Publications

Displaying publications 41 through 60 out of 895.

Publications

2020

  1. R. Ayanzadeh, M. Halem, and T. Finin, "An Ensemble Approach for Compressive Sensing with Quantum Annealers", InProceedings, IEEE International Geoscience and Remote Sensing Symposium, June 2020, 238 downloads.
  2. Z. Boukouvalas, C. Mallinson, E. Crothers, N. Japkowicz, A. Piplai, S. Mittal, A. Joshi, and T. Adali, "Independent Component Analysis for Trustworthy Cyberspace during High Impact Events: An Application to Covid-19", Article, arXiv:2006.01284 [cs.LG], June 2020, 105 downloads.
  3. A. Mahindrakar and K. P. Joshi, "Automating GDPR Compliance using Policy Integrated Blockchain", InProceedings, 6th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2020), May 2020, 778 downloads.
  4. A. Piplai, S. Chukkapalli, and A. Joshi, "NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion", InProceedings, 6th IEEE International Conference on Big Data Security on Cloud, May 2020, 309 downloads.
  5. A. Bandi, K. P. Joshi, and V. Mulwad, "Affinity Propagation Initialisation Based Proximity Clustering For Labeling in Natural Language Based Big Data Systems", InProceedings, 6th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2020), May 2020, 191 downloads.
  6. S. Dutta, S. Chukkapalli, M. Sulgekar, S. Krithivasan, P. K. Das, and A. Joshi, "Context Sensitive Access Control in Smart Home Environments", InProceedings, 6th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2020), May 2020, 1063 downloads.
  7. J. Sleeman, T. Finin, and M. Halem, "Temporal Understanding of Cybersecurity Threats", InProceedings, IEEE International Conference on Big Data Security on Cloud, May 2020, 396 downloads.
  8. J. Sleeman, J. E. Dorband, and M. Halem, "A hybrid quantum enabled RBM advantage: convolutional autoencoders for quantum image compression and generative learning", InProceedings, Quantum Information Science, Sensing, and Computation XII, May 2020, 153 downloads.
  9. C. H. Song, D. Lawrie, T. Finin, and J. Mayfield, "Gazetteer Generation for Neural Named Entity Recognition", InProceedings, Proceedings of the 33rd International FLAIRS Conference, May 2020, 480 downloads.
  10. R. Ayanzadeh, M. Halem, and T. Finin, "Reinforcement Quantum Annealing: A Hybrid Quantum Learning Automata", Article, Nature Scientific Reports, May 2020, 187 downloads.
  11. R. Ayanzadeh, "Leveraging Artificial Intelligence to Advance Problem-Solving with Quantum Annealers", PhdThesis, University of Maryland, Baltimore County, May 2020, 374 downloads.
  12. D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Managing Cybersecurity at the Grassroots: Evidence from the First Nationwide Survey of Local Government Cybersecurity", Article, Journal of Urban Affairs, April 2020.
  13. A. Ganesan, F. Ferraro, and T. Oates, "Locality Preserving Loss to Align Vector Spaces", Article, arXiv:2004.03734 [cs.LG], April 2020, 80 downloads.
  14. S. Chukkapalli, A. Piplai, S. Mittal, M. Gupta, and A. Joshi, "A Smart-Farming Ontology for Attribute Based Access Control", InProceedings, 6th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2020), March 2020, 411 downloads.
  15. C. H. Song, D. Lawrie, and T. Finin, "Improving Neural Named Entity Recognition with Gazetteers", Article, arXiv:2003.03072, March 2020, 415 downloads.
  16. T. W. Satyapanich, F. Ferraro, and T. Finin, "CASIE: Extracting Cybersecurity Event Information from Text", InProceedings, Proceeding of the 34th AAAI Conference on Artificial Intelligence, February 2020, 923 downloads.
  17. J. Sleeman, J. E. Dorband, and M. Halem, "A Hybrid Quantum Enabled RBM Advantage: Convolutional Autoencoders for Quantum Image Compression and Generative Learning", Article, arXiv preprint arXiv:2001.11946, January 2020, 276 downloads.
  18. R. Ayanzadeh, M. Halem, and T. Finin, "Reinforcement Quantum Annealing: A Quantum-Assisted Learning Automata Approach", Article, arXiv:2001.00234 [quant-ph], January 2020, 344 downloads.

2019

  1. M. P. Joshi, K. P. Joshi, and T. Finin, "Delegated Authorization Framework for EHR Services using Attribute Based Encryption", Article, IEEE Transactions on Services Computing, December 2019, 852 downloads.
  2. R. Razavisousan and K. P. Joshi, "Two Tier Analysis of Social Media Collaboration for Student Migration", InProceedings, IEEE International Conference on Collaboration and Internet Computing (IEEE CIC), 2019, December 2019, 229 downloads.