Publications

Displaying publications 181 through 200 out of 1094.

Publications

2019

  1. M. Murnane, M. Breitmeyer, F. Ferraro, C. Matuszek, and D. Engel, "Learning from Human-Robot Interactions in Modeled Scenes", InProceedings, ACM SIGGRAPH 2019 Posters, July 2019, 517 downloads.
  2. M. Murnane, M. Breitmeyer, F. Ferraro, and C. Matuszek, "Learning from Human-Robot Interactions in Modeled Scenes", InProceedings, ACM SIGGRAPH 2019 Posters, July 2019, 511 downloads.
  3. S. Oni, Z. Chen, A. Crainiceanu, K. P. Joshi, and D. Needham, "Situation-Aware Access Control in Federated Data-as-a-Service for Maritime Search And Rescue", InProceedings, IEEE International Conference on Services Computing (IEEE SCC), 2019, July 2019, 866 downloads.
  4. K. Sane, K. P. Joshi, and S. Mittal, "A Semantic Approach for Automating Knowledge in Policies of Cyber Insurance Services", InProceedings, IEEE International Conference on Web Services (IEEE ICWS) 2019, July 2019, 1936 downloads.
  5. S. Dixit, K. P. Joshi, and S. Choi, "Multi Authority Access Control in a Cloud EHR System with MA-ABE", InProceedings, IEEE International Conference on Edge Computing (EDGE 2019), July 2019, 995 downloads.
  6. L. Elluri, V. Mandalapu, and N. Roy, "Developing Machine Learning based Predictive Models for Smart Policing", InProceedings, International Conference on Smart Computing (SMARTCOMP), June 2019, 1369 downloads.
  7. C. Kery, F. Ferraro, and C. Matuszek, "¿Es un plátano? Exploring the Application of a Physically Grounded Language Acquisition System to Spanish", NAACL Combined Workshop on Spatial Language Understanding and Grounded Communication for Robotics, June 2019, 707 downloads.
  8. S. K. Singh, R. Bose, and A. Joshi, "Energy theft detection for AMI using principal component analysis based reconstructed data", Article, IET Cyber-Physical Systems: Theory & Applications, June 2019, 1182 downloads.
  9. N. Pillai, F. Ferraro, and C. Matuszek, "Deep Learning for Category-Free Grounded Language Acquisition", NAACL Workshop on Spatial Language Understanding and Grounded Communication for Robotics, June 2019, 537 downloads.
  10. A. Renjan, S. N. Narayanan, and K. P. Joshi, "A Policy based Framework for Privacy-Respecting Deep Packet Inspection of High Velocity Network Traffic", InProceedings, 5th IEEE International Conference on Big Data Security on Cloud, May 2019, 913 downloads.
  11. A. Pingle, A. Piplai, S. Mittal, A. Joshi, J. Holt, and R. Zak, "RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement", InProceedings, IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2019), May 2019, 1248 downloads.
  12. S. Mittal, A. Joshi, and T. Finin, "Cyber-All-Intel: An AI for Security Related Threat Intelligence", TechReport, CoRR abs/1905.02895, May 2019, 541 downloads.
  13. S. N. Narayanan, "A Framework for Detecting Anomalous Behaviors in Smart Cyber-physical Systems", PhdThesis, University of Maryland, Baltimore County, May 2019, 559 downloads.
  14. S. Mittal, "Knowledge for Cyber Threat Intelligence", PhdThesis, University of Maryland, Baltimore County, May 2019, 615 downloads.
  15. S. N. Narayanan, "A Framework for Detecting Anomalous Behaviors in Smart Cyber-Physical Systems", PhdThesis, May 2019, 766 downloads.
  16. S. Mittal, "Knowledge for Cyber Threat Intelligence", PhdThesis, May 2019, 285 downloads.
  17. M. M. Rahman, S. Hisamoto, and K. Duh, "Query Expansion for Cross-Language Question Re-Ranking", Article, arXiv:1904.07982, April 2019, 522 downloads.
  18. S. Ramapatruni, S. N. Narayanan, S. Mittal, A. Joshi, and K. P. Joshi, "Anomaly Detection Models for Smart Home Security", InProceedings, 5th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2019), April 2019, 1685 downloads.
  19. R. Ayanzadeh, M. Halem, and T. Finin, "SAT-based Compressive Sensing", Article, arXiv:1903.03650 [cs.IT], March 2019, 687 downloads.
  20. D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Cyberattacks at the Grass Roots: American Local Governments and the Need for High Levels of Cybersecurity", Article, Public Administration Review, February 2019, 1234 downloads.