Tags: nsf

Research Areas

  1. ecommerce



  1. A. Piplai, A. Joshi, and T. Finin, "Offline RL+CKG: A hybrid AI model for cybersecurity tasks", InProceedings, AAAI Spring Symposium on Challenges Requiring the Combination of Machine Learning and Knowledge Engineering, March 2023, 176 downloads.


  1. K. Roy, Y. Zi, V. Narayanan, M. Gaur, and A. Sheth, "KSAT: Knowledge-infused Self Attention Transformer -- Integrating Multiple Domain-Specific Contexts", TechReport, arXiv:2210.04307 [cs.CL], October 2022, 67 downloads.


  1. P. Ranade, A. Piplai, A. Joshi, and T. Finin, "CyBERT: Contextualized Embeddings for the Cybersecurity Domain", InProceedings, IEEE International Conference on Big Data, December 2021, 1183 downloads.
  2. J. Sleeman, I. Stajner, C. Keller, M. Halem, C. Hamer, R. Montuoro, B. Baker, and e., "The Integration of Artificial Intelligence for Improved Operational Air Quality Forecasting", InProceedings, AGU Fall Meeting 2021, December 2021.
  3. M. P. Joshi, K. P. Joshi, and T. Finin, "Delegated Authorization Framework for EHR Services using Attribute Based Encryption", Article, IEEE Transactions on Services Computing, November 2021, 1273 downloads.
  4. S. Chukkapalli, P. Ranade, S. Mittal, and A. Joshi, "A Privacy Preserving Anomaly Detection Framework for Cooperative Smart Farming Ecosystem", InProceedings, IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications, November 2021, 291 downloads.
  5. M. P. Joshi, K. P. Joshi, and T. Finin, "Delegated Authorization Framework for EHR Services using Attribute Based Encryption", InProceedings, IEEE World Congress on Services, September 2021, 237 downloads.
  6. P. Ranade, A. Piplai, S. Mittal, A. Joshi, and T. Finin, "Generating Fake Cyber Threat Intelligence Using Transformer-Based Models", Proceedings, International Joint Conference on Neural Networks (IJCNN 2021), July 2021, 543 downloads.
  7. R. Ayanzadeh, J. E. Dorband, M. Halem, and T. Finin, "Multi-Qubit Correction for Quantum Annealers", Article, Nature Scientific Reports, July 2021, 431 downloads.
  8. A. Nagar, L. Elluri, and K. P. Joshi, "Automated Compliance of Mobile Wallet Payments for Cloud Services", InProceedings, 7th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2021), May 2021, 342 downloads.


  1. J. Sleeman, V. Caicedo, M. Halem, and B. Demoz, "Using Lidar and Machine Learning to Identify Planetary Boundary Layer Heights", InProceedings, American Geophysical Union Fall Meeting Abstracts, December 2019.
  2. C. Kery, N. Pillai, C. Matuszek, and F. Ferraro, "Building Language-Agnostic Grounded Language Learning Systems", InProceedings, 28th International Conference on Robot and Human Interactive Communication (Ro-Man), October 2019, 325 downloads.
  3. K. Sane, K. P. Joshi, and S. Mittal, "A Semantic Approach for Automating Knowledge in Policies of Cyber Insurance Services", InProceedings, IEEE International Conference on Web Services (IEEE ICWS) 2019, July 2019, 1028 downloads.
  4. A. Renjan, S. N. Narayanan, and K. P. Joshi, "A Policy based Framework for Privacy-Respecting Deep Packet Inspection of High Velocity Network Traffic", InProceedings, 5th IEEE International Conference on Big Data Security on Cloud, May 2019, 536 downloads.


  1. M. P. Joshi, K. P. Joshi, and T. Finin, "Attribute Based Encryption for Secure Access to Cloud Based EHR Systems", InProceedings, International Conference on Cloud Computing, July 2018, 1765 downloads.
  2. A. Nagar and K. P. Joshi, "A Semantically Rich Knowledge Representation of PCI DSS for Cloud Services", InProceedings, 6th International IBM Cloud Academy Conference ICACON 2018, Japan, May 2018, 1273 downloads.


  1. S. K. Singh, K. Khanna, R. Bose, and A. Joshi, "Joint transformation based detection of false data injection attacks in smart grid", Article, IEEE Transactions on Industrial Informatics, June 2017, 1337 downloads.


  1. K. Khanna, R. Bose, and A. Joshi, "On Detecting False Data Injection with Limited Network Information using Statistical Techniques", InProceedings, IEEE Power and Energy Society General Meeting, Chicago, 2017, November 2016, 772 downloads.
  2. S. N. Narayanan, S. Mittal, and A. Joshi, "Using Semantic Technologies to Mine Vehicular Context for Security", InProceedings, 37th IEEE Sarnoff Symposium (2016), September 2016, 1351 downloads.


  1. Y. Huang, Y. Yesha, and S. Zhou, "A database-based distributed computation architecture with Accumulo and D4M: An application of eigensolver for large sparse matrix", InProceedings, IEEE International Conference on Big Data, November 2015, 1217 downloads.


  1. J. Sleeman and T. Finin, "Taming Wild Big Data", InProceedings, AAAI Fall Symposium on Natural Language Access to Big Data, November 2014, 1233 downloads.


  1. N. Noy, D. L. McGuinness, and e., "Research Challenges and Opportunities in Knowledge Representation", TechReport, February 2013, 97 downloads.


  1. V. Agrawal, L. Shastri, M. Singh, and T. Finin, "Activity Context Representation: Techniques and Languages", InProceedings, February 2012, 38 downloads.
  2. A. Lahane, Y. Yesha, M. A. Grasso, A. Joshi, and e., "Detection of Unsafe Action from Laparoscopic Cholecystectomy Video", InProceedings, Proceedings of ACM SIGHIT International Health Informatics Symposium, January 2012, 1638 downloads.


  1. J. Martineau, "Identifying and Isolating Text Classification Signals from Domain and Genre Noise for Sentiment Analysis", PhdThesis, University of Maryland, Baltimore County, December 2011, 2469 downloads.


  1. C. Tilmes, Y. Yesha, and M. Halem, "Tracking Provenance of Earth Science Data", Article, Earth Science Informatics, November 2010, 1536 downloads.
  2. C. Tilmes, Y. Yesha, and M. Halem, "Provenance Artifact Identification in the Atmospheric Composition Processing System (ACPS)", InProceedings, Proceedings of the 2nd Workshop on the Theory and Practice of Provenance, February 2010, 1135 downloads, 1 citation.


  1. M. A. Grasso, "The Effect of Computerized Resident Sign-Out on Clarity", Proceedings, Proceedings of the AMIA 2009 Annual Symposium, November 2009, 2242 downloads.
  2. M. Halem, N. Most, C. Tilmes, K. Stewart, Y. Yesha, D. Chapman, and P. Nguyen, "Service-Oriented Atmospheric Radiances (SOAR): Gridding and Analysis Services for Multisensor Aqua IR Radiance Data for Climate Studies", Article, IEEE Transactions on Geoscience and Remote Sensing, January 2009.


  1. C. Tilmes and A. J. Fleig, "Provenance Tracking in an Earth Science Data Processing System", InProceedings, Proceedings of Provenance and Annotation of Data and Processes: Second International Provenance and Annotation Workshop, Ipaw 2008, , June 2008, 2033 downloads.


  1. C. Parr, J. Sachs, L. Han, and T. Wang, "RDF123 and Spotter: Tools for generating OWL and RDF for biodiversity data in spreadsheets and unstructured text", InProceedings, Proceedings of Biodiversity Information Standards Annual Conference (TDWG 2007), October 2007, 2060 downloads, 3 citations.
  2. L. Han, C. Parr, J. Sachs, A. Joshi, and T. Finin, "RDF123: a mechanism to transform spreadsheets to RDF", TechReport, University of Maryland, Baltimore County, August 2007, 9136 downloads, 9 citations.


  1. C. Parr, J. Sachs, A. Parafiynyk, T. Wang, and R. Espinosa, "ETHAN: the Evolutionary Trees and Natural History Ontology", TechReport, University of Maryland, Baltimore County, November 2006, 4481 downloads, 1 citation.


  1. V. Parekh, "Applying Ontologies and Semantic Web technologies to Environmental Sciences and Engineering", MastersThesis, University of Maryland, Baltimore County, May 2005, 14094 downloads, 1 citation.


  1. M. Sheshagiri, "Automatic Composition and Invocation of Semantic Web Services", MastersThesis, UMBC, August 2004, 2768 downloads, 11 citations.


  1. M. A. Grasso, "Interdisciplinary computer science, guest editor introduction", Article, ACM Crossroads, March 2003, 1376 downloads.
  2. S. B. Kodeswaran, O. V. Ratsimor, A. Joshi, T. Finin, and Y. Yesha, "Using Peer-to-Peer Data Routing for Infrastructure-based Wireless Networks", InProceedings, First IEEE International Conference on Pervasive Computing and Communications , March 2003, 2755 downloads, 11 citations.


  1. T. Finin and A. Joshi, "Agents, Trust, and Information Access on the Semantic Web", Article, SIGMOD Record, December 2002, 1380 downloads.
  2. O. V. Ratsimor, S. B. Kodeswaran, T. Finin, A. Joshi, and Y. Yesha, "Combining Infrastructure and Ad hoc Collaboration For Data Management in Mobile Wireless Networks", InProceedings, Workshop on Ad hoc Communications and Collaboration in Ubiquitous Computing Environments, November 2002, 3125 downloads, 13 citations.


  1. S. Quirolgico, K. Canfield, T. Finin, and J. A. Smith, "Merging Neural Networks in a Multi-Agent System", TechReport, TR EB-2000-01, January 2000, 6 downloads.


  1. Y. Chen, Y. Peng, Y. K. Labrou, and R. S. Cost, "Negotiating agents for supply chain management", InProceedings, Proceedings of the AAAI Workshop on Artificial Intelligence for Electronic Commerce, July 1999, 2842 downloads, 14 citations.
  2. Y. Chen, Y. Peng, T. Finin, Y. K. Labrou, and R. S. Cost, "Negotiating Agents for Supply Chain Management", InProceedings, AAAI Workshop on Artificial Intelligence for Electronic Commerce, July 1999, 37 downloads.


  1. R. Neches, R. Fikes, T. Finin, T. Gruber, R. Patil, T. Senator, and W. Swartout, "Enabling Technology for Knowledge Sharing", Article, AI Magazine, August 1991, 2607 downloads, 1202 citations.


  1. T. Finin, "Casting the Rendezvous Analyzer Rules into Augmented Transition Network Form", TechReport, IBM Research Report RJ 2146, November 1978.