Tags: pda

Active Projects

  1. Medical Data Polygraph

Publications

2025

  1. S. Chukkapalli, D. Ledbetter, A. Joshi, T. Finin, and J. Freeman, "Impostors Among Us: An Agentic Approach to Identifying and Resolving Conflicts in Collaborative Network Environments", InProceedings, IEEE Military Communications Conference, October 2025, 244 downloads.

2024

  1. H. Oh, B. (. Kulvatunyou, A. Jones, and T. Finin, "Employing Word-Embedding for Schema Matching in Standard Lifecycle Management", Article, Journal of Industrial Information Integration, March 2024, 1398 downloads.

2023

  1. S. Devare, M. Koupaee, G. Gunapati, S. Ghosh, S. Vallurupalli, Y. K. Lal, F. Ferraro, N. Chambers, G. Durrett, R. Mooney, K. Erk, and N. Balasubramanian, "SAGEViz: SchemA GEneration and Visualization", InProceedings, Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing: System Demonstrations, December 2023, 355 downloads.
  2. N. Das, A. Kotal, D. Roseberry, and A. Joshi, "Change Management using Generative Modeling on Digital Twins", InProceedings, International Conference on Intelligence and Security Informatics (ISI), October 2023, 656 downloads.
  3. R. Walid, K. P. Joshi, and S. Choi, "Semantically Rich Differential Access to Secure Cloud EHR", InProceedings, 9th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2023), May 2023, 760 downloads.
  4. M. Rezaee and F. Ferraro, "RevUp: Revise and Update Information Bottleneck for Event Representation", InProceedings, Proceedings of the 17th Conference of the European Chapter of the Association for Computational Linguistics, May 2023, 446 downloads.

2022

  1. U. Lokala, F. Lamay, R. Daniulaityte, M. Gaur, A. Gyrard, K. Thirunarayan, U. Kursuncu, and A. Sheth, "Drug Abuse Ontology to Harness Web-Based Data for Substance Use Epidemiology Research: Ontology Development Study", Article, JMIR Public Health and Surveillance, December 2022, 660 downloads.

2021

  1. L. Elluri, S. Chukkapalli, K. P. Joshi, T. Finin, and A. Joshi, "A BERT Based Approach to Measure Web Services Policies Compliance With GDPR", Article, IEEE Access, November 2021, 2037 downloads.
  2. L. Elluri, A. Piplai, A. Kotal, A. Joshi, and K. P. Joshi, "A Policy-Driven Approach to Secure Extraction of COVID-19 Data From Research Papers", Article, Frontiers in Big Data, doi: 10.3389/fdata.2021.701966, August 2021, 624 downloads.

2020

  1. L. Elluri, K. P. Joshi, and A. Kotal, "Measuring Semantic Similarity across EU GDPR Regulation and Cloud Privacy Policies", InProceedings, 7th International Workshop on Privacy and Security of Big Data (PSBD 2020), in conjunction with 2020 IEEE International Conference on Big Data (IEEE BigData 2020), December 2020, 905 downloads.
  2. S. Dasgupta, A. Piplai, A. Kotal, and A. Joshi, "A Comparative Study of Deep Learning based Named Entity Recognition Algorithms for Cybersecurity", InProceedings, IEEE International Conference on Big Data 2020, December 2020, 1426 downloads.

2019

  1. S. Mittal, A. Joshi, and T. Finin, "Cyber-All-Intel: An AI for Security Related Threat Intelligence", TechReport, CoRR abs/1905.02895, May 2019, 719 downloads.
  2. S. Mittal, "Knowledge for Cyber Threat Intelligence", PhdThesis, University of Maryland, Baltimore County, May 2019, 671 downloads.
  3. S. Mittal, "Knowledge for Cyber Threat Intelligence", PhdThesis, May 2019, 321 downloads.

2016

  1. S. Mittal, P. K. Das, V. Mulwad, A. Joshi, and T. Finin, "CyberTwitter: Using Twitter to generate alerts for Cybersecurity Threats and Vulnerabilities", InProceedings, IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), August 2016, 4579 downloads.

2015

  1. M. Ahluwalia, Z. Chen, A. Gangopadhyay, and Y. Yesha, "Target-Based, Privacy Preserving, and Incremental Association Rule Mining", Article, IEEE Transactions on Services Computing, November 2015, 1303 downloads.

2014

  1. R. Yus, V. Mulwad, T. Finin, and E. Mena, "Infoboxer: Using Statistical and Semantic Knowledge to Help Create Wikipedia Infoboxes", InProceedings, 13th International Semantic Web Conference (ISWC 2014), Riva del Garda (Italy), October 2014, 1427 downloads.

2013

  1. P. K. Das, A. Joshi, and T. Finin, "Energy efficient sensing for managing context and privacy on smartphones", InProceedings, First Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn 2013) co-located with the 12th International Semantic Web Conference (ISWC 2013), Sydney, Australia., October 2013, 1659 downloads.
  2. Y. Peng and Y. Kang, "Ontology-Based Dynamic Forms for Manufacturing Capability Information Collection", InProceedings, IFIP Advances in Information and Communication Technology, September 2013.

2011

  1. J. Martineau, "Identifying and Isolating Text Classification Signals from Domain and Genre Noise for Sentiment Analysis", PhdThesis, University of Maryland, Baltimore County, December 2011, 2888 downloads.

2010

  1. I. Mayk, A. Patwardhan, and e., "Tactical Information Technology for Assured Network Operations Information Dissemination and Management for Battle Command Support Services", InProceedings, Proceedings of the 27th Army Science Conference, November 2010, 1652 downloads.
  2. K. Viswanathan and T. Finin, "Text Based Similarity Metrics and Delta for Semantic Web Graphs", InProceedings, Proceedings of the Poster Session of 9th International Semantic Web Conference, November 2010, 2895 downloads.
  3. K. Viswanathan and T. Finin, "Text Based Similarity and Delta for Semantic Web Graphs", TechReport, University of Maryland, Baltimore County, August 2010, 2809 downloads.
  4. W. Murnane, "Improving Accuracy of Named Entity Recognition on Social Media Data", MastersThesis, University of Maryland, Baltimore County, August 2010, 6090 downloads, 3 citations.
  5. K. Viswanathan, "Text Based Similarity Metrics and Delta for Semantic Web Graphs", MastersThesis, UMBC, June 2010, 1910 downloads.
  6. Y. Peng, S. Zhang, and R. Pan, "Bayesian Network Reasoning with Uncertain Evidences", Article, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, June 2010, 2462 downloads.
  7. T. Finin, W. Murnane, A. Karandikar, N. Keller, J. Martineau, and M. Dredze, "Annotating named entities in Twitter data with crowdsourcing", InProceedings, Proceedings of the NAACL Workshop on Creating Speech and Text Language Data With Amazon's Mechanical Turk, June 2010, 3499 downloads.

2009

  1. W. Jensen and V. Korolev, "A Location-Based Mechanism for Mobile Device Security", InProceedings, Lecture Notes in Artificial Intelligence, March 2009.

2008

  1. P. A. Kodeswaran, S. B. Kodeswaran, A. Joshi, and T. Finin, "Enforcing security in semantics driven policy based networks", InProceedings, Proceedings of the 24th International Conference on Data Engineering Workshops, Secure Semantic Web, April 2008, 2770 downloads.

2007

  1. P. Kolari, "Detecting Spam Blogs: An Adaptive Online Approach", PhdThesis, Ph.D. Dissertation, December 2007, 9070 downloads, 3 citations.
  2. O. V. Ratsimor, "Opportunistic Bartering of Digital Goods and Services in Pervasive Environments", PhdThesis, University of Maryland, Baltimore County, August 2007, 2911 downloads.
  3. P. Kolari, T. Finin, A. Java, and A. Joshi, "Towards Spam Detection at Ping Servers", InProceedings, Proceedings of the First International Conference on Web and Social Media (ICWSM), March 2007, 3049 downloads, 5 citations.
  4. P. Reddivari, T. Finin, and A. Joshi, "Policy-Based Access Control for an RDF Store", InProceedings, Proceedings of the IJCAI-07 Workshop on Semantic Web for Collaborative Knowledge Acquisition, January 2007, 8472 downloads, 34 citations.

2006

  1. R. Pan, Y. Peng, and Z. Ding, "Belief Update in Bayesian Networks Using Uncertain Evidence", InProceedings, Proceedings of the 18th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2006), November 2006, 3965 downloads.
  2. H. Zeng, M. Alhossaini, L. Ding, R. Fikes, and D. L. McGuinness, "Computing Trust from Revision History", InProceedings, Proceedings of the 2006 International Conference on Privacy, Security and Trust, October 2006, 3600 downloads, 55 citations.
  3. E. Rukzio, M. Paolucci, T. Finin, P. Wisner, and T. Payne, "Mobile Interaction with the Real World", Proceedings, Proceedings of the 8th conference on human-computer interaction with mobile devices and services (MobileHCI '06), September 2006, 331 downloads.
  4. E. Rukzio, M. Paolucci, T. Finin, P. Wisner, and T. Payne, "Proceedings of the workshop on Mobile Interaction with the Real World (MIRW 2006)", Proceedings, September 2006, 376 downloads.
  5. R. Pan, "Semantic-Linked Bayesian Networks: A Framework for Bayesian Network Mapping", PhdThesis, University of Maryland, Baltimore County, August 2006.
  6. P. Kolari, A. Java, and T. Finin, "Characterizing the Splogosphere", InProceedings, Proceedings of the 3rd Annual Workshop on Weblogging Ecosystem: Aggregation, Analysis and Dynamics, 15th World Wid Web Conference, May 2006, 8028 downloads, 84 citations.
  7. D. L. McGuinness, H. Zeng, P. Pinheiro da Silva, L. Ding, D. Narayanan, and M. Bhaowal, "Investigations into Trust for Collaborative Information Repositories: A Wikipedia Case Study", InProceedings, Proceedings of the Workshop on Models of Trust for the Web, May 2006, 4277 downloads, 45 citations.

2005

  1. P. Reddivari, T. Finin, and A. Joshi, "Policy based Access Control for a RDF Store", InProceedings, Proceedings of the Policy Management for the Web Workshop, May 2005, 3656 downloads, 34 citations.
  2. L. Kagal, T. Finin, and J. A. Hendler, "Proceedings of the Policy Management for the Web workshop", Proceedings, World Wide Web Consortium, May 2005, 3041 downloads.
  3. M. Chopra, "Applying Policy Based Access Control and XML Digital Signatures for Security in Pervasive Computing Environments", MastersThesis, May 2005, 3053 downloads.
  4. L. Kagal, T. Finin, and A. Joshi, "Towards a Well-Behaved Web", TechReport, UMBC, January 2005, 312 downloads.

2004

  1. X. Luan, "Adaptive Middle Agent for Service Matching in the Semantic Web: A Quantitative Approach", PhdThesis, University of Maryland, Baltimore County, November 2004, 3951 downloads.
  2. W. Jensen, S. Gavrila, and V. Korolev, "A Unified Framework for Mobile Device Security", InProceedings, Security and Management 2004, September 2004.
  3. A. B. Shah, L. Kagal, T. Finin, and A. Joshi, "Policy Development Software for Security Policies", InProceedings, DIAMACS Workshop on Usable Privacy and Security Software, July 2004, 300 downloads.
  4. M. A. Grasso, "Clinical applications of handheld computing", Proceedings, Proceedings of the 17th IEEE Symposium on Computer-Based Medical Systems, June 2004.
  5. J. Parker, J. Pinkston, and A. Joshi, "On Intrusion Detection in Mobile Ad Hoc Networks", InProceedings, 23rd IEEE International Performance Computing and Communications Conference -- Workshop on Information Assurance , April 2004, 5195 downloads, 15 citations.

2003

  1. L. Ding, L. Zhou, and T. Finin, "Trust Based Knowledge Outsourcing for Semantic Web Agents", InProceedings, Proceedings of the 2003 IEEE/WIC International Conference on Web Intelligence, October 2003, 3763 downloads, 47 citations.
  2. W. Jensen, S. Gavrila, and V. Korolev, "Picture Password: A Visual Login Technique for Mobile Devices", Article, NISTIR 7030, July 2003.
  3. W. Jensen, T. Karygiannis, V. Korolev, S. Gavrila, and M. Iorga, "Policy Expression and Enforcement for Handheld Devices", Article, NISTIR 6981, May 2003, 1138 downloads.
  4. S. Avancha, P. D'Souza, F. Perich, A. Joshi, and Y. Yesha, "P2P M-Commerce in Pervasive Environments", Article, ACM SIGecom Exchanges, January 2003, 5351 downloads, 16 citations.
  5. X. Luan, Y. Peng, and T. Finin, "Learning in the Broker Agent", InBook, Innovative Concepts for Agent-Based Systems, January 2003, 1452 downloads.

2002

  1. L. Kagal, V. Korolev, S. Avancha, A. Joshi, T. Finin, and Y. Yesha, "Centaurus : An Infrastructure for Service Management in Ubiquitous Computing", Article, ACM Wireless Networks Journal, November 2002, 3071 downloads, 19 citations.
  2. L. Kagal, V. Korolev, S. Avancha, A. Joshi, and T. Finin, "An Approach to Dynamic Service Management in Pervasive Computing", InProceedings, Proceedings of the Grace Hopper Celebration of Women in Computing, October 2002, 3483 downloads.
  3. W. Jensen, T. Karygiannis, S. Gavrila, and V. Korolev, "Assigning and Enforcing Security Policies on Handheld Devices", InProceedings, 14th Annual Canadian Information Technology Security Symposium , May 2002, 252 downloads.
  4. A. Joshi, T. Finin, and Y. Yesha, "Agents, Mobility, and M-services: Creating the Next Generation Applications and Infrastructure on Mobile Ad-Hoc Networks", InBook, Developing an Infrastructure for Mobile and Wireless Systems, January 2002, 1118 downloads.

2000

  1. H. Chen, T. Finin, A. Joshi, D. Chakraborty, and L. Xu, "Service Discovery in the Future Electronic Market", Article, Workshop on Knowledge-based Electronic Markets, AAAI-2000, July 2000, 3024 downloads, 30 citations.

1993

  1. T. Finin, C. Nicholas, and Y. Yesha, "Information and Knowledge Management, Expanding the Definition of "Database"", Book, Springer, January 1993, 330 downloads.

1987

  1. S. Schocken and T. Finin, "Prolog Meta-Interpreters for Rule-Based Inference Under Uncertainty", TechReport, New York University, September 1987, 782 downloads.

1986

  1. T. Finin, "Interactive classification: A technique for acquiring and maintaining knowledge bases", Article, Proceedings of the IEEE, October 1986, 2982 downloads, 19 citations.
  2. T. Finin and D. Silverman, "Interactive Classification as a Knowledge Acquisition Tool", InBook, Expert Data Base Systems, January 1986, 472 downloads.

Old Conferences

  1. Policy Management for the Web
    May 10, 2005