2011

RDFKB: A Semantic Web Knowledge Base.
Proceedings of the IJCAI 2011, 2011

Learning Cause Identifiers from Annotator Rationales.
Proceedings of the IJCAI 2011, 2011

Scalable queries for large datasets using cloud computing: a case study.
Proceedings of the 15th International Database Engineering and Applications Symposium (IDEAS 2011), September 21, 2011

Ontology-Driven Query Expansion Using Map/Reduce Framework to Facilitate Federated Queries.
Proceedings of the IEEE International Conference on Web Services, 2011

Supervised Learning for Insider Threat Detection Using Stream Mining.
Proceedings of the IEEE 23rd International Conference on Tools with Artificial Intelligence, 2011

Detecting Recurring and Novel Classes in Concept-Drifting Data Streams.
Proceedings of the 11th IEEE International Conference on Data Mining, 2011

Law Enforcement Ontology for Identification of Related Information of Interest Across Free Text Dcouments.
Proceedings of the European Intelligence and Security Informatics Conference, 2011

Pseudo-Label Generation for Multi-Label Text Classification.
Proceedings of the 2011 Conference on Intelligent Data Understanding, 2011

Scalable Complex Query Processing over Large Semantic Web Data Using Cloud.
Proceedings of the IEEE International Conference on Cloud Computing, 2011

2010
Knowledge Based Image Annotation Refinement.
J. Signal Process. Syst., 2010

Secure Data Objects Replication in Data Grid.
IEEE Trans. Dependable Secur. Comput., 2010

Cause Identification from Aviation Safety Incident Reports via Weakly Supervised Semantic Lexicon Construction.
J. Artif. Intell. Res., 2010

Update-Enabled Triplification of Relational Data into Virtual RDF Stores.
Int. J. Semantic Comput., 2010

Security Issues for Cloud Computing.
Int. J. Inf. Secur. Priv., 2010

Policy Enforcement System for Inter-Organizational Data Sharing.
Int. J. Inf. Secur. Priv., 2010

Analysis of firewall policy rules using traffic mining techniques.
Int. J. Internet Protoc. Technol., 2010

Relationalization of provenance data in complex RDF reification nodes.
Electron. Commer. Res., 2010

A mining technique using n-grams and motion transcripts for body sensor network data repository.
Proceedings of Wireless Health 2010, 2010

Tweethood: Agglomerative Clustering on Fuzzy k-Closest Friends with Variable Depth for Location Mining.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Ontology-driven query expansion methods to facilitate federated queries.
Proceedings of the IEEE International Conference on Service-Oriented Computing and Applications, 2010

A Semantic Web Repository for Managing and Querying Aligned Knowledge.
Proceedings of the ISWC 2010 Posters & Demonstrations Track: Collected Abstracts, 2010

Efficient Processing of Large RDF Streams Using Memory Management Algorithms.
Proceedings of the ISWC 2010 Posters & Demonstrations Track: Collected Abstracts, 2010

Bi-directional Translation of Relational Data into Virtual RDF Stores.
Proceedings of the 4th IEEE International Conference on Semantic Computing (ICSC 2010), 2010

Classification and Novel Class Detection of Data Streams in a Dynamic Feature Space.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2010

Classification and Novel Class Detection in Data Streams with Active Mining.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2010

Tweets mining using WIKIPEDIA and impurity cluster measurement.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2010

Efficient RDF data management including provenance and uncertainty.
Proceedings of the Fourteenth International Database Engineering and Applications Symposium (IDEAS 2010), 2010

Data Stream Mining: Challenges and Techniques.
Proceedings of the 22nd IEEE International Conference on Tools with Artificial Intelligence, 2010

Using Correlation Based Subspace Clustering for Multi-label Text Data Classification.
Proceedings of the 22nd IEEE International Conference on Tools with Artificial Intelligence, 2010

Addressing Concept-Evolution in Concept-Drifting Data Streams.
Proceedings of the ICDM 2010, 2010

Geospatial Schema Matching with High-Quality Cluster Assurance and Location Mining from Social Network.
Proceedings of the ICDMW 2010, 2010

TWinner: understanding news queries with geo-content using Twitter.
Proceedings of the 6th Workshop on Geographic Information Retrieval, 2010

Secure data storage and retrieval in the cloud.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

A Token-Based Access Control System for RDF Data in the Clouds.
Proceedings of the Cloud Computing, Second International Conference, 2010

Multi-label ASRS Dataset Classification Using Semi Supervised Subspace Clustering.
Proceedings of the 2010 Conference on Intelligent Data Understanding, 2010

Materializing Inferred and Uncertain Knowledge in RDF Datasets.
Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence, 2010

Materializing and Persisting Inferred and Uncertain Knowledge in RDF Datasets.
Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence, 2010

Data Intensive Query Processing for Large RDF Graphs Using Cloud Computing Tools.
Proceedings of the IEEE International Conference on Cloud Computing, 2010

2009
R2d: a Framework for the Relational Transformation of RDF Data.
Int. J. Semantic Comput., 2009

Design and implementation of a secure social network system.
Comput. Syst. Sci. Eng., 2009

Exploiting an antivirus interface.
Comput. Stand. Interfaces, 2009

Relationalizing RDF stores for tools reusability.
Proceedings of the 18th International Conference on World Wide Web, 2009

R2D: Extracting Relational Structure from RDF Stores.
Proceedings of the 2009 IEEE/WIC/ACM International Conference on Web Intelligence, 2009

R2D: A Bridge between the Semantic Web and Relational Visualization Tools.
Proceedings of the 3rd IEEE International Conference on Semantic Computing (ICSC 2009), 2009

Semantic Schema Matching without Shared Instances.
Proceedings of the 3rd IEEE International Conference on Semantic Computing (ICSC 2009), 2009

Integrating Novel Class Detection with Classification for Concept-Drifting Data Streams.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2009

A Multi-partition Multi-chunk Ensemble Technique to Classify Concept-Drifting Data Streams.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2009

Building a Geosocial Semantic Web for Military Stabilization and Reconstruction Operations.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2009

Design of a temporal geosocial semantic web for military stabilization and reconstruction operations.
Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, 2009

Lacking Labels in the Stream: Classifying Evolving Stream Data with Few Labels.
Proceedings of the Foundations of Intelligent Systems, 18th International Symposium, 2009

Design and implementation of a secure social network system.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009


A Relational Wrapper for RDF Reification.
Proceedings of the Trust Management III, Third IFIP WG 11.11 International Conference, 2009

RDFKB: efficient support for RDF inference queries and knowledge management.
Proceedings of the International Database Engineering and Applications Symposium (IDEAS 2009), 2009

SISC: A Text Classification Approach Using Semi Supervised Subspace Clustering.
Proceedings of the ICDM Workshops 2009, 2009

Real-Time Knowledge Discovery and Dissemination for Intelligence Analysis.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

Geographically-typed semantic schema matching.
Proceedings of the 17th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2009

Storage and Retrieval of Large RDF Graph Using Hadoop and MapReduce.
Proceedings of the Cloud Computing, First International Conference, CloudCom 2009, Beijing, 2009

2008
Managing and Mining Multimedia Data, Animations and Annotations.
Proceedings of the Wiley Encyclopedia of Computer Science and Engineering, 2008

Privacy and Security Challenges in GIS.
Proceedings of the Encyclopedia of GIS., 2008

Geospatial Semantic Web, Definition.
Proceedings of the Encyclopedia of GIS., 2008

Predicting WWW surfing using multiple evidence combination.
VLDB J., 2008

<i>Multimedia Data Mining and Knowledge Discovery</i>.
J. Electronic Imaging, 2008

A scalable multi-level feature extraction technique to detect malicious executables.
Inf. Syst. Frontiers, 2008

Emergency Response Applications: Dynamic Plume Modeling and Real-Time Routing.
IEEE Internet Comput., 2008

Design and Implementation of a Framework for Assured Information Sharing Across Organizational Boundaries.
Int. J. Inf. Secur. Priv., 2008

Multi-label large margin hierarchical perceptron.
Int. J. Data Min. Model. Manag., 2008

Multi-concept Document Classification Using a Perceptron-Like Algorithm.
Proceedings of the 2008 IEEE / WIC / ACM International Conference on Web Intelligence, 2008

An Effective Evidence Theory Based K-Nearest Neighbor (KNN) Classification.
Proceedings of the 2008 IEEE / WIC / ACM International Conference on Web Intelligence, 2008

Software Fault Localization Using N-gram Analysis.
Proceedings of the Wireless Algorithms, 2008

Ontology Alignment Using Multiple Contexts.
Proceedings of the Poster and Demonstration Session at the 7th International Semantic Web Conference (ISWC2008), 2008

Measuring anonymization privacy/analysis tradeoffs inherent to sharing network data.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

The SCRUB security data sharing infrastructure.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

Towards autonomic risk-aware security configuration.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

A Novel Quantitative Approach For Measuring Network Security.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Detecting Remote Exploits Using Data Mining.
Proceedings of the Advances in Digital Forensics IV, 2008

A Practical Approach to Classify Evolving Data Streams: Training with Limited Amount of Labeled Data.
Proceedings of the 8th IEEE International Conference on Data Mining (ICDM 2008), 2008

Content-based ontology matching for GIS datasets.
Proceedings of the 16th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2008

Making Quantitative Measurements of Privacy/Analysis Tradeoffs Inherent to Packet Trace Anonymization.
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008

Data Mining for Security Applications.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

The randomized approximating graph algorithm for image annotation refinement problem.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2008

Peer to peer botnet detection for cyber-security: a data mining approach.
Proceedings of the 4th annual workshop on Cyber security and information intelligence research, 2008

A comprehensive objective network security metric framework for proactive security configuration.
Proceedings of the 4th annual workshop on Cyber security and information intelligence research, 2008

Privacy/Analysis Tradeoffs in Sharing Anonymized Packet Traces: Single-Field Case.
Proceedings of the The Third International Conference on Availability, 2008

2007
A new intrusion detection system using support vector machines and hierarchical clustering.
VLDB J., 2007

Web Navigation Prediction Using Multiple Evidence Combination and Domain Knowledge.
IEEE Trans. Syst. Man Cybern. Part A, 2007

Rapid goal-oriented automated software testing using MEA-graph planning.
Softw. Qual. J., 2007

A framework for a video analysis tool for suspicious event detection.
Multim. Tools Appl., 2007

E-Mail Worm Detection Using Data Mining.
Int. J. Inf. Secur. Priv., 2007

A framework for automated image annotation.
Comput. Syst. Sci. Eng., 2007

Standards for image annotation using Semantic Web.
Comput. Stand. Interfaces, 2007

Standards for secure data sharing across organizations.
Comput. Stand. Interfaces, 2007

Toward Trusted Sharing of Network Packet Traces Using Anonymization: Single-Field Privacy/Analysis Tradeoffs
CoRR, 2007

Constructing gene co-expression networks and predicting functions of unknown genes by random matrix theory.
BMC Bioinform., 2007

SCRUB-tcpdump: A multi-level packet anonymizer demonstrating privacy/analysis tradeoffs.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

Feature Based Techniques for Auto-Detection of Novel Email Worms.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2007

Geospatial Data Mining for National Security: Land Cover Classification and Semantic Grouping.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007

A Hybrid Model to Detect Malicious Executables.
Proceedings of IEEE International Conference on Communications, 2007

Geospatial data qualities as web services performance metrics.
Proceedings of the 15th ACM International Symposium on Geographic Information Systems, 2007

DAGIS: A Geospatial Semantic Web Services Discovery and Selection Framework.
Proceedings of the GeoSpatial Semantics, Second International Conference, 2007

2006
Secure knowledge management: confidentiality, trust, and privacy.
IEEE Trans. Syst. Man Cybern. Part A, 2006

Automatic image annotation and retrieval using weighted feature selection.
Multim. Tools Appl., 2006

Real-time classification of variable length multi-attribute motions.
Knowl. Inf. Syst., 2006

Introduction.
Knowl. Inf. Syst., 2006

A Repository for Component-based Embedded Software Development.
Int. J. Softw. Eng. Knowl. Eng., 2006

Reasoning with semantics-aware access control policies for geospatial web services.
Proceedings of the 3rd ACM Workshop On Secure Web Services, 2006

Access control, confidentiality and privacy for video surveillance databases.
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006

Analysis of Firewall Policy Rules Using Data Mining Techniques.
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006

Email Worm Detection Using Naïve Bayes and Support Vector Machine.
Proceedings of the Intelligence and Security Informatics, 2006

Detection and Resolution of Anomalies in Firewall Policy Rules.
Proceedings of the Data and Applications Security XX, 2006

Vulnerability analysis For evaluating quality of protection of security policies.
Proceedings of the 2nd ACM Workshop on Quality of Protection, 2006

2005
The 6th international workshop on Multimedia Data Mining (MDM/KDD2005).
SIGKDD Explor., 2005

A study of the model and algorithms for handling location-dependent continuous queries.
Knowl. Inf. Syst., 2005

A Framework for Effective Annotation of Information from Closed Captions Using Ontologies.
J. Intell. Inf. Syst., 2005

Hierarchical Clustering for Complex Data.
Int. J. Artif. Intell. Tools, 2005

Image annotations by combining multiple evidence & wordNet.
Proceedings of the 13th ACM International Conference on Multimedia, 2005

Translating Images to Keywords: Problems, Applications and Progress.
Proceedings of the Advances in Multimedia Information Systems, 11th International Workshop, 2005

Improving Image Annotations Using WordNet.
Proceedings of the Advances in Multimedia Information Systems, 11th International Workshop, 2005

Message correlation in automated communication surveillance through singular value decomposition and word frequency association.
Proceedings of the 6th international workshop on Multimedia data mining, 2005

Dependable Real-Time Data Mining.
Proceedings of the Eighth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2005), 2005

2004
Retrieval effectiveness of an ontology-based model for information selection.
VLDB J., 2004

The 4th international workshop on multimedia data mining (MDM/KDD2003).
SIGKDD Explor., 2004

The 5th international workshop on multimedia data mining (MDM/KDD2004).
SIGKDD Explor., 2004

Change Detection in XML Documents for Fixed Structures using Exclusive-Or (XOR).
J. Digit. Inf. Manag., 2004

A dynamically growing self-organizing tree (DGSOT) for hierarchical clustering gene expression profiles.
Bioinform., 2004

Automatic image annotation and retrieval using subspace clustering algorithm.
Proceedings of the Second ACM International Workshop on Multimedia Databases, 2004

Automatic image annotation and retrieval using weighted feature selection.
Proceedings of the Sixth IEEE International Symposium on Multimedia Software Engineering, 2004

Automated Test Data Generation Using MEA-Graph Planning.
Proceedings of the 16th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2004), 2004

An Effective Support Vector Machines (SVMs) Performance Using Hierarchical Clustering.
Proceedings of the 16th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2004), 2004

2003
Hierarchical Clustering of Gene Expression Data.
Proceedings of the 3rd IEEE International Symposium on BioInformatics and BioEngineering (BIBE 2003), 2003

A Run-Time Based Technique to Optimize Queries in Distributed Internet Databases.
Proceedings of the Advanced Topics in Database Research, Vol. 2, 2003

2002
Automatic Ontology Derivation Using Clustering for Image Classification.
Proceedings of the MIS 2002, International Workshop on Multimedia Information Systems, October 10, 2002

Object Boundary Detection For Ontology-Based Image Classification.
Proceedings of the Third International Workshop on Multimedia Data Mining, 2002

Object Detection for Hierarchical Image Classification.
Proceedings of the Mining Multimedia and Complex Data, 2002

A Component-Based Approach for Embedded Software Development.
Proceedings of the 5th International Symposiun on Object Oriented Real-Time Distributed Computing, 2002

Ontology Construction for Information Selection.
Proceedings of the 14th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2002), 2002

A Comparative Study of Storing XML Data in Relational Database Management Systems.
Proceedings of the International Conference on Internet Computing, 2002

Effective Management of Location Dependent Continuous Queries in Mobile Environment.
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002

Image Classification Using Neural Networks and Ontologies.
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002

2001
An Adaptive Probe-Based Technique to Optimize Join Queries in Distributed Internet Databases.
J. Database Manag., 2001

A performance evaluation of storing XML data in relational database management systems.
Proceedings of the 3rd International Workshop on Web Information and Data Management (WIDM 2001), 2001

An On-Line Repository for Embedded Software.
Proceedings of the 13th IEEE International Conference on Tools with Artificial Intelligence, 2001

2000
A Probe-Based Technique to Optimize Join Queries in Distributed Internet Databases.
Knowl. Inf. Syst., 2000

Effective Retrieval of Audio Information from Annotated Text Using Ontologies.
Proceedings of the International Workshop on Multimedia Data Mining, 2000

Audio Structuring and Personalized Retrieval Using Ontologies.
Proceedings of IEEE Advances in Digital Libraries 2000 (ADL 2000), 2000

1999
Structuring and querying personalized audio using ontologies.
Proceedings of the 7th ACM International Conference on Multimedia '99, Orlando, FL, USA, October 30, 1999


  Loading...