Tom Johnsten

According to our database1, Tom Johnsten authored at least 26 papers between 1999 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Computational framework for generating synthetic signal peptides.
Proceedings of the BCB '22: 13th ACM International Conference on Bioinformatics, Computational Biology and Health Informatics, Northbrook, Illinois, USA, August 7, 2022

2021
Precise Weather Parameter Predictions for Target Regions via Neural Networks.
Proceedings of the Machine Learning and Knowledge Discovery in Databases. Applied Data Science Track, 2021

RARE: Rare Action Rule Exploration.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

2020
Towards Poisoning the Neural Collaborative Filtering-Based Recommender Systems.
Proceedings of the Computer Security - ESORICS 2020, 2020

TADS: Transformation of Anomalies in Data Streams.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

Dynamic Thresholding Leading to Optimal Inventory Maintenance.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

2019
Discovery of Action Rules for Continuously Valued Data.
Proceedings of the 2019 IEEE First International Conference on Cognitive Machine Intelligence (CogMI), 2019

Prescriptive Equipment Maintenance: A Framework.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
Android Malware Detection Using Step-Size Based Multi-layered Vector Space Models.
Proceedings of the 13th International Conference on Malicious and Unwanted Software, 2018

A Multi-Objective Evolutionary Action Rule Mining Method.
Proceedings of the 2018 IEEE Congress on Evolutionary Computation, 2018

2015
Exploiting multi-layered vector spaces for signal peptide detection.
Int. J. Data Min. Bioinform., 2015

2013
Representations for Large-Scale Sequence Data Mining: A Tale of Two Vector Space Models.
Proceedings of the Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing, 2013

Targeted Action Rule Discovery.
Proceedings of the 12th International Conference on Machine Learning and Applications, 2013

Diagnosis and Grading of Alzheimer's Disease via Automatic Classification of FDG-PET Scans.
Proceedings of the Brain and Health Informatics - International Conference, 2013

2012
Granular Approach for Protein Sequence Analysis.
Proceedings of the Rough Sets and Current Trends in Computing, 2012

2011
Algorithms for discovering potentially interesting patterns.
Int. J. Granul. Comput. Rough Sets Intell. Syst., 2011

FAARM: Frequent Association Action Rules Mining Using FP-Tree.
Proceedings of the Data Mining Workshops (ICDMW), 2011

Multi-layered Vector Spaces for Classifying and Analyzing Biological Sequences.
Proceedings of the ISCA 3rd International Conference on Bioinformatics and Computational Biology, 2011

A Threat Tree for Health Information Security and Privacy.
Proceedings of the A Renaissance of Information Technology for Sustainability and Global Competitiveness. 17th Americas Conference on Information Systems, 2011

2010
Efficient Algorithm for Discovering Potential Interesting Patterns with Closed Itemsets.
Proceedings of the 2010 IEEE International Conference on Granular Computing, 2010

2009
An efficient algorithm for discovering positive and negative patterns.
Proceedings of the 2009 IEEE International Conference on Granular Computing, 2009

2006
On discovering "potentially useful" patterns from databases.
Proceedings of the 2006 IEEE International Conference on Granular Computing, 2006

2003
A Methodology for Hiding Knowledge in XML Document Collections.
Proceedings of the 27th International Computer Software and Applications Conference (COMPSAC 2003): Design and Assessment of Trustworthy Software-Based Systems, 2003

2002
On Security and Privacy Risks in Association Mining Algorithms.
Proceedings of the Research Directions in Data and Applications Security, 2002

2001
Security Procedures for Classification Mining Algorithms.
Proceedings of the Database and Application Security XV, 2001

1999
Impact of Decision-Region Based Classification Mining Algorithms on Database Security.
Proceedings of the Research Advances in Database and Information Systems Security, 1999


  Loading...