Rakesh M. Verma

Orcid: 0000-0002-7466-7823

Affiliations:
  • University of Houston, USA


According to our database1, Rakesh M. Verma authored at least 135 papers between 1986 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
The Pitfalls of Publishing in the Age of LLMs: Strange and Surprising Adventures with a High-Impact NLP Journal.
CoRR, 2024

Unmasking the Imposters: In-Domain Detection of Human vs. Machine-Generated Tweets.
CoRR, 2024

A Roadmap for Multilingual, Multimodal Domain Independent Deception Detection.
CoRR, 2024

Homograph Attacks on Maghreb Sentiment Analyzers.
CoRR, 2024

Domain-Independent Deception: A New Taxonomy and Linguistic Analysis.
CoRR, 2024

Blue Sky: Multilingual, Multimodal Domain Independent Deception Detection.
Proceedings of the 2024 SIAM International Conference on Data Mining, 2024

Data Quality in NLP: Metrics and a Comprehensive Taxonomy.
Proceedings of the Advances in Intelligent Data Analysis XXII, 2024

All Your LLMs Belong to Us: Experiments with a New Extortion Phishing Dataset.
Proceedings of the Data and Applications Security and Privacy XXXVIII, 2024

Domain-Agnostic Adapter Architecture for Deception Detection: Extensive Evaluations with the DIFrauD Benchmark.
Proceedings of the 2024 Joint International Conference on Computational Linguistics, 2024

Domain Independent Deception Detection: Feature Sets, LIWC Efficacy, and Synthetic Data Challenges.
Proceedings of the 10th ACM International Workshop on Security and Privacy Analytics, 2024

LLMs for Explainable Few-shot Deception Detection.
Proceedings of the 10th ACM International Workshop on Security and Privacy Analytics, 2024

DetectiveReDASers at HSD-2Lang 2024: A New Pooling Strategy with Cross-lingual Augmentation and Ensembling for Hate Speech Detection in Low-resource Languages.
Proceedings of the 7th Workshop on Challenges and Applications of Automated Extraction of Socio-political Events from Text, 2024

2023
Rebutting Rebuttals.
Commun. ACM, September, 2023

Enhancement of Twitter event detection using news streams.
Nat. Lang. Eng., March, 2023

Sixteen Years of Phishing User Studies: What Have We Learned?
IEEE Trans. Dependable Secur. Comput., 2023

DetectiveRedasers at ArAIEval Shared Task: Leveraging Transformer Ensembles for Arabic Deception Detection.
Proceedings of ArabicNLP 2023, Singapore (Hybrid), December 7, 2023, 2023

ReDASPersuasion at ArAIEval Shared Task: Multilingual and Monolingual Models For Arabic Persuasion Detection.
Proceedings of ArabicNLP 2023, Singapore (Hybrid), December 7, 2023, 2023

ReDASPersuasion at SemEval-2023 Task 3: Persuasion Detection using Multilingual Transformers and Language Agnostic Features.
Proceedings of the The 17th International Workshop on Semantic Evaluation, 2023

USDOT Tier-1 University Transportation Center for Advancing Cybersecurity Research and Education.
Proceedings of the IEEE International Conference on Mobility, 2023

Adversarial Robustness of Phishing Email Detection Models.
Proceedings of the 9th ACM International Workshop on Security and Privacy Analytics, 2023

2022
Domain-Independent Deception: Definition, Taxonomy and the Linguistic Cues Debate.
CoRR, 2022

Software Vulnerability Detection via Multimodal Deep Learning.
Proceedings of the Security and Trust Management - 18th International Workshop, 2022

Does Deception Leave a Content Independent Stylistic Trace?
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

Leveraging Synthetic Data and PU Learning For Phishing Email Detection.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

Data Quality and Linguistic Cues for Domain-independent Deception Detection.
Proceedings of the IEEE/ACM International Conference on Big Data Computing, 2022

Vulnerability Detection via Multimodal Learning: Datasets and Analysis.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Online news media website ranking using user-generated content.
J. Inf. Sci., 2021

What is the Security Mindset? Can it be Developed?
Proceedings of the SIGCSE '21: The 52nd ACM Technical Symposium on Computer Science Education, 2021

Capacity Expansion in Cybersecurity: Challenges and Prospects.
Proceedings of the SIGCSE '21: The 52nd ACM Technical Symposium on Computer Science Education, 2021

Claim Verification Using a Multi-GAN Based Model.
Proceedings of the International Conference on Recent Advances in Natural Language Processing (RANLP 2021), 2021

On the Feasibility of Using GANs for Claim Verification- Experiments and Analysis.
Proceedings of the workshop Reducing Online Misinformation Through Credible Information Retrieval (ROMCIR 2021) co-located with 43rd European Conference on Information Retrieval (ECIR 2021), 2021

2020
Experiments in Extractive Summarization: Integer Linear Programming, Term/Sentence Scoring, and Title-driven Models.
CoRR, 2020

Modeling Coherency in Generated Emails by Leveraging Deep Neural Learners.
CoRR, 2020

Less is More: Exploiting Social Trust to Increase the Effectiveness of a Deception Attack.
CoRR, 2020

SoK: A Comprehensive Reexamination of Phishing Research From the Security Perspective.
IEEE Commun. Surv. Tutorials, 2020

Can Machines Tell Stories? A Comparative Study of Deep Neural Language Models and Metrics.
IEEE Access, 2020

An In-Depth Benchmarking and Evaluation of Phishing Detection Research for Security Needs.
IEEE Access, 2020

Poster: A Modular and Innovative Security Analytics Course.
Proceedings of the 51st ACM Technical Symposium on Computer Science Education, 2020

Phishing Sites Detection from a Web Developer's Perspective Using Machine Learning.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

Diverse Datasets and a Customizable Benchmarking Framework for Phishing.
Proceedings of the IWSPA@CODASPY '20: Proceedings ofthe Sixth International Workshop on Security and Privacy Analytics, 2020

Adversarial Machine Learning for Text.
Proceedings of the IWSPA@CODASPY '20: Proceedings ofthe Sixth International Workshop on Security and Privacy Analytics, 2020

Developing A Compelling Vision for Winning the Cybersecurity Arms Race.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

PhishBench 2.0: A Versatile and Extendable Benchmarking Framework for Phishing.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Scam Augmentation and Customization: Identifying Vulnerable Users and Arming Defenders.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
The CATS Hackathon: Creating and Refining Test Items for Cybersecurity Concept Inventories.
IEEE Secur. Priv., 2019

Automated email Generation for Targeted Attacks using Natural Language.
CoRR, 2019

Newswire versus Social Media for Disaster Response and Recovery.
CoRR, 2019

Parameter Tuning and Confidence Limits of Malware Clustering.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

Data Quality for Security Challenges: Case Studies of Phishing, Malware and Intrusion Detection Datasets.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Citance-based retrieval and summarization using IR and machine learning.
Scientometrics, 2018

Identifying reference spans: topic modeling and word embeddings help IR.
Int. J. Digit. Libr., 2018

University of Houston @ CL-SciSumm 2018.
Proceedings of the 3rd Joint Workshop on Bibliometric-enhanced Information Retrieval and Natural Language Processing for Digital Libraries (BIRNDL 2018) co-located with the 41st International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR 2018), 2018

Performance Evaluation of Features and Clustering Algorithms for Malware.
Proceedings of the 2018 IEEE International Conference on Data Mining Workshops, 2018

Phishing Email Detection Using Robust NLP Techniques.
Proceedings of the 2018 IEEE International Conference on Data Mining Workshops, 2018

Security Analytics: Adapting Data Science for Security Challenges.
Proceedings of the Fourth ACM International Workshop on Security and Privacy Analytics, 2018

Machine Learning Methods for Software Vulnerability Detection.
Proceedings of the Fourth ACM International Workshop on Security and Privacy Analytics, 2018

2017
Uniqueness of Normal Forms for Shallow Term Rewrite Systems.
ACM Trans. Comput. Log., 2017

INSuRE: Collaborating Centers of Academic Excellence Engage Students in Cybersecurity Research.
IEEE Secur. Priv., 2017

Extractive Summarization: Limits, Compression, Generalized Model and Heuristics.
Computación y Sistemas, 2017

The INSuRE Project: CAE-Rs Collaborate to Engage Students in Cybersecurity Research.
CoRR, 2017

University of Houston @ CL-SciSumm 2017: Positional language Models, Structural Correspondence Learning and Textual Entailment.
Proceedings of the Computational Linguistics Scientific Summarization Shared Task (CL-SciSumm 2017) organized as a part of the 2nd Joint Workshop on Bibliometric-enhanced Information Retrieval and Natural Language Processing for Digital Libraries (BIRNDL 2017) and co-located with the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR 2017), 2017

ICE: Idiom and Collocation Extractor for Research and Education.
Proceedings of the 15th Conference of the European Chapter of the Association for Computational Linguistics, 2017

What's in a URL: Fast Feature Extraction and Malicious URL Detection.
Proceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics, 2017

Comprehensive Method for Detecting Phishing EmailsUsing Correlation-based Analysis and User Participation.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

Scaling and Effectiveness of Email Masquerade Attacks: Exploiting Natural Language Generation.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
University of Houston at CL-SciSumm 2016: SVMs with tree kernels and Sentence Similarity.
Proceedings of the Joint Workshop on Bibliometric-enhanced Information Retrieval and Natural Language Processing for Digital Libraries (BIRNDL) co-located with the Joint Conference on Digital Libraries 2016 (JCDL 2016), 2016

Mining the Web for Collocations: IR Models of Term Associations.
Proceedings of the Computational Linguistics and Intelligent Text Processing, 2016

2015
The Efficacy of Epidemic Algorithms on Detecting Node Replicas in Wireless Sensor Networks.
J. Sens. Actuator Networks, 2015

Security Analytics: Essential Data Analytics Knowledge for Cybersecurity Professionals and Students.
IEEE Secur. Priv., 2015

Phish-IDetector: Message-Id Based Automatic Phishing Detection.
Proceedings of the SECRYPT 2015, 2015

A New Approach for Idiom Identification Using Meanings and the Web.
Proceedings of the Recent Advances in Natural Language Processing, 2015

Integrity Protection for Big Data Processing with Dynamic Redundancy Computation.
Proceedings of the 2015 IEEE International Conference on Autonomic Computing, 2015

Topic based segmentation of classroom videos.
Proceedings of the 2015 IEEE Frontiers in Education Conference, 2015

On the Character of Phishing URLs: Accurate and Robust Statistical Learning Classifiers.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

Panel: Essential Data Analytics Knowledge forCyber-security Professionals and Students.
Proceedings of the 2015 ACM International Workshop on International Workshop on Security and Privacy Analytics, 2015

2014
Catching Classical and Hijack-Based Phishing Attacks.
Proceedings of the Information Systems Security - 10th International Conference, 2014

2013
Modeling and analysis of LEAP, a key management protocol for wireless sensor networks.
Proceedings of the 10th Annual IEEE International Conference on Sensing, 2013

Semantic Feature Selection for Text with Application to Phishing Email Detection.
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013

2012
Detecting Phishing Emails the Natural Language Way.
Proceedings of the Computer Security - ESORICS 2012, 2012

Combining Syntax and Semantics for Automatic Extractive Single-Document Summarization.
Proceedings of the Computational Linguistics and Intelligent Text Processing, 2012

Two-Pronged Phish Snagging.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Does Unification Help in Normalization?
Proceedings of the 25th International Workshop on Unification, 2011

SemQuest: University of Houston's Semantics-based Question Answering System.
Proceedings of the Fourth Text Analysis Conference, 2011

Automated extractive single-document summarization: beating the baselines with a new approach.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

2010
A polynomial algorithm for uniqueness of normal forms of linear shallow term rewrite systems.
Appl. Algebra Eng. Commun. Comput., 2010

A Ranking-based Approach for Multiple-document Information Extraction.
Proceedings of the Third Text Analysis Conference, 2010

R-LEAP+: randomizing LEAP+ key distribution to resist replay and jamming attacks.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Uniqueness of Normal Forms is Decidable for Shallow Term Rewrite Systems.
Proceedings of the IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, 2010

2009
Complexity of Normal Form Properties and Reductions for Term Rewriting Problems Complexity of Normal Form Properties and Reductions for Term Rewriting Problems.
Fundam. Informaticae, 2009

Correcting and Improving the NP Proof for Cryptographic Protocol Insecurity.
Proceedings of the Information Systems Security, 5th International Conference, 2009

2008
New Undecidability Results for Properties of Term Rewrite Systems.
Proceedings of the Ninth International Workshop on Rule-Based Programming, 2008

Semantic Multi-Document Update Summarization Techniques.
Proceedings of the First Text Analysis Conference, 2008

Visualization of rule-based programming.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Complexity of Checking Freshness of Cryptographic Protocols.
Proceedings of the Information Systems Security, 4th International Conference, 2008

Semantic Analysis of Association Rules.
Proceedings of the Twenty-First International Florida Artificial Intelligence Research Society Conference, 2008

Improving Techniques for Proving Undecidability of Checking Cryptographic Protocols.
Proceedings of the The Third International Conference on Availability, 2008

2006
Automata theory: its relevance to computer science students and course contents.
Proceedings of the 37th SIGCSE Technical Symposium on Computer Science Education, 2006

A Query-Based Medical Information Summarization System Using Ontology Knowledge.
Proceedings of the 19th IEEE International Symposium on Computer-Based Medical Systems (CBMS 2006), 2006

2005
A new decidability technique for ground term rewriting systems with applications.
ACM Trans. Comput. Log., 2005

A visual and interactive automata theory course emphasizing breadth of automata.
Proceedings of the 10th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2005

2004
Remarks on Thatte's transformation of term rewriting systems.
Inf. Comput., 2004

Deciding confluence of certain term rewriting systems in polynomial time.
Ann. Pure Appl. Log., 2004

Characterizing Confluence by Rewrite Closure and Right Ground Term Rewrite Systems.
Appl. Algebra Eng. Commun. Comput., 2004

2003
On the Confluence of Linear Shallow Term Rewrite Systems.
Proceedings of the STACS 2003, 20th Annual Symposium on Theoretical Aspects of Computer Science, Berlin, Germany, February 27, 2003

2002
Algorithms and reductions for rewriting problems II.
Inf. Process. Lett., 2002

On the Structure of Counterexamples to Symmetric Orderings for BDD's.
Proceedings of the Computing: the Australasian Theory Symposium, 2002

K-tree/forest: efficient indexes for boolean queries.
Proceedings of the SIGIR 2002: Proceedings of the 25th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 2002

2001
RULE2001 - Foreword.
Proceedings of the Second International Workshop on Rule-Based Programming, 2001

Algorithms and Reductions for Rewriting Problems.
Fundam. Informaticae, 2001

Local and Symbolic Bisimulation Using Tabled Constraint Logic Programming.
Proceedings of the Logic Programming, 17th International Conference, 2001

Efficient declustering techniques for temporal access structures.
Proceedings of the Twelfth Australasian Database Conference, 2001

2000
Static Analysis Techniques for Equational Logic Programming
CoRR, 2000

1999
Tight Bounds for Prefetching and Buffer Management Algorithms for Parallel I/O Systems.
IEEE Trans. Parallel Distributed Syst., 1999

L<sup>arrow</sup>R<sup>2</sup>: A Laboratory fro Rapid Term Graph Rewriting.
Proceedings of the Rewriting Techniques and Applications, 10th International Conference, 1999

1998
RPO Constraint Solving Is in NP.
Proceedings of the Computer Science Logic, 12th International Workshop, 1998

1997
An Efficient Multiversion Access STructure.
IEEE Trans. Knowl. Data Eng., 1997

General Techniques for Analyzing Recursive Algorithms with Applications.
SIAM J. Comput., 1997

On Embedding Rectangular Meshes into Rectangular Meshes of Smaller Aspect Ratio.
Inf. Process. Lett., 1997

Unique Normal Forms for Nonlinear Term Rewriting Systems: Root Overlaps.
Proceedings of the Fundamentals of Computation Theory, 11th International Symposium, 1997

1996
A New Combinatorial Approach to Optimal Embeddings of Rectangles.
Algorithmica, 1996

1995
Transformations and Confluence for Rewrite Systems.
Theor. Comput. Sci., 1995

A Theory of Using History for Equational Systems with Applications.
J. ACM, 1995

Unique Normal Forms and Confluence of Rewrite Systems: Persistence.
Proceedings of the Fourteenth International Joint Conference on Artificial Intelligence, 1995

1994
A General Method and a Master Theorem for Divide-and-Conquer Recurrences with Applications.
J. Algorithms, 1994

1993
Smaran: A Congruence-Closure Based System for Equational Computations.
Proceedings of the Rewriting Techniques and Applications, 5th International Conference, 1993

On Embeddings of Rectangles into Optimal Squares.
Proceedings of the 1993 International Conference on Parallel Processing, 1993

1992
Tight Complexity Bounds for Term Matching Problems
Inf. Comput., November, 1992

Strings, Trees, and Patterns.
Inf. Process. Lett., 1992

1991
A Theory of Using History for Equational Systems with Applications (Extended Abstract)
Proceedings of the 32nd Annual Symposium on Foundations of Computer Science, 1991

1990
Nonoblivious Normalization Algorithms for Nonlinear Rewrite Systems.
Proceedings of the Automata, Languages and Programming, 17th International Colloquium, 1990

1989
An Analysis of a Good Algorithm for the Subtree Problem, Corrected.
SIAM J. Comput., 1989

Term Matching on Parallel Computers.
J. Log. Program., 1989

Some Complexity Theoretic Aspects of AC Rewriting.
Proceedings of the STACS 89, 1989

1988
Optimal Time Bounds for Parallel Term Matching.
Proceedings of the 9th International Conference on Automated Deduction, 1988

1986
An Efficient Parallel Algorithm for Term Matching.
Proceedings of the Foundations of Software Technology and Theoretical Computer Science, 1986


  Loading...