Tags: neural network

Publications

2023

  1. A. Piplai, A. Kotal, S. Mohseni, M. Gaur, S. Mittal, and A. Joshi, "Knowledge-Enhanced Neurosymbolic Artificial Intelligence for Cybersecurity and Privacy", Article, IEEE Internet Computing, September 2023, 648 downloads.
  2. F. Lu, E. Raff, and F. Ferraro, "Neural Bregman Divergences for Distance Learning", InProceedings, 11th International Conference on Learning Representations, May 2023, 234 downloads.

2021

  1. S. Dasgupta, A. Piplai, P. Ranade, and A. Joshi, "Cybersecurity Knowledge Graph Improvement with Graph Neural Networks", InProceedings, International Conference on Big Data, December 2021, 703 downloads.

2020

  1. A. Piplai, S. Mittal, A. Joshi, T. Finin, J. Holt, and R. Zak, "Creating Cybersecurity Knowledge Graphs from Malware After Action Reports", Article, IEEE Access Journal, December 2020, 1233 downloads.
  2. S. N. Narayanan, A. Joshi, and R. Bose, "ABATe: Automatic Behavioral Abstraction Technique to Detect Anomalies in Smart Cyber-Physical Systems", InProceedings, IEEE Transactions on Dependable and Secure Computing, October 2020, 937 downloads.
  3. J. Sleeman, M. Halem, V. Caicedo, B. Demoz, and R. M. Delgado, "A Deep Machine Learning Approach for LIDAR Based Boundary Layer Height Detection", InProceedings, IEEE International Geoscience and Remote Sensing Symposium, October 2020.
  4. A. Piplai, S. Chukkapalli, and A. Joshi, "NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion", InProceedings, 6th IEEE International Conference on Big Data Security on Cloud, May 2020, 1342 downloads.
  5. J. Sleeman, J. E. Dorband, and M. Halem, "A hybrid quantum enabled RBM advantage: convolutional autoencoders for quantum image compression and generative learning", InProceedings, Quantum Information Science, Sensing, and Computation XII, May 2020, 593 downloads.
  6. T. W. Satyapanich, F. Ferraro, and T. Finin, "CASIE: Extracting Cybersecurity Event Information from Text", InProceedings, Proceeding of the 34th AAAI Conference on Artificial Intelligence, February 2020, 2559 downloads, 150 citations.
  7. J. Sleeman, J. E. Dorband, and M. Halem, "A Hybrid Quantum Enabled RBM Advantage: Convolutional Autoencoders for Quantum Image Compression and Generative Learning", Article, arXiv preprint arXiv:2001.11946, January 2020, 925 downloads.

2019

  1. J. Sleeman, V. Caicedo, M. Halem, and B. Demoz, "Using Lidar and Machine Learning to Identify Planetary Boundary Layer Heights", InProceedings, American Geophysical Union Fall Meeting Abstracts, December 2019.
  2. J. Sleeman, M. Halem, and J. E. Dorband, "RBM Image Generation Using the D-Wave 2000Q", Misc, Poster Presentation Presented at the 2019 Rising Stars in EECS Workshop, October 2019, 634 downloads.
  3. J. Sleeman, M. Halem, and J. E. Dorband, "RBM Image Generation Using the D-Wave 2000Q", Misc, D-Wave Qubits North America Conference, September 2019, 737 downloads.
  4. S. Mittal, A. Joshi, and T. Finin, "Cyber-All-Intel: An AI for Security Related Threat Intelligence", TechReport, CoRR abs/1905.02895, May 2019, 437 downloads.
  5. S. Mittal, "Knowledge for Cyber Threat Intelligence", PhdThesis, University of Maryland, Baltimore County, May 2019, 579 downloads.
  6. S. Mittal, "Knowledge for Cyber Threat Intelligence", PhdThesis, May 2019, 261 downloads.

2018

  1. P. Ranade, S. Mittal, A. Joshi, and K. P. Joshi, "Using Deep Neural Networks to Translate Multi-lingual Threat Intelligence", InProceedings, IEEE Intelligence and Security Informatics (IEEE ISI) 2018, November 2018, 1671 downloads.
  2. A. Padia, F. Ferraro, and T. Finin, "KG Cleaner: Identifying and Correcting Errors Produced by Information Extraction Systems", InCollection, arXiv, August 2018, 837 downloads.

2017

  1. K. Khanna and A. Joshi, "AI based approach to identify compromised meters in data integrity attacks on smart grid", Article, IET Generation, Transmission and Distribution, October 2017, 1092 downloads.
  2. S. Saha, K. P. Joshi, and A. Gupta, "A Deep Learning Approach to Understanding Cloud Service Level Agreements ", InProceedings, Fifth International IBM Cloud Academy Conference, May 2017, 1504 downloads.
  3. A. L. Kashyap, "Deep Representation of Lyrical Style and Semantics for Music Recommendation", PhdThesis, University of Maryland, Baltimore County, May 2017, 535 downloads.

2016

  1. T. W. Satyapanich and T. Finin, "Event Nugget Detection Task: UMBC systems", InProceedings, Proceedings of the 9th Text Analysis Worksho, November 2016, 1312 downloads.
  2. J. Lo, Y. Gui, and Y. Peng, "Training Deep Neural Networks with Gradual Deconvexification", InProceedings, International Joint Conference on Neural Networks (IJCNN 2016),, June 2016, 501 downloads.
  3. Y. Gui, "Convexification and Deconvexification for Training Artificial Neural Networks", PhdThesis, May 2016, 429 downloads.

2015

  1. J. Lo, Y. Gui, and Y. Peng, "The Normalized Risk-Averting Error Criterion for Avoiding Nonglobal Local Minima in Training Neural Networks", Article, Neurocomputing, February 2015, 414 downloads.

2012

  1. J. Lo, Y. Gui, and Y. Peng, "Overcoming the Local-Minimum Problem in Training Multilayer Perceptrons with the NRAE Training Method", InProceedings, Ninth International Symposium on Neural Networks (ISNN 2012), July 2012, 460 downloads.

2008

  1. Y. Peng and L. L. Augsburger, "Knowledge-Based Systems and Other AI Applications for Tableting", InBook, Pharmaceutical Dosage Forms, January 2008, 3388 downloads.

2005

  1. S. Dornbush, K. Fisher, K. McKay, A. Prikhodko, and Z. Segall, "XPod a human activity and emotion aware mobile music player", InProceedings, Proceedings of the International Conference on Mobile Technology, Applications and Systems, November 2005, 8091 downloads, 18 citations.
  2. W. Wilson, Y. Peng, and L. L. Augsburger, "Generalization of a Prototype Intelligent Hybrid System for Hard Gelatin Capsule Formulation Development", Article, AAPS PharmSciTech, October 2005, 2426 downloads.

2002

  1. G. Kalra, Y. Peng, M. Guo, and L. L. Augsburger, "A hybrid intelligent system for formulation of BCS Class II drugs in hard gelatin capsules", InProceedings, Proceedings of the 9th International Conference on Neural Information Processing, November 2002, 4587 downloads.

2000

  1. S. Quirolgico, K. Canfield, T. Finin, and J. A. Smith, "Merging Neural Networks in a Multi-Agent System", TechReport, TR EB-2000-01, January 2000, 269 downloads.

1999

  1. S. Quirolgico, K. Canfield, T. Finin, and J. A. Smith, "Communicating neural network knowledge between agents in a simulated aerial reconnaissance system", InProceedings, Proceedings of the First International Symposium on Agent Systems and Applications,, October 1999, 3114 downloads, 5 citations.

Old Events

  1. Activity recognition from RFID sensor data
    September 25, 2005