Rakesh M. Verma
Orcid: 0000-0002-7466-7823Affiliations:
- University of Houston, USA
According to our database1,
Rakesh M. Verma
authored at least 135 papers
between 1986 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
The Pitfalls of Publishing in the Age of LLMs: Strange and Surprising Adventures with a High-Impact NLP Journal.
CoRR, 2024
CoRR, 2024
CoRR, 2024
Proceedings of the 2024 SIAM International Conference on Data Mining, 2024
Proceedings of the Advances in Intelligent Data Analysis XXII, 2024
Proceedings of the Data and Applications Security and Privacy XXXVIII, 2024
Domain-Agnostic Adapter Architecture for Deception Detection: Extensive Evaluations with the DIFrauD Benchmark.
Proceedings of the 2024 Joint International Conference on Computational Linguistics, 2024
Domain Independent Deception Detection: Feature Sets, LIWC Efficacy, and Synthetic Data Challenges.
Proceedings of the 10th ACM International Workshop on Security and Privacy Analytics, 2024
Proceedings of the 10th ACM International Workshop on Security and Privacy Analytics, 2024
DetectiveReDASers at HSD-2Lang 2024: A New Pooling Strategy with Cross-lingual Augmentation and Ensembling for Hate Speech Detection in Low-resource Languages.
Proceedings of the 7th Workshop on Challenges and Applications of Automated Extraction of Socio-political Events from Text, 2024
2023
Nat. Lang. Eng., March, 2023
IEEE Trans. Dependable Secur. Comput., 2023
DetectiveRedasers at ArAIEval Shared Task: Leveraging Transformer Ensembles for Arabic Deception Detection.
Proceedings of ArabicNLP 2023, Singapore (Hybrid), December 7, 2023, 2023
ReDASPersuasion at ArAIEval Shared Task: Multilingual and Monolingual Models For Arabic Persuasion Detection.
Proceedings of ArabicNLP 2023, Singapore (Hybrid), December 7, 2023, 2023
ReDASPersuasion at SemEval-2023 Task 3: Persuasion Detection using Multilingual Transformers and Language Agnostic Features.
Proceedings of the The 17th International Workshop on Semantic Evaluation, 2023
USDOT Tier-1 University Transportation Center for Advancing Cybersecurity Research and Education.
Proceedings of the IEEE International Conference on Mobility, 2023
Proceedings of the 9th ACM International Workshop on Security and Privacy Analytics, 2023
2022
CoRR, 2022
Proceedings of the Security and Trust Management - 18th International Workshop, 2022
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022
Proceedings of the IEEE/ACM International Conference on Big Data Computing, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
Proceedings of the SIGCSE '21: The 52nd ACM Technical Symposium on Computer Science Education, 2021
Proceedings of the SIGCSE '21: The 52nd ACM Technical Symposium on Computer Science Education, 2021
Proceedings of the International Conference on Recent Advances in Natural Language Processing (RANLP 2021), 2021
Proceedings of the workshop Reducing Online Misinformation Through Credible Information Retrieval (ROMCIR 2021) co-located with 43rd European Conference on Information Retrieval (ECIR 2021), 2021
2020
Experiments in Extractive Summarization: Integer Linear Programming, Term/Sentence Scoring, and Title-driven Models.
CoRR, 2020
CoRR, 2020
Less is More: Exploiting Social Trust to Increase the Effectiveness of a Deception Attack.
CoRR, 2020
SoK: A Comprehensive Reexamination of Phishing Research From the Security Perspective.
IEEE Commun. Surv. Tutorials, 2020
Can Machines Tell Stories? A Comparative Study of Deep Neural Language Models and Metrics.
IEEE Access, 2020
An In-Depth Benchmarking and Evaluation of Phishing Detection Research for Security Needs.
IEEE Access, 2020
Proceedings of the 51st ACM Technical Symposium on Computer Science Education, 2020
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020
Proceedings of the IWSPA@CODASPY '20: Proceedings ofthe Sixth International Workshop on Security and Privacy Analytics, 2020
Proceedings of the IWSPA@CODASPY '20: Proceedings ofthe Sixth International Workshop on Security and Privacy Analytics, 2020
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Scam Augmentation and Customization: Identifying Vulnerable Users and Arming Defenders.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
2019
The CATS Hackathon: Creating and Refining Test Items for Cybersecurity Concept Inventories.
IEEE Secur. Priv., 2019
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019
Data Quality for Security Challenges: Case Studies of Phishing, Malware and Intrusion Detection Datasets.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Scientometrics, 2018
Int. J. Digit. Libr., 2018
Proceedings of the 3rd Joint Workshop on Bibliometric-enhanced Information Retrieval and Natural Language Processing for Digital Libraries (BIRNDL 2018) co-located with the 41st International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR 2018), 2018
Proceedings of the 2018 IEEE International Conference on Data Mining Workshops, 2018
Proceedings of the 2018 IEEE International Conference on Data Mining Workshops, 2018
Proceedings of the Fourth ACM International Workshop on Security and Privacy Analytics, 2018
Proceedings of the Fourth ACM International Workshop on Security and Privacy Analytics, 2018
2017
ACM Trans. Comput. Log., 2017
INSuRE: Collaborating Centers of Academic Excellence Engage Students in Cybersecurity Research.
IEEE Secur. Priv., 2017
Computación y Sistemas, 2017
CoRR, 2017
University of Houston @ CL-SciSumm 2017: Positional language Models, Structural Correspondence Learning and Textual Entailment.
Proceedings of the Computational Linguistics Scientific Summarization Shared Task (CL-SciSumm 2017) organized as a part of the 2nd Joint Workshop on Bibliometric-enhanced Information Retrieval and Natural Language Processing for Digital Libraries (BIRNDL 2017) and co-located with the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR 2017), 2017
Proceedings of the 15th Conference of the European Chapter of the Association for Computational Linguistics, 2017
Proceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics, 2017
Comprehensive Method for Detecting Phishing EmailsUsing Correlation-based Analysis and User Participation.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017
Scaling and Effectiveness of Email Masquerade Attacks: Exploiting Natural Language Generation.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
University of Houston at CL-SciSumm 2016: SVMs with tree kernels and Sentence Similarity.
Proceedings of the Joint Workshop on Bibliometric-enhanced Information Retrieval and Natural Language Processing for Digital Libraries (BIRNDL) co-located with the Joint Conference on Digital Libraries 2016 (JCDL 2016), 2016
Proceedings of the Computational Linguistics and Intelligent Text Processing, 2016
2015
The Efficacy of Epidemic Algorithms on Detecting Node Replicas in Wireless Sensor Networks.
J. Sens. Actuator Networks, 2015
Security Analytics: Essential Data Analytics Knowledge for Cybersecurity Professionals and Students.
IEEE Secur. Priv., 2015
Proceedings of the SECRYPT 2015, 2015
Proceedings of the Recent Advances in Natural Language Processing, 2015
Proceedings of the 2015 IEEE International Conference on Autonomic Computing, 2015
Proceedings of the 2015 IEEE Frontiers in Education Conference, 2015
On the Character of Phishing URLs: Accurate and Robust Statistical Learning Classifiers.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
Panel: Essential Data Analytics Knowledge forCyber-security Professionals and Students.
Proceedings of the 2015 ACM International Workshop on International Workshop on Security and Privacy Analytics, 2015
2014
Proceedings of the Information Systems Security - 10th International Conference, 2014
2013
Modeling and analysis of LEAP, a key management protocol for wireless sensor networks.
Proceedings of the 10th Annual IEEE International Conference on Sensing, 2013
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013
2012
Proceedings of the Computer Security - ESORICS 2012, 2012
Combining Syntax and Semantics for Automatic Extractive Single-Document Summarization.
Proceedings of the Computational Linguistics and Intelligent Text Processing, 2012
Proceedings of the Seventh International Conference on Availability, 2012
2011
Proceedings of the 25th International Workshop on Unification, 2011
Proceedings of the Fourth Text Analysis Conference, 2011
Automated extractive single-document summarization: beating the baselines with a new approach.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011
2010
A polynomial algorithm for uniqueness of normal forms of linear shallow term rewrite systems.
Appl. Algebra Eng. Commun. Comput., 2010
Proceedings of the Third Text Analysis Conference, 2010
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010
Proceedings of the IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, 2010
2009
Complexity of Normal Form Properties and Reductions for Term Rewriting Problems Complexity of Normal Form Properties and Reductions for Term Rewriting Problems.
Fundam. Informaticae, 2009
Proceedings of the Information Systems Security, 5th International Conference, 2009
2008
Proceedings of the Ninth International Workshop on Rule-Based Programming, 2008
Proceedings of the First Text Analysis Conference, 2008
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008
Proceedings of the Information Systems Security, 4th International Conference, 2008
Proceedings of the Twenty-First International Florida Artificial Intelligence Research Society Conference, 2008
Proceedings of the The Third International Conference on Availability, 2008
2006
Proceedings of the 37th SIGCSE Technical Symposium on Computer Science Education, 2006
Proceedings of the 19th IEEE International Symposium on Computer-Based Medical Systems (CBMS 2006), 2006
2005
ACM Trans. Comput. Log., 2005
Proceedings of the 10th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2005
2004
Ann. Pure Appl. Log., 2004
Appl. Algebra Eng. Commun. Comput., 2004
2003
Proceedings of the STACS 2003, 20th Annual Symposium on Theoretical Aspects of Computer Science, Berlin, Germany, February 27, 2003
2002
Proceedings of the Computing: the Australasian Theory Symposium, 2002
Proceedings of the SIGIR 2002: Proceedings of the 25th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 2002
2001
Proceedings of the Second International Workshop on Rule-Based Programming, 2001
Proceedings of the Logic Programming, 17th International Conference, 2001
Proceedings of the Twelfth Australasian Database Conference, 2001
2000
1999
Tight Bounds for Prefetching and Buffer Management Algorithms for Parallel I/O Systems.
IEEE Trans. Parallel Distributed Syst., 1999
Proceedings of the Rewriting Techniques and Applications, 10th International Conference, 1999
1998
Proceedings of the Computer Science Logic, 12th International Workshop, 1998
1997
SIAM J. Comput., 1997
Inf. Process. Lett., 1997
Proceedings of the Fundamentals of Computation Theory, 11th International Symposium, 1997
1996
1995
Proceedings of the Fourteenth International Joint Conference on Artificial Intelligence, 1995
1994
A General Method and a Master Theorem for Divide-and-Conquer Recurrences with Applications.
J. Algorithms, 1994
1993
Proceedings of the Rewriting Techniques and Applications, 5th International Conference, 1993
Proceedings of the 1993 International Conference on Parallel Processing, 1993
1992
1991
A Theory of Using History for Equational Systems with Applications (Extended Abstract)
Proceedings of the 32nd Annual Symposium on Foundations of Computer Science, 1991
1990
Proceedings of the Automata, Languages and Programming, 17th International Colloquium, 1990
1989
SIAM J. Comput., 1989
1988
Proceedings of the 9th International Conference on Automated Deduction, 1988
1986
Proceedings of the Foundations of Software Technology and Theoretical Computer Science, 1986