Anupam Joshi
Anupam Joshi

Professor

Faculty, Principal Faculty

University of Maryland Baltimore County
Computer Science, 1000 Hilltop Circle, Baltimore, MD 21250, USA

Graduated in August 1993

Anupam Joshi is the Oros Family Professor and Chair of the Computer Science and Electrical Engineering at UMBC. He obtained a B. Tech degree in Electrical Engineering from IIT Delhi and Masters and Ph.D. in Computer Science from Purdue University.

His research interests are in the broad area of Cybersecurity, mobile and networked computing and Intelligent Cognitive systems. His primary focus has been on automating Cybersecurity processes, data and security management in mobile, pervasive computing and sensor environments. He has created agent based middleware to support discovery, composition, and secure access of services/data over both infrastructure based (e.g. 802.11, cellular) and ad-hoc wireless networks (e.g. Bluetooth). He is also interested in Semantic Web and Data/Web Mining, where he has worked on personalizing the web space using a combination of agents and soft computing. His other interests include networked HPCC.
He has published over 275 technical papers with nearly 22,000 citations and an h-Index of 78.

He has obtained research support from NSF, NASA, DARPA, DoD, IBM, AetherSystens, HP, AT&T and Intel. He has presented tutorials in conferences, served as guest editor for special issues for IEEE Personal Comm., Comm. ACM etc., and served as an Associate Editor of IEEE Transactions of Fuzzy Systems from 99-03. At UMBC, Joshi teaches courses in Operating Systems, Mobile Computing, Networking, and Web Mining.

He is a Fellow of IEEE and a member of ACM.

Anupam Joshi

Refereed Publications

2020

  1. A. Piplai, S. Mittal, M. Abdelsalam, M. Gupta, A. Joshi, and T. Finin, "Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior", InProceedings, IEEE Intelligence and Security Informatics (ISI) 2020, November 2020, 106 downloads.
  2. N. K. Choudhary, S. Chukkapalli, S. Mittal, M. Gupta, M. Abdelsalam, and A. Joshi, "YieldPredict: A Crop Yield Prediction Framework for Smart Farms", November 2020, 8 downloads.
  3. A. Kotal, K. P. Joshi, and A. Joshi, "ViCLOUD: Measuring Vagueness in Cloud Service Privacy Policies and Terms of Services", InProceedings, IEEE International Conference on Cloud Computing (CLOUD), 2020, October 2020, 91 downloads.
  4. S. Chukkapalli, S. Mittal, M. Gupta, M. Abdelsalam, A. Joshi, R. Sandhu, and K. P. Joshi, "Ontologies and Artificial Intelligence Systems for the Cooperative Smart Farming Ecosystem", InCollection, IEEE Access, September 2020, 65 downloads.
  5. Z. Boukouvalas, C. Mallinson, E. Crothers, N. Japkowicz, A. Piplai, S. Mittal, A. Joshi, and T. Adali, "Independent Component Analysis for Trustworthy Cyberspace during High Impact Events: An Application to Covid-19", Article, arXiv:2006.01284 [cs.LG], June 2020, 40 downloads.
  6. A. Piplai, S. Chukkapalli, and A. Joshi, "NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion", InProceedings, 6th IEEE International Conference on Big Data Security on Cloud, May 2020, 80 downloads.
  7. S. Dutta, S. Chukkapalli, M. Sulgekar, S. Krithivasan, P. K. Das, and A. Joshi, "Context Sensitive Access Control in Smart Home Environments", InProceedings, 6th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2020), May 2020, 521 downloads.
  8. D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Managing Cybersecurity at the Grassroots: Evidence from the First Nationwide Survey of Local Government Cybersecurity", Article, Journal of Urban Affairs, April 2020.
  9. S. Chukkapalli, A. Piplai, S. Mittal, M. Gupta, and A. Joshi, "A Smart-Farming Ontology for Attribute Based Access Control", InProceedings, 6th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2020), March 2020, 253 downloads.

2019

  1. N. Khurana, S. Mittal, A. Piplai, and A. Joshi, "Preventing Poisoning Attacks on AI based Threat Intelligence Systems", InProceedings, IEEE Machine Learning for Signal Processing, September 2019, 586 downloads.
  2. O. M. Singh, A. Padia, and A. Joshi, "Named Entity Recognition for Nepali Language", Article, arXiv:1908.05828 [cs.CL], August 2019, 257 downloads.
  3. A. Diaz, A. Sherman, and A. Joshi, "Phishing in an academic community: A study of user susceptibility and behavior", Article, Crypologia, August 2019, 135 downloads.
  4. S. K. Singh, R. Bose, and A. Joshi, "Energy theft detection for AMI using principal component analysis based reconstructed data", Article, IET Cyber-Physical Systems: Theory & Applications, June 2019, 48 downloads.
  5. A. Pingle, A. Piplai, S. Mittal, A. Joshi, J. Holt, and R. Zak, "RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement", InProceedings, IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2019), May 2019, 352 downloads.
  6. S. Ramapatruni, S. N. Narayanan, S. Mittal, A. Joshi, and K. P. Joshi, "Anomaly Detection Models for Smart Home Security", InProceedings, 5th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2019), April 2019, 769 downloads.
  7. D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Cyberattacks at the Grass Roots: American Local Governments and the Need for High Levels of Cybersecurity", Article, Public Administration Review, February 2019, 332 downloads.

2018

  1. S. N. Narayanan, K. Khanna, B. K. Panigrahi, and A. Joshi, "Security in Smart Cyber-Physical Systems: A Case Study on Smart Grids and Smart Cars", InBook, Smart Cities Cybersecurity and Privacy, December 2018, 66 downloads.
  2. P. Ranade, S. Mittal, A. Joshi, and K. P. Joshi, "Using Deep Neural Networks to Translate Multi-lingual Threat Intelligence", InProceedings, IEEE Intelligence and Security Informatics (IEEE ISI) 2018, November 2018, 693 downloads.
  3. A. Renjan, K. P. Joshi, S. N. Narayanan, and A. Joshi, "DAbR: Dynamic Attribute-based Reputation scoring for Malicious IP Address Detection", InProceedings, IEEE Intelligence and Security Informatics (IEEE ISI) 2018, November 2018, 862 downloads.
  4. P. Ranade, S. Mittal, A. Joshi, and K. P. Joshi, "Understanding Multi-lingual Threat Intelligence for AI based Cyber-defense Systems", InProceedings, IEEE International Symposium on Technologies for Homeland Security, October 2018, 428 downloads.
  5. S. N. Narayanan, A. Ganesan, K. P. Joshi, T. Oates, A. Joshi, and T. Finin, "Early Detection of Cybersecurity Threats Using Collaborative Cognition", InProceedings, Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing (CIC), October 2018, 1328 downloads.
  6. D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Cybersecurity at the Grassroots: American Local Governments and the Challenges of Internet Security", Article, Journal of Homeland Security and Emergency Management, September 2018.
  7. L. Neil, S. Mittal, and A. Joshi, "Mining Threat Intelligence about Open-Source Projects and Libraries from Code Repository Issues and Bug Reports", InProceedings, IEEE Intelligence and Security Informatics (IEEE ISI) 2018, September 2018, 737 downloads.
  8. V. Rathode, S. N. Narayanan, S. Mittal, and A. Joshi, "Semantically Rich, Context Aware Access Control for Openstack", InProceedings, 4th International Conference on Collaboration and Internet Computing, September 2018, 419 downloads.
  9. A. Padia, A. Roy, T. W. Satyapanich, F. Ferraro, S. Pan, Y. Park, A. Joshi, and T. Finin, "UMBC at SemEval-2018 Task 8: Understanding Text about Malware", InProceedings, Proceedings of International Workshop on Semantic Evaluation (SemEval-2018), June 2018, 653 downloads.

2017

  1. S. K. Singh, R. Bose, and A. Joshi, "Entropy Based Electricity Theft Detection in AMI Network", Article, IET Cyber-Physical Systems: Theory and Applications, October 2017, 801 downloads.
  2. P. K. Das, A. Joshi, and T. Finin, "Personalizing context-aware access control on mobile platforms", InProceedings, 3rd IEEE International Conference on Collaboration and Internet Computing, October 2017, 1003 downloads.
  3. K. Khanna and A. Joshi, "AI based approach to identify compromised meters in data integrity attacks on smart grid", Article, IET Generation, Transmission and Distribution, October 2017, 536 downloads.
  4. S. Mittal, A. Joshi, and T. Finin, "Thinking, Fast and Slow: Combining Vector Spaces and Knowledge Graphs", Article, CoRR, August 2017, 336 downloads.
  5. S. Mittal, A. Gupta, K. P. Joshi, C. Pearce, and A. Joshi, "A Question and Answering System for Management of Cloud Service Level Agreements", InProceedings, IEEE International Conference on Cloud Computing, June 2017, 750 downloads.
  6. S. K. Singh, K. Khanna, R. Bose, and A. Joshi, "Joint transformation based detection of false data injection attacks in smart grid", Article, IEEE Transactions on Industrial Informatics, June 2017, 811 downloads.
  7. K. Khanna and A. Joshi, "Bi-level Modelling of False Data Injection Attacks on Security Constrained Optimal Power Flow", Article, IET Generation, Transmission and Distribution, June 2017, 484 downloads.
  8. D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Cybersecurity Challenges to American Local Governments", InProceedings, Proceedings of 17th European Conference on Digital Government , June 2017, 760 downloads.
  9. K. Chopra, R. Bose, and A. Joshi, "Secure Power Trading in Cooperative Relay Network With Asymmetric Cournot Duopoly Model", InProceedings, 12th Annual Symposium On Information Assurance (ASIA’17), May 2017, 534 downloads.
  10. P. K. Das, A. Joshi, and T. Finin, "App behavioral analysis using system calls", InProceedings, 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS): MobiSec 2017: Security, Privacy, and Digital Forensics of Mobile Systems and Networks, May 2017, 1125 downloads.
  11. K. Chopra, R. Bose, and A. Joshi, "Secrecy Outage of Cooperative Relay Network With and Without Eavesdropper's Direct Link", InProceedings, 23rd National Conference on Communications (NCC), March 2017, 531 downloads.
  12. K. Chopra, R. Bose, and A. Joshi, "Secrecy Performance of Threshold-Based Decode-and-Forward Cooperative Cognitive Radio Network", Article, IET Communications 2017, February 2017, 450 downloads.

2016

  1. K. Khanna and A. Joshi, "Bid Modification Attack in Smart Grid for Monetary Benefits", InProceedings, 2016 IEEE International Symposium on Nanoelectronic and Information Systems (iNIS), December 2016, 452 downloads.
  2. K. P. Joshi, A. Gupta, S. Mittal, C. Pearce, A. Joshi, and T. Finin, "Semantic Approach to Automating Management of Big Data Privacy Policies", InProceedings, IEEE BigData 2016, December 2016, 1614 downloads.
  3. K. Khanna, R. Bose, and A. Joshi, "On Detecting False Data Injection with Limited Network Information using Statistical Techniques", InProceedings, IEEE Power and Energy Society General Meeting, Chicago, 2017, November 2016, 481 downloads.
  4. K. Chopra, R. Bose, and A. Joshi, "Secrecy Outage Performance of Cooperative Relay Network With Diversity Combining", InProceedings, IEEE 2nd International Conference on Signal and Image Processing (ICSIP’17), November 2016, 643 downloads.
  5. P. K. Das, A. Joshi, and T. Finin, "Capturing policies for fine-grained access control on mobile devices", InProceedings, 2nd IEEE International Conference on Collaboration and Internet Computing (CIC 2016), Pittsburgh, PA, USA, November 1-3, 2016, November 2016, 956 downloads.
  6. P. K. Das, D. Ghosh, P. Jagtap, A. Joshi, and T. Finin, "Preserving User Privacy and Security in Context-Aware Mobile Platforms", InBook, Mobile Application Development, Usability, and Security, October 2016, 1020 downloads.
  7. P. K. Das, A. L. Kashyap, G. Singh, C. Matuszek, T. Finin, and A. Joshi, "Semantic knowledge and privacy in the physical web", InProceedings, Proceedings of the 4th Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn2016) co-located with 15th International Semantic Web Conference (ISWC 2016), October 2016, 1677 downloads.
  8. K. P. Joshi, A. Gupta, S. Mittal, C. Pearce, A. Joshi, and T. Finin, "ALDA : Cognitive Assistant for Legal Document Analytics", InProceedings, AAAI Fall Symposium 2016, September 2016, 908 downloads.
  9. S. N. Narayanan, S. Mittal, and A. Joshi, "Using Semantic Technologies to Mine Vehicular Context for Security", InProceedings, 37th IEEE Sarnoff Symposium (2016), September 2016, 1124 downloads.
  10. K. Khanna, B. K. Panigrahi, and A. Joshi, "Data Integrity Attack in Smart Grid: Optimized Attack to Gain Monetary Economic Profit", Article, IET Transactions on Generation, Transmission and Distribution, September 2016, 1101 downloads.
  11. P. Jain, P. Kumaraguru, and A. Joshi, "Other Times, Other Values: Leveraging Attribute History to Link User Profiles across Online Social Networks", Article, Social Network Analysis and Mining, September 2016, 953 downloads.
  12. S. Mittal, P. K. Das, V. Mulwad, A. Joshi, and T. Finin, "CyberTwitter: Using Twitter to generate alerts for Cybersecurity Threats and Vulnerabilities", InProceedings, International Symposium on Foundations of Open Source Intelligence and Security Informatics, August 2016, 2571 downloads.
  13. B. Thuraisingham, M. Kantarcioglu, K. Hamlen, L. Khan, T. Finin, A. Joshi, T. Oates, and E. Bertino, "A Data Driven Approach for the Science of Cyber Security: Challenges and Directions", InProceedings, IEEE Conference on Information Reuse and Integration,, July 2016, 1117 downloads.
  14. P. Nimbalkar, V. Mulwad, N. Puranik, A. Joshi, and T. Finin, "Semantic Interpretation of Structured Log Files", InProceedings, 17th IEEE International Conference on Information Reuse and Integration, July 2016, 801 downloads.
  15. A. Gupta, S. Mittal, K. P. Joshi, C. Pearce, and A. Joshi, "Streamlining Management of Multiple Cloud Services", InProceedings, IEEE International Conference on Cloud Computing, June 2016, 1251 downloads.
  16. P. K. Das, S. N. Narayanan, N. K. Sharma, A. Joshi, K. P. Joshi, and T. Finin, "Context-Sensitive Policy Based Security in Internet of Things", InProceedings, 2016 IEEE International Conference on Smart Computing (SMARTCOMP), May 2016, 1458 downloads.
  17. S. N. Narayanan, S. Mittal, and A. Joshi, "OBD SecureAlert: An Anomaly Detection System for Vehicles", InProceedings, IEEE Workshop on Smart Service Systems (SmartSys 2016), May 2016, 1041 downloads.
  18. S. Mittal, K. P. Joshi, C. Pearce, and A. Joshi, "Automatic Extraction of Metrics from SLAs for Cloud Service Management", InProceedings, 2016 IEEE International Conference on Cloud Engineering (IC2E 2016), April 2016, 1214 downloads.
  19. K. Khanna and A. Joshi, "Feasibility and mitigation of false data injection attacks in smart grid", InProceedings, IEEE 6th International Conference on Power Systems (ICPS), 2016 , March 2016, 525 downloads.
  20. K. Chopra, R. Bose, and A. Joshi, "Duopoly Models for Power Trading in Secure Cooperative Relay Networks", InProceedings, IEEE National Conference on Communications (NCC 2016), February 2016, 659 downloads.
  21. M. L. Mathews, A. Joshi, and T. Finin, "Detecting Botnets Using a Collaborative Situational-aware IDPS", InProceedings, Second International Conference on Information Systems Security and Privacy, February 2016, 1337 downloads.
  22. Z. Syed, A. Padia, M. L. Mathews, T. Finin, and A. Joshi, "UCO: A Unified Cybersecurity Ontology", InProceedings, Proceedings of the AAAI Workshop on Artificial Intelligence for Cyber Security, February 2016, 2771 downloads.
  23. N. K. Sharma and A. Joshi, "Representing attribute based access control policies in OWL", InProceedings, Tenth International Conference on Semantic Computing (ICSC), February 2016, 1419 downloads.
  24. C. Grasso, A. Joshi, and E. Siegel, "Visualization of Pain Severity Events Using Semantic Structures", InProceedings, 10th International Conference on Semantic Computing, February 2016, 711 downloads.

2015

  1. S. Mittal, K. P. Joshi, C. Pearce, and A. Joshi, "Parallelizing Natural Language Techniques for Knowledge Extraction from Cloud Service Level Agreements", InProceedings, 2015 IEEE International Conference on Big Data, October 2015, 1164 downloads.
  2. A. Padia, T. Finin, and A. Joshi, "Attribute-based Fine Grained Access Control for Triple Stores", InProceedings, 3rd Society, Privacy and the Semantic Web - Policy and Technology workshop, 14th International Semantic Web Conference, October 2015, 1179 downloads.
  3. P. Pappachan, R. Yus, P. K. Das, S. Mehrotra, T. Finin, and A. Joshi, "Building a Mobile Applications Knowledge Base for the Linked Data Cloud", InProceedings, 1st International Workshop on Mobile Deployment of Semantic Technologies (MoDeST 2015), co-located with the 14th International Semantic Web Conference (ISWC 2015), Bethlehem, PA (USA), October 2015, 917 downloads.
  4. J. Sleeman, T. Finin, and A. Joshi, "Topic Modeling for RDF Graphs", InProceedings, 3rd International Workshop on Linked Data for Information Extraction, 14th International Semantic Web Conference, October 2015, 1205 downloads.
  5. C. Grasso, A. Joshi, and E. Siegel, "Beyond NER: Towards Semantics in Clinical Text", InProceedings, Biomedical Data Mining, Modeling, and Semantic Integration (BDM2I); co-located with the 14th International Semantic Web Conference (ISWC 2015), Bethlehem, PA (USA), October 2015, 700 downloads.
  6. P. Pappachan, R. Yus, P. K. Das, S. Mehrotra, T. Finin, and A. Joshi, "Mobipedia: Mobile Applications Linked Data", InProceedings, 14th International Semantic Web Conference (ISWC 2015), Bethlehem, PA (USA), October 2015, 936 downloads.
  7. W. Li, A. Joshi, and T. Finin, "SVM-CASE: An SVM-based Context Aware Security Framework for Vehicular Ad-hoc Networks", InProceedings, 82nd IEEE Vehicular Technology Conference, September 2015, 1118 downloads.
  8. P. Jain, P. Kumaraguru, and A. Joshi, "Other Times, Other Values: Leveraging Attribute History to Link User Profiles across Online Social Networks", InProceedings, 26th ACM Conference on Hypertext and Social Media (HT15), August 2015, 1095 downloads.
  9. L. Han, T. Finin, A. Joshi, and D. Cheng, "Querying RDF Data with Text Annotated Graphs", InProceedings, Proceedings of the 27th International Conference on Scientific and Statistical Database Management, June 2015, 1773 downloads.
  10. D. Norris, A. Joshi, and T. Finin, "Cybersecurity Challenges to American State and Local Governments", InProceedings, 15th European Conference on eGovernment, June 2015.
  11. D. Norris, A. Joshi, and T. Finin, "Cybersecurity Challenges to American State and Local Governments", InProceedings, 15th European Conference on eGovernment, June 2015, 825 downloads.
  12. L. Zavala, P. K. Murukannaiah, N. Poosamani, T. Finin, A. Joshi, I. Rhee, and M. Singh, "Platys: From Position to Place- Oriented Mobile Computing", Article, AI Magazine, June 2015, 957 downloads.
  13. J. Sleeman, T. Finin, and A. Joshi, "Entity Type Recognition for Heterogeneous Semantic Graphs", Article, AI Magazine, March 2015, 1252 downloads.

2014

  1. P. Pappachan, R. Yus, A. Joshi, and T. Finin, "Rafiki: A Semantic and Collaborative Approach to Community Health-care in Underserved Areas", InProceedings, 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2014), October 2014, 1233 downloads.
  2. R. Yus, P. Pappachan, P. K. Das, T. Finin, A. Joshi, and E. Mena, "Semantics for Privacy and Shared Context", InProceedings, Second International Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn 2014), Riva del Garda (Italy), October 2014, October 2014, 944 downloads.
  3. P. Pappachan, R. Yus, P. K. Das, T. Finin, E. Mena, and A. Joshi, "A Semantic Context-Aware Privacy Model for FaceBlock", InProceedings, Second International Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn 2014), Riva del Garda (Italy), October 2014, 2035 downloads.
  4. T. Finin, A. Joshi, P. Pappachan, R. Yus, P. K. Das, and E. Mena, "Privacy in a World of Mobile Devices", InProceedings, NSF Workshop on Big Data Security and Privacy, September 2014, 1033 downloads.
  5. V. Mulwad, T. Finin, and A. Joshi, "Interpreting Medical Tables as Linked Data to Generate Meta-Analysis Reports", InProceedings, Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, August 2014, 960 downloads.
  6. R. Yus, P. Pappachan, P. K. Das, E. Mena, A. Joshi, and T. Finin, "FaceBlock: Privacy-Aware Pictures for Google Glass", InProceedings, Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services, June 2014, 2575 downloads.
  7. V. Korolev and A. Joshi, "PROB: A tool for Tracking Provenance and Reproducibility of Big Data Experiments", InProceedings, Reproduce '14. HPCA 2014, March 2014, 1406 downloads.

2013

  1. V. Korolev, M. A. Grasso, and A. Joshi, "On Use of Machine Learning Techniques and Genotypes for Prediction of Chronic Diseases", InProceedings, AMIA Annual Symposium, November 2013.
  2. D. Dhariwal, A. Joshi, and M. A. Grasso, "Text and Ontology Driven Clinical Decision Support System", Proceedings, American Medical Informatics Association (AMIA) Annual Symposium, October 2013, 904 downloads.
  3. P. K. Das, A. Joshi, and T. Finin, "Energy efficient sensing for managing context and privacy on smartphones", InProceedings, First Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn 2013) co-located with the 12th International Semantic Web Conference (ISWC 2013), Sydney, Australia., October 2013, 1055 downloads.
  4. V. Mulwad, T. Finin, and A. Joshi, "Semantic Message Passing for Generating Linked Data from Tables", InProceedings, Proceedings of the 12th International Semantic Web Conference, October 2013, 1838 downloads.
  5. A. Joshi, R. Lal, T. Finin, and A. Joshi, "Extracting cybersecurity related linked data from text", InProceedings, Proceedings of the 7th IEEE International Conference on Semantic Computing, September 2013, 1825 downloads.
  6. P. Sharma, A. Joshi, and T. Finin, "Detecting Data Exfiltration by Integrating Information Across Layers", InProceedings, 14th IEEE International Conference on Information Reuse and Integration, August 2013, 1540 downloads.
  7. P. K. Das, D. Ghosh, A. Joshi, and T. Finin, "ACM HotMobile 2013 Poster: An Energy Efficient Semantic Context Model for Managing Privacy on Smartphones", Article, SIGMOBILE Mob. Comput. Commun. Rev., July 2013, 4302 downloads.
  8. W. Li, A. Joshi, and T. Finin, "CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using Policies", Article, Distributed and Parallel Databases, June 2013, 1462 downloads.
  9. L. Han, T. Finin, P. McNamee, A. Joshi, and Y. Yesha, "Improving Word Similarity by Augmenting PMI with Estimates of Word Polysemy", Article, IEEE Transactions on Knowledge and Data Engineering (TKDE), June 2013, 2222 downloads.
  10. P. Jain, P. Kumaraguru, and A. Joshi, "@I seek 'fb.me': Identifying Users across Multiple Online Social Networks", InProceedings, Second International Workshop on Web of Linked Entities (WoLE), May 2013, 1519 downloads.
  11. H. Lamba, P. Kumaraguru, and A. Joshi, "Faking Sandy: Characterizing and Identifying Fake Images on Twitter during Hurricane Sandy", InProceedings, Second International Workshop on Privacy and Security in Online Social Media (PSOSM), May 2013, 3459 downloads.

2012

  1. A. Joshi and P. Kumaraguru, "Identifying and characterizing user communities on Twitter during crisis events", InProceedings, Proceedings of the 2012 workshop on Data-driven user behavioral modelling and mining from social media, October 2012, 1202 downloads.
  2. M. L. Mathews, P. Halvorsen, A. Joshi, and T. Finin, "A Collaborative Approach to Situational Awareness for CyberSecurity", InProceedings, 8th IEEE Int. Conf. on Collaborative Computing: Networking, Applications and Worksharing, October 2012, 1651 downloads.
  3. L. Han, T. Finin, and A. Joshi, "Schema-Free Structured Querying of DBpedia Data", InProceedings, Proceedings of the 21st ACM Conference on Information and Knowledge Management (CIKM), August 2012, 1382 downloads.
  4. K. P. Joshi, T. Finin, Y. Yesha, A. Joshi, N. Golpayegani, and N. Adam, "A Policy-based Approach to Smart Cloud Services", InProceedings, Proceedings of the Annual Service Research and Innovation Institute Global Conference, July 2012, 1464 downloads.
  5. V. Mulwad, T. Finin, and A. Joshi, "A Domain Independent Framework for Extracting Linked Semantic Data from Tables", InCollection, Search Computing - Broadening Web Search, July 2012, 1445 downloads.
  6. S. More, M. L. Mathews, A. Joshi, and T. Finin, "A Semantic Approach to Situational Awareness for Intrusion Detection", InProceedings, Proceedings of the National Symposium on Moving Target Research, June 2012, 2758 downloads.
  7. W. Li, J. Parker, and A. Joshi, "Security Through Collaboration and Trust in MANETs", Article, Mobile Networks and Applications (MONET), June 2012.
  8. S. More, M. L. Mathews, A. Joshi, and T. Finin, "A Knowledge-Based Approach To Intrusion Detection Modeling", InProceedings, Proceedings of the IEEE Workshop on Semantic Computing and Security, May 2012, 1952 downloads.
  9. D. Ghosh, A. Joshi, T. Finin, and P. Jagtap, "Privacy control in smart phones using semantically rich reasoning and context modeling", InProceedings, Proceedings of the IEEE Workshop on Semantic Computing and Security, May 2012, 1207 downloads.
  10. K. P. Joshi, Y. Yesha, T. Finin, and A. Joshi, "Policy based Cloud Services on a VCL platform", InProceedings, Proceedings of the first International IBM Cloud Academy Conference (ICA CON 2012), April 2012, 2335 downloads.
  11. A. Joshi, T. Finin, K. P. Joshi, and M. Oberoi, "A Policy Driven Semantic Approach to Data Usage Management", InProceedings, DUMW Workshop in conjunction with WWW 2012, April 2012, 1237 downloads.
  12. A. Lahane, Y. Yesha, M. A. Grasso, A. Joshi, and e., "Detection of Unsafe Action from Laparoscopic Cholecystectomy Video", InProceedings, Proceedings of ACM SIGHIT International Health Informatics Symposium, January 2012, 1407 downloads.
  13. W. Li, P. A. Kodeswaran, P. Jagtap, A. Joshi, and T. Finin, "Managing and Securing Critical Infrastructure - A Semantic Policy and Trust Driven Approach", InBook, Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges, January 2012, 1288 downloads.

2011

  1. L. Han, T. Finin, and A. Joshi, "GoRelations: An Intuitive Query System for DBpedia", InProceedings, Proceedings of the Joint International Semantic Technology Conference, December 2011, 2032 downloads.
  2. V. Mulwad, T. Finin, and A. Joshi, "Automatically Generating Government Linked Data from Tables", InCollection, Working notes of AAAI Fall Symposium on Open Government Knowledge: AI Opportunities and Challenges, November 2011, 2884 downloads.
  3. W. Li, A. Joshi, and T. Finin, "SAT: an SVM-based Automated Trust Management System for Mobile Ad-hoc Networks", InProceedings, Proceedings of the 2011 Military Communications Conference, November 2011, 1572 downloads.
  4. A. Iyengar, T. Finin, and A. Joshi, "Content-based prediction of temporal boundaries for events in Twitter", InProceedings, Proceedings of the Third IEEE International Conference on Social Computing, October 2011, 1815 downloads.
  5. M. Oberoi, P. Jagtap, A. Joshi, T. Finin, and L. Kagal, "Information Integration and Analysis: A Semantic Approach to Privacy", InProceedings, Proc. Third IEEE International Conference on Information Privacy, Security, Risk and Trust, October 2011, 1377 downloads.
  6. P. Jagtap, A. Joshi, T. Finin, and L. Zavala, "Preserving Privacy in Context-Aware Systems", InProceedings, Proceedings of the Fifth IEEE International Conference on Semantic Computing, October 2011, 1520 downloads.
  7. V. Mulwad, T. Finin, and A. Joshi, "Generating Linked Data by Inferring the Semantics of Tables", InProceedings, Proceedings of the First International Workshop on Searching and Integrating New Web Data Sources, September 2011, 2898 downloads.
  8. V. Mulwad, W. Li, A. Joshi, T. Finin, and K. Viswanathan, "Extracting Information about Security Vulnerabilities from Web Text", InProceedings, Proceedings of the Web Intelligence for Information Security Workshop, August 2011, 2807 downloads.
  9. L. Zavala, R. Dharurkar, P. Jagtap, T. Finin, and A. Joshi, "Mobile, Collaborative, Context-Aware Systems", InProceedings, Proceedings of the AAAI Workshop on Activity Context Representation: Techniques and Languages , August 2011, 2519 downloads.
  10. W. Li, A. Joshi, and T. Finin, "ATM: Automated Trust Management for Mobile Ad-hoc Networks Using Support Vector Machine", InProceedings, 12th IEEE International Conference on Mobile Data Management (MDM 2011), June 2011, 1455 downloads.
  11. W. Li, P. Jagtap, L. Zavala, A. Joshi, and T. Finin, "CARE-CPS: Context-Aware tRust Evaluation for Wireless Networks in Cyber-Physical System Using Policies", InProceedings, Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks, June 2011, 1878 downloads.
  12. A. Jitendra, A. Joshi, and e., "Two-stream indexing for spoken web search", InProceedings, Proceedings of the 20th international conference companion on world wide web, April 2011, 1166 downloads.
  13. K. P. Joshi, A. Joshi, and Y. Yesha, "Managing the Quality of Virtualized Services", InProceedings, Proceedings of the SRII Global Conference 2011, March 2011, 1461 downloads.
  14. A. Gupta, K. Viswanathan, A. Joshi, T. Finin, and P. Kumaraguru, "Integrating Linked Open Data with Unstructured Text for Intelligence Gathering Tasks", InProceedings, Proceedings of the Eighth International Workshop on Information Integration on the Web, March 2011, 1467 downloads.
  15. P. A. Kodeswaran, S. B. Kodeswaran, A. Joshi, and T. Finin, "Enforcing security in semantics driven policy based networks", Article, Computer Standards and Interfaces, January 2011, 1633 downloads, 1 citation.

2010

  1. V. Mulwad, T. Finin, Z. Syed, and A. Joshi, "Using linked data to interpret tables", InProceedings, Proceedings of the the First International Workshop on Consuming Linked Data, November 2010, 2547 downloads, 7 citations.
  2. V. Mulwad, T. Finin, Z. Syed, and A. Joshi, "T2LD: Interpreting and Representing Tables as Linked Data", InProceedings, Proceedings of the Poster and Demonstration Session at the 9th International Semantic Web Conference, CEUR Workshop Proceedings, November 2010, 4385 downloads, 2 citations.
  3. P. A. Kodeswaran, F. Perich, W. Li, A. Joshi, and T. Finin, "Enforcing Secure and Robust Routing with Declarative Policies", InProceedings, Proceedings of the 2010 Military Communications Conference, October 2010, 1626 downloads, 1 citation.
  4. P. A. Kodeswaran, A. Joshi, T. Finin, and F. Perich, "A Declarative Approach for Secure and Robust Routing", InProceedings, Proceedings of the 3rd ACM Workshop on Assurable & Usable Security Configuration , October 2010, 1963 downloads.
  5. R. Schauer and A. Joshi, "A Probabilistic Approach to Distributed System Management", InProceedings, Proceedings of the Seventh International Conference on Autonomic Computing, June 2010, 1509 downloads.
  6. K. P. Joshi, A. Joshi, T. Finin, and Y. Yesha, "Policy Driven Negotiations for Managing Virtualized Services on the Cloud", InProceedings, Proceedings of 19th Annual Frontiers in Service Conference, Sweden, June 2010, June 2010, 1139 downloads.
  7. W. Li, A. Joshi, and T. Finin, "Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-Dimensional Trust Management Approach", InProceedings, The 11th International Conference on Mobile Data Management (MDM 2010), May 2010, 2694 downloads, 7 citations.
  8. P. A. Kodeswaran, A. Joshi, T. Finin, and F. Perich, "Correcting Routing Failures Using Declarative Policies and Argumentation", InProceedings, Seventh USENIX Symposium on Networked Systems Design and Implementation, April 2010, 2000 downloads.
  9. Z. Syed, T. Finin, V. Mulwad, and A. Joshi, "Exploiting a Web of Semantic Data for Interpreting Tables", InProceedings, Proceedings of the Second Web Science Conference, April 2010, 4695 downloads, 6 citations.

2009

  1. P. A. Kodeswaran and A. Joshi, "Towards a Declarative Framework For Managing Application and Network Adaptations", Proceedings, IEEE GlobeCom, December 2009, 1614 downloads.
  2. M. A. Grasso, T. Finin, X. Zhu, A. Joshi, and Y. Yesha, "Video Summarization of Laparoscopic Cholecystectomies", InProceedings, Proceedings of the AMIA 2009 Annual Symposium, November 2009, 1825 downloads.
  3. J. Martineau, T. Finin, A. Joshi, and S. Patel, "Improving Binary Classification on Text Problems using Differential Word Features", InProceedings, Proceedings of the 18th ACM Conference on Information and Knowledge Management, November 2009, 4471 downloads, 4 citations.
  4. K. P. Joshi, A. Joshi, and Y. Yesha, "Quality metrics for Virtualized IT Services on the Cloud", InProceedings, Proceedings of 18th Annual Frontiers in Service Conference, Hawaii, 2009, October 2009.
  5. L. Han, T. Finin, A. Joshi, and Y. Yesha, "Data Integration for E-Science Using Correlated Concepts", InProceedings, Microsoft eScience Workshop 2009, September 2009.
  6. W. Li, A. Joshi, and T. Finin, "Policy-based Malicious Peer Detection in Ad Hoc Networks", InProceedings, Proceedings of the 2009 International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2009), August 2009, 2569 downloads, 4 citations.
  7. W. Li and A. Joshi, "Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory", InProceedings, 10th International Conference on Mobile Data Management (MDM 2009), May 2009, 1754 downloads, 7 citations.

2008

  1. W. Li, J. Parker, and A. Joshi, "Security through Collaboration in MANETs", InProceedings, Proceedings of The 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2008), November 2008, 1958 downloads, 1 citation.
  2. S. Gupta, A. Joshi, and T. Finin, "A Framework for Secure Knowledge Management in Pervasive Computing", InProceedings, Proceedings of the Workshop on Secure Knowledge Management, November 2008, 1946 downloads.
  3. A. Joshi, T. Finin, L. Kagal, J. Parker, and A. Patwardhan, "Security Policies and Trust in Ubiquitous Computing", Article, Philosophical Transactions of the Royal Society A, October 2008, 2426 downloads, 1 citation.
  4. L. Han, T. Finin, C. Parr, J. Sachs, and A. Joshi, "RDF123: from Spreadsheets to RDF", InProceedings, Seventh International Semantic Web Conference, October 2008, 5821 downloads, 26 citations.
  5. O. Walavalkar, A. Joshi, T. Finin, and Y. Yesha, "Streaming Knowledge Bases", InProceedings, Proceedings of the Fourth International Workshop on Scalable Semantic Web knowledge Base Systems, October 2008, 3496 downloads, 4 citations.
  6. Z. Syed, T. Finin, and A. Joshi, "Wikitology: Wikipedia as an ontology", InProceedings, Proceedings of the Grace Hopper Celebration of Women in Computing Conference, October 2008.
  7. T. Finin, A. Joshi, P. Kolari, A. Java, A. Kale, and A. Karandikar, "The Information ecology of social media and online communities", Article, AI Magazine, September 2008, 6223 downloads, 11 citations.
  8. A. Java, A. Joshi, and T. Finin, "Detecting Commmunities via Simultaneous Clustering of Graphs and Folksonomies", InProceedings, Proceedings of the Tenth Workshop on Web Mining and Web Usage Analysis (WebKDD), August 2008, 6293 downloads, 5 citations.
  9. S. Gupta, A. Joshi, and A. Patwardhan, "Query Distribution Estimation and Predictive Caching in Mobile Ad Hoc Networks", InProceedings, Proceedings of the Seventh International ACM Workshop on Data Engineering for Wireless and Mobile Access, June 2008, 2392 downloads, 1 citation.
  10. T. Finin, A. Joshi, L. Kagal, J. Niu, R. Sandhu, W. H. Winsborough, and B. Thuraisingham, "ROWLBAC - Representing Role Based Access Control in OWL", InProceedings, Proceedings of the 13th Symposium on Access control Models and Technologies, June 2008, 6869 downloads, 61 citations.
  11. P. A. Kodeswaran, S. B. Kodeswaran, A. Joshi, and F. Perich, "Utilizing semantic policies for managing BGP route dissemination", InProceedings, Automated Network Management (INFOCOM workshops), April 2008, 1429 downloads.
  12. P. A. Kodeswaran, S. B. Kodeswaran, A. Joshi, and T. Finin, "Enforcing security in semantics driven policy based networks", InProceedings, Proceedings of the 24th International Conference on Data Engineering Workshops, Secure Semantic Web, April 2008, 2094 downloads.
  13. T. Finin, A. Joshi, L. Kagal, J. Niu, R. Sandhu, W. H. Winsborough, and B. Thuraisingham, "Role Based Access Control and OWL", InProceedings, Proceedings of the fourth OWL: Experiences and Directions Workshop, April 2008, 2845 downloads.
  14. A. A. Nanavati, R. Singh, D. Chakraborty, K. Dasgupta, S. Mukherjea, G. Gurumurthy, and A. Joshi, "Analyzing the Structure and Evolution of Massive Telecom Graphs", Article, IEEE Transactions on Knowledge and Data Engineering, March 2008, 2962 downloads.
  15. A. Java, A. Joshi, and T. Finin, "Approximating the Community Structure of the Long Tail", InProceedings, Proceedings of the Second International Conference on Weblogs and Social Media (ICWSM 2008), March 2008, 5121 downloads, 4 citations.
  16. A. Karandikar, A. Java, A. Joshi, T. Finin, Y. Yesha, and Y. Yesha, "Second Space: A Generative Model For The Blogosphere", InProceedings, Proceedings of the International Conference on Weblogs and Social Media (ICWSM 2008), March 2008, 4446 downloads, 1 citation.
  17. Z. Syed, T. Finin, and A. Joshi, "Wikipedia as an Ontology for Describing Documents", InProceedings, Proceedings of the Second International Conference on Weblogs and Social Media, March 2008, 8918 downloads, 34 citations.
  18. K. Dasgupta, R. Singh, B. Vishwanathan, D. Chakraborty, A. Joshi, S. Mukherjea, and A. A. Nanavati, "Social ties and their relevance to churn in mobile telecom networks", InProceedings, Proceedings of the 11th international conference on Extending database technology: Advances in database technology, March 2008, 2463 downloads.
  19. B. Aleman-Meza, M. Nagarajan, L. Ding, A. Sheth, B. Arpinar, A. Joshi, and T. Finin, "Scalable semantic analytics on social networks for addressing the problem of conflict of interest detection", Article, ACM Transactions on the Web, February 2008, 2754 downloads, 14 citations.

2007

  1. S. B. Kodeswaran, O. V. Ratsimor, F. Perich, and A. Joshi, "Utilizing Semantic Tags for Policy Based Networking", InProceedings, IEEE Globecom 2007 Internet Protocol Symposium, November 2007, 2476 downloads, 6 citations.
  2. A. Java, S. Nirenburg, M. McShane, T. Finin, J. English, and A. Joshi, "Using a Natural Language Understanding System to Generate Semantic Web Content", Article, International Journal on Semantic Web and Information Systems, November 2007, 3270 downloads, 13 citations.
  3. A. Joshi, T. Finin, A. Java, A. Kale, and P. Kolari, "Web 2.0 Mining: Analyzing Social Media", InProceedings, Proceedings of the NSF Symposium on Next Generation of Data Mining and Cyber-Enabled Discovery for Innovation, October 2007, 5196 downloads, 5 citations.
  4. S. Agarwal, A. Joshi, T. Finin, Y. Yesha, and T. Ganous, "A Pervasive Computing System for the Operating Room of the Future", Article, Mobile Networks and Applications, August 2007, 3304 downloads.
  5. P. Ordonez, P. A. Kodeswaran, V. Korolev, W. Li, O. Walavalkar, A. Joshi, T. Finin, Y. Yesha, and I. George, "A Ubiquitous Context-Aware Environment for Surgical Training", InProceedings, Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems, August 2007, 2181 downloads, 1 citation.
  6. J. Martineau, A. Java, P. Kolari, A. Joshi, T. Finin, and J. Mayfield, "BlogVox: Learning Sentiment Classifiers", InProceedings, Proceedings of the Twenty-Second AAAI Conference on Artificial Intelligence, July 2007, 1731 downloads, 2 citations.
  7. A. Patwardhan, J. Parker, M. Iorga, A. Joshi, T. Karygiannis, and Y. Yesha, "Threshold-based Intrusion Detection in Ad Hoc Networks and Secure AODV", Article, Ad Hoc Networks Journal (ADHOCNET), May 2007, 3003 downloads, 16 citations.
  8. S. Dornbush and A. Joshi, "StreetSmart Traffic: Discovering and Disseminating Automobile Congestion Using VANETs", InProceedings, Vehicular Technology Conference, April 2007, 3818 downloads, 40 citations.
  9. A. Java, P. Kolari, T. Finin, A. Joshi, and T. Oates, "Feeds That Matter: A Study of Bloglines Subscriptions", InProceedings, Proceedings of the International Conference on Weblogs and Social Media (ICWSM 2007), March 2007, 6274 downloads, 17 citations.
  10. A. Kale, A. Karandikar, P. Kolari, A. Java, and A. Joshi, "Modeling Trust and Influence in the Blogosphere Using Link Polarity", InProceedings, Proceedings of the International Conference on Weblogs and Social Media (ICWSM 2007), March 2007, 4498 downloads, 36 citations.
  11. P. Kolari, A. Java, and A. Joshi, "Spam in Blogs and Social Media, Tutorial", InProceedings, ICWSM 2007, March 2007, 3308 downloads, 3 citations.
  12. P. Kolari, T. Finin, A. Java, and A. Joshi, "Towards Spam Detection at Ping Servers", InProceedings, Proceedings of the International Conference on Weblogs and Social Media (ICWSM 2007), March 2007, 2418 downloads, 5 citations.
  13. A. Java, P. Kolari, T. Finin, A. Joshi, J. Martineau, and J. Mayfield, "The BlogVox Opinion Retrieval System", InProceedings, Proceedings of the Fifteenth Text REtrieval Conference (TREC 2006), February 2007, 4025 downloads, 7 citations.
  14. S. Dornbush, J. English, T. Oates, Z. Segall, and A. Joshi, "XPod: A Human Activity Aware Learning Mobile Music Player", InProceedings, Proceedings of the Workshop on Ambient Intelligence, 20th International Joint Conference on Artificial Intelligence (IJCAI-2007), January 2007, 3999 downloads, 13 citations.
  15. A. Java, P. Kolari, T. Finin, J. Mayfield, A. Joshi, and J. Martineau, "BlogVox: Separating Blog Wheat from Blog Chaff", InProceedings, Proceedings of the Workshop on Analytics for Noisy Unstructured Text Data, 20th International Joint Conference on Artificial Intelligence (IJCAI-2007), January 2007, 3380 downloads, 8 citations.
  16. P. Reddivari, T. Finin, and A. Joshi, "Policy-Based Access Control for an RDF Store", InProceedings, Proceedings of the IJCAI-07 Workshop on Semantic Web for Collaborative Knowledge Acquisition, January 2007, 7295 downloads, 34 citations.

2006

  1. P. Kolari, A. Java, T. Finin, J. Mayfield, A. Joshi, and J. Martineau, "Blog Track Open Task: Spam Blog Classification", InCollection, TREC 2006 Blog Track Notebook, November 2006, 7970 downloads, 11 citations.
  2. A. A. Nanavati, S. Gurumurthy, G. Das, D. Chakraborty, K. Dasgupta, S. Mukherjea, and A. Joshi, "On the Structural Properties of Massive Telecom Call Graphs: Findings and Implications", InProceedings, Proceedings of the 15th ACM international conference on Information and knowledge management, November 2006, 4636 downloads.
  3. T. Finin, L. Ding, and A. Joshi, "Information Integration and the Semantic Web", InProceedings, Notes from the Information Integration Workshop, October 2006, 5582 downloads, 2 citations.
  4. A. Patwardhan, A. Joshi, T. Finin, and Y. Yesha, "A Data Intensive Reputation Management Scheme for Vehicular Ad Hoc Networks", InProceedings, Second International Workshop on Vehicle-to-Vehicle Communications, Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services, July 2006, 3619 downloads, 10 citations.
  5. P. Kolari, A. Java, T. Finin, T. Oates, and A. Joshi, "Detecting Spam Blogs: A Machine Learning Approach", InProceedings, Proceedings of the 21st National Conference on Artificial Intelligence (AAAI 2006), July 2006, 10841 downloads, 75 citations.
  6. A. Patwardhan, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "Querying in Packs: Trustworthy Data Management in Ad Hoc Networks", Article, International Journal of Wireless Information Networks, June 2006, 3636 downloads, 5 citations.
  7. L. Kagal, T. Finin, A. Joshi, and S. Greenspan, "Security and Privacy Challenges in Open and Dynamic Environments", Article, Computer, June 2006, 2753 downloads.
  8. B. Aleman-Meza, M. Nagarajan, C. Ramakrishnan, A. Sheth, B. Arpinar, L. Ding, P. Kolari, A. Joshi, and T. Finin, "Semantic Analytics on Social Networks: Experiences in Addressing the Problem of Conflict of Interest Detection", InProceedings, Proceedings of the 15th International World Wide Web Conference,, May 2006, 3585 downloads, 106 citations.
  9. S. B. Kodeswaran and A. Joshi, "Content and Context Aware Networking Using Semantic Tagging", InProceedings, International Workshop on Semantics enabled Networks and Services, April 2006, 2511 downloads.
  10. P. Kolari, T. Finin, and A. Joshi, "SVMs for the Blogosphere: Blog Identification and Splog Detection", InProceedings, AAAI Spring Symposium on Computational Approaches to Analysing Weblogs, March 2006, 12821 downloads, 112 citations.
  11. D. Chakraborty, A. Joshi, and Y. Yesha, "Integrating service discovery with routing and session management for ad-hoc networks", Article, Ad Hoc Networks, March 2006, 26 citations.
  12. J. Parker, A. Patwardhan, F. Perich, A. Joshi, and T. Finin, "Trust in Pervasive Computing", Article, The Handbook of Mobile Middleware , February 2006, 1618 downloads, 1 citation.
  13. D. Chakraborty, A. Joshi, Y. Yesha, and T. Finin, "Toward Distributed Service Discovery in Pervasive Computing Environments", Article, IEEE Transactions on Mobile Computing , February 2006, 2658 downloads, 142 citations.
  14. J. Parker, A. Patwardhan, and A. Joshi, "Cross-layer Analysis for Detecting Wireless Misbehaviour", Proceedings, IEEE Consumer Communications and Networking Conference Special Sessions, January 2006, 3893 downloads, 13 citations.

2005

  1. T. Finin, L. Ding, L. Zhou, and A. Joshi, "Social Networking on the Semantic Web", Article, The Learning Organization, December 2005, 8115 downloads, 2 citations.
  2. A. Patwardhan, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "Active Collaborations for Trustworthy Data Management in Ad Hoc Networks", InProceedings, Proceedings of the 2nd IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, November 2005, 3181 downloads, 11 citations.
  3. L. Ding, R. Pan, T. Finin, A. Joshi, Y. Peng, and P. Kolari, "Finding and Ranking Knowledge on the Semantic Web", InProceedings, Proceedings of the 4th International Semantic Web Conference, November 2005, 12972 downloads, 130 citations.
  4. L. Ding, T. Finin, A. Joshi, Y. Peng, P. Pinheiro da Silva, and D. L. McGuinness, "Tracking RDF Graph Provenance using RDF Molecules", InProceedings, Proceedings of the 4th International Semantic Web Conference, November 2005, 6260 downloads, 47 citations.
  5. S. B. Kodeswaran and A. Joshi, "Using Location Information for Scheduling in 802.15.3 MAC", InProceedings, 2nd International Conference on Broadband Networks (BROADNETS 2005), October 2005, 3603 downloads.
  6. L. Ding, T. Finin, A. Joshi, Y. Peng, R. Pan, and P. Reddivari, "Search on the Semantic Web", Article, IEEE Computer, October 2005, 3625 downloads, 66 citations.
  7. T. Finin, L. Ding, R. Pan, A. Joshi, P. Kolari, A. Java, and Y. Peng, "Swoogle: Searching for knowledge on the Semantic Web", InProceedings, AAAI 05 (intelligent systems demo), July 2005, 5451 downloads, 35 citations.
  8. F. Perich, A. Joshi, and R. Chirkova, "Data Management for Mobile Ad-Hoc Networks", InBook, Enabling Technologies for Wireless e-Business Applications, July 2005, 4993 downloads, 2 citations.
  9. H. Chen, T. Finin, and A. Joshi, "The SOUPA Ontology for Pervasive Computing", InBook, Ontologies for Agents: Theory and Experiences, July 2005, 5725 downloads, 70 citations.
  10. P. Kolari, L. Ding, S. Ganjugunte, L. Kagal, A. Joshi, and T. Finin, "Enhancing Web Privacy Protection through Declarative Policies", InProceedings, Proceedings of the IEEE Workshop on Policy for Distributed Systems and Networks(POLICY 2005), June 2005, 7368 downloads, 27 citations.
  11. P. Reddivari, T. Finin, and A. Joshi, "Policy based Access Control for a RDF Store", InProceedings, Proceedings of the Policy Management for the Web Workshop, May 2005, 2908 downloads, 34 citations.
  12. F. Perich, A. Joshi, Y. Yesha, and T. Finin, "Collaborative Joins in a Pervasive Computing Environment", Article, VLDB Journal, April 2005, 3996 downloads, 15 citations.
  13. L. Ding, P. Kolari, T. Finin, A. Joshi, Y. Peng, and Y. Yesha, "On Homeland Security and the Semantic Web: A Provenance and Trust Aware Inference Framework", InProceedings, Proceedings of the AAAI SPring Symposium on AI Technologies for Homeland Security, March 2005, 4061 downloads, 32 citations.
  14. A. Patwardhan, J. Parker, A. Joshi, M. Iorga, and T. Karygiannis, "Secure Routing and Intrusion Detection in Ad Hoc Networks", InProceedings, Proceedings of the 3rd International Conference on Pervasive Computing and Communications, March 2005, 7067 downloads, 96 citations.
  15. L. Ding, L. Zhou, T. Finin, and A. Joshi, "How the Semantic Web is Being Used:An Analysis of FOAF Documents", InProceedings, Proceedings of the 38th International Conference on System Sciences, January 2005, 13694 downloads, 116 citations.
  16. T. Finin, J. Mayfield, C. Fink, A. Joshi, and R. S. Cost, "Information Retrieval and the Semantic Web", InProceedings, Proceedings of the 38th International Conference on System Sciences, January 2005, 16511 downloads, 51 citations.
  17. L. Ding, T. Finin, and A. Joshi, "Analyzing Social Networks on the Semantic Web", Article, IEEE Intelligent Systems, January 2005, 8602 downloads, 20 citations.
  18. D. Chakraborty, A. Joshi, T. Finin, and Y. Yesha, "Service Composition for Mobile Environments", Article, Journal on Mobile Networking and Applications, Special Issue on Mobile Services, January 2005, 4292 downloads, 67 citations.

2004

  1. L. Kagal, J. Parker, H. Chen, A. Joshi, and T. Finin, "Security, Privacy and Trust in Mobile Computing Environments", InBook, Handbook of Mobile Computing, Editors Imad Mahgoub and Mohammad Ilyas, December 2004, 3 citations.
  2. L. Ding, T. Finin, A. Joshi, R. Pan, R. S. Cost, Y. Peng, P. Reddivari, V. C. Doshi, and J. Sachs, "Swoogle: A Search and Metadata Engine for the Semantic Web", InProceedings, Proceedings of the Thirteenth ACM Conference on Information and Knowledge Management , November 2004, 28409 downloads, 467 citations.
  3. H. Chen, T. Finin, A. Joshi, F. Perich, D. Chakraborty, and L. Kagal, "Intelligent Agents Meet the Semantic Web in Smart Spaces", Article, IEEE Internet Computing, November 2004, 5085 downloads, 156 citations.
  4. L. Kagal, T. Finin, and A. Joshi, "Declarative Policies for Describing Web Service Capabilities and Constraints", InProceedings, W3C Workshop on Constraints and Capabilities for Web Services, October 2004, 7916 downloads, 23 citations.
  5. A. Patwardhan, V. Korolev, L. Kagal, and A. Joshi, "Enforcing Policies in Pervasive Environments", InProceedings, International Conference on Mobile and Ubiquitous Systems: Networking and Services, August 2004, 5320 downloads, 30 citations.
  6. F. Perich, L. Kagal, A. Joshi, T. Finin, and Y. Yesha, "In Reputation We Believe: Query Processing in Mobile Ad-Hoc Networks", InProceedings, International Conference on Mobile and Ubiquitous Systems: Networking and Services, August 2004, 4034 downloads, 32 citations.
  7. S. Avancha, C. Patel, and A. Joshi, "Ontology-driven Adaptive Sensor Networks", InProceedings, MobiQuitous 2004, August 2004, 4084 downloads, 18 citations.
  8. H. Chen, F. Perich, T. Finin, and A. Joshi, "SOUPA: Standard Ontology for Ubiquitous and Pervasive Applications", InProceedings, International Conference on Mobile and Ubiquitous Systems: Networking and Services, August 2004, 11355 downloads, 342 citations.
  9. P. Kolari and A. Joshi, "Web Mining - Research and Practice", Article, IEEE Computing in Science and Engineering - Web Engineering Special Issue, August 2004, 4126 downloads, 25 citations.
  10. H. Chen, F. Perich, D. Chakraborty, T. Finin, and A. Joshi, "Intelligent Agents Meet Semantic Web in a Smart Meeting Room", InProceedings, Proceedings of the Third International Joint Conference on Autonomous Agents & Multi Agent Systems (AAMAS 2004), July 2004, 5494 downloads, 81 citations.
  11. L. Ding, P. Kolari, S. Ganjugunte, T. XXXXX, and A. Joshi, "Modeling and Evaluating Trust Network Inference", InProceedings, Seventh International Workshop on Trust in Agent Societies at AAMAS 2004, July 2004, 4476 downloads, 31 citations.
  12. D. Chakraborty, A. Joshi, and Y. Yesha, "Towards Distributed Service Discovery in Pervasive Computing Environments", Article, IEEE Transactions on Mobile Computing, July 2004, 3323 downloads, 29 citations.
  13. F. Perich, A. Joshi, and Y. Yesha, "On Data Management in Pervasive Computing Environments", Article, IEEE Transactions on Knowledge and Data Engineering, May 2004, 5200 downloads, 82 citations.
  14. H. Chen and A. Joshi, "Building an Autonomous Broker Agent for Smart Meeting Rooms", InBook, Submitted to Robotics and Autonomous Systems, April 2004.
  15. H. Chen, T. Finin, and A. Joshi, "The SOUPA Ontology for Pervasive Computing", InBook, Ontologies for agents: Theory and experiences, April 2004, 1467 downloads, 70 citations.
  16. J. Parker, J. Pinkston, and A. Joshi, "On Intrusion Detection in Mobile Ad Hoc Networks", InProceedings, 23rd IEEE International Performance Computing and Communications Conference -- Workshop on Information Assurance , April 2004, 4623 downloads, 15 citations.
  17. D. Chakraborty, Y. Yesha, and A. Joshi, "A Distributed Service Composition Protocol for Pervasive Environments", Proceedings, Wireless Communcations and Networking Conference (WCNC), March 2004, 3082 downloads, 22 citations.
  18. D. Chakraborty, A. Joshi, and Y. Yesha, "Integrating Service Discovery with Routing and Session Management for Ad hoc Networks", Article, Ad Hoc Networks Journal by Elsevier Science, March 2004, 3509 downloads, 9 citations.
  19. H. Chen, T. Finin, and A. Joshi, "A Context Broker for Building Smart Meeting Rooms", Proceedings, Proceedings of the AAAI Symposium on Knowledge Representation and Ontology for Autonomous Systems Symposium, 2004 AAAI Spring Symposium, March 2004, 8702 downloads, 65 citations.
  20. H. Chen, T. Finin, and A. Joshi, "Semantic Web in in the Context Broker Architecture", InProceedings, Proceedings of the Second Annual IEEE International Conference on Pervasive Computer and Communications, March 2004, 10671 downloads, 183 citations.
  21. D. Chakraborty, A. Shenoi, Y. Yesha, Y. Yesha, and A. Joshi, "A Queueing Theoretic Model for Service Discovery in Ad-hoc Networks", InProceedings, Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), January 2004, 2988 downloads, 6 citations.
  22. J. Undercofer, A. Joshi, T. Finin, and J. Pinkston, "Using DAML+ OIL to classify intrusive behaviours", Article, Knowledge Engineering Review, January 2004, 1081 downloads, 3 citations.
  23. S. Avancha, A. Joshi, and J. Pinkston, "Security for Sensor Networks", InBook, Wireless Sensor Networks, January 2004, 3480 downloads, 52 citations.

2003

  1. J. Undercofer and A. Joshi, "Data Mining, Semantics and Intrusion Detection: What to dig for and Where to find it", InBook, Next Generation Data Mining, December 2003, 2 citations.
  2. S. Avancha, A. Joshi, and J. Pinkston, "Secure Sensor Networks for Perimeter Protection", Article, Computer Networks, November 2003, 3161 downloads, 30 citations.
  3. O. V. Ratsimor, D. Chakraborty, A. Joshi, T. Finin, and Y. Yesha, "Service Discovery in Agent-based in Pervasive Computing Environments", Article, Journal on Mobile Networking and Applications, November 2003, 2960 downloads, 38 citations.
  4. A. Kunjithapatham, M. Sheshagiri, T. Finin, A. Joshi, and Y. Peng, "Personal Agents on the Semantic Web", InProceedings, Proc. Second Int. Semantic Web Conf., October 2003, 919 downloads.
  5. F. Perich, A. Cedilnik, L. Kagal, and A. Joshi, "A Secure Infrastructure for Service Discovery and Access in Pervasive Computing", Article, ACM Monet: Special Issue on Security in Mobile Computing Environments, October 2003, 4110 downloads, 44 citations.
  6. H. Chen, T. Finin, and A. Joshi, "An Intelligent Broker for Context-Aware Systems", Article, Adjunct Proceedings of Ubicomp 2003, October 2003, 3839 downloads, 3 citations.
  7. S. Avancha, D. Chakraborty, F. Perich, and A. Joshi, "Data and Services for Mobile Computing", InBook, Handbook of Internet Computing, October 2003, 7081 downloads.
  8. H. Chen, T. Finin, and A. Joshi, "Semantic Web in a Pervasive Context-Aware Architecture", InProceedings, Workshop on Artificial Intelligence in Mobile System, 5th Annual Conf. on Ubiquitous Computing, October 2003, 7986 downloads, 65 citations.
  9. O. V. Ratsimor, T. Finin, A. Joshi, and Y. Yesha, "eNcentive: A Framework for Intelligent Marketing in Mobile Peer-To-Peer Environments", InProceedings, The 5th International Conference on Electronic Commerce (ICEC 2003), October 2003, 6303 downloads, 42 citations.
  10. D. Khushraj, T. Finin, and A. Joshi, "Semantic Tuple Spaces: A Coordination Infrastructure in Mobile Environments", InProceedings, Proceedings of the Second International Semantic Web Conference , September 2003, 3 citations.
  11. L. Kagal, T. Finin, and A. Joshi, "A Policy Based Approach to Security for the Semantic Web", InProceedings, 2nd International Semantic Web Conference (ISWC2003), September 2003, 10862 downloads, 218 citations.
  12. J. Undercofer, A. Joshi, and J. Pinkston, "Modeling Computer Attacks: An Ontology for Intrusion Detection", InProceedings, The Sixth International Symposium on Recent Advances in Intrusion Detection, September 2003, 4115 downloads, 19 citations.
  13. F. Perich, A. Joshi, and Y. Yesha, "Neighborhood-Consistent Transaction Management for Pervasive Computing Environments", InProceedings, 14th International Conference on Database and Expert Systems Applications (DEXA 2003), September 2003, 4410 downloads, 11 citations.
  14. H. Chen, T. Finin, and A. Joshi, "An Ontology for Context-Aware Pervasive Computing Environments", Article, Knowledge Engineering Review (Special Issue on Ontologies for Distributed Systems), September 2003, 7491 downloads, 614 citations.
  15. V. Hingne, A. Joshi, J. Michopoulos, and E. N. Houstis, "On the Grid and Sensor Networks", InProceedings, IEEE Fourth International Workshop on Grid Computing (GRID2003), August 2003, 15 citations.
  16. H. Chen, T. Finin, and A. Joshi, "An Ontology for Context-Aware Pervasive Computing Environments", Article, Workshop on Ontologies and Distributed Systems, August 2003, 6889 downloads, 614 citations.
  17. J. Undercofer, A. Joshi, T. Finin, and J. Pinkston, "A Target-Centric Ontology for Intrusion Detection", InProceedings, Workshop on Ontologies in Distributed Systems, held at The 18th International Joint Conference on Artificial Intelligence, July 2003, 1199 downloads, 50 citations.
  18. H. Chen, T. Finin, and A. Joshi, "Using OWL in a Pervasive Computing Broker", Article, Workshop on Ontologies in Agent Systems, AAMAS-2003, July 2003, 3099 downloads, 99 citations.
  19. L. Kagal, T. Finin, and A. Joshi, "A Policy Language for A Pervasive Computing Environment", InCollection, IEEE 4th International Workshop on Policies for Distributed Systems and Networks, June 2003, 4687 downloads, 341 citations.
  20. A. Choudhri, L. Kagal, A. Joshi, T. Finin, and Y. Yesha, "PatientService : Electronic Patient Record Redaction and Delivery in Pervasive Environments", InProceedings, Fifth International Workshop on Enterprise Networking and Computing in Healthcare Industry (Healthcom 2003), June 2003, 1238 downloads, 21 citations.
  21. A. Joshi, "On Web, Semantics, and Data Mining: Intrusion Detection as a Case Study", InProceedings, Proceedings of the NSF Workshop on Next Generation Data Mining, May 2003, 2945 downloads, 4 citations.
  22. A. Joshi and H. Shah, "Fuzzy Clustering for Intrusion Detection", InProceedings, Proceedings of the 12th IEEE International Conference on Fuzzy Systems, April 2003, 51 citations.
  23. V. Hingne, A. Joshi, T. Finin, H. Kargupta, and E. N. Houstis, "Towards a Pervasive Grid", InProceedings, Proceedings of the Int. Parallel and Distributed Processing Symposium , April 2003, 1253 downloads.
  24. S. B. Kodeswaran, O. V. Ratsimor, A. Joshi, T. Finin, and Y. Yesha, "Using Peer-to-Peer Data Routing for Infrastructure-based Wireless Networks", InProceedings, First IEEE International Conference on Pervasive Computing and Communications , March 2003, 2347 downloads, 11 citations.
  25. K. P. Joshi, A. Joshi, and Y. Yesha, "On Using a Warehouse to Analyze Web Logs", InCollection, Distributed and Parallel Databases, March 2003, 2618 downloads, 20 citations.
  26. S. Avancha, P. D'Souza, F. Perich, A. Joshi, and Y. Yesha, "P2P M-Commerce in Pervasive Environments", Article, ACM SIGecom Exchanges, January 2003, 4561 downloads, 16 citations.
  27. Y. Zou, T. Finin, Y. Peng, A. Joshi, and R. S. Cost, "Agent Communication in DAML World", InBook, Innovative Concepts for Agent-Based Systems, January 2003, 971 downloads.

2002

  1. D. Chakraborty and A. Joshi, "Anamika: Distributed Service Composition Architecture for Pervasive Computing Environments", Article, Mobile Computing Communications Review (MC2R), December 2002, 2864 downloads.
  2. T. Finin and A. Joshi, "Agents, Trust, and Information Access on the Semantic Web", Article, SIGMOD Record, December 2002, 1161 downloads.
  3. T. Finin, A. Joshi, L. Kagal, O. V. Ratsimor, S. Avancha, V. Korolev, H. Chen, F. Perich, and R. S. Cost, "Intelligent Agents for Mobile and Embedded Devices", Article, International Journal of Cooperative Information Systems, December 2002, 3573 downloads, 17 citations.
  4. S. Avancha, V. Korolev, A. Joshi, and Y. Yesha, "On Experiments with a Transport Protocol for Pervasive Computing Environments", Article, Computer Networks, November 2002, 2755 downloads, 3 citations.
  5. U. Shah, T. Finin, A. Joshi, J. Mayfield, and R. S. Cost, "Information retrieval on the semantic web", InProceedings, The ACM Conference on Information and Knowledge Management, November 2002, 3055 downloads, 147 citations.
  6. O. V. Ratsimor, S. B. Kodeswaran, T. Finin, A. Joshi, and Y. Yesha, "Combining Infrastructure and Ad hoc Collaboration For Data Management in Mobile Wireless Networks", InProceedings, Workshop on Ad hoc Communications and Collaboration in Ubiquitous Computing Environments, November 2002, 2937 downloads, 13 citations.
  7. S. B. Kodeswaran, O. V. Ratsimor, A. Joshi, and Y. Yesha, "Numi: A Framework for Collaborative Data Management in a Network of InfoStations", InProceedings, UMBC SRC, November 2002, 4563 downloads.
  8. S. Kumar, A. Kunjithapatham, M. Sheshagiri, T. Finin, A. Joshi, Y. Peng, and R. S. Cost, "A Personal Agent Application for the Semantic Web", InProceedings, AAAI 2002 Fall Symposium Series, November 2002, 3259 downloads, 14 citations.
  9. L. Kagal, V. Korolev, S. Avancha, A. Joshi, T. Finin, and Y. Yesha, "Centaurus : An Infrastructure for Service Management in Ubiquitous Computing", Article, ACM Wireless Networks Journal, November 2002, 2425 downloads, 19 citations.
  10. D. Chakraborty, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "A Reactive Service Composition Architecture for Pervasive Computing Environments", InProceedings, Seventh Personal Wireless Communications Conference (PWC 2002), October 2002, 3976 downloads, 82 citations.
  11. L. Kagal, F. Perich, A. Joshi, and T. Finin, "A Security Architecture Based on Trust Management for Pervasive Computing Systems", InProceedings, Grace Hopper Celebration of Women in Computing, October 2002, 5309 downloads, 30 citations.
  12. L. Kagal, V. Korolev, S. Avancha, A. Joshi, and T. Finin, "An Approach to Dynamic Service Management in Pervasive Computing", InProceedings, Proceedings of the Grace Hopper Celebration of Women in Computing, October 2002, 2782 downloads.
  13. O. V. Ratsimor, D. Chakraborty, S. Tolia, D. Khushraj, A. Kunjithapatham, A. Joshi, T. Finin, and Y. Yesha, "Allia: Alliance-based Service Discovery for Ad-Hoc Environments", InProceedings, ACM Mobile Commerce Workshop, September 2002, 2903 downloads, 132 citations.
  14. D. Chakraborty, A. Joshi, T. Finin, and Y. Yesha, "GSD: A Novel Group-based Service Discovery Protocol for MANETs", InProceedings, 4th IEEE Conference on Mobile and Wireless Communications Networks (MWCN), September 2002, 3804 downloads, 218 citations.
  15. D. Chakraborty, F. Perich, A. Joshi, and Y. Yesha, "Middleware for Mobile Information Access", InProceedings, 5th International Workshop on Mobility in Databases and Distributed Systems (MDDS 2002), September 2002, 3687 downloads, 17 citations.
  16. T. Finin, A. Joshi, L. Kagal, O. V. Ratsimor, S. Avancha, V. Korolev, H. Chen, F. Perich, and R. S. Cost, "Information agents for mobile and embedded devices", Article, International Journal of Cooperative Information Systems, September 2002, 1275 downloads.
  17. F. Perich, S. Avancha, D. Chakraborty, A. Joshi, and Y. Yesha, "Profile Driven Data Management for Pervasive Environments", InProceedings, 13th International Conference on Database and Expert Systems Applications (DEXA 2002), September 2002, 4534 downloads, 41 citations.
  18. S. Tolia, T. Finin, and A. Joshi, "MagicWeaver: An Agent-Based Simulation Framework for Wireless Sensor Networks", InProceedings, Workshop on Ubiquitous Agents for Mobile, Embedded and Wearable Devices, August 2002, 2988 downloads, 1 citation.
  19. L. Kagal, T. Finin, and A. Joshi, "Developing Secure Agent Systems Using Delegation Based Trust Management", InProceedings, Security of Mobile Multi-Agent Systems Workshop, Autonomous Agents and Multiagent Systems (AAMAS 2002) , July 2002, 5073 downloads, 38 citations.
  20. S. Avancha, A. Joshi, and T. Finin, "Enhanced Service Discovery in Bluetooth", Article, IEEE Computer, June 2002, 2647 downloads, 61 citations.
  21. B. Bethala, A. Joshi, D. Phatak, S. Avancha, and T. Goff, "Design and Evaluation of a Common Access Point for Bluetooth, 802.11 and Wired LANs", InProceedings, Proc. International Conference on Parallel and Distributed Processing Techniques and Applications, June 2002, 2911 downloads, 1 citation.
  22. A. Joshi, T. Finin, and Y. Yesha, "Me-Services: A Framework for Secure & Personalized Discovery, Composition and Management of Services in Pervasive Environments", InProceedings, International Workshop on Web Services, E-Business, and the Semantic Web, May 2002, 540 downloads.
  23. L. Kagal, F. Perich, H. Chen, S. Tolia, Y. Zou, A. Joshi, Y. Peng, R. S. Cost, and C. Nicholas, "Agents Making Sense of the Semantic Web", InProceedings, First GSFC/JPL Workshop on Radical Agent Concepts (WRAC), January 2002, 4181 downloads, 9 citations.
  24. D. Chakraborty, F. Perich, S. Avancha, and A. Joshi, "An Agent Discovery Architecture Using Ronin and DReggie", InProceedings, First GSFC/JPL Workshop on Radical Agent Concepts (WRAC), January 2002, 3569 downloads, 6 citations.
  25. S. Avancha, D. Chakraborty, H. Chen, L. Kagal, F. Perich, and A. Joshi, "Issues in Data Management for Pervasive Environments", InProceedings, NSF Workshop on Context-Aware Mobile Database Management, January 2002, 3955 downloads, 2 citations.
  26. A. Joshi, T. Finin, and Y. Yesha, "Agents, Mobility, and M-services: Creating the Next Generation Applications and Infrastructure on Mobile Ad-Hoc Networks", InBook, Developing an Infrastructure for Mobile and Wireless Systems, January 2002, 577 downloads.
  27. R. S. Cost, T. Finin, A. Joshi, Y. Peng, C. Nicholas, I. Soboroff, H. Chen, L. Kagal, F. Perich, Y. Zou, and S. Tolia, "ITtalks: A Case Study in the Semantic Web and DAML+OIL", Article, IEEE Intelligent Systems Special Issue, January 2002, 4069 downloads, 66 citations.

2001

  1. F. Perich, R. S. Cost, T. Finin, A. Joshi, Y. Peng, C. Nicholas, H. Chen, L. Kagal, Y. Zou, and S. Tolia, "ITTALKS: An Application of Agents in the Semantic Web", InProceedings, Engineering Societies in the Agents World (ESAW 2001), December 2001, 4266 downloads, 5 citations.
  2. L. Kagal, T. Finin, and A. Joshi, "Trust-Based Security in Pervasive Computing Environments", Article, IEEE Computer, December 2001, 8763 downloads, 214 citations.
  3. S. Avancha, V. Korolev, and A. Joshi, "Transport Protocols in Wireless Networks", InProceedings, IEEE International Conference on Computer Communications and Networks, October 2001, 3964 downloads, 6 citations.
  4. D. Chakraborty, F. Perich, S. Avancha, and A. Joshi, "DReggie: Semantic Service Discovery for M-Commerce Applications", InProceedings, Workshop on Reliable and Secure Applications in Mobile Environment, In Conjunction with 20th Symposium on Reliable Distributed Systems (SRDS), October 2001, 5481 downloads, 96 citations.
  5. H. Chen, S. Tolia, C. Sayers, T. Finin, and A. Joshi, "Creating Context-Aware Software Agents", Article, First GSFC/JPL Workshop on Radical Agent Concepts, September 2001, 3377 downloads, 30 citations.
  6. T. Finin, A. Joshi, L. Kagal, O. V. Ratsimor, and V. Korolev, "Information Agents for Mobile and Embedded Devices", InProceedings, Proceedings of the Fifth International Workshop Cooperative Information Agents, September 2001, 3970 downloads, 17 citations.
  7. S. Avancha, D. Chakraborty, D. Gada, T. Kamdar, and A. Joshi, "Fast and Efficient Handoff Scheme using Forwarding Pointers and Heirarchical Foreign Agents", InProceedings, Proc. Conference on Design and Modeling of Wireless Networks, ITCom, August 2001.
  8. O. V. Ratsimor, V. Korolev, A. Joshi, T. Finin, and Y. Yesha, "Agents2Go: An Infrastructure for Location-Dependent Service Discovery in the Mobile Electronic Commerce Environment", InProceedings, ACM Mobile Commerce Workshop, July 2001, 4862 downloads, 39 citations.
  9. R. S. Cost, T. Finin, A. Joshi, Y. Peng, C. Nicholas, H. Chen, L. Kagal, F. Perich, Y. Zou, and S. Tolia, "ITTALKS: A Case Study in the Semantic Web and DAML", InProceedings, International Semantic Web Working Symposium (SWWS 2001), July 2001, 3948 downloads, 18 citations.
  10. V. Korolev and A. Joshi, "An End-End Approach to Wireless Web Access", InProceedings, Wireless Networks and Mobile Computing 2001, Workshop of 21st IEEE Intl. Conf. Distributed Computing Systems, April 2001.
  11. L. Kagal, V. Korolev, H. Chen, A. Joshi, and T. Finin, "Centaurus : A Framework for Intelligent Services in a Mobile Environment", InProceedings, International Workshop of Smart Appliances and Wearable Computing at the 21st International Conference of Distributed Computing Systems, April 2001, 5629 downloads, 57 citations.
  12. H. Chen and A. Joshi, "Dynamic Service Discovery for Mobile Computing: Intelligent Agents Meet Jini in the Aether", Article, Cluster Computing, February 2001, 3467 downloads, 69 citations.

2000

  1. A. Joshi, "On Proxy Agents, Mobility, and Web Access", Article, ACM/Baltzer Journal of Mobile Networks and Nomadic Applications (MONET), December 2000, 2538 downloads, 77 citations.
  2. C. Pullela, L. Xu, D. Chakraborty, and A. Joshi, "Component based Architecture for Mobile Information Access", InProceedings, International Conference on Parallel Processing (ICPP 2000), August 2000, 14 citations.
  3. H. Chen, T. Finin, A. Joshi, D. Chakraborty, and L. Xu, "Service Discovery in the Future Electronic Market", Article, Workshop on Knowledge-based Electronic Markets, AAAI-2000, July 2000, 2435 downloads, 30 citations.
  4. A. Joshi and R. Krishnapuram, "On Mining Web Access Logs", InProceedings, Proceedings of the SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, May 2000, 2618 downloads, 122 citations.

1999

  1. K. P. Joshi, A. Joshi, Y. Yesha, and R. Krishnapuram, "Warehousing and Mining Web Logs", InProceedings, Workshop on Web Information and Data Management, 1999 ACM Conference on Information and Knowledge Management (CIKM'99), November 1999, 3719 downloads, 60 citations.
  2. V. Mulwad, T. Finin, and A. Joshi, "Semantic Message Passing for Generating Linked Data from Tables", InProceedings, under review, November 1999.
  3. O. Nasraoui, R. Krishnapuram, and A. Joshi, "Relational Clustering Based on a New Robust Estimator with Application to Web Mining", InProceedings, North American Fuzzy Info. Proc. Society (NAFIPS 99), October 1999, 3107 downloads, 44 citations.
  4. A. Joshi, "On Mobility and Agents", InProceedings, DIMACS Workshop on Mobile Networks and Computing, March 1999, 2510 downloads, 2 citations.

1998

  1. H. Bharadvaj, A. Joshi, and S. Auephanwiriyakul, "An Active Transcoding Proxy to Support Mobile Web Access", InProceedings, 17th IEEE Symposium on Reliable Distributed Systems, October 1998, 3536 downloads, 176 citations.
  2. A. Joshi and V. Subramanyam, "Security in Mobile Systems", InProceedings, Workshop on Security in Large Scale Distributed Systems, IEEE SRDS, October 1998, 6 citations.

1986

  1. D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Managing Cybersecurity at the Grassroots: Evidence from the First Nationwide Survey of Local Government Cybersecurity", Article, Journal of Urban Affairs, April 1986.

Non-Refereed Publications

2020

  1. S. Sontowski, M. Gupta, S. Chukkapalli, M. Abdelsalam, S. Mittal, A. Joshi, and R. Sandhu, "Cyber Attacks on Smart Farming Infrastructure", TechReport, October 2020, 172 downloads.

2019

  1. A. Piplai, S. Mittal, A. Joshi, T. Finin, J. Holt, and R. Zak, "Creating Cybersecurity Knowledge Graphs from Malware After Action Reports", TechReport, November 2019, 423 downloads.

2017

  1. S. Mittal, A. Joshi, and T. Finin, "Thinking, Fast and Slow: Combining Vector Spaces and Knowledge Graphs", TechReport, arXiv, August 2017, 878 downloads.

2015

  1. S. N. Narayanan, S. Mittal, and A. Joshi, "Using Data Analytics to Detect Anomalous States in Vehicles", TechReport, December 2015, 958 downloads.

2012

  1. L. Han, T. Finin, and A. Joshi, "GoRelations: Towards an Intuitive Query System for RDF Data", TechReport, University of Maryland, Baltimore County, February 2012, 1107 downloads.

2011

  1. L. Han, T. Finin, P. McNamee, A. Joshi, and Y. Yesha, "Improving Word Similarity by Augmenting PMI with Estimates of Word Polysemy", TechReport, University of Maryland, Baltimore County, June 2011.
  2. P. Jagtap, A. Joshi, T. Finin, and L. Zavala, "Privacy Preservation in Context Aware Geosocial Networking Applications", TechReport, University of Maryland, Baltimore County, May 2011, 1758 downloads.

2009

  1. K. P. Joshi, A. Joshi, Y. Yesha, and e., "A Framework for Relating Frontstage and Backstage Quality in Virtualized Services", TechReport, TR-CS-09-01, May 2009, 1687 downloads.
  2. L. Han, Y. Yesha, R. Salkeld, J. Martineau, L. Ding, and A. Joshi, "Finding Appropriate Semantic Web Ontology Terms from Words", TechReport, May 2009, 2067 downloads.

2008

  1. T. Finin, A. Joshi, L. Kagal, J. Niu, R. Sandhu, W. H. Winsborough, and B. Thuraisingham, "Using OWL to Model Role Based Access Control", TechReport, University of Maryland, Baltimore County, February 2008, 2431 downloads.
  2. Z. Syed and A. Joshi, "Wikitology: Using Wikipedia as an Ontology", TechReport, February 2008, 6015 downloads.

2007

  1. S. B. Kodeswaran, P. A. Kodeswaran, A. Joshi, and F. Perich, "Utilizing Semantic Policies for Secure BGP Route Dissemination", TechReport, September 2007, 2134 downloads.
  2. L. Han, C. Parr, J. Sachs, A. Joshi, and T. Finin, "RDF123: a mechanism to transform spreadsheets to RDF", TechReport, University of Maryland, Baltimore County, August 2007, 8709 downloads, 9 citations.
  3. A. Kale, P. Kolari, A. Java, T. Finin, and A. Joshi, "On Modeling Trust in Social Media using Link Polarity", TechReport, University of Maryland, Baltimore County, May 2007, 3289 downloads.

2006

  1. A. Java, S. Nirenburg, M. McShane, J. English, and A. Joshi, "Using a Natural Language Understanding System to Generate Semantic Web Content", TechReport, October 2006, 2730 downloads.
  2. S. Agarwal, A. Joshi, and Y. Yesha, "A Pervasive Computing System for the Operating Room of the Future", TechReport, University of Maryland, Baltimore County, September 2006, 3807 downloads.
  3. N. Vartak, A. Patwardhan, A. Joshi, and P. Nagy, "Protecting the privacy of RFID tags", TechReport, University of Maryland, Baltimore County, September 2006, 2907 downloads.
  4. S. Agarwal, A. Joshi, T. Ganous, and Y. Yesha, "Context-Aware System to Create Electronic Medical Records", TechReport, July 2006, 2982 downloads.

2005

  1. L. Ding, A. Joshi, Y. Peng, R. Pan, and P. Reddivari, "Search on the Semantic Web", TechReport, TR-CS-05-09, September 2005, 9577 downloads.
  2. L. Ding, P. Kolari, Z. Ding, S. Avancha, and A. Joshi, "Using Ontologies in the Semantic Web: A Survey", TechReport, TR-CS-05-07, July 2005, 7335 downloads.

2004

  1. P. Kolari, L. Ding, L. Kagal, S. Ganjugunte, and A. Joshi, "Enhancing P3P Framework through Policies and Trust", TechReport, UMBC Technical Report, TR-CS-04-13, September 2004, 3911 downloads.
  2. H. Chen and A. Joshi, "A Pervasive Computing Ontology for User Privacy Protection in the Context Broker Architecture", TechReport, University of Maryland, Baltimore County, July 2004, 4510 downloads.
  3. A. B. Shah, L. Kagal, and A. Joshi, "Policy Development Software for Security Policies", TechReport, DIMACS workshop on Usable Privacy and Security Software, July 2004.

2003

  1. F. Perich, A. Joshi, and Y. Yesha, "Collaborative Joins in a Pervasive Computing Environment", TechReport, University of Maryland, Baltimore County, August 2003, 3938 downloads.
  2. D. Chakraborty, A. Joshi, and Y. Yesha, "Towards Distributed Service Discovery in Pervasive Computing Environments", TechReport, Submitted to IEEE TMC Technical Report TR-CS-03-26, June 2003, 3186 downloads.

2002

  1. S. B. Kodeswaran, O. V. Ratsimor, A. Joshi, T. Finin, and Y. Yesha, "Numi: A Framework for Collaborative Data Management in a Network of InfoStations", TechReport, University of Maryland, Baltimore County, November 2002, 1078 downloads.
  2. A. Joshi, "Neighborhood Watch: An Intrusion Detection and Response Protocol for Mobile Ad Hoc Networks", TechReport, UMBC, October 2002.
  3. L. Kagal, F. Perich, A. Joshi, and Y. Yesha, "Vigil: Providing Trust for Enhanced Security in Pervasive Systems", TechReport, University of Maryland, Baltimore County, August 2002, 5088 downloads, 11 citations.
  4. D. Chakraborty, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "A Reactive Service Composition Architecture for Pervasive Computing Environments", TechReport, University of Maryland, Baltimore County, March 2002, 4281 downloads.
  5. D. Chakraborty, F. Perich, A. Joshi, and Y. Yesha, "Middleware for Mobile Information Systems", TechReport, University of Maryland, Baltimore County, March 2002, 3500 downloads.

2001

  1. F. Perich, S. Avancha, A. Joshi, Y. Yesha, and K. P. Joshi, "Query Routing and Processing in Mobile Ad-Hoc Environments", TechReport, University of Maryland, Baltimore County, November 2001, 4545 downloads.
  2. D. Chakraborty, F. Perich, and A. Joshi, "An Agent-Based Approach to Ubiquitous Information Access", TechReport, University of Maryland, Baltimore County, October 2001, 3664 downloads.
  3. A. Cedilnik, L. Kagal, F. Perich, and A. Joshi, "A Secure Infrastructure for Service Discovery and Access in Pervasive Computing", TechReport, University of Maryland, Baltimore County, August 2001, 4156 downloads.
  4. S. Avancha, A. Joshi, and T. Finin, "Enhancing the Bluetooth Service Discovery Protocol", TechReport, University of Maryland, Baltimore County, August 2001, 1603 downloads.

2000

  1. T. Kamdar and A. Joshi, "On Creating Adaptive Web Servers Using Weblog Mining", TechReport, University of Maryland, Baltimore County, November 2000, 3604 downloads.
  2. Z. Jiang, A. Joshi, R. Krishnapuram, and L. Yi, "Retriever: Improving Web Search Engine Results Using Clustering", TechReport, University of Maryland Baltimore County, October 2000, 3284 downloads.

1999

  1. L. Kagal, V. Korolev, A. Joshi, T. Finin, and Y. Yesha, "A Highly Adaptable Infrastructure for Service Discovery and Management in Ubiquitous Computing", TechReport, Technical Report, TR CS-01-06, November 1999.
  2. A. Joshi, K. P. Joshi, and R. Krishnapuram, "On Mining Web Access Logs", TechReport, University of Maryland Baltimore County, October 1999, 3662 downloads.

Active Projects

  1. Accelerated Cybersecurity, Principal Investigator
  2. ALDA: Automated Legal Document Analytics, Affiliated Faculty
  3. Cloud Security and Privacy, Principal Faculty
  4. Semantic Cloud Services Framework, Affiliated Faculty

Past Projects

  1. A Personal Agent Application for the Semantic Web, Faculty
  2. Agents2Go, Faculty
  3. Allia: Alliance-based Service Discovery, Faculty
  4. An Agent Based Distributed Computing System using XReggie and Ronin, Faculty
  5. Anamika: Distributed Service Discovery and Composition for Pervasive Environments, Affiliated Faculty
  6. Automatic Interpretation of Log Files, Principal Faculty
  7. Centaurus, Faculty
  8. CentaurusComm, Faculty
  9. CoCoNet: Content and Context Aware Networking, Professor
  10. Context Broker Architecture (CoBrA), Faculty
  11. Context-Aware Surgical Training, Faculty
  12. DAML, Faculty
  13. DAML / ITTalks, Faculty
  14. Damlator: Semantic Web Translator, Faculty
  15. Disconnected Web Browsing, Faculty
  16. Distributed Trust Management in Mobile Ad Hoc Networks, Professor
  17. DReggie: Semantic Service Discovery Infrastructure, Principal Investigator
  18. Enabling Peer-to-Peer Resource Discovery in Agent Environment, Faculty
  19. eNcentive, Faculty
  20. Feeds that matter, Adjunct Faculty
  21. FOAF, Principal Faculty
  22. Graph of Relations, Faculty
  23. iConnect, Principal Investigator
  24. IDE for Rei Policy Language, Faculty
  25. Indian Election 2009, Affiliated Faculty
  26. IT Services Metrics, Affiliated Faculty
  27. MagicWeaver: An Agent Based Simulation Framework For Wireless Sensor Networks, Faculty
  28. memeta, Principal Investigator
  29. MGI Semantic Data, Principal Faculty
  30. mNote: Anywhere, Anytime Classroom, Faculty
  31. MoGATU: Data Management in Pervasive Computing Environments, Faculty
  32. MOWSER: Wireless Web Access, Faculty
  33. MTLD: Interpreting Medical Tables as Linked Data, Principal Investigator
  34. Numi: Using Collaborative Agents to Enrich Service Environments, Faculty
  35. Ontology Editor for Eclipse, Faculty
  36. ontosem2owl, Faculty
  37. OWLIR: Information Retrieval On The Semantic Web, Faculty
  38. Platys: From Position to Place in Next Generation Networks, Principal Investigator
  39. Policy Compliant Integration of Linked Data, Faculty
  40. Policy-based Automated WAN Configuration and Management, Principal Investigator
  41. Privacy for the WWW, Affiliated Faculty
  42. RAP: RDF Access-control Policiies, Faculty
  43. Rei : A Policy Specification Language, Faculty
  44. Ronin Agent Framework, Faculty
  45. Securing the Semantic Web: A Trust Management Approach, Faculty
  46. Security in Mobile Databases, Faculty
  47. Semantic Discovery: Discovering Complex Relationships in Semantic Web, Principal Investigator
  48. Semantic Service Discovery in Bluetooth, Faculty
  49. Semantic Situational Awareness for Intrusion Detection, Principal Investigator
  50. Simulator to evaluate/prototype Local Area and Personal Area Wireless Network Protocols, Faculty
  51. Spire, Faculty
  52. Swoogle, Affiliated Faculty
  53. Tables to Linked Data, Faculty
  54. Text and Ontology Driven Clinical Decision Support System, Professor
  55. Trauma Pod, Faculty
  56. Vigil / Secure Centaurus, Faculty
  57. Vox Blogguli, Faculty
  58. Web/Data Mining and Personalization, Faculty
  59. Wikitology, Principal Faculty

Assertions

  1. (Person) Anupam Joshi attended (Event) My Experience in Building Ontology-driven Applications.
  2. (Photo) Professors Joshi and SIvalingham shows (Person) Anupam Joshi.
  3. (Photo) Professor Anupam Joshi shows (Person) Anupam Joshi.
  4. (Person) Randy Schauer is advised by (Person) Anupam Joshi.
  5. (Photo) Dr. Joshi and Dr. Avancha shows (Person) Anupam Joshi.
  6. (Person) Wenjia Li is advised by (Person) Anupam Joshi.
  7. (Person) Primal Pappachan is advised by (Person) Anupam Joshi.
  8. (Person) Prajit Kumar Das is advised by (Person) Anupam Joshi.
  9. (Person) Anupam Joshi advises (Person) Sudip Mittal.
  10. (Person) Anupam Joshi advises (Person) Sandeep Nair Narayanan.
  11. (Person) Anupam Joshi advises (Person) Anantaa Kotal.
  12. (Person) Anupam Joshi advises (Person) Sofia Dutta.