Publications

Displaying publications 781 through 800 out of 1074.

Publications

  1. S. Mousavi, M. Rezaee, and R. Ayanzadeh, "A Survey on Compressive Sensing: Classical Results and Recent Advancements", Article, arXiv:1908.01014, August 2019, 470 downloads.
  2. A. Kotal, A. Piplai, S. Chukkapalli, and A. Joshi, "PriveTAB : Secure and Privacy-Preserving sharing of Tabular Data", InProceedings, ACM International Workshop on Security and Privacy Analytics, April 2022, 468 downloads.
  3. U. Lokala, F. Lamay, R. Daniulaityte, M. Gaur, A. Gyrard, K. Thirunarayan, U. Kursuncu, and A. Sheth, "Drug Abuse Ontology to Harness Web-Based Data for Substance Use Epidemiology Research: Ontology Development Study", Article, JMIR Public Health and Surveillance, December 2022, 465 downloads.
  4. D. Ghosh, P. Gupta, S. Dixit, and R. Yus, "JENNER: Just-in-time Enrichment in Query Processing", InProceedings, Proceedings of the VLDB Endowment, September 2022, 457 downloads.
  5. J. Weizenbaum, "How to Make a Computer Appear Intelligent", Article, Datamation, 456 downloads.
  6. R. Ayanzadeh, J. E. Dorband, M. Halem, and T. Finin, "Post-Quantum Error-Correction for Quantum Annealers", Article, arXiv:2010.00115 [quant-ph], September 2020, 451 downloads.
  7. A. Padia, F. Ferraro, and T. Finin, "Jointly Identifying and Fixing Inconsistent Readings from Information Extraction Systems", InProceedings, Proceedings of the Third Deep Learning Inside Out (DeeLIO):Workshop: Knowledge Extraction and Integration for Deep Learning Architecture, May 2022, 450 downloads.
  8. C. Thirunavukkarasu, T. Finin, and J. Mayfield, "Secret Agents - A Security Architecture for the KQML Agent Communication Language", InProceedings, CIKM'95 Intelligent Information Agents Workshop, October 1995, 446 downloads.
  9. D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Cybersecurity at the Grassroots: American Local Governments and the Challenges of Internet Security", Article, Journal of Homeland Security and Emergency Management, September 2018, 445 downloads.
  10. L. Elluri, A. Piplai, A. Kotal, A. Joshi, and K. P. Joshi, "A Policy-Driven Approach to Secure Extraction of COVID-19 Data From Research Papers", Article, Frontiers in Big Data, doi: 10.3389/fdata.2021.701966, August 2021, 443 downloads.
  11. K. P. Joshi and S. Saha, "A Semantically Rich Framework for Knowledge Representation of Code of Federal Regulations (CFR)", Article, Digital Government: Research and Practice, December 2020, 439 downloads.
  12. T. Finin, D. P. McKay, R. Fritzson, and R. McEntire, "KQML - A Language and Protocol for Knowledge and Information Exchange", InBook, Knowledge Building and Knowledge Sharing, September 1994, 430 downloads.
  13. R. Walid, K. P. Joshi, and S. Choi, "Comparison of attribute‑based encryption schemes in securing healthcare systems", Article, Scientific Reports, Nature, March 2024, 430 downloads.
  14. A. Hamid, H. R. Samidi, T. Finin, P. Pappachan, and R. Yus, "GenAIPABench: A Benchmark for Generative AI-based Privacy Assistants", Article, Proceedings on Privacy Enhancing Technologies, July 2024, 429 downloads.
  15. E. J. Clarke, "The empirical use of continuous variables in Bayesian belief networks for exploratory data analysis", PhdThesis, University of Maryland, Baltimore County, May 1998, 427 downloads.
  16. A. Ganesan, F. Ferraro, and T. Oates, "Locality Preserving Loss to Align Vector Spaces", Article, arXiv:2004.03734 [cs.LG], April 2020, 424 downloads.
  17. A. Padia, "Joint Models to Refine Knowledge Graphs", PhdThesis, University of Maryland, Baltimore County, December 2019, 422 downloads.
  18. K. Echenim, L. Elluri, and K. P. Joshi, "Ensuring Privacy Policy Compliance of Wearables with IoT Regulations", InProceedings, IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (IEEE TPS 2023), November 2023, 418 downloads.
  19. A. Ganesan, F. Ferraro, and T. Oates, "Locality Preserving Loss: Neighbors that Live together, Align together", InProceedings, AdaptNPT: The Second Workshop on Domain Adaptation for NLP at EACL, April 2021, 416 downloads.
  20. M. A. Rabi, "Relationships among security and algebraic properties of cryptographic objects, and a security infrastructure for agent communication languages", PhdThesis, University of Maryland, Baltimore County, July 1998, 411 downloads.