Jugal K. Kalita

According to our database1, Jugal K. Kalita authored at least 126 papers between 1984 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
Index-Based Network Aligner of Protein-Protein Interaction Networks.
IEEE/ACM Trans. Comput. Biology Bioinform., 2018

A survey of detection methods for XSS attacks.
J. Network and Computer Applications, 2018

A detection framework for semantic code clones and obfuscated code.
Expert Syst. Appl., 2018

Parallel Attention Mechanisms in Neural Machine Translation.
CoRR, 2018

Abstractive Summarization Using Attentive Neural Techniques.
CoRR, 2018

Hierarchical Text Generation using an Outline.
CoRR, 2018

Exploring Sentence Vector Spaces through Automatic Summarization.
CoRR, 2018

Isolated and Ensemble Audio Preprocessing Methods for Detecting Adversarial Examples against Automatic Speech Recognition.
CoRR, 2018

A Survey of the Usages of Deep Learning in Natural Language Processing.
CoRR, 2018

Intrinsic-overlapping co-expression module detection with application to Alzheimer's Disease.
Computational Biology and Chemistry, 2018

THD-Tricluster: A robust triclustering technique and its application in condition specific change analysis in HIV-1 progression data.
Computational Biology and Chemistry, 2018

Genre Identification and the Compositional Effect of Genre in Literature.
Proceedings of the 27th International Conference on Computational Linguistics, 2018

2017
Network Traffic Anomaly Detection and Prevention - Concepts, Techniques, and Tools
Computer Communications and Networks, Springer, ISBN: 978-3-319-65186-6, 2017

Complex detection from PPI data using ensemble method.
NetMAHIB, 2017

Predicting run time of classification algorithms using meta-learning.
Int. J. Machine Learning & Cybernetics, 2017

An Unsupervised Method for Detection of XSS Attack.
I. J. Network Security, 2017

DDoS Attacks: Tools, Mitigation Approaches, and Probable Impact on Private Cloud Environment.
CoRR, 2017

Deep Learning applied to NLP.
CoRR, 2017

A Novel Algorithm for Local Alignment of Protein Interaction Networks: MODULA.
Proceedings of the 25th Italian Symposium on Advanced Database Systems, 2017

Exploring Symmetric Substructures in Protein Interaction Networks for Pairwise Alignment.
Proceedings of the Bioinformatics and Biomedical Engineering, 2017

Ranking most informative apps for effective identification of legitimate smartphone owners.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Schemes for Labeling Semantic Code Clones using Machine Learning.
Proceedings of the 16th IEEE International Conference on Machine Learning and Applications, 2017

Performing local network alignment by ensembling global aligners.
Proceedings of the 2017 IEEE International Conference on Bioinformatics and Biomedicine, 2017

2016
Global Alignment of Protein-Protein Interaction Networks: A Survey.
IEEE/ACM Trans. Comput. Biology Bioinform., 2016

FFSc: a novel measure for low-rate and high-rate DDoS attack detection using multivariate data analysis.
Security and Communication Networks, 2016

E-LDAT: a lightweight system for DDoS flooding attack detection and IP traceback using extended entropy metric.
Security and Communication Networks, 2016

A multi-step outlier-based anomaly detection approach to network-wide traffic.
Inf. Sci., 2016

Rank Correlation for Low-Rate DDoS Attack Detection: An Empirical Evaluation.
I. J. Network Security, 2016

Approaches and issues in view selection for materialising in data warehouse.
IJBIS, 2016

Detecting and Extracting Events from Text Documents.
CoRR, 2016

Authentication of Smartphone Users Using Behavioral Biometrics.
IEEE Communications Surveys and Tutorials, 2016

Composition of Compound Nouns Using Distributional Semantics.
Proceedings of the 13th International Conference on Natural Language Processing, 2016

Integrating WordNet for Multiple Sense Embeddings in Vector Semantics.
Proceedings of the 13th International Conference on Natural Language Processing, 2016

Automatic Algorithm Selection in Computational Software Using Machine Learning.
Proceedings of the 15th IEEE International Conference on Machine Learning and Applications, 2016

Semantic Clone Detection Using Machine Learning.
Proceedings of the 15th IEEE International Conference on Machine Learning and Applications, 2016

Sentiment Analysis of Restaurant Reviews on Yelp with Incremental Learning.
Proceedings of the 15th IEEE International Conference on Machine Learning and Applications, 2016

Named entity recognition in Assamese: A hybrid approach.
Proceedings of the 2016 International Conference on Advances in Computing, 2016

A novel measure for low-rate and high-rate DDoS attack detection using multivariate data analysis.
Proceedings of the 8th International Conference on Communication Systems and Networks, 2016

Algorithm Selection Using Performance and Run Time Behavior.
Proceedings of the Artificial Intelligence: Methodology, Systems, and Applications, 2016

2015
An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection.
Pattern Recognition Letters, 2015

Strew index.
NetMAHIB, 2015

Network defense: Approaches, methods and techniques.
J. Network and Computer Applications, 2015

Towards Generating Real-life Datasets for Network Intrusion Detection.
I. J. Network Security, 2015

Botnet in DDoS Attacks: Trends and Challenges.
IEEE Communications Surveys and Tutorials, 2015

Core and peripheral connectivity based cluster analysis over PPI network.
Computational Biology and Chemistry, 2015

A multiobjective memetic algorithm for PPI network alignment.
Bioinformatics, 2015

Phrase translation using a bilingual dictionary and n-gram data: A case study from Vietnamese to English.
Proceedings of the 11th Workshop on Multiword Expressions, 2015

Selecting Machine Learning Algorithms Using Regression Models.
Proceedings of the IEEE International Conference on Data Mining Workshop, 2015

MODULA: A network module based local protein interaction network alignment method.
Proceedings of the 2015 IEEE International Conference on Bioinformatics and Biomedicine, 2015

Automatically Creating a Large Number of New Bilingual Dictionaries.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

2014
Shifting-and-Scaling Correlation Based Biclustering Algorithm.
IEEE/ACM Trans. Comput. Biology Bioinform., 2014

Stemming resource-poor Indian languages.
ACM Trans. Asian Lang. Inf. Process., 2014

Network attacks: Taxonomy, tools and systems.
J. Network and Computer Applications, 2014

MIFS-ND: A mutual information-based feature selection method.
Expert Syst. Appl., 2014

Network Anomaly Detection: Methods, Systems and Tools.
IEEE Communications Surveys and Tutorials, 2014

Summarization of Twitter Microblogs.
Comput. J., 2014

MLH-IDS: A Multi-Level Hybrid Intrusion Detection Method.
Comput. J., 2014

Extracting and Displaying Temporal and Geospatial Entities from Articles on Historical Events.
Comput. J., 2014

Detecting Distributed Denial of Service Attacks: Methods, Tools and Future Directions.
Comput. J., 2014

Towards an Unsupervised Method for Network Anomaly Detection in Large Datasets.
Computing and Informatics, 2014

Reconstruction of gene co-expression network from microarray data using local expression patterns.
BMC Bioinformatics, 2014

A comparison of algorithms for the pairwise alignment of biological networks.
Bioinformatics, 2014

Information metrics for low-rate DDoS attack detection: A comparative evaluation.
Proceedings of the Seventh International Conference on Contemporary Computing, 2014

Named entity recognition in Assamese using CRFS and rules.
Proceedings of the 2014 International Conference on Asian Language Processing, 2014

Automatically constructing Wordnet Synsets.
Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics, 2014

2013
Cutting Plane Training for Linear Support Vector Machines.
IEEE Trans. Knowl. Data Eng., 2013

Design and Evaluation of Soft Keyboards for Brahmic Scripts.
ACM Trans. Asian Lang. Inf. Process., 2013

CoBi: Pattern Based Co-Regulated Biclustering of Gene Expression Data.
Pattern Recognition Letters, 2013

Streaming trend detection in Twitter.
IJWBC, 2013

A rough set-based effective rule generation method for classification with an application in intrusion detection.
IJSN, 2013

Creating Reverse Bilingual Dictionaries.
Proceedings of the Human Language Technologies: Conference of the North American Chapter of the Association of Computational Linguistics, 2013

Better Twitter Summaries?
Proceedings of the Human Language Technologies: Conference of the North American Chapter of the Association of Computational Linguistics, 2013

An Improved Stemming Approach Using HMM for a Highly Inflectional Language.
Proceedings of the Computational Linguistics and Intelligent Text Processing, 2013

2012
Module extraction from subspace co-expression networks.
NetMAHIB, 2012

AOCD: An Adaptive Outlier Based Coordinated Scan Detection Approach.
I. J. Network Security, 2012

An effective graph-based clustering technique to identify coherent patterns from gene expression data.
IJBRA, 2012

Survey on Incremental Approaches for Network Anomaly Detection
CoRR, 2012

An effective method for network module extraction from microarray data.
BMC Bioinformatics, 2012

Summarization of Historical Articles Using Temporal Event Clustering.
Proceedings of the Human Language Technologies: Conference of the North American Chapter of the Association of Computational Linguistics, 2012

Deterministic Approach for Biclustering of Co-Regulated Genes from Gene Expression Data.
Proceedings of the Advances in Knowledge-Based and Intelligent Information and Engineering Systems, 2012

Analysis and evaluation of stemming algorithms: a case study with Assamese.
Proceedings of the 2012 International Conference on Advances in Computing, 2012

An effective unsupervised network anomaly detection method.
Proceedings of the 2012 International Conference on Advances in Computing, 2012

Packet and Flow Based Network Intrusion Dataset.
Proceedings of the Contemporary Computing - 5th International Conference, 2012

Discretization in gene expression data analysis: a selected survey.
Proceedings of the Second International Conference on Computational Science, 2012

2011
Neuro-fuzzy time-series analysis of large-volume data.
Int. Syst. in Accounting, Finance and Management, 2011

A pattern matching approach for clustering gene expression data.
IJDMMM, 2011

Survey on Incremental Approaches for Network Anomaly Detection.
IJCNIS, 2011

A Survey of Outlier Detection Methods in Network Anomaly Identification.
Comput. J., 2011

Surveying Port Scans and Their Detection Methodologies.
Comput. J., 2011

Comparing Twitter Summarization Algorithms for Multiple Post Summaries.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

NADO: network anomaly detection using outlier approach.
Proceedings of the 2011 International Conference on Communication, 2011

GERC: Tree Based Clustering for Gene Expression Data.
Proceedings of the 11th IEEE International Conference on Bioinformatics and Bioengineering, 2011

2010
Scaling alignment of large ontologies.
IJBRA, 2010

Scalable biomedical Named Entity Recognition: investigation of a database-supported SVM approach.
IJBRA, 2010

Experiments in Microblog Summarization.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

A Comparison of Approaches for Geospatial Entity Extraction from Wikipedia.
Proceedings of the 4th IEEE International Conference on Semantic Computing (ICSC 2010), 2010

Summarizing Microblogs Automatically.
Proceedings of the Human Language Technologies: Conference of the North American Chapter of the Association of Computational Linguistics, 2010

A Suffix-Based Noun and Verb Classifier for an Inflectional Language.
Proceedings of the International Conference on Asian Language Processing, 2010

2009
A new approach for clustering gene expression time series data.
IJBRA, 2009

Extracting Geospatial Entities from Wikipedia.
Proceedings of the 3rd IEEE International Conference on Semantic Computing (ICSC 2009), 2009

A Branch and Bound Algorithm to Scale Alignment of Large Ontologies.
Proceedings of the 3rd IEEE International Conference on Semantic Computing (ICSC 2009), 2009

An Incremental Clustering of Gene Expression Data.
Proceedings of the World Congress on Nature & Biologically Inspired Computing, 2009

Part of Speech Tagger for Assamese Text.
Proceedings of the ACL 2009, 2009

Mining Wikipedia Article Clusters for Geospatial Entities and Relationships.
Proceedings of the Social Semantic Web: Where Web 2.0 Meets Web 3.0, 2009

2008
Acquisition of Morphology of an Indic Language from Text Corpus.
ACM Trans. Asian Lang. Inf. Process., 2008

Gooal Automatic Design Tool - A Role Posets Based Tool to Produce Object Models from Problem Descriptions.
Proceedings of the ICSOFT 2008, 2008

2006
Computational modelling and simulation of the immune system.
IJBRA, 2006

Clustering Approach to Content Based Image Retrieval.
Proceedings of the 2006 International Conference on Geometric Modeling and Imaging, 2006

2005
GOOAL: an educational object oriented analysis laboratory.
Proceedings of the Companion to the 20th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2005

2003
Ant algorithms for the optimal restoration of distribution feeders during cold load pickup.
Proceedings of the 2003 IEEE Swarm Intelligence Symposium, 2003

The Significance of Temporal-Difference Learning in Self-Play Training TD-Rummy versus EVO-rummy.
Proceedings of the Machine Learning, 2003

2002
Unsupervised Learning of Morphology for Building Lexicon for a Highly Inflectional Language.
Proceedings of the ACL-02 Workshop on Morphological and Phonological Learning, 2002

Automatically generating object models from natural language analysis.
Proceedings of the Companion of the 17th annual ACM SIGPLAN conference on Object-oriented programming, 2002

GOOAL: a Graphic Object Oriented Analysis Laboratory.
Proceedings of the Companion of the 17th annual ACM SIGPLAN conference on Object-oriented programming, 2002

Efficient handling of high-dimensional feature spaces by randomized classifier ensembles.
Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2002

An Ant Colony Algorithm for the Restoration of Distribution Systems.
Proceedings of the Late Breaking papers at the Genetic and Evolutionary Computation Conference (GECCO-2002), 2002

2001
Summarization as Feature Selection for Text Categorization.
Proceedings of the 2001 ACM CIKM International Conference on Information and Knowledge Management, 2001

2000
Parsing and Interpretation in the Minimalist Paradigm.
Computational Intelligence, 2000

1997
Situation assessment and prediction in intelligence domains.
Knowl.-Based Syst., 1997

An Informal Semantic Analysis of Motion Verbs Based on Physical Primitives.
Computational Intelligence, 1997

1991
Simulating human tasks using simple natural language instructions.
Proceedings of the 23th Winter Simulation Conference, 1991

Interpreting Prepositions Physically.
Proceedings of the 9th National Conference on Artificial Intelligence, 1991

1989
Automatically Generating Natural Language Reports.
International Journal of Man-Machine Studies, 1989

1988
Automatically Generating Natural Language Reports In An Office Environment.
Proceedings of the 2nd Applied Natural Language Processing Conference, 1988

1986
Summarizing Natural Language Database Responses.
Computational Linguistics, 1986

1984
A Response to the Need for Summary Responses.
Proceedings of the 10th International Conference on Computational Linguistics and 22nd Annual Meeting of the Association for Computational Linguistics, 1984


  Loading...