Tags: probability

Past Projects

  1. Bayes OWL

Publications

2022

  1. R. Ayanzadeh, J. E. Dorband, M. Halem, and T. Finin, "Quantum-Assisted Greedy Algorithms", InProceedings, Proceedings of the International Geoscience and Remote Sensing Symposium (IGARSS), July 2022, 368 downloads.

2020

  1. R. Ayanzadeh, M. Halem, and T. Finin, "Reinforcement Quantum Annealing: A Hybrid Quantum Learning Automata", Article, Nature Scientific Reports, May 2020, 484 downloads.
  2. D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Managing Cybersecurity at the Grassroots: Evidence from the First Nationwide Survey of Local Government Cybersecurity", Article, Journal of Urban Affairs, April 2020, 255 downloads.
  3. D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Managing Cybersecurity at the Grassroots: Evidence from the First Nationwide Survey of Local Government Cybersecurity", Article, Journal of Urban Affairs, April 2020, 282 downloads.
  4. R. Ayanzadeh, M. Halem, and T. Finin, "Reinforcement Quantum Annealing: A Quantum-Assisted Learning Automata Approach", Article, arXiv:2001.00234 [quant-ph], January 2020, 605 downloads.

2019

  1. R. Ayanzadeh, M. Halem, J. E. Dorband, and T. Finin, "Quantum-Assisted Greedy Algorithms", Article, arXiv:1912.02362 [quant-ph], December 2019, 442 downloads.
  2. S. K. Singh, R. Bose, and A. Joshi, "Energy theft detection for AMI using principal component analysis based reconstructed data", Article, IET Cyber-Physical Systems: Theory & Applications, June 2019, 875 downloads.

2018

  1. R. Ayanzadeh, M. Halem, and T. Finin, "Solving Hard SAT Instances with Adiabatic Quantum Computers", American Geophysical Union, Fall Meeting 2018, abstract #IN41B-27, December 2018.

2017

  1. S. K. Singh, R. Bose, and A. Joshi, "Entropy Based Electricity Theft Detection in AMI Network", Article, IET Cyber-Physical Systems: Theory and Applications, October 2017, 1093 downloads.
  2. S. K. Singh, K. Khanna, R. Bose, and A. Joshi, "Joint transformation based detection of false data injection attacks in smart grid", Article, IEEE Transactions on Industrial Informatics, June 2017, 1434 downloads.
  3. K. Chopra, R. Bose, and A. Joshi, "Secure Power Trading in Cooperative Relay Network With Asymmetric Cournot Duopoly Model", InProceedings, 12th Annual Symposium On Information Assurance (ASIA’17), May 2017, 829 downloads.
  4. K. Chopra, R. Bose, and A. Joshi, "Secrecy Outage of Cooperative Relay Network With and Without Eavesdropper's Direct Link", InProceedings, 23rd National Conference on Communications (NCC), March 2017, 915 downloads.
  5. K. Chopra, R. Bose, and A. Joshi, "Secrecy Performance of Threshold-Based Decode-and-Forward Cooperative Cognitive Radio Network", Article, IET Communications 2017, February 2017, 739 downloads.

2016

  1. K. Khanna, R. Bose, and A. Joshi, "On Detecting False Data Injection with Limited Network Information using Statistical Techniques", InProceedings, IEEE Power and Energy Society General Meeting, Chicago, 2017, November 2016, 827 downloads.
  2. K. Chopra, R. Bose, and A. Joshi, "Secrecy Outage Performance of Cooperative Relay Network With Diversity Combining", InProceedings, IEEE 2nd International Conference on Signal and Image Processing (ICSIP’17), November 2016, 1002 downloads.
  3. T. W. Satyapanich and T. Finin, "Event Nugget Detection Task: UMBC systems", InProceedings, Proceedings of the 9th Text Analysis Worksho, November 2016, 1106 downloads.
  4. Y. Sun and Y. Peng, "Inconsistent Knowledge Integration with Bayesian Network", 29th International FLAIRS Conference, May 2016, 288 downloads.
  5. K. Chopra, R. Bose, and A. Joshi, "Duopoly Models for Power Trading in Secure Cooperative Relay Networks", InProceedings, IEEE National Conference on Communications (NCC 2016), February 2016, 989 downloads.

2014

  1. L. Han, "Schema Free Querying of Semantic Data", PhdThesis, University of Maryland, Baltimore County, August 2014, 1550 downloads.

2012

  1. Y. Peng, Z. Ding, S. Zhang, and R. Pan, "Bayesian Network Revision with Probabilistic Constraints", Article, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, March 2012, 314 downloads.

2010

  1. Y. Peng and S. Zhang, "Integrating Probability Constraints into Bayesian Nets", InProceedings, Proceeding of the 2010 conference on ECAI 2010: 19th European Conference on Artificial Intelligence, November 2010, 1196 downloads.
  2. M. M. Rahman and e., "A more appropriate Protein Classification using Data Mining", Article, journal of theoretical and applied information technology, November 2010.

2008

  1. S. Zhang, Y. Peng, and X. Wang, "An Efficient Method for Probabilistic Knowledge Integration", InProceedings, Proceedings of The 20th IEEE International Conference on Tools with Artificial Intelligence, November 2008, 1877 downloads, 2 citations.
  2. Y. Shi, "An Investigation of Linguistic Information for Speech Recognition Error Detection", PhdThesis, University of Maryland, Baltimore County, October 2008, 3406 downloads.
  3. R. Holder, "Improving a Plan Library for Real-time Systems Using Nearly Orthogonal Latin Hypercube Sampling", InProceedings, Proceedings of the Twenty-Third AAAI Conference on Artificial Intelligence, July 2008, 3604 downloads.

2007

  1. M. A. Grasso and e., "Accuracy of the suspected blood indicator in detecting red lesions during wireless capsule endoscopy", Proceedings, American College of Physicians, Maryland Regional Associates Meeting, Baltimore Maryland, May 2007.
  2. Y. Yu and Y. Peng, "Learning the Semantic Meaning of a Concept from the Web", InProceedings, Proceedings of the 20th Conference of the Canadian Society for Computational Studies of Intelligence, May 2007, 2168 downloads.

2006

  1. R. Pan, Y. Peng, and Z. Ding, "Belief Update in Bayesian Networks Using Uncertain Evidence", InProceedings, Proceedings of the 18th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2006), November 2006, 3573 downloads.

2005

  1. Z. Ding, "BayesOWL: A Probabilistic Framework for Semantic Web", PhdThesis, University of Maryland, Baltimore County, December 2005, 8878 downloads, 10 citations.
  2. R. Pan, Z. Ding, Y. Yu, and Y. Peng, "A Bayesian Network Approach to Ontology Mapping", InProceedings, Proceedings of the Fourth International Semantic Web Conference, November 2005, 4486 downloads, 91 citations.
  3. Y. Peng and Z. Ding, "Modifying Bayesian Networks by Probability Constraints", InProceedings, Proceedings of the 21st Conference on Uncertainty in Artificial Intelligence, July 2005, 2725 downloads, 18 citations.
  4. Z. Ding, Y. Peng, R. Pan, and Y. Yu, "A Bayesian Methodology towards Automatic Ontology Mapping", InProceedings, Proceedings of the AAAI-05 C&O Workshop on Contexts and Ontologies: Theory, Practice and Applications, July 2005, 5063 downloads, 20 citations.

2004

  1. Z. Ding, Y. Peng, and R. Pan, "A Bayesian Approach to Uncertainty Modeling in OWL Ontology", InProceedings, Proceedings of the International Conference on Advances in Intelligent Systems - Theory and Applications, November 2004, 4203 downloads, 2 citations.
  2. W. Watthayu and Y. Peng, "A Bayesian network based framework for multi-criteria decision making", InProceedings, Proceedings of the 17th International Conference on Multiple Criteria Decision Analysis, August 2004, 8859 downloads, 18 citations.
  3. , "Intrusion Detection: Modeling System State to Detect and Classify Aberrant Behavior", PhdThesis, University of Maryland, Baltimore County, February 2004, 7354 downloads.
  4. Z. Ding and Y. Peng, "A Probabilistic Extension to Ontology Language OWL", InProceedings, Proceedings of the 37th Hawaii International Conference On System Sciences (HICSS-37)., January 2004, 6102 downloads, 154 citations.

2001

  1. X. Luan, Y. Peng, and T. Finin, "Agent Consumer Reports: of the Agents, by the Agents and for the Agents", InProceedings, Proc. 2nd Asia-Pacific Conf. on Intelligent Agent Technology (IAT-2001), October 2001, 1118 downloads.

Old News

  1. Zhongli Ding defends dissertation
    December 5, 2005