Anupam Joshi

Affiliations:
  • University of Maryland, USA


According to our database1, Anupam Joshi authored at least 314 papers between 1993 and 2023.

Collaborative distances:
  • Dijkstra number2 of two.
  • Erdős number3 of three.

Awards

IEEE Fellow

IEEE Fellow 2015, "For contributions to security, privacy and data management in mobile and pervasive systems".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Knowledge-Enhanced Neurosymbolic Artificial Intelligence for Cybersecurity and Privacy.
IEEE Internet Comput., 2023

FABULA: Intelligence Report Generation Using Retrieval-Augmented Narrative Construction.
CoRR, 2023

Knowledge-enhanced Neuro-Symbolic AI for Cybersecurity and Privacy.
CoRR, 2023

A Practical Entity Linking System for Tables in Scientific Literature.
CoRR, 2023

Knowledge Graph-driven Tabular Data Discovery from Scientific Documents.
Proceedings of the Joint Proceedings of Workshops at the 49th International Conference on Very Large Data Bases (VLDB 2023), Vancouver, Canada, August 28, 2023

Change Management using Generative Modeling on Digital Twins.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2023

Bewitching the Battlefield: Repurposing the MouseJack Attack for Crazyflie Drones.
Proceedings of the IEEE INFOCOM 2023, 2023

Towards Semantic Exploration of Tables in Scientific Documents.
Proceedings of the Joint Proceedings of the ESWC 2023 Workshops and Tutorials co-located with 20th European Semantic Web Conference (ESWC 2023), 2023

Privacy-Preserving Data Sharing in Agriculture: Enforcing Policy Rules for Secure and Confidential Data Synthesis.
Proceedings of the IEEE International Conference on Big Data, 2023

Offline RL+CKG: A hybrid AI model for cybersecurity tasks.
Proceedings of the AAAI 2023 Spring Symposium on Challenges Requiring the Combination of Machine Learning and Knowledge Engineering (AAAI-MAKE 2023), 2023

2022
ABATe: Automatic Behavioral Abstraction Technique to Detect Anomalies in Smart Cyber-Physical Systems.
IEEE Trans. Dependable Secur. Comput., 2022

CAPD: A Context-Aware, Policy-Driven Framework for Secure and Resilient IoBT Operations.
CoRR, 2022

Recognizing and Extracting Cybersecurtity-relevant Entities from Text.
CoRR, 2022

Computational Understanding of Narratives: A Survey.
IEEE Access, 2022

Knowledge Guided Two-player Reinforcement Learning for Cyber Attacks and Defenses.
Proceedings of the 21st IEEE International Conference on Machine Learning and Applications, 2022

PriveTAB: Secure and Privacy-Preserving sharing of Tabular Data.
Proceedings of the IWSPA@CODASPY 2022: Proceedings of the 2022 ACM on International Workshop on Security and Privacy Analytics, 2022

2021
A Policy-Driven Approach to Secure Extraction of COVID-19 Data From Research Papers.
Frontiers Big Data, 2021

A BERT Based Approach to Measure Web Services Policies Compliance With GDPR.
IEEE Access, 2021

A Privacy Preserving Anomaly Detection Framework for Cooperative Smart Farming Ecosystem.
Proceedings of the 3rd IEEE International Conference on Trust, 2021

The Effect of Text Ambiguity on creating Policy Knowledge Graphs.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Cyber-Physical System Security Surveillance using Knowledge Graph based Digital Twins - A Smart Farming Usecase.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2021

Generating Fake Cyber Threat Intelligence Using Transformer-Based Models.
Proceedings of the International Joint Conference on Neural Networks, 2021

The Case for Latent Variable Vs Deep Learning Methods in Misinformation Detection: An Application to COVID-19.
Proceedings of the Discovery Science - 24th International Conference, 2021

CyBERT: Contextualized Embeddings for the Cybersecurity Domain.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

Combating Fake Cyber Threat Intelligence using Provenance in Cybersecurity Knowledge Graphs.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

Cybersecurity Knowledge Graph Improvement with Graph Neural Networks.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

2020
Priority-Based Protection Against the Malicious Data Injection Attacks on State Estimation.
IEEE Syst. J., 2020

Phishing in an academic community: A study of user susceptibility and behavior.
Cryptologia, 2020

Independent Component Analysis for Trustworthy Cyberspace during High Impact Events: An Application to Covid-19.
CoRR, 2020

Creating Cybersecurity Knowledge Graphs From Malware After Action Reports.
IEEE Access, 2020

Ontologies and Artificial Intelligence Systems for the Cooperative Smart Farming Ecosystem.
IEEE Access, 2020

Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020

Cyber Attacks on Smart Farming Infrastructure.
Proceedings of the 6th IEEE International Conference on Collaboration and Internet Computing, 2020

NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion.
Proceedings of the 6th IEEE International Conference on Big Data Security on Cloud, 2020

Context Sensitive Access Control in Smart Home Environments.
Proceedings of the 6th IEEE International Conference on Big Data Security on Cloud, 2020

A Smart-Farming Ontology for Attribute Based Access Control.
Proceedings of the 6th IEEE International Conference on Big Data Security on Cloud, 2020

Using Knowledge Graphs and Reinforcement Learning for Malware Analysis.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

A Comparative Study of Deep Learning based Named Entity Recognition Algorithms for Cybersecurity.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

YieldPredict: A Crop Yield Prediction Framework for Smart Farms.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

Aspect Based Abusive Sentiment Detection in Nepali Social Media Texts.
Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2020

ViCLOUD: Measuring Vagueness in Cloud Service Privacy Policies and Terms of Services.
Proceedings of the 13th IEEE International Conference on Cloud Computing, 2020

2019
Energy theft detection for AMI using principal component analysis based reconstructed data.
IET Cyper-Phys. Syst.: Theory & Appl., 2019

Stackelberg game for price and power control in secure cooperative relay network.
IET Cyper-Phys. Syst.: Theory & Appl., 2019

Cyber-All-Intel: An AI for Security related Threat Intelligence.
CoRR, 2019

Preventing Poisoning Attacks On AI Based Threat Intelligence Systems.
Proceedings of the 29th IEEE International Workshop on Machine Learning for Signal Processing, 2019

Named Entity Recognition for Nepali Language.
Proceedings of the 5th IEEE International Conference on Collaboration and Internet Computing, 2019

Anomaly Detection Models for Smart Home Security.
Proceedings of the 5th IEEE International Conference on Big Data Security on Cloud, 2019

RelExt: relation extraction using deep learning approaches for cybersecurity knowledge graph improvement.
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019

2018
Joint-Transformation-Based Detection of False Data Injection Attacks in Smart Grid.
IEEE Trans. Ind. Informatics, 2018

Secrecy performance of threshold-based cognitive relay network with diversity combining.
J. Commun. Networks, 2018

Entropy-based electricity theft detection in AMI network.
IET Cyper-Phys. Syst.: Theory & Appl., 2018

Secrecy outage of threshold-based cooperative relay network with and without direct links.
EURASIP J. Inf. Secur., 2018

Cognitive Techniques for Early Detection of Cybersecurity Events.
CoRR, 2018

Preventing Poisoning Attacks on AI based Threat Intelligence Systems.
CoRR, 2018

Energy theft detection in advanced metering infrastructure.
Proceedings of the 4th IEEE World Forum on Internet of Things, 2018

UMBC at SemEval-2018 Task 8: Understanding Text about Malware.
Proceedings of The 12th International Workshop on Semantic Evaluation, 2018

DAbR: Dynamic Attribute-based Reputation scoring for Malicious IP Address Detection.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

Using Deep Neural Networks to Translate Multi-lingual Threat Intelligence.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

Mining Threat Intelligence about Open-Source Projects and Libraries from Code Repository Issues and Bug Reports.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

Semantically Rich, Context Aware Access Control for Openstack.
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018

Early Detection of Cybersecurity Threats Using Collaborative Cognition.
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018

2017
Secrecy performance of threshold-based decode-and-forward cooperative cognitive radio network.
IET Commun., 2017

Thinking, Fast and Slow: Combining Vector Spaces and Knowledge Graphs.
CoRR, 2017

Secrecy outage of cooperative relay network with and without eavesdropper's direct link.
Proceedings of the Twenty-third National Conference on Communications, 2017

App behavioral analysis using system calls.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Personalizing Context-Aware Access Control on Mobile Platforms.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017

A Question and Answering System for Management of Cloud Service Level Agreements.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
Other times, other values: leveraging attribute history to link user profiles across online social networks.
Soc. Netw. Anal. Min., 2016

Distributed system configuration management using Markov logic networks.
Int. J. Auton. Comput., 2016

OBD_SecureAlert: An Anomaly Detection System for Vehicles.
Proceedings of the 2016 IEEE International Conference on Smart Computing, 2016

Context-Sensitive Policy Based Security in Internet of Things.
Proceedings of the 2016 IEEE International Conference on Smart Computing, 2016

Semantic Knowledge and Privacy in the Physical Web.
Proceedings of the 4th Workshop on Society, 2016

Representing Attribute Based Access Control Policies in OWL.
Proceedings of the Tenth IEEE International Conference on Semantic Computing, 2016

Visualization of Pain Severity Events in Clinical Records Using Semantic Structures.
Proceedings of the Tenth IEEE International Conference on Semantic Computing, 2016

Using semantic technologies to mine vehicular context for security.
Proceedings of the 37th IEEE Sarnoff Symposium 2016, Newark, NJ, USA, 2016

Bid Modification Attack in Smart Grid for Monetary Benefits.
Proceedings of the IEEE International Symposium on Nanoelectronic and Information Systems, 2016

A Data Driven Approach for the Science of Cyber Security: Challenges and Directions.
Proceedings of the 17th IEEE International Conference on Information Reuse and Integration, 2016

Semantic Interpretation of Structured Log Files.
Proceedings of the 17th IEEE International Conference on Information Reuse and Integration, 2016

Detecting Botnets using a Collaborative Situational-aware IDPS.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

Automatic Extraction of Metrics from SLAs for Cloud Service Management.
Proceedings of the 2016 IEEE International Conference on Cloud Engineering, 2016

Capturing Policies for Fine-Grained Access Control on Mobile Devices.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

Semantic approach to automating management of big data privacy policies.
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016

CyberTwitter: Using Twitter to generate alerts for cybersecurity threats and vulnerabilities.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016

ALDA: Cognitive Assistant for Legal Document Analytics.
Proceedings of the 2016 AAAI Fall Symposia, Arlington, Virginia, USA, November 17-19, 2016, 2016

UCO: A Unified Cybersecurity Ontology.
Proceedings of the Artificial Intelligence for Cyber Security, 2016

Streamlining Management of Multiple Cloud Services.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2015
Using Data Analytics to Detect Anomalous States in Vehicles.
CoRR, 2015

Entity Type Recognition for Heterogeneous Semantic Graphs.
AI Mag., 2015

Platys: From Position to Place-Oriented Mobile Computing.
AI Mag., 2015

SVM-CASE: An SVM-Based Context Aware Security Framework for Vehicular Ad-Hoc Networks.
Proceedings of the IEEE 82nd Vehicular Technology Conference, 2015

Querying RDF data with text annotated graphs.
Proceedings of the 27th International Conference on Scientific and Statistical Database Management, 2015

Topic Modeling for RDF Graphs.
Proceedings of the Third International Workshop on Linked Data for Information Extraction (LD4IE2015) co-located with the 14th International Semantic Web Conference (ISWC 2015), 2015

Mobipedia: Mobile Applications Linked Data.
Proceedings of the ISWC 2015 Posters & Demonstrations Track co-located with the 14th International Semantic Web Conference (ISWC-2015), 2015

Building a Mobile Applications Knowledge Base for the Linked Data Cloud.
Proceedings of the 1st International Workshop on Mobile Deployment of Semantic Technologies (MoDeST 2015) co-located with 14th International Semantic Web Conference (ISWC 2015), 2015

Beyond NER: Towards Semantics in Clinical Text.
Proceedings of International Workshop on Biomedical Data Mining, 2015

Parallelizing natural language techniques for knowledge extraction from cloud service level agreements.
Proceedings of the 2015 IEEE International Conference on Big Data (IEEE BigData 2015), Santa Clara, CA, USA, October 29, 2015

2014
Integrating domain knowledge in supervised machine learning to assess the risk of breast cancer.
Int. J. Medical Eng. Informatics, 2014

Semantics for Privacy and Shared Context.
Proceedings of the 2nd Workshop on Society, 2014

A Semantic Context-Aware Privacy Model for FaceBlock.
Proceedings of the 2nd Workshop on Society, 2014

Demo: FaceBlock: privacy-aware pictures for google glass.
Proceedings of the 12th Annual International Conference on Mobile Systems, 2014

Identification in Encrypted Wireless Networks Using Supervised Learning.
Proceedings of the 2014 IEEE Military Communications Conference, 2014

Interpreting medical tables as linked data for generating meta-analysis reports.
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014

Rafiki: A semantic and collaborative approach to community health-care in underserved areas.
Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, 2014

Longitudinal Tracking of Pain Phenotypes in Electronic Health Records Using an SVM.
Proceedings of the AMIA 2014, 2014

2013
Improving Word Similarity by Augmenting PMI with Estimates of Word Polysemy.
IEEE Trans. Knowl. Data Eng., 2013

ACM HotMobile 2013 poster: an energy efficient semantic context model for managing privacy on smartphones.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2013

CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using policies.
Distributed Parallel Databases, 2013

@i seek 'fb.me': identifying users across multiple online social networks.
Proceedings of the 22nd International World Wide Web Conference, 2013

Faking Sandy: characterizing and identifying fake images on Twitter during Hurricane Sandy.
Proceedings of the 22nd International World Wide Web Conference, 2013

Analyzing Close Friend Interactions in Social Media.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Semantic Message Passing for Generating Linked Data from Tables.
Proceedings of the Semantic Web - ISWC 2013, 2013

Energy Efficient Sensing for Managing Context and Privacy on Smartphones.
Proceedings of the Workshop on Society, 2013

Extracting Cybersecurity Related Linked Data from Text.
Proceedings of the 2013 IEEE Seventh International Conference on Semantic Computing, 2013

Detection of Real-Time Intentions from Micro-blogs.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2013

Detecting data exfiltration by integrating information across layers.
Proceedings of the IEEE 14th International Conference on Information Reuse & Integration, 2013

Combining smart phone and infrastructure sensors to improve security in enterprise settings.
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013

On Use of Machine Learning Techniques and Genotypes for Prediction of Chronic Diseases.
Proceedings of the AMIA 2013, 2013

Text and Ontology Driven Clinical Decision Support System.
Proceedings of the AMIA 2013, 2013

2012
Security Through Collaboration and Trust in MANETs.
Mob. Networks Appl., 2012

Characterization of social media response to natural disasters.
Proceedings of the 21st World Wide Web Conference, 2012

A Knowledge-Based Approach to Intrusion Detection Modeling.
Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops, 2012

Privacy Control in Smart Phones Using Semantically Rich Reasoning and Context Modeling.
Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops, 2012

A Domain Independent Framework for Extracting Linked Semantic Data from Tables.
Proceedings of the Search Computing - Broadening Web Search, 2012

Securing Enterprise Data on Smartphones Using Run Time Information Flow Control.
Proceedings of the 13th IEEE International Conference on Mobile Data Management, 2012

Detection of unsafe action from laparoscopic cholecystectomy video.
Proceedings of the ACM International Health Informatics Symposium, 2012

Towards Analyzing Micro-Blogs for Detection and Classification of Real-Time Intentions.
Proceedings of the Sixth International Conference on Weblogs and Social Media, 2012

Who's Who: Linking User's Multiple Identities on Online Social Media.
Proceedings of the 18th International Conference on Management of Data, 2012

A collaborative approach to situational awareness for cybersecurity.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012

Finding associations among SNPS for prostate cancer using collaborative filtering.
Proceedings of the ACM sixth international workshop on Data and text mining in biomedical informatics, 2012

Schema-free structured querying of DBpedia data.
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012

Identifying and characterizing user communities on Twitter during crisis events.
Proceedings of the 2012 workshop on Data-driven User Behavioral Modelling and Mining from Social Media, 2012

2011
Enforcing security in semantics driven policy based networks.
Comput. Stand. Interfaces, 2011

Two-stream indexing for spoken web search.
Proceedings of the 20th International Conference on World Wide Web, 2011

Generating Linked Data by Inferring the Semantics of Tables.
Proceedings of the First International Workshop on Searching and Integrating New Web Data Sources, 2011

Information Integration and Analysis: A Semantic Approach to Privacy.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Content-Based Prediction of Temporal Boundaries for Events in Twitter.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Preserving Privacy in Context-Aware Systems.
Proceedings of the 5th IEEE International Conference on Semantic Computing (ICSC 2011), 2011

CARE-CPS: Context-Aware Trust Evaluation for Wireless Networks in Cyber-Physical System Using Policies.
Proceedings of the POLICY 2011, 2011

SAT: an SVM-based automated trust management system for Mobile Ad-hoc Networks.
Proceedings of the MILCOM 2011, 2011

ATM: Automated Trust Management for Mobile Ad Hoc Networks Using Support Vector Machine.
Proceedings of the 12th IEEE International Conference on Mobile Data Management, 2011

Extracting Information about Security Vulnerabilities from Web Text.
Proceedings of the 2011 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, 2011

GoRelations: An Intuitive Query System for DBpedia.
Proceedings of the Semantic Web - Joint International Semantic Technology Conference, 2011

Mobile, Collaborative, Context-Aware Systems.
Proceedings of the Activity Context Representation: Techniques and Languages, 2011

2010
Using Linked Data to Interpret Tables.
Proceedings of the First International Workshop on Consuming Linked Data (COLD 2010), 2010

T2LD: Interpreting and Representing Tables as Linked Data.
Proceedings of the ISWC 2010 Posters & Demonstrations Track: Collected Abstracts, 2010

A declarative approach for secure and robust routing.
Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration, 2010

Enforcing Security Policies in Mobile Devices Using Multiple Personas.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2010

Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-dimensional Trust Management Approach.
Proceedings of the Eleventh International Conference on Mobile Data Management, 2010

A probabilistic approach to distributed system management.
Proceedings of the 7th International Conference on Autonomic Computing, 2010

Highly scalable parallel collaborative filtering algorithm.
Proceedings of the 2010 International Conference on High Performance Computing, 2010

2009
Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory.
Proceedings of the MDM 2009, 2009


Policy-Based Malicious Peer Detection in Ad Hoc Networks.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Improving binary classification on text problems using differential word features.
Proceedings of the 18th ACM Conference on Information and Knowledge Management, 2009

User interests in social media sites: an exploration with micro-blogs.
Proceedings of the 18th ACM Conference on Information and Knowledge Management, 2009

2008
Scalable semantic analytics on social networks for addressing the problem of conflict of interest detection.
ACM Trans. Web, 2008

Analyzing the Structure and Evolution of Massive Telecom Graphs.
IEEE Trans. Knowl. Data Eng., 2008

The Information Ecology of Social Media and Online Communities.
AI Mag., 2008

Threshold-based intrusion detection in ad hoc networks and secure AODV.
Ad Hoc Networks, 2008

RDF123: From Spreadsheets to RDF.
Proceedings of the Semantic Web - ISWC 2008, 7th International Semantic Web Conference, 2008

R<i>OWL</i>BAC: representing role based access control in <i>OWL</i>.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

Role Based Access Control and OWL.
Proceedings of the Fourth OWLED Workshop on OWL: Experiences and Directions, 2008

Query distribution estimation and predictive caching in mobile ad hoc networks.
Proceedings of the Seventh ACM International Workshop on Data Engineering for Wireless and Mobile Access, 2008

Wikipedia as an Ontology for Describing Documents.
Proceedings of the Second International Conference on Weblogs and Social Media, 2008

Second Space: A Generative Model for the Blogosphere.
Proceedings of the Second International Conference on Weblogs and Social Media, 2008

Approximating the Community Structure of the Long Tail.
Proceedings of the Second International Conference on Weblogs and Social Media, 2008

Social ties and their relevance to churn in mobile telecom networks.
Proceedings of the EDBT 2008, 2008

Security through Collaboration in MANETs.
Proceedings of the Collaborative Computing: Networking, 2008

Web 2.0 Mining.
Proceedings of the Next Generation of Data Mining., 2008

2007
A Pervasive Computing System for the Operating Room of the Future.
Mob. Networks Appl., 2007

Using a Natural Language Understanding System to Generate Semantic Web Content.
Int. J. Semantic Web Inf. Syst., 2007

StreetSmart Traffic: Discovering and Disseminating Automobile Congestion Using VANET's.
Proceedings of the 65th IEEE Vehicular Technology Conference, 2007

A Ubiquitous Context-Aware Environment for Surgical Training.
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007

A Human Activity Aware Learning Mobile Music Player.
Proceedings of the Advances in Ambient Intelligence [best papers from AITamI@IJCAI 2007, 2007

Towards Spam Detection at Ping Servers.
Proceedings of the First International Conference on Weblogs and Social Media, 2007

Modeling Trust and Influence in the Blogosphere Using Link Polarity.
Proceedings of the First International Conference on Weblogs and Social Media, 2007

Feeds That Matter: A Study of Bloglines Subscriptions.
Proceedings of the First International Conference on Weblogs and Social Media, 2007

Utilizing Semantic Tags for Policy Based Networking.
Proceedings of the Global Communications Conference, 2007

BlogVox: Learning Sentiment Classifiers.
Proceedings of the Twenty-Second AAAI Conference on Artificial Intelligence, 2007

2006
Trust in Pervasive Computing.
Proceedings of the Handbook of Mobile Middleware., 2006

Toward Distributed Service Discovery in Pervasive Computing Environments.
IEEE Trans. Mob. Comput., 2006

Querying in Packs: Trustworthy Data Management in <i>Ad Hoc</i> Networks.
Int. J. Wirel. Inf. Networks, 2006

Security and Privacy Challenges in Open and Dynamic Environments.
Computer, 2006

A framework for specification and performance evaluation of service discovery protocols in mobile ad-hoc networks.
Ad Hoc Networks, 2006

Integrating service discovery with routing and session management for ad-hoc networks.
Ad Hoc Networks, 2006

Semantic analytics on social networks: experiences in addressing the problem of conflict of interest detection.
Proceedings of the 15th international conference on World Wide Web, 2006

The BlogVox Opinion Retrieval System.
Proceedings of the Fifteenth Text REtrieval Conference, 2006

A Data Intensive Reputation Management Scheme for Vehicular Ad Hoc Networks.
Proceedings of the 3rd Annual International ICST Conference on Mobile and Ubiquitous Systems: Computing, 2006

Content and Context Aware Networking Using Semantic Tagging.
Proceedings of the 22nd International Conference on Data Engineering Workshops, 2006

On the structural properties of massive telecom call graphs: findings and implications.
Proceedings of the 2006 ACM CIKM International Conference on Information and Knowledge Management, 2006

Cross-layer analysis for detecting wireless misbehavior.
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006

SVMs for the Blogosphere: Blog Identification and Splog Detection.
Proceedings of the Computational Approaches to Analyzing Weblogs, 2006

Detecting Spam Blogs: A Machine Learning Approach.
Proceedings of the Proceedings, 2006

2005
Collaborative joins in a pervasive computing environment.
VLDB J., 2005

Service Composition for Mobile Environments.
Mob. Networks Appl., 2005

Using incremental Web log mining to create adaptive web servers.
Int. J. Digit. Libr., 2005

On a data-driven environment for multiphysics applications.
Future Gener. Comput. Syst., 2005

Social Networks Applied.
IEEE Intell. Syst., 2005

Search on the Semantic Web.
Computer, 2005

Finding and Ranking Knowledge on the Semantic Web.
Proceedings of the Semantic Web - ISWC 2005, 4th International Semantic Web Conference, 2005

Enhancing Web Privacy Protection through Declarative Policies.
Proceedings of the 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), 2005

Secure Routing and Intrusion Detection in Ad Hoc Networks.
Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications (PerCom 2005), 2005

Active collaborations for trustworthy data management in ad hoc networks.
Proceedings of the IEEE 2nd International Conference on Mobile Adhoc and Sensor Systems, 2005

Orthogonal Decision Trees for Resource-Constrained Physiological Data Stream Monitoring Using Mobile Devices.
Proceedings of the High Performance Computing, 2005

Information Retrieval and the Semantic Web.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

How the Semantic Web is Being Used: An Analysis of FOAF Documents.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

Using location information for scheduling in 802.15.3 MAC.
Proceedings of the 2nd International Conference on Broadband Networks (BROADNETS 2005), 2005

On Homeland Security and the Semantic Web: A Provenance and Trust Aware Inference Framework.
Proceedings of the AI Technologies for Homeland Security, 2005

Swoogle: Searching for Knowledge on the Semantic Web.
Proceedings of the Proceedings, 2005

2004
Security, Trust, and Privacy in Mobile Computing Environments.
Proceedings of the Mobile Computing Handbook., 2004

Data and Services for Mobile Computing.
Proceedings of the Practical Handbook of Internet Computing., 2004

On Data Management in Pervasive Computing Environments.
IEEE Trans. Knowl. Data Eng., 2004

Service Discovery in Agent-Based Pervasive Computing Environments.
Mob. Networks Appl., 2004

Intelligent Agents Meet the Semantic Web in Smart Spaces.
IEEE Internet Comput., 2004

Web mining: research and practice.
Comput. Sci. Eng., 2004

A distributed service composition protocol for pervasive environments.
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004

Semantic Web in the Context Broker Architecture.
Proceedings of the Second IEEE International Conference on Pervasive Computing and Communications (PerCom 2004), 2004

In Reputation We Believe: Query Processing in Mobile Ad-Hoc Networks.
Proceedings of the 1st Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2004), 2004

Enforcing Policies in Pervasive Environments.
Proceedings of the 1st Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2004), 2004

SOUPA: Standard Ontology for Ubiquitous and Pervasive Applications.
Proceedings of the 1st Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2004), 2004

Ontology-Driven Adaptive Sensor Networks.
Proceedings of the 1st Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2004), 2004

On intrusion detection and response for mobile ad hoc networks.
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004

Agent-Based Simulation of Data-Driven Fire Propagation Dynamics.
Proceedings of the Computational Science, 2004

Swoogle: a search and metadata engine for the semantic web.
Proceedings of the 2004 ACM CIKM International Conference on Information and Knowledge Management, 2004

Intelligent Agents Meet Semantic Web in a Smart Meeting Room.
Proceedings of the 3rd International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2004), 2004

2003
Guest editorial.
VLDB J., 2003

MobiCom poster: Anamika: distributed service composition architecture for pervasive environments.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2003

P2P M-commerce in pervasive environments.
SIGecom Exch., 2003

A Secure Infrastructure for Service Discovery and Access in Pervasive Computing.
Mob. Networks Appl., 2003

Using DAML+OIL to classify intrusive behaviours.
Knowl. Eng. Rev., 2003

An ontology for context-aware pervasive computing environments.
Knowl. Eng. Rev., 2003

On Using a Warehouse to Analyze Web Logs.
Distributed Parallel Databases, 2003

Secure sensor networks for perimeter protection.
Comput. Networks, 2003

A Policy Based Approach to Security for the Semantic Web.
Proceedings of the Semantic Web, 2003

Dynamic Solver Selection for an Internet Simulation Backbone.
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003

Modeling Computer Attacks: An Ontology for Intrusion Detection.
Proceedings of the Recent Advances in Intrusion Detection, 6th International Symposium, 2003

A Policy Language for a Pervasive Computing Environment.
Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 2003

Using Peer-to-Peer Data Routing for Infrastructure-Based Wireless Networks.
Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (PerCom'03), 2003

Using OWL in a Pervasive Computing Broker.
Proceedings of the Ontologies in Agent Systems 2003, 2003

Towards a Pervasive Grid.
Proceedings of the 17th International Parallel and Distributed Processing Symposium (IPDPS 2003), 2003

On the Grid and Sensor Networks.
Proceedings of the 4th International Workshop on Grid Computing (GRID 2003), 2003

Fuzzy clustering for intrusion detection.
Proceedings of the 12th IEEE International Conference on Fuzzy Systems, 2003

Panel on computational intelligence for homeland defense and counterterrorism.
Proceedings of the 12th IEEE International Conference on Fuzzy Systems, 2003

Neighborhood-Consistent Transaction Management for Pervasive Computing Environments.
Proceedings of the Database and Expert Systems Applications, 14th International Conference, 2003

eNcentive: a framework for intelligent marketing in mobile peer-to-peer environments.
Proceedings of the 5th International Conference on Electronic Commerce, 2003

2002
Centaurus: An Infrastructure for Service Management in Ubiquitous Computing Environments.
Wirel. Networks, 2002

Agents, Turst, and Information Access on the Semantic Web.
SIGMOD Rec., 2002

Intelligent Agents for Mobile and Embedded Devices.
Int. J. Cooperative Inf. Syst., 2002

ITtalks: A Case Study in the Semantic Web and DAML+OIL.
IEEE Intell. Syst., 2002

Enhanced Service Discovery in Bluetooth.
Computer, 2002

On experiments with a transport protocol for pervasive computing environments.
Comput. Networks, 2002

Agent Communication in DAML World.
Proceedings of the Innovative Concepts for Agent-Based Systems, 2002

Agents Making Sense of the Semantic Web.
Proceedings of the Innovative Concepts for Agent-Based Systems, 2002

Creating Context-Aware Software Agents.
Proceedings of the Innovative Concepts for Agent-Based Systems, 2002

Allia: alliance-based service discovery for ad-hoc environments.
Proceedings of the 2nd International Workshop on Mobile Commerce, 2002

Me-Services: A Framework for Secure & Personalized Discovery, Composition and Management of Services in Pervasive Environments.
Proceedings of the Web Services, 2002

Simulation of a Common Access Point for Bluetooth, 802.11 and Wired LANs.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2002

Adaptive Multimedia System Architecture for Improving QoS in Wireless Networks.
Proceedings of the Advances in Multimedia Information Processing, 2002

GSD: a novel group-based service discovery protocol for MANETS.
Proceedings of The Fourth IEEE Conference on Mobile and Wireless Communications Networks, 2002

MobileIQ: A Framework for Mobile Information Access.
Proceedings of the Third International Conference on Mobile Data Management (MDM 2002), 2002

A Reactive Service Composition Architecture for Pervasive Computing Environments.
Proceedings of the Mobile and Wireless Communications, 2002

Middleware for Mobile Information Access.
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002

Profile Driven Data Management for Pervasive Environments.
Proceedings of the Database and Expert Systems Applications, 13th International Conference, 2002

Information retrieval on the semantic web.
Proceedings of the 2002 ACM CIKM International Conference on Information and Knowledge Management, 2002

2001
Low-complexity fuzzy relational clustering algorithms for Web mining.
IEEE Trans. Fuzzy Syst., 2001

Broadband Wireless.
J. High Speed Networks, 2001

Communications - Trust-Based Security in Pervasive Computing Environments.
Computer, 2001

Dynamic Service Discovery for Mobile Computing: Intelligent Agents Meet Jini in the Aether.
Clust. Comput., 2001

Agents2Go: an infrastructure for location-dependent service discovery in the mobile electronic commerce environment.
Proceedings of the 1st International Workshop on Mobile Commerce, 2001

ITTALKS: A Case Study in the Semantic Web and DAML.
Proceedings of SWWS'01, The first Semantic Web Working Symposium, Stanford University, California, USA, July 30, 2001

Agents, Mobility, and M-services: Creating the Next Generation Applications and Infrastructure on Mobile Ad-Hoc Networks.
Proceedings of the Developing an Infrastructure for Mobile and Wireless Systems, 2001

Data mining "to go": ubiquitous KDD for mobile and distributed environments.
Proceedings of the Tutorial notes of the fifth ACM SIGKDD international conference on Knowledge discovery and data mining, 2001

An End-End Approach to Wireless Web Access.
Proceedings of the 21st International Conference on Distributed Computing Systems Workshops (ICDCS 2001 Workshops), 2001

Centaurus: A Framework for Intelligent Services in a Mobile Environment.
Proceedings of the 21st International Conference on Distributed Computing Systems Workshops (ICDCS 2001 Workshops), 2001

Transport protocols in wireless networks.
Proceedings of the 10th International Conference on Computer Communications and Networks, 2001

An Expertise Recommender Using Web Mining.
Proceedings of the Fourteenth International Florida Artificial Intelligence Research Society Conference, 2001

ITTALKS: An Application of Agents in the Semantic Web.
Proceedings of the Engineering Societies in the Agents World II, 2001

Information Agents for Mobile and Embedded Devices.
Proceedings of the Cooperative Information Agents V, 5th International Workshop, 2001

2000
On proxy agents, mobility, and web access.
Mob. Networks Appl., 2000

Extracting Web User Profiles Using Relational Competitive Fuzzy Clustering.
Int. J. Artif. Intell. Tools, 2000

A Component Based Architecture for Mobile Information Access.
Proceedings of the 2000 International Workshop on Parallel Processing, 2000

Multi-Agent Systems, Internet and Applications - Introduction.
Proceedings of the 33rd Annual Hawaii International Conference on System Sciences (HICSS-33), 2000

On Mining Web Access Logs.
Proceedings of the 2000 ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, 2000

1999
Guest Editorial.
Distributed Parallel Databases, 1999

Multiagent Systems on the Net - Introduction.
Commun. ACM, 1999

Warehousing and Mining Web Logs.
Proceedings of the ACM CIKM'99 2nd Workshop on Web Information and Data Management (WIDM'99), 1999

On mobility and agents.
Proceedings of the Mobile Networks and Computing, 1999

1998
Scene Change Detection Techniques for Video Database Systems.
Multim. Syst., 1998

Multiagent System Support of Networked Scientific Computing.
IEEE Internet Comput., 1998

Multidisciplinary Problem Solving Environments for Computational Science.
Adv. Comput., 1998

Personalization & Asynchronicity to Support Mobile Web Access.
Proceedings of the CIKM'98 First Workshop on Web Information and Data Management (WIDM'98), 1998

Interactive Image Retrieval over the Internet.
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998

Security in Mobile Systems.
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998

An Active Transcoding Proxy to Support Mobile Web Access.
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998

On Fuzzy Clustering and Content Based Access to Networked Video Databases.
Proceedings of the RIDE'98, 1998

1997
Video Database Systems - Issues, Products and Applications
Advances in Database Systems 5, Kluwer, ISBN: 978-0-7923-9872-1, 1997

On neurobiological, neuro-fuzzy, machine learning, and statistical pattern recognition techniques.
IEEE Trans. Neural Networks, 1997

Notebook interfaces for networked scientific computing: design and WWW implementation.
Concurr. Pract. Exp., 1997

On Disconnected Browsing of Distributed Information.
Proceedings of the 7th International Workshop on Research Issues in Data Engineering (RIDE '97) High Performance Database Management for Large-Scale Applications, 1997

A MultiAgent Environment for MPSE's.
Proceedings of the Eighth SIAM Conference on Parallel Processing for Scientific Computing, 1997

Neuro-fuzzy approaches to collaborative scientific computing.
Proceedings of International Conference on Neural Networks (ICNN'97), 1997

Panel on Cooperative MultiAgent Systems for the Web.
Proceedings of the Second IFCIS International Conference on Cooperative Information Systems, 1997

1996
PYTHIA: A Knowledge-Based System to Select Scientific Algorithms.
ACM Trans. Math. Softw., 1996

Software Architecture of Ubiquitous Scientific Computing Environments for Mobile Platforms.
Mob. Networks Appl., 1996

Internet, education, and the Web.
Proceedings of the 5th Workshop on Enabling Technologies, 1996

A neuro-fuzzy approach to agglomerative clustering.
Proceedings of International Conference on Neural Networks (ICNN'96), 1996

Web Intelligent Query - Disconnected Web Browsing using Cooperative Techniques.
Proceedings of the First IFCIS International Conference on Cooperative Information Systems (CoopIS'96), 1996

1995
On the problem of correspondence in range data and some inelastic uses for elastic nets.
IEEE Trans. Neural Networks, 1995

On correspondence, line tokens and missing tokens.
Pattern Recognit., 1995

To Learn or Not do Learn.
Proceedings of the Adaption and Learning in Multi-Agent Systems, 1995

SciAgents-an agent based environment for distributed, cooperative scientific computing.
Proceedings of the Seventh International Conference on Tools with Artificial Intelligence, 1995

1993
Correspondence problem in image sequence analysis.
Pattern Recognit., 1993

Backpropagation learns Marr's operator.
Biol. Cybern., 1993

Using elastic nets for correspondence in range data.
Proceedings of International Conference on Neural Networks (ICNN'88), San Francisco, CA, USA, March 28, 1993


  Loading...