Segui
Bhavani Thuraisingham
Bhavani Thuraisingham
Cyber Security Research and Education Institute, University of Texas at Dallas
Email verificata su utdallas.edu
Titolo
Citata da
Citata da
Anno
A new intrusion detection system using support vector machines and hierarchical clustering
L Khan, M Awad, B Thuraisingham
The VLDB journal 16, 507-521, 2007
5842007
Classification and novel class detection in concept-drifting data streams under time constraints
M Masud, J Gao, L Khan, J Han, BM Thuraisingham
IEEE Transactions on knowledge and data engineering 23 (6), 859-874, 2010
5292010
Privacy preservation in wireless sensor networks: A state-of-the-art survey
N Li, N Zhang, SK Das, B Thuraisingham
Ad Hoc Networks 7 (8), 1501-1514, 2009
4432009
Security issues for cloud computing
K Hamlen, M Kantarcioglu, L Khan, B Thuraisingham
International Journal of Information Security and Privacy (IJISP) 4 (2), 36-48, 2010
3632010
Systems and methods for determining user attribute values by mining user network data and information
S Abrol, V Khadilkar, LR Khan, BM Thuraisingham
US Patent 8,965,974, 2015
3422015
ROWLBAC: representing role based access control in OWL
T Finin, A Joshi, L Kagal, J Niu, R Sandhu, W Winsborough, ...
Proceedings of the 13th ACM symposium on Access control models and …, 2008
3392008
Inferring private information using social network data
J Lindamood, R Heatherly, M Kantarcioglu, B Thuraisingham
Proceedings of the 18th international conference on World wide web, 1145-1146, 2009
3312009
technologies, techniques, tools, and Trends
B Thuraisingham, D Maning
CRC press, 1999
2921999
Heuristics-based query processing for large RDF graphs using cloud computing
M Husain, J McGlothlin, MM Masud, L Khan, BM Thuraisingham
IEEE Transactions on Knowledge and Data Engineering 23 (9), 1312-1327, 2011
2872011
A semantic web based framework for social network access control
B Carminati, E Ferrari, R Heatherly, M Kantarcioglu, B Thuraisingham
Proceedings of the 14th ACM symposium on Access control models and …, 2009
2372009
Effective software fault localization using an RBF neural network
WE Wong, V Debroy, R Golden, X Xu, B Thuraisingham
IEEE Transactions on Reliability 61 (1), 149-169, 2011
2262011
A practical approach to classify evolving data streams: Training with limited amount of labeled data
MM Masud, J Gao, L Khan, J Han, B Thuraisingham
2008 Eighth IEEE International Conference on Data Mining, 929-934, 2008
2172008
Knowledge management: Classic and contemporary works
D Morey, MT Maybury, BM Thuraisingham
MIT Press, 2002
2152002
Systems and methods for automated detection of application vulnerabilities
L Khan, Z Lin, B Thuraisingham, J Sahs, D Sounthiraraj, G Greenwood
US Patent 9,977,904, 2018
2132018
Preventing private information inference attacks on social networks
R Heatherly, M Kantarcioglu, B Thuraisingham
IEEE Transactions on Knowledge and Data Engineering 25 (8), 1849-1862, 2012
2072012
Least cost rumor blocking in social networks
L Fan, Z Lu, W Wu, B Thuraisingham, H Ma, Y Bi
2013 IEEE 33rd International Conference on Distributed Computing Systems …, 2013
1982013
Privacy preserving synthetic data release using deep learning
NC Abay, Y Zhou, M Kantarcioglu, B Thuraisingham, L Sweeney
Machine Learning and Knowledge Discovery in Databases: European Conference …, 2019
1962019
Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry
M Qiu, K Gai, B Thuraisingham, L Tao, H Zhao
Future generation computer systems 80, 421-429, 2018
1952018
Eksploracja danych
DJ Hand, H Mannila, P Smyth
Wydawnictwa Naukowo-Techniczne, 2005
1952005
Deepsweep: An evaluation framework for mitigating DNN backdoor attacks using data augmentation
H Qiu, Y Zeng, S Guo, T Zhang, M Qiu, B Thuraisingham
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
1922021
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20