Tags: rif

Refereed Publications

2020

  1. A. Piplai, P. Ranade, A. Kotal, S. Mittal, S. N. Narayanan, and A. Joshi, "Using Knowledge Graphs and Reinforcement Learning for Malware Analysis", InProceedings, 4th International Workshop on Big Data Analytics for Cyber Intelligence and Defense, IEEE International Conference on Big Data, December 2020, 167 downloads.
  2. A. Piplai, S. Mittal, M. Abdelsalam, M. Gupta, A. Joshi, and T. Finin, "Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior", InProceedings, IEEE Intelligence and Security Informatics (ISI) 2020, November 2020, 158 downloads.
  3. N. K. Choudhary, S. Chukkapalli, S. Mittal, M. Gupta, M. Abdelsalam, and A. Joshi, "YieldPredict: A Crop Yield Prediction Framework for Smart Farms", November 2020, 123 downloads.

2019

  1. A. Padia, "Joint Models to Refine Knowledge Graphs", PhdThesis, University of Maryland, Baltimore County, December 2019, 96 downloads.
  2. A. Padia, "Joint Models to Refine Knowledge Graphs", PhdThesis, October 2019, 182 downloads.
  3. R. Ayanzadeh, M. Halem, and T. Finin, "SAT-based Compressive Sensing", Article, arXiv:1903.03650 [cs.IT], March 2019, 247 downloads.
  4. K. P. Joshi and A. Banerjee, "Automating Privacy Compliance Using Policy Integrated Blockchain", Article, Cryptography, Special Issue Advances of Blockchain Technology and Its Applications, February 2019, 563 downloads.

2018

  1. A. Padia, F. Ferraro, and T. Finin, "Team UMBC-FEVER: Claim verification using Semantic Lexical Resources", InProceedings, Proceedings of the First Workshop on Fact Extraction and Verification, November 2018, 384 downloads.
  2. Y. Sun, "On the Integration of Inconsistent Knowledge with Bayseian Networks", PhdThesis, University of Maryland, Baltimore County, May 2018, 101 downloads.

2017

  1. B. Van Durme, T. Lippincott, K. Duh, D. Burchfield, A. Poliak, C. Costello, T. Finin, S. Miller, J. Mayfield, P. Koehn, C. Harmon, D. Lawrie, C. May, M. Thomas, A. Carrell, and J. Chaloux, "CADET: Computer Assisted Discovery Extraction and Translation", InProceedings, 8th International Joint Conference on Natural Language Processing (System Demonstrations), November 2017, 496 downloads.

2011

  1. J. Martineau, "Identifying and Isolating Text Classification Signals from Domain and Genre Noise for Sentiment Analysis", PhdThesis, University of Maryland, Baltimore County, December 2011, 2133 downloads.
  2. J. Kim, Y. Peng, N. Ivezik, and J. Shin, "An Optimization Approach for Semantic-based XML Schema Matching", Article, International Journal of Trade, Economics, and Finance, January 2011, 1000 downloads.

2010

  1. J. Kim, Y. Peng, N. Ivezik, and J. Shin, "Semantic-based Optimal XML Schema Matching: A Mathematical Programming Approach", InProceedings, The Proceedings of International Conference on E-business, Management and Economics, December 2010, 1174 downloads.

2008

  1. A. Java, A. Joshi, and T. Finin, "Detecting Commmunities via Simultaneous Clustering of Graphs and Folksonomies", InProceedings, Proceedings of the Tenth Workshop on Web Mining and Web Usage Analysis (WebKDD), August 2008, 6378 downloads, 5 citations.
  2. P. A. Kodeswaran, S. B. Kodeswaran, A. Joshi, and F. Perich, "Utilizing semantic policies for managing BGP route dissemination", InProceedings, Automated Network Management (INFOCOM workshops), April 2008, 1451 downloads.

2007

  1. P. Kolari, "Detecting Spam Blogs: An Adaptive Online Approach", PhdThesis, Ph.D. Dissertation, December 2007, 8177 downloads, 3 citations.
  2. S. B. Kodeswaran, O. V. Ratsimor, F. Perich, and A. Joshi, "Utilizing Semantic Tags for Policy Based Networking", InProceedings, IEEE Globecom 2007 Internet Protocol Symposium, November 2007, 2502 downloads, 6 citations.
  3. A. Java, P. Kolari, T. Finin, J. Mayfield, A. Joshi, and J. Martineau, "BlogVox: Separating Blog Wheat from Blog Chaff", InProceedings, Proceedings of the Workshop on Analytics for Noisy Unstructured Text Data, 20th International Joint Conference on Artificial Intelligence (IJCAI-2007), January 2007, 3408 downloads, 8 citations.

2005

  1. S. Dornbush, K. Fisher, K. McKay, A. Prikhodko, and Z. Segall, "XPod a human activity and emotion aware mobile music player", InProceedings, Proceedings of the International Conference on Mobile Technology, Applications and Systems, November 2005, 7535 downloads, 18 citations.
  2. A. B. Shah, "An integrated development environment for policies", MastersThesis, University of Maryland, Baltimore County, March 2005, 2373 downloads.

2004

  1. F. Perich, L. Kagal, A. Joshi, T. Finin, and Y. Yesha, "In Reputation We Believe: Query Processing in Mobile Ad-Hoc Networks", InProceedings, International Conference on Mobile and Ubiquitous Systems: Networking and Services, August 2004, 4073 downloads, 32 citations.
  2. D. Chakraborty, A. Shenoi, Y. Yesha, Y. Yesha, and A. Joshi, "A Queueing Theoretic Model for Service Discovery in Ad-hoc Networks", InProceedings, Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), January 2004, 3011 downloads, 6 citations.

2002

  1. L. Kagal, F. Perich, A. Joshi, and T. Finin, "A Security Architecture Based on Trust Management for Pervasive Computing Systems", InProceedings, Grace Hopper Celebration of Women in Computing, October 2002, 5344 downloads, 30 citations.
  2. M. Gandhe, T. Finin, and B. Grosof, "SweetJess: Translating DamlRuleML to Jess", InProceedings, International Workshop on Rule Markup Languages for Business Rules on the Semantic Web in conjunction with ISWC2002, June 2002, 2489 downloads, 51 citations.

2001

  1. L. Kagal, T. Finin, and A. Joshi, "Trust-Based Security in Pervasive Computing Environments", Article, IEEE Computer, December 2001, 8832 downloads, 214 citations.

1998

  1. Q. He, K. Sycara, and T. Finin, "Personal Security Agent: KQML-based PKI", InProceedings, Proceedings of the 2nd International Conference on Autonomous Agents, May 1998, 2155 downloads, 49 citations.

1995

  1. C. Thirunavukkarasu, T. Finin, and J. Mayfield, "Secret Agents - A Security Architecture for the KQML Agent Communication Language", InProceedings, CIKM'95 Intelligent Information Agents Workshop, October 1995, 136 downloads.

Non-Refereed Publications

2007

  1. S. B. Kodeswaran, P. A. Kodeswaran, A. Joshi, and F. Perich, "Utilizing Semantic Policies for Secure BGP Route Dissemination", TechReport, September 2007, 2162 downloads.