Tags: neural network

Refereed Publications

2020

  1. A. Piplai, S. Chukkapalli, and A. Joshi, "NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion", InProceedings, 6th IEEE International Conference on Big Data Security on Cloud, May 2020, 9 downloads.
  2. T. W. Satyapanich, F. Ferraro, and T. Finin, "CASIE: Extracting Cybersecurity Event Information from Text", InProceedings, Proceeding of the 34th AAAI Conference on Artificial Intelligence, February 2020, 345 downloads.
  3. J. Sleeman, J. E. Dorband, and M. Halem, "A Hybrid Quantum Enabled RBM Advantage: Convolutional Autoencoders for Quantum Image Compression and Generative Learning", Article, arXiv preprint arXiv:2001.11946, January 2020, 80 downloads.

2019

  1. J. Sleeman, V. Caicedo, M. Halem, and B. Demoz, "Using Lidar and Machine Learning to Identify Planetary Boundary Layer Heights", InProceedings, American Geophysical Union Fall Meeting Abstracts, December 2019.
  2. J. Sleeman, M. Halem, and J. E. Dorband, "RBM Image Generation Using the D-Wave 2000Q", Misc, Poster Presentation Presented at the 2019 Rising Stars in EECS Workshop, October 2019, 53 downloads.
  3. J. Sleeman, M. Halem, and J. E. Dorband, "RBM Image Generation Using the D-Wave 2000Q", Misc, D-Wave Qubits North America Conference, September 2019, 79 downloads.

2018

  1. P. Ranade, S. Mittal, A. Joshi, and K. P. Joshi, "Using Deep Neural Networks to Translate Multi-lingual Threat Intelligence", InProceedings, IEEE Intelligence and Security Informatics (IEEE ISI) 2018, November 2018, 571 downloads.
  2. A. Padia, F. Ferraro, and T. Finin, "KG Cleaner: Identifying and Correcting Errors Produced by Information Extraction Systems", InCollection, arXiv, August 2018, 260 downloads.

2017

  1. K. Khanna and A. Joshi, "AI based approach to identify compromised meters in data integrity attacks on smart grid", Article, IET Generation, Transmission and Distribution, October 2017, 491 downloads.
  2. S. Saha, K. P. Joshi, and A. Gupta, "A Deep Learning Approach to Understanding Cloud Service Level Agreements ", InProceedings, Fifth International IBM Cloud Academy Conference, May 2017, 908 downloads.

2016

  1. T. W. Satyapanich and T. Finin, "Event Nugget Detection Task: UMBC systems", InProceedings, Proceedings of the 9th Text Analysis Worksho, November 2016, 771 downloads.

2008

  1. Y. Peng and L. L. Augsburger, "Knowledge-Based Systems and Other AI Applications for Tableting", InBook, Pharmaceutical Dosage Forms, January 2008, 2801 downloads.

2005

  1. S. Dornbush, K. Fisher, K. McKay, A. Prikhodko, and Z. Segall, "XPod a human activity and emotion aware mobile music player", InProceedings, Proceedings of the International Conference on Mobile Technology, Applications and Systems, November 2005, 7462 downloads, 18 citations.
  2. W. Wilson, Y. Peng, and L. L. Augsburger, "Generalization of a Prototype Intelligent Hybrid System for Hard Gelatin Capsule Formulation Development", Article, AAPS PharmSciTech, October 2005, 1906 downloads.

2002

  1. G. Kalra, Y. Peng, M. Guo, and L. L. Augsburger, "A hybrid intelligent system for formulation of BCS Class II drugs in hard gelatin capsules", InProceedings, Proceedings of the 9th International Conference on Neural Information Processing, November 2002, 4049 downloads.

1999

  1. S. Quirolgico and K. Canfield, "Communicating neural network knowledge between agents in a simulated aerial reconnaissance system", InProceedings, Proceedings of the First International Symposium on Agent Systems and Applications,, October 1999, 2485 downloads, 5 citations.

Non-Refereed Publications

2019

  1. A. Piplai, S. Mittal, A. Joshi, T. Finin, J. Holt, and R. Zak, "Creating Cybersecurity Knowledge Graphs from Malware After Action Reports", TechReport, November 2019, 333 downloads.

Old Events

  1. Activity recognition from RFID sensor data
    September 25, 2005