2025
- J. Tamboli, K. P. Joshi, and O. Clark, "Security Compliance for Smart Manufacturing using Knowledgegraph based Digital Twin", InProceedings, BigCyber Workshop held in conjunction with 2025 IEEE International Conference on Big Data (BigData), December 2025, 37 downloads.
- P. Shukla and M. Halem, "DUNE: A Machine Learning Deep UNET++ based ensemble Approach to Monthly, Seasonal and Annual Climate Forecasting", Article, Artificial Intelligence for the Earth Systems, October 2025, 104 downloads.
- M. Islam, L. Elluri, and K. P. Joshi, "Integrating Knowledge Graphs with Retrieval-Augmented Generation to Automate IoT Device Security Compliance", InProceedings, 2025 IEEE International Conference on Intelligence and Security Informatics (ISI), July 2025, 1156 downloads.
2024
- S. Chattoraj and K. P. Joshi, "MedReg-KG: KnowledgeGraph for Streamlining Medical Device Regulatory Compliance", InProceedings, 4th Workshop on Knowledge Graphs and Big Data in Conjunction with IEEE BigData 2024, December 2024, 766 downloads.
- S. Chattoraj and K. P. Joshi, "Semantically Rich Approach to Automating Regulations of Medical Devices", InProceedings, IEEE International Conference on Digital Health (ICDH) , 2024 at IEEE World Congress on Services 2024, July 2024, 889 downloads.
- H. Oh, B. (. Kulvatunyou, A. Jones, and T. Finin, "Employing Word-Embedding for Schema Matching in Standard Lifecycle Management", Article, Journal of Industrial Information Integration, March 2024, 1240 downloads.
2023
- K. Echenim and K. P. Joshi, "IoT-Reg: A Comprehensive Knowledge Graph for Real-Time IoT Data Privacy Compliance", InProceedings, IEEE Big Data 2023, 3rd Workshop on Knowledge Graphs and Big Data, December 2023, 2253 downloads.
- K. Echenim, L. Elluri, and K. P. Joshi, "Ensuring Privacy Policy Compliance of Wearables with IoT Regulations", InProceedings, IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (IEEE TPS 2023), November 2023, 782 downloads.
- J. Clavin and K. P. Joshi, "Policy Integrated Blockchain to Automate HIPAA Part 2 Compliance", InProceedings, IEEE International Conference on Digital Health (ICDH) 2023 in IEEE World Congress on Services 2023, July 2023, 799 downloads.
2022
- A. Sheth, M. Gaur, K. Roy, R. Venkataraman, and V. Khandelwal, "Process Knowledge-Infused AI: Toward User-Level Explainability, Interpretability, and Safety", Article, IEEE Internet Computing, September 2022, 517 downloads.
- R. Yus, G. Bouloukakis, S. Mehrotra, and N. Venkatasubramanian, "The SemIoTic Ecosystem: A Semantic Bridge between IoT Devices and Smart Spaces", Article, ACM Transactions on Internet Technology, August 2022, 495 downloads.
- C. Hanks and M. Maiden, "CyberEnt: A Cybersecurity Domain Specific Dataset for Named Entity Recognition", Misc, UMBC Undergraduate Research and Creative Achievement Day, April 2022, 884 downloads.
2021
- J. Sleeman, I. Stajner, C. Keller, M. Halem, C. Hamer, R. Montuoro, B. Baker, and e., "The Integration of Artificial Intelligence for Improved Operational Air Quality Forecasting", InProceedings, AGU Fall Meeting 2021, December 2021.
- A. Kotal, A. Joshi, and K. P. Joshi, "The Effect of Text Ambiguity on creating Policy Knowledge Graphs", InProceedings, IEEE International Conference on Big Data and Cloud Computing (BDCloud 2021), September 2021, 808 downloads.
- D. Ziaei, J. Sleeman, M. Halem, V. Caicedo, R. M. Delgado, and B. Demoz, "Convolutional LSTM for Planetary Boundary Layer Height (PBLH) Prediction", InProceedings, AAAI 2021 Spring Symposium on Combining Artificial Intelligence and Machine Learning with Physical Sciences, March 2021, 711 downloads.
2020
- J. Sleeman, J. E. Dorband, and M. Halem, "A hybrid quantum enabled RBM advantage: convolutional autoencoders for quantum image compression and generative learning", InProceedings, Quantum Information Science, Sensing, and Computation XII, May 2020, 643 downloads.
- J. Sleeman, J. E. Dorband, and M. Halem, "A Hybrid Quantum Enabled RBM Advantage: Convolutional Autoencoders for Quantum Image Compression and Generative Learning", Article, arXiv preprint arXiv:2001.11946, January 2020, 985 downloads.
2019
- J. Sleeman, V. Caicedo, M. Halem, and B. Demoz, "Using Lidar and Machine Learning to Identify Planetary Boundary Layer Heights", InProceedings, American Geophysical Union Fall Meeting Abstracts, December 2019.
- J. Sleeman, M. Halem, and J. E. Dorband, "RBM Image Generation Using the D-Wave 2000Q", Misc, D-Wave Qubits North America Conference, September 2019, 791 downloads.
2018
- J. Sleeman, "Variational Autoencoders using D-Wave Quantum Annealing", InProceedings, American Geophysical Union Fall Meeting Abstracts, December 2018.
- S. N. Narayanan, A. Ganesan, K. P. Joshi, T. Oates, A. Joshi, and T. Finin, "Early Detection of Cybersecurity Threats Using Collaborative Cognition", InProceedings, Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing (CIC), October 2018, 3769 downloads, 60 citations.
2012
- K. P. Joshi, T. Finin, Y. Yesha, A. Joshi, N. Golpayegani, and N. Adam, "A Policy-based Approach to Smart Cloud Services", InProceedings, Proceedings of the Annual Service Research and Innovation Institute Global Conference, July 2012, 2016 downloads.
- J. Mayfield and T. Finin, "Evaluating the Quality of a Knowledge Base Populated from Text", InProceedings, Joint Workshop on Automatic Knowledge Base Construction and Web-scale Knowledge Extraction, June 2012, 5215 downloads.
- K. P. Joshi, Y. Yesha, T. Finin, and A. Joshi, "Policy based Cloud Services on a VCL platform", InProceedings, Proceedings of the first International IBM Cloud Academy Conference (ICA CON 2012), April 2012, 3279 downloads.
- W. Li, P. A. Kodeswaran, P. Jagtap, A. Joshi, and T. Finin, "Managing and Securing Critical Infrastructure - A Semantic Policy and Trust Driven Approach", InBook, Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges, January 2012, 1909 downloads.
2011
- R. Dharurkar, "Context-Aware Middleware for Activity Recognition", MastersThesis, University of Maryland, Baltimore County, May 2011, 1774 downloads.
- K. P. Joshi, A. Joshi, and Y. Yesha, "Managing the Quality of Virtualized Services", InProceedings, Proceedings of the SRII Global Conference 2011, March 2011, 2013 downloads.
2010
- D. Chapman, K. P. Joshi, Y. Yesha, M. Halem, Y. Yesha, and P. Nguyen, "Scientific Services on the Cloud", InBook, Handbook of Cloud Computing, September 2010, 1976 downloads.
2009
- A. Joshi, Y. Yesha, T. Finin, W. Li, and P. A. Kodeswaran, "A Policy and Trust Driven Framework for Securing Cyber Physical Systems", InProceedings, Workshop on Future Directions in Cyber-physical Systems Security, July 2009, 508 downloads.
- J. Mayfield, D. Alexander, B. J. Dorr, J. Eisner, T. Elsayed, T. Finin, C. Fink, M. Freedman, N. Garera, P. McNamee, D. Oard, C. Piatko, Z. Syed, R. Weischedel, D. Yarowsky, and e., "Cross-Document Coreference Resolution: A Key Technology for Learning by Reading", InProceedings, Proceedings of the AAAI 2009 Spring Symposium on Learning by Reading and Learning to Read, March 2009, 3672 downloads, 40 citations.
2008
- C. Tilmes, "Standardizing Interfaces for External Access to Data and Processing for the NASA Ozone Product Evaluation And Test Element", InProceedings, Proceedings of the 2008 Geoinformatics Conference , July 2008.
- T. Finin, A. Joshi, L. Kagal, J. Niu, R. Sandhu, W. H. Winsborough, and B. Thuraisingham, "ROWLBAC - Representing Role Based Access Control in OWL", InProceedings, Proceedings of the 13th Symposium on Access control Models and Technologies, June 2008, 7991 downloads, 350 citations.
- T. Finin, A. Joshi, L. Kagal, J. Niu, R. Sandhu, W. H. Winsborough, and B. Thuraisingham, "Role Based Access Control and OWL", InProceedings, Proceedings of the 4th OWLED Workshop on OWL: Experiences and Direction, April 2008, 3415 downloads.
- T. Finin, A. Joshi, L. Kagal, J. Niu, R. Sandhu, W. H. Winsborough, and B. Thuraisingham, "Using OWL to Model Role Based Access Control", TechReport, University of Maryland, Baltimore County, February 2008, 3328 downloads.
2007
- C. Parr, J. Sachs, L. Han, T. Wang, and T. Finin, "RDF123 and Spotter: Tools for generating OWL and RDF for biodiversity data in spreadsheets and unstructured text", InProceedings, Proceedings of Biodiversity Information Standards Annual Conference (TDWG 2007), October 2007, 2506 downloads, 3 citations.
- O. V. Ratsimor, "Opportunistic Bartering of Digital Goods and Services in Pervasive Environments", PhdThesis, University of Maryland, Baltimore County, August 2007, 2875 downloads.
2005
- R. Schauer, "A Mass Storage System Administrator Autonomic Assistant", MastersThesis, University of Maryland, Baltimore County, December 2005, 3229 downloads.
- A. Toninelli, J. Bradshaw, L. Kagal, and R. Montanari, "Rule-based and Ontology-based Policies: Toward a Hybrid Approach to Control Agents in Pervasive Environments", InProceedings, Proceedings of the Semantic Web and Policy Workshop, November 2005, 3005 downloads, 29 citations.
- M. Halem and R. Schauer, "A Mass Storage System Administrator Autonomic Assistant", InProceedings, Proceedings of the Second International Conference on Autonomic Computing, June 2005, 2593 downloads.
2003
- W. Jensen, T. Karygiannis, V. Korolev, S. Gavrila, and M. Iorga, "Policy Expression and Enforcement for Handheld Devices", Article, NISTIR 6981, May 2003, 1103 downloads.
- A. Joshi, "On Web, Semantics, and Data Mining: Intrusion Detection as a Case Study", InProceedings, Proceedings of the NSF Workshop on Next Generation Data Mining, May 2003, 3710 downloads, 4 citations.
- K. P. Joshi, A. Joshi, and Y. Yesha, "On Using a Warehouse to Analyze Web Logs", InCollection, Distributed and Parallel Databases, March 2003, 3272 downloads, 20 citations.
1999
- K. P. Joshi, A. Joshi, Y. Yesha, and R. Krishnapuram, "Warehousing and Mining Web Logs", InProceedings, Workshop on Web Information and Data Management, 1999 ACM Conference on Information and Knowledge Management (CIKM'99), November 1999, 4514 downloads, 60 citations.
- S. Quirolgico, K. Canfield, T. Finin, and J. A. Smith, "Communicating neural network knowledge between agents in a simulated aerial reconnaissance system", InProceedings, Proceedings of the First International Symposium on Agent Systems and Applications,, October 1999, 3155 downloads, 5 citations.
1998
- M. A. Rabi, T. Finin, A. Sherman, and Y. K. Labrou, "Secure Knowledge Query Manipulation Language: a security infrastructure for agent communication languages", TechReport, UMBC, November 1998, 290 downloads.
- M. A. Rabi, "Relationships among security and algebraic properties of cryptographic objects, and a security infrastructure for agent communication languages", PhdThesis, University of Maryland, Baltimore County, July 1998, 582 downloads.
Old Events
- Kelvin Information Extraction System
November 2, 2015 - Phd proposal: A Semantic Resolution Framework for Manufacturing Capability Data Integration
May 14, 2013 - MS defense: Social Media Analytics: Digital Footprints
May 13, 2013 - Information Extraction of Security related entities and concepts from unstructured text
April 1, 2013 - Predicting Chronic Diseases with Machine Learning
March 5, 2013 - An architecture for enterprise information interoperability
November 9, 2012 - Cyber-Physical Social Systems: Research Challenges
April 6, 2012 - Semantic Web Meetup
November 15, 2011 - Beyond Reactive Management of Network Intrusions
October 12, 2011 - Context-Aware Middleware for Activity Recognition
May 19, 2011