Tags: sensor

Research Areas

  1. Machine learning

Publications

2022

  1. P. Gupta, S. Mehrotra, S. Sharma, R. Yus, and N. Venkatasubramanian, "Sentaur: Sensor Observable Data Model for Smart Spaces", InProceedings, 31st ACM International Conference on Information and Knowledge Management (CIKM), October 2022, 43 downloads.
  2. D. Ghosh, P. Gupta, S. Dixit, and R. Yus, "JENNER: Just-in-time Enrichment in Query Processing", InProceedings, Proceedings of the VLDB Endowment, September 2022, 69 downloads.
  3. R. Yus, G. Bouloukakis, S. Mehrotra, and N. Venkatasubramanian, "The SemIoTic Ecosystem: A Semantic Bridge between IoT Devices and Smart Spaces", Article, ACM Transactions on Internet Technology, August 2022, 42 downloads.
  4. S. Chukkapalli, A. Joshi, T. Finin, and R. F. Erbacher, "CAPD: A Context-Aware, Policy-Driven Framework for Secure and Resilient IoBT Operations", InProceedings, Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications IV, SPIE Defense + Commercial Sensing, April 2022, 181 downloads.
  5. A. Chio, D. Jiang, P. Gupta, G. Bouloukakis, R. Yus, S. Dixit, and N. Venkatasubramanian, "SmartSPEC: Customizable Smart Space Datasets via Event-driven Simulations", InProceedings, IEEE International Conference on Pervasive Computing and Communications (PerCom), March 2022, 35 downloads.
  6. A. Chio, D. Jiang, P. Gupta, G. Bouloukakis, R. Yus, S. Mehrotra, and N. Venkatasubramanian, "Artifact: SmartSPEC: Customizable Smart Space Datasets via Event-driven Simulations", InProceedings, 20th International Conference on Pervasive Computing and Communications, March 2022, 45 downloads.

2021

  1. S. Chukkapalli, N. Pillai, S. Mittal, and A. Joshi, "Cyber-Physical System Security Surveillance using Knowledge Graph based Digital Twins - A Smart Farming Usecase", InProceedings, IEEE Intelligence and Security Informatics (ISI) 2021, August 2021, 270 downloads.
  2. M. Murnane, P. Higgins, M. Saraf, F. Ferraro, C. Matuszek, and D. Engel, "A Simulator for Human-Robot Interaction in Virtual Reality", InProceedings, Conference on Virtual Reality and 3D User Interfaces, Abstracts and Workshops (VRW), March 2021, 287 downloads.

2020

  1. S. Sontowski, M. Gupta, S. Chukkapalli, M. Abdelsalam, S. Mittal, A. Joshi, and R. Sandhu, "Cyber Attacks on Smart Farming Infrastructure", InProceedings, 6th IEEE International Conference on Collaboration and Internet Computing (IEEE CIC 2020), October 2020, 679 downloads.
  2. S. N. Narayanan, A. Joshi, and R. Bose, "ABATe: Automatic Behavioral Abstraction Technique to Detect Anomalies in Smart Cyber-Physical Systems", InProceedings, IEEE Transactions on Dependable and Secure Computing, October 2020, 348 downloads.
  3. S. Chukkapalli, S. Mittal, M. Gupta, M. Abdelsalam, A. Joshi, R. Sandhu, and K. P. Joshi, "Ontologies and Artificial Intelligence Systems for the Cooperative Smart Farming Ecosystem", InCollection, IEEE Access, September 2020, 279 downloads.
  4. S. Chukkapalli, A. Piplai, S. Mittal, M. Gupta, and A. Joshi, "A Smart-Farming Ontology for Attribute Based Access Control", InProceedings, 6th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2020), March 2020, 680 downloads.

2019

  1. M. Murnane, M. Breitmeyer, F. Ferraro, C. Matuszek, and D. Engel, "Learning from Human-Robot Interactions in Modeled Scenes", InProceedings, ACM SIGGRAPH 2019 Posters, July 2019, 180 downloads.
  2. M. Murnane, M. Breitmeyer, F. Ferraro, and C. Matuszek, "Learning from Human-Robot Interactions in Modeled Scenes", InProceedings, ACM SIGGRAPH 2019 Posters, July 2019, 189 downloads.
  3. S. Ramapatruni, S. N. Narayanan, S. Mittal, A. Joshi, and K. P. Joshi, "Anomaly Detection Models for Smart Home Security", InProceedings, 5th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2019), April 2019, 1185 downloads.

2018

  1. S. N. Narayanan, A. Ganesan, K. P. Joshi, T. Oates, A. Joshi, and T. Finin, "Early Detection of Cybersecurity Threats Using Collaborative Cognition", InProceedings, Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing (CIC), October 2018, 2566 downloads.

2017

  1. P. K. Das, "Context-Dependent Privacy and Security Management on Mobile Devices", PhdThesis, Ph.D. Dissertation, August 2017, 949 downloads.
  2. A. Banerjee, R. Dalal, S. Mittal, and K. P. Joshi, "Generating Digital Twin models using Knowledge Graphs for Industrial Production Lines", InProceedings, Workshop on Industrial Knowledge Graphs, co-located with the 9th International ACM Web Science Conference 2017, June 2017, 1856 downloads.
  3. K. Khanna and A. Joshi, "Bi-level Modelling of False Data Injection Attacks on Security Constrained Optimal Power Flow", Article, IET Generation, Transmission and Distribution, June 2017, 683 downloads.

2016

  1. K. Khanna, R. Bose, and A. Joshi, "On Detecting False Data Injection with Limited Network Information using Statistical Techniques", InProceedings, IEEE Power and Energy Society General Meeting, Chicago, 2017, November 2016, 726 downloads.
  2. P. K. Das, D. Ghosh, P. Jagtap, A. Joshi, and T. Finin, "Preserving User Privacy and Security in Context-Aware Mobile Platforms", InBook, Mobile Application Development, Usability, and Security, October 2016, 1234 downloads.
  3. S. N. Narayanan, S. Mittal, and A. Joshi, "Using Semantic Technologies to Mine Vehicular Context for Security", InProceedings, 37th IEEE Sarnoff Symposium (2016), September 2016, 1313 downloads.
  4. S. N. Narayanan, S. Mittal, and A. Joshi, "OBD SecureAlert: An Anomaly Detection System for Vehicles", InProceedings, IEEE Workshop on Smart Service Systems (SmartSys 2016), May 2016, 1337 downloads.
  5. K. Khanna and A. Joshi, "Feasibility and mitigation of false data injection attacks in smart grid", InProceedings, IEEE 6th International Conference on Power Systems (ICPS), 2016 , March 2016, 757 downloads.
  6. M. L. Mathews, A. Joshi, and T. Finin, "Detecting Botnets Using a Collaborative Situational-aware IDPS", InProceedings, Second International Conference on Information Systems Security and Privacy, February 2016, 1543 downloads.

2013

  1. P. K. Das, A. Joshi, and T. Finin, "Energy efficient sensing for managing context and privacy on smartphones", InProceedings, First Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn 2013) co-located with the 12th International Semantic Web Conference (ISWC 2013), Sydney, Australia., October 2013, 1253 downloads.

2012

  1. M. L. Mathews, P. Halvorsen, A. Joshi, and T. Finin, "A Collaborative Approach to Situational Awareness for CyberSecurity", InProceedings, 8th IEEE Int. Conf. on Collaborative Computing: Networking, Applications and Worksharing, October 2012, 1863 downloads.
  2. D. Ghosh, A. Joshi, T. Finin, and P. Jagtap, "Privacy control in smart phones using semantically rich reasoning and context modeling", InProceedings, Proceedings of the IEEE Workshop on Semantic Computing and Security, May 2012, 1386 downloads.
  3. S. More, "Situation Aware Intrusion Detection Model", MastersThesis, University of Maryland, Baltimore County, May 2012, 70 downloads.

2011

  1. P. Jagtap, A. Joshi, T. Finin, and L. Zavala, "Preserving Privacy in Context-Aware Systems", InProceedings, Proceedings of the Fifth IEEE International Conference on Semantic Computing, October 2011, 1710 downloads.
  2. R. Dharurkar, "Context-Aware Middleware for Activity Recognition", MastersThesis, University of Maryland, Baltimore County, May 2011, 1363 downloads.
  3. P. Jagtap, "Privacy Preservation in Context Aware Systems", MastersThesis, May 2011, 1431 downloads.
  4. P. Jagtap, A. Joshi, T. Finin, and L. Zavala, "Privacy Preservation in Context Aware Geosocial Networking Applications", TechReport, University of Maryland, Baltimore County, May 2011, 1919 downloads.

2010

  1. C. Tilmes, Y. Yesha, and M. Halem, "Tracking Provenance of Earth Science Data", Article, Earth Science Informatics, November 2010, 1497 downloads.

2009

  1. M. Halem, N. Most, C. Tilmes, K. Stewart, Y. Yesha, D. Chapman, and P. Nguyen, "Service-Oriented Atmospheric Radiances (SOAR): Gridding and Analysis Services for Multisensor Aqua IR Radiance Data for Climate Studies", Article, IEEE Transactions on Geoscience and Remote Sensing, January 2009.

2008

  1. O. Walavalkar, A. Joshi, T. Finin, and Y. Yesha, "Streaming Knowledge Bases", InProceedings, Proceedings of the Fourth International Workshop on Scalable Semantic Web knowledge Base Systems, October 2008, 4003 downloads, 4 citations.
  2. C. Tilmes and A. J. Fleig, "Provenance Tracking in an Earth Science Data Processing System", InProceedings, Proceedings of Provenance and Annotation of Data and Processes: Second International Provenance and Annotation Workshop, Ipaw 2008, , June 2008, 1998 downloads.

2007

  1. M. Halem, Y. Yesha, C. Tilmes, D. Chapman, N. Most, and A. Bertolli, "SOAR: A System for the Analysis of Atmospheric Radiances", InProceedings, EOS Transactions, December 2007.
  2. O. Walavalkar, "Streaming Knowledge Bases", MastersThesis, University of Maryland, Baltimore County, August 2007, 4 citations.
  3. S. Agarwal, A. Joshi, T. Finin, Y. Yesha, and T. Ganous, "A Pervasive Computing System for the Operating Room of the Future", Article, Mobile Networks and Applications, August 2007, 3572 downloads.
  4. M. Halem, Y. Yesha, C. Tilmes, D. Chapman, M. Goldberg, and L. Zhou, "A Web Service Tool (SOAR) for the Dynamic Generation of L1 Grids of Coincident AIRS, AMSU and MODIS Satellite Sounding Radiance Data for Climate Studies", Article, EOS Transactions, June 2007.
  5. M. Halem, A. Patwardhan, S. Dornbush, M. Seablom, and Y. Yesha, "Sensor Web Design Studies for Realtime Dynamic Congestion Pricing", Proceedings, PerTrans07, March 2007, 3634 downloads.

2006

  1. S. Agarwal, A. Joshi, and Y. Yesha, "A Pervasive Computing System for the Operating Room of the Future", TechReport, University of Maryland, Baltimore County, September 2006, 4401 downloads.
  2. S. Agarwal, A. Joshi, T. Ganous, and Y. Yesha, "Context-Aware System to Create Electronic Medical Records", TechReport, July 2006, 3157 downloads.
  3. A. Patwardhan, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "Querying in Packs: Trustworthy Data Management in Ad Hoc Networks", Article, International Journal of Wireless Information Networks, June 2006, 3960 downloads, 5 citations.
  4. S. Agarwal, "Context-Aware System to Create Electronic Medical Encounter Records", MastersThesis, May 2006, 2744 downloads, 2 citations.

2005

  1. A. Patwardhan, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "Active Collaborations for Trustworthy Data Management in Ad Hoc Networks", InProceedings, Proceedings of the 2nd IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, November 2005, 3389 downloads, 11 citations.
  2. S. Avancha, "A Holistic Approach to Secure Sensor Networks", PhdThesis, UMBC, August 2005, 3279 downloads.

2004

  1. H. Chen, "An Intelligent Broker Architecture for Pervasive Context-Aware Systems", PhdThesis, University of Maryland, Baltimore County, December 2004, 7410 downloads, 17 citations.
  2. S. Avancha, C. Patel, and A. Joshi, "Ontology-driven Adaptive Sensor Networks", InProceedings, MobiQuitous 2004, August 2004, 4380 downloads, 18 citations.
  3. F. Perich, "On Peer-to-Peer Data Management in Pervasive Computing Environments", PhdThesis, UMBC, May 2004, 1925 downloads.
  4. J. Undercofer, "Intrusion Detection: Modeling System State to Detect and Classify Aberrant Behavior", PhdThesis, University of Maryland, Baltimore County, February 2004, 7231 downloads.
  5. S. Avancha, A. Joshi, and J. Pinkston, "Security for Sensor Networks", InBook, Wireless Sensor Networks, January 2004, 3709 downloads, 52 citations.

2003

  1. S. Avancha, A. Joshi, and J. Pinkston, "Secure Sensor Networks for Perimeter Protection", Article, Computer Networks, November 2003, 3448 downloads, 30 citations.
  2. V. Hingne, A. Joshi, J. Michopoulos, and E. N. Houstis, "On the Grid and Sensor Networks", InProceedings, IEEE Fourth International Workshop on Grid Computing (GRID2003), August 2003, 15 citations.
  3. V. Hingne, A. Joshi, T. Finin, H. Kargupta, and E. N. Houstis, "Towards a Pervasive Grid", InProceedings, Proceedings of the Int. Parallel and Distributed Processing Symposium , April 2003, 1425 downloads.
  4. S. Avancha, P. D'Souza, F. Perich, A. Joshi, and Y. Yesha, "P2P M-Commerce in Pervasive Environments", Article, ACM SIGecom Exchanges, January 2003, 4826 downloads, 16 citations.

2002

  1. L. Kagal, V. Korolev, S. Avancha, A. Joshi, T. Finin, and Y. Yesha, "Centaurus : An Infrastructure for Service Management in Ubiquitous Computing", Article, ACM Wireless Networks Journal, November 2002, 2623 downloads, 19 citations.
  2. L. Kagal, V. Korolev, S. Avancha, A. Joshi, and T. Finin, "An Approach to Dynamic Service Management in Pervasive Computing", InProceedings, Proceedings of the Grace Hopper Celebration of Women in Computing, October 2002, 3042 downloads.
  3. S. Tolia, T. Finin, and A. Joshi, "MagicWeaver: An Agent-Based Simulation Framework for Wireless Sensor Networks", InProceedings, Workshop on Ubiquitous Agents for Mobile, Embedded and Wearable Devices, August 2002, 3170 downloads, 1 citation.