Tags: gan

Refereed Publications

2020

  1. K. P. Joshi, L. Elluri, and A. Nagar, "An Integrated Knowledge Graph to Automate Cloud Data Compliance", Article, IEEE Access, November 2020, 59 downloads.
  2. A. Kotal, K. P. Joshi, and A. Joshi, "ViCLOUD: Measuring Vagueness in Cloud Service Privacy Policies and Terms of Services", InProceedings, IEEE International Conference on Cloud Computing (CLOUD), 2020, October 2020, 96 downloads.
  3. S. Oni, Z. Chen, A. Crainiceanu, K. P. Joshi, and D. Needham, "A Framework for Situation-Aware Access Control in Federated Data-as-a-Service Systems Based on Query Rewriting", InProceedings, IEEE International Conference on Services Computing (IEEE SCC), 2020, October 2020, 58 downloads.
  4. A. Piplai, S. Chukkapalli, and A. Joshi, "NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion", InProceedings, 6th IEEE International Conference on Big Data Security on Cloud, May 2020, 80 downloads.

2019

  1. M. P. Joshi, K. P. Joshi, and T. Finin, "Delegated Authorization Framework for EHR Services using Attribute Based Encryption", Article, IEEE Transactions on Services Computing, December 2019, 641 downloads.
  2. A. Kaplunovich, K. P. Joshi, and Y. Yesha, "Scalability Analysis of Blockchain on a Serverless Cloud", InProceedings, 7th International Workshop on Distributed Storage and Blockchain Technologies for Big Data, held in conjunction with IEEE International Conference on Big Data, 2019, December 2019, 358 downloads.
  3. K. Joshi, K. P. Joshi, and S. Mittal, "A Semantic Approach for Automating Knowledge in Policies of Cyber Insurance Services", InProceedings, IEEE International Conference on Web Services (IEEE ICWS) 2019, July 2019, 529 downloads.
  4. S. Dixit, K. P. Joshi, and S. Choi, "Multi Authority Access Control in a Cloud EHR System with MA-ABE", InProceedings, IEEE International Conference on Edge Computing (EDGE 2019), July 2019, 274 downloads.
  5. A. Renjan, S. N. Narayanan, and K. P. Joshi, "A Policy based Framework for Privacy-Respecting Deep Packet Inspection of High Velocity Network Traffic", InProceedings, 5th IEEE International Conference on Big Data Security on Cloud, May 2019, 240 downloads.
  6. A. Pingle, A. Piplai, S. Mittal, A. Joshi, J. Holt, and R. Zak, "RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement", InProceedings, IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2019), May 2019, 355 downloads.
  7. S. Mittal, "Knowledge for Cyber Threat Intelligence", PhdThesis, University of Maryland, Baltimore County, May 2019, 49 downloads.
  8. K. P. Joshi and A. Banerjee, "Automating Privacy Compliance Using Policy Integrated Blockchain", Article, Cryptography, Special Issue Advances of Blockchain Technology and Its Applications, February 2019, 511 downloads.

2018

  1. A. Nagar and K. P. Joshi, "An Integrated Knowledge Graph to Automate GDPR and PCI DSS Compliance", IEEE International Conference on Big Data 2018, December 2018, 942 downloads.
  2. A. Renjan, K. P. Joshi, S. N. Narayanan, and A. Joshi, "DAbR: Dynamic Attribute-based Reputation scoring for Malicious IP Address Detection", InProceedings, IEEE Intelligence and Security Informatics (IEEE ISI) 2018, November 2018, 865 downloads.
  3. P. Ranade, S. Mittal, A. Joshi, and K. P. Joshi, "Understanding Multi-lingual Threat Intelligence for AI based Cyber-defense Systems", InProceedings, IEEE International Symposium on Technologies for Homeland Security, October 2018, 428 downloads.
  4. K. P. Joshi, "A Knowledge Representation of Cloud Data controls for EU GDPR Compliance", InProceedings, 11th IEEE International Conference on Cloud Computing (CLOUD), July 2018, 755 downloads.
  5. M. P. Joshi, K. P. Joshi, and T. Finin, "Attribute Based Encryption for Secure Access to Cloud Based EHR Systems", InProceedings, International Conference on Cloud Computing, July 2018, 1132 downloads.
  6. A. Nagar and K. P. Joshi, "A Semantically Rich Knowledge Representation of PCI DSS for Cloud Services", InProceedings, 6th International IBM Cloud Academy Conference ICACON 2018, Japan, May 2018, 608 downloads.
  7. M. M. Rahman, "Understanding the Logical and Semantic Structure of Large Documents", PhdThesis, University of Maryland, Baltimore County, May 2018, 85 downloads.

2017

  1. S. Saha, K. P. Joshi, R. Frank, M. Aebig, and J. Lin, "Automated Knowledge Extraction from the Federal Acquisition Regulations System (FARS)", InProceedings, 2nd International Workshop on Enterprise Big Data Semantic and Analytics Modeling at IEEE International Conference on Big Data 2017 , December 2017, 1016 downloads.
  2. S. Saha and K. P. Joshi, "Cognitive Assistance for Automating the Analysis of the Federal Acquisition Regulations System", InProceedings, AAAI Fall Symposium 2017, November 2017, 631 downloads.
  3. M. P. Joshi, S. Mittal, K. P. Joshi, and T. Finin, "Semantically Rich, Oblivious Access Control Using ABAC for Secure Cloud Storage", InProceedings, Proceedings of the First IEEE International Conference on Edge Computing, June 2017, 1085 downloads.
  4. D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Cybersecurity Challenges to American Local Governments", InProceedings, Proceedings of 17th European Conference on Digital Government , June 2017, 761 downloads.
  5. S. Saha, K. P. Joshi, and A. Gupta, "A Deep Learning Approach to Understanding Cloud Service Level Agreements ", InProceedings, Fifth International IBM Cloud Academy Conference, May 2017, 955 downloads.

2016

  1. P. K. Das, A. L. Kashyap, G. Singh, C. Matuszek, T. Finin, and A. Joshi, "Semantic knowledge and privacy in the physical web", InProceedings, Proceedings of the 4th Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn2016) co-located with 15th International Semantic Web Conference (ISWC 2016), October 2016, 1678 downloads.
  2. K. P. Joshi, A. Gupta, S. Mittal, C. Pearce, A. Joshi, and T. Finin, "ALDA : Cognitive Assistant for Legal Document Analytics", InProceedings, AAAI Fall Symposium 2016, September 2016, 908 downloads.
  3. S. Mittal, P. K. Das, V. Mulwad, A. Joshi, and T. Finin, "CyberTwitter: Using Twitter to generate alerts for Cybersecurity Threats and Vulnerabilities", InProceedings, International Symposium on Foundations of Open Source Intelligence and Security Informatics, August 2016, 2573 downloads.
  4. S. Mittal, K. P. Joshi, C. Pearce, and A. Joshi, "Automatic Extraction of Metrics from SLAs for Cloud Service Management", InProceedings, 2016 IEEE International Conference on Cloud Engineering (IC2E 2016), April 2016, 1215 downloads.
  5. N. K. Sharma and A. Joshi, "Representing attribute based access control policies in OWL", InProceedings, Tenth International Conference on Semantic Computing (ICSC), February 2016, 1419 downloads.

2015

  1. B. Stanton, M. Theofanos, and K. P. Joshi, "Framework for Cloud Usability", InProceedings, HCI International 2015, August 2015, 1003 downloads.
  2. A. Hendre and K. P. Joshi, "A Semantic Approach to Cloud Security and Compliance", InProceedings, 8th International Conference on Cloud Computing (CLOUD), June 2015, 815 downloads.
  3. D. Norris, A. Joshi, and T. Finin, "Cybersecurity Challenges to American State and Local Governments", InProceedings, 15th European Conference on eGovernment, June 2015, 825 downloads.
  4. A. A. Krisnadhi, R. Arko, S. Carbotte, C. Chandler, M. Cheatham, T. Finin, P. Hitzler, K. Janowicz, T. Narock, L. Raymond, and P. Wiebe, "Ontology Pattern Modeling for Cross-Repository Data Integration in the Ocean Sciences: The Oceanographic Cruise Example", InBook, The Semantic Web in Earth and Space Science: Current Status and Future Directions, June 2015, 976 downloads.

2014

  1. K. P. Joshi, "Cloud Data Management Policies: Security and Privacy Checklist", InProceedings, 2nd International IBM Cloud Academy Conference ICA CON 2014, Atlanta, May 2014, 933 downloads.

2013

  1. P. McNamee, J. Mayfield, T. Finin, T. Oates, D. Lawrie, T. Xu, and D. Oard, "KELVIN: a tool for automated knowledge base construction", InProceedings, Proc. Conf. of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, June 2013, 1063 downloads.
  2. R. Lal, "Information Extraction of Security related entities and concepts from unstructured text.", MastersThesis, University of Maryland Baltimore County, May 2013, 1490 downloads.

2012

  1. A. Joshi, T. Finin, K. P. Joshi, and M. Oberoi, "A Policy Driven Semantic Approach to Data Usage Management", InProceedings, DUMW Workshop in conjunction with WWW 2012, April 2012, 1237 downloads.

2011

  1. C. Lee, Y. H. Lee, Y. Peng, and H. Cho, "A Supplier Discovery Framework For Effective And Efficient Configuration Of A Supply Chain", Article, International Journal of Industrial Engineering,, November 2011, 1197 downloads.
  2. R. Dharurkar, "Context-Aware Middleware for Activity Recognition", MastersThesis, University of Maryland, Baltimore County, May 2011, 1199 downloads.
  3. Z. Syed and T. Finin, "Creating and Exploiting a Hybrid Knowledge Base for Linked Data", InBook, Agents and Artificial Intelligence, April 2011, 1986 downloads.
  4. A. Gupta, K. Viswanathan, A. Joshi, T. Finin, and P. Kumaraguru, "Integrating Linked Open Data with Unstructured Text for Intelligence Gathering Tasks", InProceedings, Proceedings of the Eighth International Workshop on Information Integration on the Web, March 2011, 1467 downloads.

2010

  1. C. Tilmes, Y. Yesha, and M. Halem, "Tracking Provenance of Earth Science Data", Article, Earth Science Informatics, November 2010, 1356 downloads.
  2. J. Sleeman and T. Finin, "Learning Co-reference Relations for FOAF Instances", InProceedings, Proceedings of the Poster and Demonstration Session at the 9th International Semantic Web Conference, November 2010, 2342 downloads, 2 citations.
  3. J. Sleeman and T. Finin, "Computing FOAF Co-reference Relations with Rules and Machine Learning", InProceedings, Proceedings of the Third International Workshop on Social Data on the Web, November 2010, 3414 downloads, 6 citations.
  4. P. A. Kodeswaran, F. Perich, W. Li, A. Joshi, and T. Finin, "Enforcing Secure and Robust Routing with Declarative Policies", InProceedings, Proceedings of the 2010 Military Communications Conference, October 2010, 1627 downloads, 1 citation.
  5. W. Murnane, "Improving Accuracy of Named Entity Recognition on Social Media Data", MastersThesis, University of Maryland, Baltimore County, August 2010, 5061 downloads, 3 citations.
  6. Z. Syed, E. Viegas, and S. Parastatidis, "Automatic Discovery of Semantic Relations using MindNet", InProceedings, Proceedings of the Seventh International Conference on Language Resources and Evaluation, May 2010, 2065 downloads.
  7. C. Tilmes, Y. Yesha, and M. Halem, "Provenance Artifact Identification in the Atmospheric Composition Processing System (ACPS)", InProceedings, Proceedings of the 2nd Workshop on the Theory and Practice of Provenance, February 2010, 959 downloads, 1 citation.
  8. T. Finin and Z. Syed, "Creating and Exploiting a Web of Semantic Data", InProceedings, Proceedings of the Second International Conference on Agents and Artificial Intelligence, January 2010, 4943 downloads, 9 citations.

2009

  1. W. Jensen and V. Korolev, "A Location-Based Mechanism for Mobile Device Security", InProceedings, Lecture Notes in Artificial Intelligence, March 2009.
  2. T. Finin, Z. Syed, J. Mayfield, P. McNamee, and C. Piatko, "Using Wikitology for Cross-Document Entity Coreference Resolution", InProceedings, Proceedings of the AAAI Spring Symposium on Learning by Reading and Learning to Read, March 2009, 2584 downloads, 7 citations.

2008

  1. A. Java, "Mining Social Media Communities and Content", PhdThesis, University of Maryland, Baltimore County, December 2008, 54167 downloads.
  2. C. Tilmes and A. J. Fleig, "Provenance Tracking in an Earth Science Data Processing System", InProceedings, Proceedings of Provenance and Annotation of Data and Processes: Second International Provenance and Annotation Workshop, Ipaw 2008, , June 2008, 1846 downloads.
  3. K. Dasgupta, R. Singh, B. Vishwanathan, D. Chakraborty, A. Joshi, S. Mukherjea, and A. A. Nanavati, "Social ties and their relevance to churn in mobile telecom networks", InProceedings, Proceedings of the 11th international conference on Extending database technology: Advances in database technology, March 2008, 2463 downloads.

2007

  1. C. Parr, J. Sachs, L. Han, and T. Wang, "RDF123 and Spotter: Tools for generating OWL and RDF for biodiversity data in spreadsheets and unstructured text", InProceedings, Proceedings of Biodiversity Information Standards Annual Conference (TDWG 2007), October 2007, 1822 downloads, 3 citations.
  2. O. Walavalkar, "Streaming Knowledge Bases", MastersThesis, University of Maryland, Baltimore County, August 2007, 4 citations.
  3. P. Kolari, T. Finin, Y. Yesha, Y. Yesha, K. Lyons, S. Perelgut, and J. Hawkins, "On the Structure, Properties and Utility of Internal Corporate Blogs", InProceedings, Proceedings of the International Conference on Weblogs and Social Media (ICWSM 2007), March 2007, 13930 downloads, 43 citations.

2004

  1. W. Jensen, S. Gavrila, and V. Korolev, "A Unified Framework for Mobile Device Security", InProceedings, Security and Management 2004, September 2004.
  2. L. Kagal, "A Policy-Based Approach to Governing Autonomous Behavior in Distributed Environments", PhdThesis, University of Maryland Baltimore County, September 2004, 10 citations.
  3. S. Avancha, C. Patel, and A. Joshi, "Ontology-driven Adaptive Sensor Networks", InProceedings, MobiQuitous 2004, August 2004, 4085 downloads, 18 citations.
  4. M. A. Grasso, "Clinical applications of handheld computing", Proceedings, Proceedings of the 17th IEEE Symposium on Computer-Based Medical Systems, June 2004.
  5. V. Parekh, J. (. Gwo, and T. Finin, "Ontology based Semantic Metadata for GeoScience Data", InProceedings, Proceedings of the International Conference on Information and Knowledge Engineering, June 2004, 5156 downloads, 1 citation.

2003

  1. W. Jensen, V. Korolev, S. Gavrila, and C. Seveilac, "A Framework for Multi-Mode Authentication: Overview and Implementation Guide", Article, NISTIR 7046, August 2003.
  2. W. Jensen, S. Gavrila, and V. Korolev, "Picture Password: A Visual Login Technique for Mobile Devices", Article, NISTIR 7030, July 2003.
  3. S. Cranefield, T. Finin, V. Tamma, and S. Willmott, "Proceedings of the Workshop on Ontologies in Agent Systems (OAS'03", Proceedings, CEUR Publications, July 2003, 2923 downloads.
  4. W. Jensen, T. Karygiannis, M. Iorga, S. Gavrila, and V. Korolev, "Security Policy Management for Handheld Devices", InProceedings, Security and Management (SAM'03),, June 2003, 964 downloads.
  5. W. Jensen, T. Karygiannis, V. Korolev, S. Gavrila, and M. Iorga, "Policy Expression and Enforcement for Handheld Devices", Article, NISTIR 6981, May 2003, 635 downloads.
  6. S. B. Kodeswaran, O. V. Ratsimor, A. Joshi, T. Finin, and Y. Yesha, "Using Peer-to-Peer Data Routing for Infrastructure-based Wireless Networks", InProceedings, First IEEE International Conference on Pervasive Computing and Communications , March 2003, 2347 downloads, 11 citations.

2002

  1. T. Finin and A. Joshi, "Agents, Trust, and Information Access on the Semantic Web", Article, SIGMOD Record, December 2002, 1161 downloads.
  2. O. V. Ratsimor, S. B. Kodeswaran, T. Finin, A. Joshi, and Y. Yesha, "Combining Infrastructure and Ad hoc Collaboration For Data Management in Mobile Wireless Networks", InProceedings, Workshop on Ad hoc Communications and Collaboration in Ubiquitous Computing Environments, November 2002, 2937 downloads, 13 citations.
  3. W. Jensen, T. Karygiannis, S. Gavrila, and V. Korolev, "Assigning and Enforcing Security Policies on Handheld Devices", InProceedings, 14th Annual Canadian Information Technology Security Symposium , May 2002.

2000

  1. A. Joshi and R. Krishnapuram, "On Mining Web Access Logs", InProceedings, Proceedings of the SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, May 2000, 2618 downloads, 122 citations.

1999

  1. O. Nasraoui, R. Krishnapuram, and A. Joshi, "Relational Clustering Based on a New Robust Estimator with Application to Web Mining", InProceedings, North American Fuzzy Info. Proc. Society (NAFIPS 99), October 1999, 3108 downloads, 44 citations.

1998

  1. W. Tolone, B. Chu, J. Long, R. Wilhelm, Y. Peng, and A. Boughannam, "Supporting Human Interactions within Integrated Manufacturing Systems", Article, International Journal of Advanced Manufacturing, December 1998, 1002 downloads, 3 citations.
  2. B. Chu, W. Tolone, J. Long, R. Wilhelm, Y. Peng, T. Finin, and M. L. Mathews, "Toward Intelligent Integrated Manufacturing Planning-Execution", Article, The International Journal of Agile Manufacturing, January 1998, 2054 downloads, 20 citations.

1995

  1. C. Thirunavukkarasu, T. Finin, A. Potluri, D. P. McKay, and R. McEntire, "On Agent Domains, Agent Names and Proxy Agents", InProceedings, ACM CIKM Intelligent Information Agents Workshop, October 1995, 192 downloads.

1980

  1. T. Finin, "The Semantic Interpretation of Compound Nominals", PhdThesis, University of Illinois at Urbana Champaign, February 1980, 1602 downloads, 85 citations.

Non-Refereed Publications

2018

  1. S. Saha and K. P. Joshi, "Cognitively Rich Framework to Automate Extraction and Representation of Legal Knowledge", TechReport, March 2018, 381 downloads.

2014

  1. B. Stanton, M. Theofanos, and K. P. Joshi, "Framework for Cloud Usability", TechReport, NISTIR, August 2014, 1030 downloads.
  2. A. A. Krisnadhi, R. Arko, S. Carbotte, C. Chandler, M. Cheatham, T. Finin, P. Hitzler, K. Janowicz, T. Narock, L. Raymond, A. Shepherd, and P. Wiebe, "An Ontology Pattern for Oceanograhic Cruises: Towards an Oceanograhper's Dream of Integrated Knowledge Discovery", TechReport, June 2014, 625 downloads.

2006

  1. C. Parr, J. Sachs, A. Parafiynyk, T. Wang, and R. Espinosa, "ETHAN: the Evolutionary Trees and Natural History Ontology", TechReport, University of Maryland, Baltimore County, November 2006, 4179 downloads, 1 citation.

Old Event Series

  1. MD Semantic Web Meetups