Publications

Displaying publications 181 through 200 out of 1094.

Publications

2019

  1. M. Murnane, M. Breitmeyer, F. Ferraro, C. Matuszek, and D. Engel, "Learning from Human-Robot Interactions in Modeled Scenes", InProceedings, ACM SIGGRAPH 2019 Posters, July 2019, 503 downloads.
  2. M. Murnane, M. Breitmeyer, F. Ferraro, and C. Matuszek, "Learning from Human-Robot Interactions in Modeled Scenes", InProceedings, ACM SIGGRAPH 2019 Posters, July 2019, 498 downloads.
  3. S. Oni, Z. Chen, A. Crainiceanu, K. P. Joshi, and D. Needham, "Situation-Aware Access Control in Federated Data-as-a-Service for Maritime Search And Rescue", InProceedings, IEEE International Conference on Services Computing (IEEE SCC), 2019, July 2019, 848 downloads.
  4. K. Sane, K. P. Joshi, and S. Mittal, "A Semantic Approach for Automating Knowledge in Policies of Cyber Insurance Services", InProceedings, IEEE International Conference on Web Services (IEEE ICWS) 2019, July 2019, 1860 downloads.
  5. S. Dixit, K. P. Joshi, and S. Choi, "Multi Authority Access Control in a Cloud EHR System with MA-ABE", InProceedings, IEEE International Conference on Edge Computing (EDGE 2019), July 2019, 981 downloads.
  6. L. Elluri, V. Mandalapu, and N. Roy, "Developing Machine Learning based Predictive Models for Smart Policing", InProceedings, International Conference on Smart Computing (SMARTCOMP), June 2019, 1315 downloads.
  7. C. Kery, F. Ferraro, and C. Matuszek, "¿Es un plátano? Exploring the Application of a Physically Grounded Language Acquisition System to Spanish", NAACL Combined Workshop on Spatial Language Understanding and Grounded Communication for Robotics, June 2019, 688 downloads.
  8. S. K. Singh, R. Bose, and A. Joshi, "Energy theft detection for AMI using principal component analysis based reconstructed data", Article, IET Cyber-Physical Systems: Theory & Applications, June 2019, 1164 downloads.
  9. N. Pillai, F. Ferraro, and C. Matuszek, "Deep Learning for Category-Free Grounded Language Acquisition", NAACL Workshop on Spatial Language Understanding and Grounded Communication for Robotics, June 2019, 527 downloads.
  10. A. Renjan, S. N. Narayanan, and K. P. Joshi, "A Policy based Framework for Privacy-Respecting Deep Packet Inspection of High Velocity Network Traffic", InProceedings, 5th IEEE International Conference on Big Data Security on Cloud, May 2019, 898 downloads.
  11. A. Pingle, A. Piplai, S. Mittal, A. Joshi, J. Holt, and R. Zak, "RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement", InProceedings, IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2019), May 2019, 1222 downloads.
  12. S. Mittal, A. Joshi, and T. Finin, "Cyber-All-Intel: An AI for Security Related Threat Intelligence", TechReport, CoRR abs/1905.02895, May 2019, 492 downloads.
  13. S. N. Narayanan, "A Framework for Detecting Anomalous Behaviors in Smart Cyber-physical Systems", PhdThesis, University of Maryland, Baltimore County, May 2019, 541 downloads.
  14. S. Mittal, "Knowledge for Cyber Threat Intelligence", PhdThesis, University of Maryland, Baltimore County, May 2019, 600 downloads.
  15. S. N. Narayanan, "A Framework for Detecting Anomalous Behaviors in Smart Cyber-Physical Systems", PhdThesis, May 2019, 661 downloads.
  16. S. Mittal, "Knowledge for Cyber Threat Intelligence", PhdThesis, May 2019, 275 downloads.
  17. M. M. Rahman, S. Hisamoto, and K. Duh, "Query Expansion for Cross-Language Question Re-Ranking", Article, arXiv:1904.07982, April 2019, 505 downloads.
  18. S. Ramapatruni, S. N. Narayanan, S. Mittal, A. Joshi, and K. P. Joshi, "Anomaly Detection Models for Smart Home Security", InProceedings, 5th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2019), April 2019, 1653 downloads.
  19. R. Ayanzadeh, M. Halem, and T. Finin, "SAT-based Compressive Sensing", Article, arXiv:1903.03650 [cs.IT], March 2019, 675 downloads.
  20. D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Cyberattacks at the Grass Roots: American Local Governments and the Need for High Levels of Cybersecurity", Article, Public Administration Review, February 2019, 1202 downloads.