Tags: nsf

Research Areas

  1. ecommerce

Publications

2023

  1. K. Echenim and K. P. Joshi, "IoT-Reg: A Comprehensive Knowledge Graph for Real-Time IoT Data Privacy Compliance", InProceedings, IEEE Big Data 2023, 3rd Workshop on Knowledge Graphs and Big Data, December 2023, 71 downloads.
  2. A. Piplai, A. Joshi, and T. Finin, "Offline RL+CKG: A hybrid AI model for cybersecurity tasks", InProceedings, AAAI Spring Symposium on Challenges Requiring the Combination of Machine Learning and Knowledge Engineering, March 2023, 234 downloads.

2022

  1. K. Roy, Y. Zi, V. Narayanan, M. Gaur, and A. Sheth, "KSAT: Knowledge-infused Self Attention Transformer -- Integrating Multiple Domain-Specific Contexts", TechReport, arXiv:2210.04307 [cs.CL], October 2022, 98 downloads.

2021

  1. P. Ranade, A. Piplai, A. Joshi, and T. Finin, "CyBERT: Contextualized Embeddings for the Cybersecurity Domain", InProceedings, IEEE International Conference on Big Data, December 2021, 1320 downloads.
  2. J. Sleeman, I. Stajner, C. Keller, M. Halem, C. Hamer, R. Montuoro, B. Baker, and e., "The Integration of Artificial Intelligence for Improved Operational Air Quality Forecasting", InProceedings, AGU Fall Meeting 2021, December 2021.
  3. M. P. Joshi, K. P. Joshi, and T. Finin, "Delegated Authorization Framework for EHR Services using Attribute Based Encryption", Article, IEEE Transactions on Services Computing, November 2021, 1358 downloads.
  4. S. Chukkapalli, P. Ranade, S. Mittal, and A. Joshi, "A Privacy Preserving Anomaly Detection Framework for Cooperative Smart Farming Ecosystem", InProceedings, IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications, November 2021, 333 downloads.
  5. M. P. Joshi, K. P. Joshi, and T. Finin, "Delegated Authorization Framework for EHR Services using Attribute Based Encryption", InProceedings, IEEE World Congress on Services, September 2021, 281 downloads.
  6. P. Ranade, A. Piplai, S. Mittal, A. Joshi, and T. Finin, "Generating Fake Cyber Threat Intelligence Using Transformer-Based Models", Proceedings, International Joint Conference on Neural Networks (IJCNN 2021), July 2021, 592 downloads.
  7. R. Ayanzadeh, J. E. Dorband, M. Halem, and T. Finin, "Multi-Qubit Correction for Quantum Annealers", Article, Nature Scientific Reports, July 2021, 533 downloads.
  8. A. Nagar, L. Elluri, and K. P. Joshi, "Automated Compliance of Mobile Wallet Payments for Cloud Services", InProceedings, 7th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2021), May 2021, 399 downloads.

2019

  1. J. Sleeman, V. Caicedo, M. Halem, and B. Demoz, "Using Lidar and Machine Learning to Identify Planetary Boundary Layer Heights", InProceedings, American Geophysical Union Fall Meeting Abstracts, December 2019.
  2. C. Kery, N. Pillai, C. Matuszek, and F. Ferraro, "Building Language-Agnostic Grounded Language Learning Systems", InProceedings, 28th International Conference on Robot and Human Interactive Communication (Ro-Man), October 2019, 369 downloads.
  3. K. Sane, K. P. Joshi, and S. Mittal, "A Semantic Approach for Automating Knowledge in Policies of Cyber Insurance Services", InProceedings, IEEE International Conference on Web Services (IEEE ICWS) 2019, July 2019, 1120 downloads.
  4. A. Renjan, S. N. Narayanan, and K. P. Joshi, "A Policy based Framework for Privacy-Respecting Deep Packet Inspection of High Velocity Network Traffic", InProceedings, 5th IEEE International Conference on Big Data Security on Cloud, May 2019, 588 downloads.

2018

  1. M. P. Joshi, K. P. Joshi, and T. Finin, "Attribute Based Encryption for Secure Access to Cloud Based EHR Systems", InProceedings, International Conference on Cloud Computing, July 2018, 1811 downloads.
  2. A. Nagar and K. P. Joshi, "A Semantically Rich Knowledge Representation of PCI DSS for Cloud Services", InProceedings, 6th International IBM Cloud Academy Conference ICACON 2018, Japan, May 2018, 1329 downloads.

2017

  1. S. K. Singh, K. Khanna, R. Bose, and A. Joshi, "Joint transformation based detection of false data injection attacks in smart grid", Article, IEEE Transactions on Industrial Informatics, June 2017, 1401 downloads.

2016

  1. K. Khanna, R. Bose, and A. Joshi, "On Detecting False Data Injection with Limited Network Information using Statistical Techniques", InProceedings, IEEE Power and Energy Society General Meeting, Chicago, 2017, November 2016, 807 downloads.
  2. S. N. Narayanan, S. Mittal, and A. Joshi, "Using Semantic Technologies to Mine Vehicular Context for Security", InProceedings, 37th IEEE Sarnoff Symposium (2016), September 2016, 1383 downloads.

2015

  1. Y. Huang, Y. Yesha, and S. Zhou, "A database-based distributed computation architecture with Accumulo and D4M: An application of eigensolver for large sparse matrix", InProceedings, IEEE International Conference on Big Data, November 2015, 1260 downloads.

2014

  1. J. Sleeman and T. Finin, "Taming Wild Big Data", InProceedings, AAAI Fall Symposium on Natural Language Access to Big Data, November 2014, 1272 downloads.

2013

  1. N. Noy, D. L. McGuinness, and e., "Research Challenges and Opportunities in Knowledge Representation", TechReport, February 2013, 152 downloads.

2012

  1. V. Agrawal, L. Shastri, M. Singh, and T. Finin, "Activity Context Representation: Techniques and Languages", InProceedings, February 2012, 82 downloads.
  2. A. Lahane, Y. Yesha, M. A. Grasso, A. Joshi, and e., "Detection of Unsafe Action from Laparoscopic Cholecystectomy Video", InProceedings, Proceedings of ACM SIGHIT International Health Informatics Symposium, January 2012, 1682 downloads.

2011

  1. J. Martineau, "Identifying and Isolating Text Classification Signals from Domain and Genre Noise for Sentiment Analysis", PhdThesis, University of Maryland, Baltimore County, December 2011, 2574 downloads.

2010

  1. C. Tilmes, Y. Yesha, and M. Halem, "Tracking Provenance of Earth Science Data", Article, Earth Science Informatics, November 2010, 1572 downloads.
  2. C. Tilmes, Y. Yesha, and M. Halem, "Provenance Artifact Identification in the Atmospheric Composition Processing System (ACPS)", InProceedings, Proceedings of the 2nd Workshop on the Theory and Practice of Provenance, February 2010, 1170 downloads, 1 citation.

2009

  1. M. A. Grasso, "The Effect of Computerized Resident Sign-Out on Clarity", Proceedings, Proceedings of the AMIA 2009 Annual Symposium, November 2009, 2280 downloads.
  2. M. Halem, N. Most, C. Tilmes, K. Stewart, Y. Yesha, D. Chapman, and P. Nguyen, "Service-Oriented Atmospheric Radiances (SOAR): Gridding and Analysis Services for Multisensor Aqua IR Radiance Data for Climate Studies", Article, IEEE Transactions on Geoscience and Remote Sensing, January 2009.

2008

  1. C. Tilmes and A. J. Fleig, "Provenance Tracking in an Earth Science Data Processing System", InProceedings, Proceedings of Provenance and Annotation of Data and Processes: Second International Provenance and Annotation Workshop, Ipaw 2008, , June 2008, 2061 downloads.

2007

  1. C. Parr, J. Sachs, L. Han, T. Wang, and T. Finin, "RDF123 and Spotter: Tools for generating OWL and RDF for biodiversity data in spreadsheets and unstructured text", InProceedings, Proceedings of Biodiversity Information Standards Annual Conference (TDWG 2007), October 2007, 2099 downloads, 3 citations.
  2. L. Han, C. Parr, J. Sachs, A. Joshi, and T. Finin, "RDF123: a mechanism to transform spreadsheets to RDF", TechReport, University of Maryland, Baltimore County, August 2007, 9204 downloads, 9 citations.

2006

  1. C. Parr, J. Sachs, A. Parafiynyk, T. Wang, R. Espinosa, and T. Finin, "ETHAN: the Evolutionary Trees and Natural History Ontology", TechReport, TR-EBQ-320-2006, November 2006, 4531 downloads, 1 citation.

2005

  1. V. Parekh, "Applying Ontologies and Semantic Web technologies to Environmental Sciences and Engineering", MastersThesis, University of Maryland, Baltimore County, May 2005, 14173 downloads, 1 citation.

2004

  1. M. Sheshagiri, "Automatic Composition and Invocation of Semantic Web Services", MastersThesis, UMBC, August 2004, 2802 downloads, 11 citations.

2003

  1. M. A. Grasso, "Interdisciplinary computer science, guest editor introduction", Article, ACM Crossroads, March 2003, 1416 downloads.
  2. S. B. Kodeswaran, O. V. Ratsimor, A. Joshi, T. Finin, and Y. Yesha, "Using Peer-to-Peer Data Routing for Infrastructure-based Wireless Networks", InProceedings, First IEEE International Conference on Pervasive Computing and Communications , March 2003, 2786 downloads, 11 citations.

2002

  1. T. Finin and A. Joshi, "Agents, Trust, and Information Access on the Semantic Web", Article, SIGMOD Record, December 2002, 1418 downloads.
  2. O. V. Ratsimor, S. B. Kodeswaran, T. Finin, A. Joshi, and Y. Yesha, "Combining Infrastructure and Ad hoc Collaboration For Data Management in Mobile Wireless Networks", InProceedings, Workshop on Ad hoc Communications and Collaboration in Ubiquitous Computing Environments, November 2002, 3161 downloads, 13 citations.

2000

  1. S. Quirolgico, K. Canfield, T. Finin, and J. A. Smith, "Merging Neural Networks in a Multi-Agent System", TechReport, TR EB-2000-01, January 2000, 49 downloads.

1999

  1. Y. Chen, Y. Peng, Y. K. Labrou, R. S. Cost, and T. Finin, "Negotiating agents for supply chain management", InProceedings, Proceedings of the AAAI Workshop on Artificial Intelligence for Electronic Commerce, July 1999, 2882 downloads, 14 citations.
  2. Y. Chen, Y. Peng, T. Finin, Y. K. Labrou, and R. S. Cost, "Negotiating Agents for Supply Chain Management", InProceedings, AAAI Workshop on Artificial Intelligence for Electronic Commerce, July 1999, 69 downloads.

1991

  1. R. Neches, R. Fikes, T. Finin, T. Gruber, R. Patil, T. Senator, and W. Swartout, "Enabling Technology for Knowledge Sharing", Article, AI Magazine, August 1991, 2668 downloads, 1202 citations.

1978

  1. T. Finin, "Casting the Rendezvous Analyzer Rules into Augmented Transition Network Form", TechReport, IBM Research Report RJ 2146, November 1978.