Displaying publications 41 through 60 out of 775.

Refereed Publications


  1. K. Khanna and A. Joshi, "AI based approach to identify compromised meters in data integrity attacks on smart grid", Article, IET Generation, Transmission and Distribution, October 2017, 318 downloads.
  2. M. M. Rahman and T. Finin, "Understanding the Logical and Semantic Structure of Large Documents", Article, arXiv e-print, September 2017, 397 downloads.
  3. P. K. Das, "Context-Dependent Privacy and Security Management on Mobile Devices", PhdThesis, Ph.D. Dissertation, August 2017, 514 downloads.
  4. S. Mittal, A. Joshi, and T. Finin, "Thinking, Fast and Slow: Combining Vector Spaces and Knowledge Graphs", Article, CoRR, August 2017, 93 downloads.
  5. F. Ferraro, A. Poliak, R. Cotterell, and B. Van Durme, "Frame-Based Continuous Lexical Semantics through Exponential Family Tensor Factorization and Semantic Proto-Roles", InProceedings, Proceedings of the Sixth Joint Conference on Lexical and Computational Semantics (*SEM), August 2017, 170 downloads.
  6. J. Sleeman, "Dynamic Data Assimilation for Topic Modeling (DDATM)", PhdThesis, University of Maryland, Baltimore County, July 2017.
  7. M. P. Joshi, S. Mittal, K. P. Joshi, and T. Finin, "Semantically Rich, Oblivious Access Control Using ABAC for Secure Cloud Storage", InProceedings, Proceedings of the First IEEE International Conference on Edge Computing, June 2017, 763 downloads.
  8. S. Mittal, A. Gupta, K. P. Joshi, C. Pearce, and A. Joshi, "A Question and Answering System for Management of Cloud Service Level Agreements", InProceedings, IEEE International Conference on Cloud Computing, June 2017, 552 downloads.
  9. S. K. Singh, K. Khanna, R. Bose, and A. Joshi, "Joint transformation based detection of false data injection attacks in smart grid", Article, IEEE Transactions on Industrial Informatics, June 2017, 384 downloads.
  10. A. Banerjee, R. Dalal, S. Mittal, and K. P. Joshi, "Generating Digital Twin models using Knowledge Graphs for Industrial Production Lines", InProceedings, Workshop on Industrial Knowledge Graphs, co-located with the 9th International ACM Web Science Conference 2017, June 2017, 968 downloads.
  11. K. Khanna and A. Joshi, "Bi-level Modelling of False Data Injection Attacks on Security Constrained Optimal Power Flow", Article, IET Generation, Transmission and Distribution, June 2017, 282 downloads.
  12. D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Cybersecurity Challenges to American Local Governments", InProceedings, Proceedings of 17th European Conference on Digital Government , June 2017, 373 downloads.
  13. K. Chopra, R. Bose, and A. Joshi, "Secure Power Trading in Cooperative Relay Network With Asymmetric Cournot Duopoly Model", InProceedings, 12th Annual Symposium On Information Assurance (ASIA’17), May 2017, 343 downloads.
  14. S. Saha, K. P. Joshi, and A. Gupta, "A Deep Learning Approach to Understanding Cloud Service Level Agreements ", InProceedings, Fifth International IBM Cloud Academy Conference, May 2017, 698 downloads.
  15. P. K. Das, A. Joshi, and T. Finin, "App behavioral analysis using system calls", InProceedings, 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS): MobiSec 2017: Security, Privacy, and Digital Forensics of Mobile Systems and Networks, May 2017, 799 downloads.
  16. C. Grasso, "A Semantically Rich Cognitive Search Assistant For Clinical Notes", PhdThesis, UMBC, April 2017, 425 downloads.
  17. M. M. Rahman, "Understanding the Logical and Semantic Structure of Large Documents", Proceedings, SDM 2016 Doctoral Forum, SIAM International Conference on Data Mining , April 2017, 302 downloads.
  18. J. Sleeman, M. Halem, T. Finin, and M. Cane, "Modeling the Evolution of Climate Change Assessment Research Using Dynamic Topic Models and Cross-Domain Divergence Maps", InProceedings, AAAI Spring Symposium on AI for Social Good, March 2017, 1181 downloads.

Non-Refereed Publications


  1. S. Mittal, A. Joshi, and T. Finin, "Thinking, Fast and Slow: Combining Vector Spaces and Knowledge Graphs", TechReport, arXiv, August 2017, 589 downloads.
  2. , " UMBC/ICMA Survey of Local Government Cybersecurity Practices", TechReport, ICMA and UMBC, April 2017, 163 downloads.