Anupam Joshi
University of Maryland, USA
http://www.cs.umbc.edu/~joshi/
https://scholar.google.com/citations?user=sJ7wlksAAAAJ
https://zbmath.org/authors/?q=ai:joshi.anupam
https://mathgenealogy.org/id.php?id=79052
https://en.wikipedia.org/wiki/Anupam_Joshi
https://orcid.org/0000-0002-8641-3193
https://www.wikidata.org/entity/Q29253659
Aritran Piplai
Anantaa Kotal
Seyedreza Mohseni
Manas Gaur
Sudip Mittal
Anupam Joshi
Knowledge-Enhanced Neurosymbolic Artificial Intelligence for Cybersecurity and Privacy.
43-48
2023
September - October
27
IEEE Internet Comput.
5
https://doi.org/10.1109/MIC.2023.3299435
db/journals/internet/internet27.html#PiplaiKMGMJ23
Aritran Piplai
Anupam Joshi
Tim Finin
Offline RL+CKG: A hybrid AI model for cybersecurity tasks.
2023
AAAI Spring Symposium: MAKE
https://ceur-ws.org/Vol-3433/short1.pdf
conf/aaaiss/2023make
db/conf/aaaiss/make2023.html#PiplaiJF23
Priyanka Ranade
Anupam Joshi
FABULA: Intelligence Report Generation Using Retrieval-Augmented Narrative Construction.
603-610
2023
ASONAM
https://doi.org/10.1145/3625007.3627505
conf/asunam/2023
db/conf/asunam/asonam2023.html#RanadeJ23
Anantaa Kotal
Lavanya Elluri
Deepti Gupta
Varun Mandalapu
Anupam Joshi
Privacy-Preserving Data Sharing in Agriculture: Enforcing Policy Rules for Secure and Confidential Data Synthesis.
5519-5528
2023
IEEE Big Data
https://doi.org/10.1109/BigData59044.2023.10386276
conf/bigdataconf/2023
db/conf/bigdataconf/bigdataconf2023.html#KotalEGMJ23
Varish Mulwad
Vijay S. Kumar
Jenny Weisenberg Williams
Tim Finin
Sharad Dixit
Anupam Joshi
Towards Semantic Exploration of Tables in Scientific Documents.
2023
ESWC Workshops
https://ceur-ws.org/Vol-3443/ESWC_2023_SemTech4STLD_paper_2.pdf
conf/esws/2023w
db/conf/esws/eswc2023w.html#MulwadKWFDJ23
Narayana Murari Gowrishetty
Sai Sree Laya Chukkapalli
Anupam Joshi
Bewitching the Battlefield: Repurposing the MouseJack Attack for Crazyflie Drones.
1-6
2023
INFOCOM Workshops
https://doi.org/10.1109/INFOCOMWKSHPS57453.2023.10225819
conf/infocom/2023w
db/conf/infocom/infocom2023w.html#GowrishettyCJ23
Nilanjana Das
Anantaa Kotal
Daniel Roseberry
Anupam Joshi
Change Management using Generative Modeling on Digital Twins.
1-6
2023
ISI
https://doi.org/10.1109/ISI58743.2023.10297181
conf/isi/2023
db/conf/isi/isi2023.html#DasKRJ23
Vijay S. Kumar
Varish Mulwad
Jenny Weisenberg Williams
Tim Finin
Sharad Dixit
Anupam Joshi
Knowledge Graph-driven Tabular Data Discovery from Scientific Documents.
2023
VLDB Workshops
https://ceur-ws.org/Vol-3462/TADA6.pdf
conf/vldb/2023w
db/conf/vldb/w2023.html#KumarMWFDJ23
Varish Mulwad
Tim Finin
Vijay S. Kumar
Jenny Weisenberg Williams
Sharad Dixit
Anupam Joshi
A Practical Entity Linking System for Tables in Scientific Literature.
2023
abs/2306.10044
CoRR
https://doi.org/10.48550/arXiv.2306.10044
db/journals/corr/corr2306.html#abs-2306-10044
Aritran Piplai
Anantaa Kotal
Seyedreza Mohseni
Manas Gaur
Sudip Mittal
Anupam Joshi
Knowledge-enhanced Neuro-Symbolic AI for Cybersecurity and Privacy.
2023
abs/2308.02031
CoRR
https://doi.org/10.48550/arXiv.2308.02031
db/journals/corr/corr2308.html#abs-2308-02031
Nilanjana Das
Anantaa Kotal
Daniel Roseberry
Anupam Joshi
Change Management using Generative Modeling on Digital Twins.
2023
abs/2309.12421
CoRR
https://doi.org/10.48550/arXiv.2309.12421
db/journals/corr/corr2309.html#abs-2309-12421
Priyanka Ranade
Anupam Joshi
FABULA: Intelligence Report Generation Using Retrieval-Augmented Narrative Construction.
2023
abs/2310.13848
CoRR
https://doi.org/10.48550/arXiv.2310.13848
db/journals/corr/corr2310.html#abs-2310-13848
Anantaa Kotal
Lavanya Elluri
Deepti Gupta
Varun Mandalapu
Anupam Joshi
Privacy-Preserving Data Sharing in Agriculture: Enforcing Policy Rules for Secure and Confidential Data Synthesis.
2023
abs/2311.15460
CoRR
https://doi.org/10.48550/arXiv.2311.15460
db/journals/corr/corr2311.html#abs-2311-15460
Priyanka Ranade
Sanorita Dey
Anupam Joshi
Tim Finin
Computational Understanding of Narratives: A Survey.
101575-101594
2022
10
IEEE Access
https://doi.org/10.1109/ACCESS.2022.3205314
db/journals/access/access10.html#RanadeDJF22
Sandeep Nair Narayanan
Anupam Joshi
Ranjan Bose
ABATe: Automatic Behavioral Abstraction Technique to Detect Anomalies in Smart Cyber-Physical Systems.
1673-1686
2022
19
IEEE Trans. Dependable Secur. Comput.
3
https://doi.org/10.1109/TDSC.2020.3034331
db/journals/tdsc/tdsc19.html#NarayananJB22
Anantaa Kotal
Aritran Piplai
Sai Sree Laya Chukkapalli
Anupam Joshi
PriveTAB: Secure and Privacy-Preserving sharing of Tabular Data.
35-45
2022
IWSPA@CODASPY
https://doi.org/10.1145/3510548.3519377
conf/codaspy/2022iwspa
db/conf/codaspy/iwspa2022.html#KotalPCJ22
Aritran Piplai
Mike Anoruo
Kayode Fasaye
Anupam Joshi
Tim Finin
Ahmad Ridley
Knowledge Guided Two-player Reinforcement Learning for Cyber Attacks and Defenses.
1342-1349
2022
ICMLA
https://doi.org/10.1109/ICMLA55696.2022.00213
conf/icmla/2022
db/conf/icmla/icmla2022.html#PiplaiAFJFR22
Anupam Joshi
Maribel Fernández
Rakesh M. Verma
CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24 - 27, 2022
ACM
CODASPY
2022
978-1-4503-9220-4
https://doi.org/10.1145/3508398
db/conf/codaspy/codaspy2022.html
Casey Hanks
Michael Maiden
Priyanka Ranade
Tim Finin
Anupam Joshi
Recognizing and Extracting Cybersecurtity-relevant Entities from Text.
2022
abs/2208.01693
CoRR
https://doi.org/10.48550/arXiv.2208.01693
db/journals/corr/corr2208.html#abs-2208-01693
Sai Sree Laya Chukkapalli
Anupam Joshi
Tim Finin
Robert F. Erbacher
CAPD: A Context-Aware, Policy-Driven Framework for Secure and Resilient IoBT Operations.
2022
abs/2208.01703
CoRR
https://doi.org/10.48550/arXiv.2208.01703
db/journals/corr/corr2208.html#abs-2208-01703
Lavanya Elluri
Sai Sree Laya Chukkapalli
Karuna Pande Joshi
Tim Finin
Anupam Joshi
A BERT Based Approach to Measure Web Services Policies Compliance With GDPR.
148004-148016
2021
9
IEEE Access
https://doi.org/10.1109/ACCESS.2021.3123950
db/journals/access/access9.html#ElluriCJFJ21
Lavanya Elluri
Aritran Piplai
Anantaa Kotal
Anupam Joshi
Karuna Pande Joshi
A Policy-Driven Approach to Secure Extraction of COVID-19 Data From Research Papers.
701966
2021
4
Frontiers Big Data
https://doi.org/10.3389/fdata.2021.701966
https://www.wikidata.org/entity/Q112680602
db/journals/fdata/fdata4.html#ElluriPKJJ21
Soham Dasgupta
Aritran Piplai
Priyanka Ranade
Anupam Joshi
Cybersecurity Knowledge Graph Improvement with Graph Neural Networks.
3290-3297
2021
IEEE BigData
https://doi.org/10.1109/BigData52589.2021.9672062
conf/bigdataconf/2021
db/conf/bigdataconf/bigdataconf2021.html#DasguptaPRJ21
Shaswata Mitra
Aritran Piplai
Sudip Mittal
Anupam Joshi
Combating Fake Cyber Threat Intelligence using Provenance in Cybersecurity Knowledge Graphs.
3316-3323
2021
IEEE BigData
https://doi.org/10.1109/BigData52589.2021.9671867
conf/bigdataconf/2021
db/conf/bigdataconf/bigdataconf2021.html#MitraPMJ21
Priyanka Ranade
Aritran Piplai
Anupam Joshi
Tim Finin
CyBERT: Contextualized Embeddings for the Cybersecurity Domain.
3334-3342
2021
IEEE BigData
https://doi.org/10.1109/BigData52589.2021.9671824
conf/bigdataconf/2021
db/conf/bigdataconf/bigdataconf2021.html#RanadePJF21
Caitlin Moroney
Evan Crothers
Sudip Mittal
Anupam Joshi
Tülay Adali
Christine Mallinson
Nathalie Japkowicz
Zois Boukouvalas
The Case for Latent Variable Vs Deep Learning Methods in Misinformation Detection: An Application to COVID-19.
422-432
2021
DS
https://doi.org/10.1007/978-3-030-88942-5_33
conf/dis/2021
db/conf/dis/dis2021.html#MoroneyCMJAMJB21
Priyanka Ranade
Aritran Piplai
Sudip Mittal
Anupam Joshi
Tim Finin
Generating Fake Cyber Threat Intelligence Using Transformer-Based Models.
1-9
2021
IJCNN
https://doi.org/10.1109/IJCNN52387.2021.9534192
conf/ijcnn/2021
db/conf/ijcnn/ijcnn2021.html#RanadePMJF21
Sai Sree Laya Chukkapalli
Nisha Pillai
Sudip Mittal
Anupam Joshi
Cyber-Physical System Security Surveillance using Knowledge Graph based Digital Twins - A Smart Farming Usecase.
1-6
2021
ISI
https://doi.org/10.1109/ISI53945.2021.9624688
conf/isi/2021
db/conf/isi/isi2021.html#ChukkapalliPMJ21
Anantaa Kotal
Anupam Joshi
Karuna Pande Joshi
The Effect of Text Ambiguity on creating Policy Knowledge Graphs.
1491-1500
2021
ISPA/BDCloud/SocialCom/SustainCom
https://doi.org/10.1109/ISPA-BDCloud-SocialCom-SustainCom52081.2021.00201
conf/ispa/2021
db/conf/ispa/ispa2021.html#KotalJJ21
Sai Sree Laya Chukkapalli
Priyanka Ranade
Sudip Mittal
Anupam Joshi
A Privacy Preserving Anomaly Detection Framework for Cooperative Smart Farming Ecosystem.
340-347
2021
TPS-ISA
https://doi.org/10.1109/TPSISA52974.2021.00037
conf/tpsisa/2021
db/conf/tpsisa/tpsisa2021.html#ChukkapalliRMJ21
Anupam Joshi
Barbara Carminati
Rakesh M. Verma
CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, Virtual Event, USA, April 26-28, 2021
ACM
CODASPY
2021
978-1-4503-8143-7
https://doi.org/10.1145/3422337
db/conf/codaspy/codaspy2021.html
Priyanka Ranade
Aritran Piplai
Sudip Mittal
Anupam Joshi
Tim Finin
Generating Fake Cyber Threat Intelligence Using Transformer-Based Models.
2021
abs/2102.04351
CoRR
https://arxiv.org/abs/2102.04351
db/journals/corr/corr2102.html#abs-2102-04351
Sai Sree Laya Chukkapalli
Sudip Mittal
Maanak Gupta
Mahmoud Abdelsalam
Anupam Joshi
Ravi S. Sandhu
Karuna P. Joshi
Ontologies and Artificial Intelligence Systems for the Cooperative Smart Farming Ecosystem.
164045-164064
2020
8
IEEE Access
https://doi.org/10.1109/ACCESS.2020.3022763
db/journals/access/access8.html#ChukkapalliMGAJ20
Aritran Piplai
Sudip Mittal
Anupam Joshi
Tim Finin
James Holt
Richard Zak
Creating Cybersecurity Knowledge Graphs From Malware After Action Reports.
211691-211703
2020
8
IEEE Access
https://doi.org/10.1109/ACCESS.2020.3039234
db/journals/access/access8.html#PiplaiMJFHZ20
Alejandra Diaz
Alan T. Sherman
Anupam Joshi
Phishing in an academic community: A study of user susceptibility and behavior.
53-67
2020
44
Cryptologia
1
https://doi.org/10.1080/01611194.2019.1623343
db/journals/cryptologia/cryptologia44.html#DiazSJ20
Kush Khanna
Bijaya Ketan Panigrahi
Anupam Joshi
Priority-Based Protection Against the Malicious Data Injection Attacks on State Estimation.
1945-1952
2020
14
IEEE Syst. J.
2
https://doi.org/10.1109/JSYST.2019.2933023
db/journals/sj/sj14.html#KhannaPJ20
Anantaa Kotal
Karuna Pande Joshi
Anupam Joshi
ViCLOUD: Measuring Vagueness in Cloud Service Privacy Policies and Terms of Services.
71-79
2020
CLOUD
https://doi.org/10.1109/CLOUD49709.2020.00023
conf/IEEEcloud/2020
db/conf/IEEEcloud/IEEEcloud2020.html#KotalJJ20
Oyesh Mann Singh
Sandesh Timilsina
Bal Krishna Bal
Anupam Joshi
Aspect Based Abusive Sentiment Detection in Nepali Social Media Texts.
301-308
2020
ASONAM
https://doi.org/10.1109/ASONAM49781.2020.9381292
conf/asunam/2020
db/conf/asunam/asonam2020.html#SinghTBJ20
Nitu Kedarmal Choudhary
Sai Sree Laya Chukkapalli
Sudip Mittal
Maanak Gupta
Mahmoud Abdelsalam
Anupam Joshi
YieldPredict: A Crop Yield Prediction Framework for Smart Farms.
2340-2349
2020
IEEE BigData
https://doi.org/10.1109/BigData50022.2020.9377832
conf/bigdataconf/2020
db/conf/bigdataconf/bigdataconf2020.html#ChoudharyCMGAJ20
Soham Dasgupta
Aritran Piplai
Anantaa Kotal
Anupam Joshi
A Comparative Study of Deep Learning based Named Entity Recognition Algorithms for Cybersecurity.
2596-2604
2020
IEEE BigData
https://doi.org/10.1109/BigData50022.2020.9378482
conf/bigdataconf/2020
db/conf/bigdataconf/bigdataconf2020.html#DasguptaPKJ20
Aritran Piplai
Priyanka Ranade
Anantaa Kotal
Sudip Mittal
Sandeep Nair Narayanan
Anupam Joshi
Using Knowledge Graphs and Reinforcement Learning for Malware Analysis.
2626-2633
2020
IEEE BigData
https://doi.org/10.1109/BigData50022.2020.9378491
conf/bigdataconf/2020
db/conf/bigdataconf/bigdataconf2020.html#PiplaiRKMNJ20
Sai Sree Laya Chukkapalli
Aritran Piplai
Sudip Mittal
Maanak Gupta
Anupam Joshi
A Smart-Farming Ontology for Attribute Based Access Control.
29-34
2020
BigDataSecurity/HPSC/IDS
https://doi.org/10.1109/BigDataSecurity-HPSC-IDS49724.2020.00017
conf/bigdatasec/2020
db/conf/bigdatasec/bigdatasec2020.html#ChukkapalliPMGJ20
Sofia Dutta
Sai Sree Laya Chukkapalli
Madhura Sulgekar
Swathi Krithivasan
Prajit Kumar Das
Anupam Joshi
Context Sensitive Access Control in Smart Home Environments.
35-41
2020
BigDataSecurity/HPSC/IDS
https://doi.org/10.1109/BigDataSecurity-HPSC-IDS49724.2020.00018
conf/bigdatasec/2020
db/conf/bigdatasec/bigdatasec2020.html#DuttaCSKDJ20
Aritran Piplai
Sai Sree Laya Chukkapalli
Anupam Joshi
NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion.
49-54
2020
BigDataSecurity/HPSC/IDS
https://doi.org/10.1109/BigDataSecurity-HPSC-IDS49724.2020.00020
conf/bigdatasec/2020
db/conf/bigdatasec/bigdatasec2020.html#PiplaiCJ20
Sina Sontowski
Maanak Gupta
Sai Sree Laya Chukkapalli
Mahmoud Abdelsalam
Sudip Mittal
Anupam Joshi
Ravi S. Sandhu
Cyber Attacks on Smart Farming Infrastructure.
135-143
2020
CIC
https://doi.org/10.1109/CIC50333.2020.00025
conf/coinco/2020
db/conf/coinco/cic2020.html#SontowskiGCAMJS20
Aritran Piplai
Sudip Mittal
Mahmoud Abdelsalam
Maanak Gupta
Anupam Joshi
Tim Finin
Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior.
1-6
2020
ISI
https://doi.org/10.1109/ISI49825.2020.9280512
conf/isi/2020
db/conf/isi/isi2020.html#PiplaiMAGJF20
Aritran Piplai
Sai Sree Laya Chukkapalli
Anupam Joshi
NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion.
2020
abs/2002.08527
CoRR
https://arxiv.org/abs/2002.08527
db/journals/corr/corr2002.html#abs-2002-08527
Zois Boukouvalas
Christine Mallinson
Evan Crothers
Nathalie Japkowicz
Aritran Piplai
Sudip Mittal
Anupam Joshi
Tülay Adali
Independent Component Analysis for Trustworthy Cyberspace during High Impact Events: An Application to Covid-19.
2020
abs/2006.01284
CoRR
https://arxiv.org/abs/2006.01284
db/journals/corr/corr2006.html#abs-2006-01284
Khyati Chopra
Ranjan Bose
Anupam Joshi
Stackelberg game for price and power control in secure cooperative relay network.
58-67
2019
4
IET Cyper-Phys. Syst.: Theory & Appl.
1
https://doi.org/10.1049/iet-cps.2017.0096
db/journals/iet-cps/iet-cps4.html#ChopraBJ19
Sandeep Kumar Singh 0004
Ranjan Bose
Anupam Joshi
Energy theft detection for AMI using principal component analysis based reconstructed data.
179-185
2019
4
IET Cyper-Phys. Syst.: Theory & Appl.
2
https://doi.org/10.1049/iet-cps.2018.5050
db/journals/iet-cps/iet-cps4.html#SinghBJ19
Aditya Pingle
Aritran Piplai
Sudip Mittal
Anupam Joshi
James Holt
Richard Zak
RelExt: relation extraction using deep learning approaches for cybersecurity knowledge graph improvement.
879-886
2019
ASONAM
https://doi.org/10.1145/3341161.3343519
conf/asunam/2019
db/conf/asunam/asonam2019.html#PinglePMJHZ19
Sowmya Ramapatruni
Sandeep Nair Narayanan
Sudip Mittal
Anupam Joshi
Karuna P. Joshi
Anomaly Detection Models for Smart Home Security.
19-24
2019
BigDataSecurity/HPSC/IDS
https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2019.00015
conf/bigdatasec/2019
db/conf/bigdatasec/bigdatasec2019.html#RamapatruniNMJJ19
Oyesh Mann Singh
Ankur Padia
Anupam Joshi
Named Entity Recognition for Nepali Language.
184-190
2019
CIC
https://doi.org/10.1109/CIC48465.2019.00031
conf/coinco/2019
db/conf/coinco/cic2019.html#SinghPJ19
Nitika Khurana
Sudip Mittal
Aritran Piplai
Anupam Joshi
Preventing Poisoning Attacks On AI Based Threat Intelligence Systems.
1-6
2019
MLSP
https://doi.org/10.1109/MLSP.2019.8918803
conf/mlsp/2019
db/conf/mlsp/mlsp2019.html#KhuranaMPJ19
Aditya Pingle
Aritran Piplai
Sudip Mittal
Anupam Joshi
James Holt
Richard Zak
RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement.
2019
abs/1905.02497
CoRR
http://arxiv.org/abs/1905.02497
db/journals/corr/corr1905.html#abs-1905-02497
Sudip Mittal
Anupam Joshi
Tim Finin
Cyber-All-Intel: An AI for Security related Threat Intelligence.
2019
abs/1905.02895
CoRR
http://arxiv.org/abs/1905.02895
db/journals/corr/corr1905.html#abs-1905-02895
Oyesh Mann Singh
Ankur Padia
Anupam Joshi
Named Entity Recognition for Nepali Language.
2019
abs/1908.05828
CoRR
http://arxiv.org/abs/1908.05828
db/journals/corr/corr1908.html#abs-1908-05828
Khyati Chopra
Ranjan Bose
Anupam Joshi
Secrecy outage of threshold-based cooperative relay network with and without direct links.
7
2018
2018
EURASIP J. Inf. Secur.
https://doi.org/10.1186/s13635-018-0077-8
db/journals/ejisec/ejisec2018.html#ChopraBJ18
Sandeep Kumar Singh 0004
Ranjan Bose
Anupam Joshi
Entropy-based electricity theft detection in AMI network.
99-105
2018
3
IET Cyper-Phys. Syst.: Theory & Appl.
2
https://doi.org/10.1049/iet-cps.2017.0063
db/journals/iet-cps/iet-cps3.html#SinghBJ18
Khyati Chopra
Ranjan Bose
Anupam Joshi
Secrecy performance of threshold-based cognitive relay network with diversity combining.
383-395
2018
20
J. Commun. Networks
4
https://doi.org/10.1109/JCN.2018.000054
db/journals/jcn/jcn20.html#ChopraBJ18
Sandeep Kumar Singh 0004
Kush Khanna
Ranjan Bose
Bijaya Ketan Panigrahi
Anupam Joshi
Joint-Transformation-Based Detection of False Data Injection Attacks in Smart Grid.
89-97
2018
14
IEEE Trans. Ind. Informatics
1
https://doi.org/10.1109/TII.2017.2720726
db/journals/tii/tii14.html#SinghKBPJ18
Sandeep Nair Narayanan
Ashwinkumar Ganesan
Karuna P. Joshi
Tim Oates 0001
Anupam Joshi
Tim Finin
Early Detection of Cybersecurity Threats Using Collaborative Cognition.
354-363
2018
CIC
https://doi.org/10.1109/CIC.2018.00054
https://doi.ieeecomputersociety.org/10.1109/CIC.2018.00054
conf/coinco/2018
db/conf/coinco/cic2018.html#NarayananGJOJF18
Vishal Rathod
Sandeep Nair Narayanan
Sudip Mittal
Anupam Joshi
Semantically Rich, Context Aware Access Control for Openstack.
460-465
2018
CIC
https://doi.org/10.1109/CIC.2018.00069
https://doi.ieeecomputersociety.org/10.1109/CIC.2018.00069
conf/coinco/2018
db/conf/coinco/cic2018.html#RathodNMJ18
Lorenzo Neil
Sudip Mittal
Anupam Joshi
Mining Threat Intelligence about Open-Source Projects and Libraries from Code Repository Issues and Bug Reports.
7-12
2018
ISI
https://doi.org/10.1109/ISI.2018.8587375
conf/isi/2018
db/conf/isi/isi2018.html#NeilNJ18
Arya Renjan
Karuna Pande Joshi
Sandeep Nair Narayanan
Anupam Joshi
DAbR: Dynamic Attribute-based Reputation scoring for Malicious IP Address Detection.
64-69
2018
ISI
https://doi.org/10.1109/ISI.2018.8587342
conf/isi/2018
db/conf/isi/isi2018.html#RenjanJNJ18
Priyanka Ranade
Sudip Mittal
Anupam Joshi
Karuna Pande Joshi
Using Deep Neural Networks to Translate Multi-lingual Threat Intelligence.
238-243
2018
ISI
https://doi.org/10.1109/ISI.2018.8587374
conf/isi/2018
db/conf/isi/isi2018.html#RanadeMJJ18
Ankur Padia
Arpita Roy
Taneeya Satyapanich
Francis Ferraro
Shimei Pan
Youngja Park
Anupam Joshi
Tim Finin
UMBC at SemEval-2018 Task 8: Understanding Text about Malware.
878-884
2018
SemEval@NAACL-HLT
https://doi.org/10.18653/v1/s18-1142
https://aclanthology.org/S18-1142/
conf/semeval/2018
db/conf/semeval/semeval2018.html#PadiaRSFPPJF18
Sandeep Kumar Singh 0004
Ranjan Bose
Anupam Joshi
Energy theft detection in advanced metering infrastructure.
529-534
2018
WF-IoT
https://doi.org/10.1109/WF-IoT.2018.8355148
conf/wf-iot/2018
db/conf/wf-iot/wf-iot2018.html#SinghBJ18
Nitika Khurana
Sudip Mittal
Anupam Joshi
Preventing Poisoning Attacks on AI based Threat Intelligence Systems.
2018
abs/1807.07418
CoRR
http://arxiv.org/abs/1807.07418
db/journals/corr/corr1807.html#abs-1807-07418
Priyanka Ranade
Sudip Mittal
Anupam Joshi
Karuna P. Joshi
Using Deep Neural Networks to Translate Multi-lingual Threat Intelligence.
2018
abs/1807.07517
CoRR
http://arxiv.org/abs/1807.07517
db/journals/corr/corr1807.html#abs-1807-07517
Sandeep Nair Narayanan
Ashwinkumar Ganesan
Karuna P. Joshi
Tim Oates 0001
Anupam Joshi
Tim Finin
Cognitive Techniques for Early Detection of Cybersecurity Events.
2018
abs/1808.00116
CoRR
http://arxiv.org/abs/1808.00116
db/journals/corr/corr1808.html#abs-1808-00116
Lorenzo Neil
Sudip Mittal
Anupam Joshi
Mining Threat Intelligence about Open-Source Projects and Libraries from Code Repository Issues and Bug Reports.
2018
abs/1808.04673
CoRR
http://arxiv.org/abs/1808.04673
db/journals/corr/corr1808.html#abs-1808-04673
Alejandra Diaz
Alan T. Sherman
Anupam Joshi
Phishing in an Academic Community: A Study of User Susceptibility and Behavior.
2018
abs/1811.06078
CoRR
http://arxiv.org/abs/1811.06078
db/journals/corr/corr1811.html#abs-1811-06078
Khyati Chopra
Ranjan Bose
Anupam Joshi
Secrecy performance of threshold-based decode-and-forward cooperative cognitive radio network.
1396-1406
2017
11
IET Commun.
9
https://doi.org/10.1049/iet-com.2016.0917
db/journals/iet-com/iet-com11.html#ChopraBJ17
Sudip Mittal
Aditi Gupta 0003
Karuna P. Joshi
Claudia Pearce
Anupam Joshi
A Question and Answering System for Management of Cloud Service Level Agreements.
684-687
2017
CLOUD
https://doi.org/10.1109/CLOUD.2017.92
https://doi.ieeecomputersociety.org/10.1109/CLOUD.2017.92
conf/IEEEcloud/2017
db/conf/IEEEcloud/IEEEcloud2017.html#Mittal0JPJ17
Prajit Kumar Das
Anupam Joshi
Tim Finin
Personalizing Context-Aware Access Control on Mobile Platforms.
107-116
2017
CIC
https://doi.org/10.1109/CIC.2017.00025
https://doi.ieeecomputersociety.org/10.1109/CIC.2017.00025
conf/coinco/2017
db/conf/coinco/cic2017.html#DasJF17
Prajit Kumar Das
Anupam Joshi
Tim Finin
App behavioral analysis using system calls.
487-492
2017
INFOCOM Workshops
https://doi.org/10.1109/INFCOMW.2017.8116425
conf/infocom/2017w
db/conf/infocom/infocom2017w.html#DasJF17
Khyati Chopra
Ranjan Bose
Anupam Joshi
Secrecy outage of cooperative relay network with and without eavesdropper's direct link.
1-6
2017
NCC
https://doi.org/10.1109/NCC.2017.8077065
conf/ncc/2017
db/conf/ncc/ncc2017.html#ChopraBJ17
Sudip Mittal
Anupam Joshi
Tim Finin
Thinking, Fast and Slow: Combining Vector Spaces and Knowledge Graphs.
2017
abs/1708.03310
CoRR
http://arxiv.org/abs/1708.03310
db/journals/corr/corr1708.html#abs-1708-03310
Randy Schauer
Anupam Joshi
Distributed system configuration management using Markov logic networks.
137-154
2016
2
Int. J. Auton. Comput.
2
https://doi.org/10.1504/IJAC.2016.10002938
db/journals/ijauc/ijauc2.html#SchauerJ16
Paridhi Jain 0001
Ponnurangam Kumaraguru
Anupam Joshi
Other times, other values: leveraging attribute history to link user profiles across online social networks.
85:1-85:16
2016
6
Soc. Netw. Anal. Min.
1
https://doi.org/10.1007/s13278-016-0391-4
db/journals/snam/snam6.html#0001KJ16
Aditi Gupta 0003
Sudip Mittal
Karuna P. Joshi
Claudia Pearce
Anupam Joshi
Streamlining Management of Multiple Cloud Services.
481-488
2016
CLOUD
https://doi.org/10.1109/CLOUD.2016.0070
https://doi.ieeecomputersociety.org/10.1109/CLOUD.2016.0070
conf/IEEEcloud/2016
db/conf/IEEEcloud/IEEEcloud2016.html#0003MJPJ16
Zareen Syed
Ankur Padia
Tim Finin
M. Lisa Mathews
Anupam Joshi
UCO: A Unified Cybersecurity Ontology.
2016
AAAI Workshop: Artificial Intelligence for Cyber Security
http://www.aaai.org/ocs/index.php/WS/AAAIW16/paper/view/12574
conf/aaai/2016security
db/conf/aaai/security2016.html#SyedPFMJ16
Karuna P. Joshi
Aditi Gupta 0003
Sudip Mittal
Claudia Pearce
Anupam Joshi
Tim Finin
ALDA: Cognitive Assistant for Legal Document Analytics.
2016
AAAI Fall Symposia
http://aaai.org/ocs/index.php/FSS/FSS16/paper/view/14119
conf/aaaifs/2016
db/conf/aaaifs/aaaifs2016.html#Joshi0MPJF16
Sudip Mittal
Prajit Kumar Das
Varish Mulwad
Anupam Joshi
Tim Finin
CyberTwitter: Using Twitter to generate alerts for cybersecurity threats and vulnerabilities.
860-867
2016
ASONAM
https://doi.org/10.1109/ASONAM.2016.7752338
https://doi.ieeecomputersociety.org/10.1109/ASONAM.2016.7752338
conf/asunam/2016
db/conf/asunam/asonam2016.html#MittalDMJF16
Karuna P. Joshi
Aditi Gupta 0003
Sudip Mittal
Claudia Pearce
Anupam Joshi
Tim Finin
Semantic approach to automating management of big data privacy policies.
482-491
2016
IEEE BigData
https://doi.org/10.1109/BigData.2016.7840639
https://doi.ieeecomputersociety.org/10.1109/BigData.2016.7840639
conf/bigdataconf/2016
db/conf/bigdataconf/bigdataconf2016.html#Joshi0MPJF16
Prajit Kumar Das
Anupam Joshi
Tim Finin
Capturing Policies for Fine-Grained Access Control on Mobile Devices.
54-63
2016
CIC
https://doi.org/10.1109/CIC.2016.021
https://doi.ieeecomputersociety.org/10.1109/CIC.2016.021
conf/coinco/2016
db/conf/coinco/cic2016.html#DasJF16
Sudip Mittal
Karuna P. Joshi
Claudia Pearce
Anupam Joshi
Automatic Extraction of Metrics from SLAs for Cloud Service Management.
139-142
2016
IC2E
https://doi.org/10.1109/IC2E.2016.14
https://doi.ieeecomputersociety.org/10.1109/IC2E.2016.14
conf/ic2e/2016
db/conf/ic2e/ic2e2016.html#MittalJPJ16
M. Lisa Mathews
Anupam Joshi
Tim Finin
Detecting Botnets using a Collaborative Situational-aware IDPS.
290-298
2016
ICISSP
https://doi.org/10.5220/0005684902900298
conf/icissp/2016
db/conf/icissp/icissp2016.html#MathewsJF16
Bhavani Thuraisingham
Murat Kantarcioglu
Kevin W. Hamlen
Latifur Khan
Tim Finin
Anupam Joshi
Tim Oates 0001
Elisa Bertino
A Data Driven Approach for the Science of Cyber Security: Challenges and Directions.
1-10
2016
IRI
https://doi.org/10.1109/IRI.2016.10
https://doi.ieeecomputersociety.org/10.1109/IRI.2016.10
conf/iri/2016
db/conf/iri/iri2016.html#ThuraisinghamKH16
Piyush Nimbalkar
Varish Mulwad
Nikhil Puranik
Anupam Joshi
Tim Finin
Semantic Interpretation of Structured Log Files.
549-555
2016
IRI
https://doi.org/10.1109/IRI.2016.81
https://doi.ieeecomputersociety.org/10.1109/IRI.2016.81
conf/iri/2016
db/conf/iri/iri2016.html#NimbalkarMPJF16
Kush Khanna
Bijaya Ketan Panigrahi
Anupam Joshi
Bid Modification Attack in Smart Grid for Monetary Benefits.
224-229
2016
iNIS
https://doi.org/10.1109/iNIS.2016.059
conf/ises/2016
db/conf/ises/inis2016.html#KhannaPJ16
Sandeep Nair Narayanan
Sudip Mittal
Anupam Joshi
Using semantic technologies to mine vehicular context for security.
124-129
2016
Sarnoff Symposium
https://doi.org/10.1109/SARNOF.2016.7846740
conf/sarnoff/2016
db/conf/sarnoff/sarnoff2016.html#NarayananMJ16
Clare Grasso
Anupam Joshi
Eliot L. Siegel
Visualization of Pain Severity Events in Clinical Records Using Semantic Structures.
321-324
2016
ICSC
https://doi.org/10.1109/ICSC.2016.53
https://doi.ieeecomputersociety.org/10.1109/ICSC.2016.53
conf/semco/2016
db/conf/semco/icsc2016.html#GrassoJS16
Nitin Kumar Sharma 0002
Anupam Joshi
Representing Attribute Based Access Control Policies in OWL.
333-336
2016
ICSC
https://doi.org/10.1109/ICSC.2016.16
https://doi.ieeecomputersociety.org/10.1109/ICSC.2016.16
conf/semco/2016
db/conf/semco/icsc2016.html#SharmaJ16
Prajit Kumar Das
Abhay L. Kashyap
Gurpreet Singh
Cynthia Matuszek
Tim Finin
Anupam Joshi
Semantic Knowledge and Privacy in the Physical Web.
2016
PrivOn@ISWC
https://ceur-ws.org/Vol-1750/paper-01.pdf
conf/semweb/2016privon
db/conf/semweb/privon2016.html#DasKSMFJ16
Prajit Kumar Das
Sandeep Nair Narayanan
Nitin Kumar Sharma 0002
Anupam Joshi
Karuna Pande Joshi
Tim Finin
Context-Sensitive Policy Based Security in Internet of Things.
1-6
2016
SMARTCOMP
https://doi.org/10.1109/SMARTCOMP.2016.7501684
https://doi.ieeecomputersociety.org/10.1109/SMARTCOMP.2016.7501684
conf/smartcomp/2016
db/conf/smartcomp/smartcomp2016.html#DasNSJJF16
Sandeep Nair Narayanan
Sudip Mittal
Anupam Joshi
OBD_SecureAlert: An Anomaly Detection System for Vehicles.
1-6
2016
SMARTCOMP
https://doi.org/10.1109/SMARTCOMP.2016.7501710
https://doi.ieeecomputersociety.org/10.1109/SMARTCOMP.2016.7501710
conf/smartcomp/2016
db/conf/smartcomp/smartcomp2016.html#NarayananMJ16
Jennifer Sleeman
Tim Finin
Anupam Joshi
Entity Type Recognition for Heterogeneous Semantic Graphs.
75-86
2015
36
AI Mag.
1
https://doi.org/10.1609/aimag.v36i1.2569
db/journals/aim/aim36.html#SleemanFJ15
Rosa Laura Zavala Gutierrez
Pradeep K. Murukannaiah
Nithyananthan Poosamani
Tim Finin
Anupam Joshi
Injong Rhee
Munindar P. Singh
Platys: From Position to Place-Oriented Mobile Computing.
50-62
2015
36
AI Mag.
2
https://doi.org/10.1609/aimag.v36i2.2584
db/journals/aim/aim36.html#GutierrezMPFJRS15
Sudip Mittal
Karuna P. Joshi
Claudia Pearce
Anupam Joshi
Parallelizing natural language techniques for knowledge extraction from cloud service level agreements.
2831-2833
2015
IEEE BigData
https://doi.org/10.1109/BigData.2015.7364092
conf/bigdataconf/2015
db/conf/bigdataconf/bigdataconf2015.html#MittalJPJ15
Paridhi Jain 0001
Ponnurangam Kumaraguru
Anupam Joshi
Other Times, Other Values: Leveraging Attribute History to Link User Profiles across Online Social Networks.
247-255
2015
HT
https://doi.org/10.1145/2700171.2791040
conf/ht/2015
db/conf/ht/ht2015.html#JainKJ15
Clare Grasso
Anupam Joshi
Eliot L. Siegel
Beyond NER: Towards Semantics in Clinical Text.
2015
BDM2I@ISWC
https://ceur-ws.org/Vol-1428/BDM2I_2015_paper_6.pdf
conf/semweb/2015bdm2i
db/conf/semweb/bdm2i2015.html#GrassoJS15
Primal Pappachan
Roberto Yus
Prajit Kumar Das
Sharad Mehrotra
Tim Finin
Anupam Joshi
Building a Mobile Applications Knowledge Base for the Linked Data Cloud.
14-25
2015
MoDeST@ISWC
https://ceur-ws.org/Vol-1506/paper2.pdf
conf/semweb/2015modest
db/conf/semweb/modest2015.html#PappachanYDMFJ15
Primal Pappachan
Roberto Yus
Prajit Kumar Das
Sharad Mehrotra
Tim Finin
Anupam Joshi
Mobipedia: Mobile Applications Linked Data.
2015
ISWC (Posters & Demos)
https://ceur-ws.org/Vol-1486/paper_92.pdf
conf/semweb/2015p
db/conf/semweb/iswc2015p.html#PappachanYDMFJ15a
Jennifer Sleeman
Tim Finin
Anupam Joshi
Topic Modeling for RDF Graphs.
48-62
2015
LD4IE@ISWC
https://ceur-ws.org/Vol-1467/LD4IE2015_Sleeman.pdf
conf/semweb/2015ld4ie
db/conf/semweb/ld4ie2015.html#SleemanFJ15
Lushan Han
Tim Finin
Anupam Joshi
Doreen Cheng
Querying RDF data with text annotated graphs.
27:1-27:12
2015
SSDBM
https://doi.org/10.1145/2791347.2791381
conf/ssdbm/2015
db/conf/ssdbm/ssdbm2015.html#HanFJC15
Wenjia Li
Anupam Joshi
Tim Finin
SVM-CASE: An SVM-Based Context Aware Security Framework for Vehicular Ad-Hoc Networks.
1-5
2015
VTC Fall
https://doi.org/10.1109/VTCFall.2015.7391162
conf/vtc/2015f
db/conf/vtc/vtc2015f.html#LiJF15
Sandeep Nair Narayanan
Sudip Mittal
Anupam Joshi
Using Data Analytics to Detect Anomalous States in Vehicles.
2015
abs/1512.08048
CoRR
http://arxiv.org/abs/1512.08048
db/journals/corr/corr1512.html#NarayananMJ15
Aniket Bochare
Aryya Gangopadhyay
Yelena Yesha
Anupam Joshi
Yaacov Yesha
Mary Brady
Michael A. Grasso
Naphtali Rishe
Integrating domain knowledge in supervised machine learning to assess the risk of breast cancer.
87-99
2014
6
Int. J. Medical Eng. Informatics
2
https://doi.org/10.1504/IJMEI.2014.060245
db/journals/ijmei/ijmei6.html#BochareGYJYBGR14
Clare Grasso
Anupam Joshi
Longitudinal Tracking of Pain Phenotypes in Electronic Health Records Using an SVM.
2014
AMIA
https://knowledge.amia.org/56638-amia-1.1540970/t-005-1.1543914/f-005-1.1543915/a-332-1.1544675/a-333-1.1544672
conf/amia/2014
db/conf/amia/amia2014.html#GrassoJ14
Primal Pappachan
Roberto Yus
Anupam Joshi
Tim Finin
Rafiki: A semantic and collaborative approach to community health-care in underserved areas.
322-331
2014
CollaborateCom
https://doi.org/10.4108/icst.collaboratecom.2014.257299
https://ieeexplore.ieee.org/document/7014578/
conf/colcom/2014
db/conf/colcom/colcom2014.html#PappachanYJF14
Varish Mulwad
Tim Finin
Anupam Joshi
Interpreting medical tables as linked data for generating meta-analysis reports.
677-686
2014
IRI
https://doi.org/10.1109/IRI.2014.7051955
https://doi.ieeecomputersociety.org/10.1109/IRI.2014.7051955
conf/iri/2014
db/conf/iri/iri2014.html#MulwadFJ14
Christopher Swartz
Anupam Joshi
Identification in Encrypted Wireless Networks Using Supervised Learning.
210-215
2014
MILCOM
https://doi.org/10.1109/MILCOM.2014.40
conf/milcom/2014
db/conf/milcom/milcom2014.html#SwartzJ14
Roberto Yus
Primal Pappachan
Prajit Kumar Das
Eduardo Mena
Anupam Joshi
Tim Finin
Demo: FaceBlock: privacy-aware pictures for google glass.
366
2014
MobiSys
https://doi.org/10.1145/2594368.2601473
https://www.wikidata.org/entity/Q61677551
conf/mobisys/2014
db/conf/mobisys/mobisys2014.html#YusPDMJF14
Primal Pappachan
Roberto Yus
Prajit Kumar Das
Tim Finin
Eduardo Mena
Anupam Joshi
A Semantic Context-Aware Privacy Model for FaceBlock.
2014
PrivOn@ISWC
https://ceur-ws.org/Vol-1316/privon2014_paper6.pdf
conf/semweb/2014privon
db/conf/semweb/privon2014.html#PappachanYDFMJ14
Roberto Yus
Primal Pappachan
Prajit Kumar Das
Tim Finin
Anupam Joshi
Eduardo Mena
Semantics for Privacy and Shared Context.
2014
PrivOn@ISWC
https://ceur-ws.org/Vol-1316/privon2014_paper1.pdf
conf/semweb/2014privon
db/conf/semweb/privon2014.html#YusPDFJM14
Wenjia Li
Anupam Joshi
Tim Finin
CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using policies.
353-376
2013
31
Distributed Parallel Databases
2
https://doi.org/10.1007/s10619-012-7113-3
db/journals/dpd/dpd31.html#LiJF13
Prajit Kumar Das
Dibyajyoti Ghosh
Anupam Joshi
Tim Finin
ACM HotMobile 2013 poster: an energy efficient semantic context model for managing privacy on smartphones.
34-35
2013
17
ACM SIGMOBILE Mob. Comput. Commun. Rev.
3
https://doi.org/10.1145/2542095.2542114
db/journals/sigmobile/sigmobile17.html#DasGJF13
Lushan Han
Tim Finin
Paul McNamee
Anupam Joshi
Yelena Yesha
Improving Word Similarity by Augmenting PMI with Estimates of Word Polysemy.
1307-1322
2013
25
IEEE Trans. Knowl. Data Eng.
6
https://doi.org/10.1109/TKDE.2012.30
http://doi.ieeecomputersociety.org/10.1109/TKDE.2012.30
db/journals/tkde/tkde25.html#HanFMJY13
Deepal S. Dhariwal
Anupam Joshi
Michael A. Grasso
Text and Ontology Driven Clinical Decision Support System.
2013
AMIA
https://knowledge.amia.org/amia-55142-a2013e-1.580047/t-06-1.582200/f-006-1.582201/a-108-1.583652/a-110-1.583649
conf/amia/2013
db/conf/amia/amia2013.html#DhariwalJG13
Vlad Korolev
Michael A. Grasso
Anupam Joshi
On Use of Machine Learning Techniques and Genotypes for Prediction of Chronic Diseases.
2013
AMIA
https://knowledge.amia.org/amia-55142-a2013e-1.580047/t-06-1.582200/f-006-1.582201/a-272-1.583187/a-273-1.583181
conf/amia/2013
db/conf/amia/amia2013.html#KorolevGJ13
Palanivel A. Kodeswaran
Dipanjan Chakraborty 0001
Parikshit Sharma
Sougata Mukherjea
Anupam Joshi
Combining smart phone and infrastructure sensors to improve security in enterprise settings.
1151-1158
2013
UbiComp (Adjunct Publication)
https://doi.org/10.1145/2494091.2499773
conf/huc/2013ap
db/conf/huc/ubicomp2013ap.html#Kodeswaran0SMJ13
Puneet Sharma
Anupam Joshi
Tim Finin
Detecting data exfiltration by integrating information across layers.
309-316
2013
IRI
https://doi.org/10.1109/IRI.2013.6642487
https://doi.ieeecomputersociety.org/10.1109/IRI.2013.6642487
conf/iri/2013
db/conf/iri/iri2013.html#SharmaJF13
Nilanjan Banerjee
Dipanjan Chakraborty 0001
Anupam Joshi
Sumit Mittal
Angshu Rai
Balaraman Ravindran
Detection of Real-Time Intentions from Micro-blogs.
116-128
2013
MobiQuitous
https://doi.org/10.1007/978-3-319-11569-6_10
http://eudl.eu/doi/10.1007/978-3-319-11569-6_10
conf/mobiquitous/2013
db/conf/mobiquitous/mobiquitous2013.html#Banerjee0JMRR13
Arnav Joshi
Ravendar Lal
Tim Finin
Anupam Joshi
Extracting Cybersecurity Related Linked Data from Text.
252-259
2013
ICSC
https://doi.org/10.1109/ICSC.2013.50
https://doi.ieeecomputersociety.org/10.1109/ICSC.2013.50
conf/semco/2013
db/conf/semco/icsc2013.html#JoshiLFJ13
Prajit Kumar Das
Anupam Joshi
Tim Finin
Energy Efficient Sensing for Managing Context and Privacy on Smartphones.
2013
PrivOn@ISWC
https://ceur-ws.org/Vol-1121/privon2013_paper1.pdf
conf/semweb/2013privon
db/conf/semweb/privon2013.html#DasJF13
Varish Mulwad
Tim Finin
Anupam Joshi
Semantic Message Passing for Generating Linked Data from Tables.
363-378
2013
ISWC (1)
conf/semweb/2013-1
db/conf/semweb/iswc2013-1.html#MulwadFJ13
https://doi.org/10.1007/978-3-642-41335-3_23
https://www.wikidata.org/entity/Q66709056
Morgan Madeira
Anupam Joshi
Analyzing Close Friend Interactions in Social Media.
932-935
2013
SocialCom
https://doi.org/10.1109/SocialCom.2013.145
https://doi.ieeecomputersociety.org/10.1109/SocialCom.2013.145
conf/socialcom/2013
db/conf/socialcom/socialcom2013.html#MadeiraJ13
Aditi Gupta 0003
Hemank Lamba
Ponnurangam Kumaraguru
Anupam Joshi
Faking Sandy: characterizing and identifying fake images on Twitter during Hurricane Sandy.
729-736
2013
WWW (Companion Volume)
https://doi.org/10.1145/2487788.2488033
conf/www/2013c
db/conf/www/www2013c.html#0003LKJ13
Paridhi Jain 0001
Ponnurangam Kumaraguru
Anupam Joshi
@i seek 'fb.me': identifying users across multiple online social networks.
1259-1268
2013
WWW (Companion Volume)
https://doi.org/10.1145/2487788.2488160
conf/www/2013c
db/conf/www/www2013c.html#JainKJ13
Wenjia Li
James Parker
Anupam Joshi
Security Through Collaboration and Trust in MANETs.
342-352
2012
17
Mob. Networks Appl.
3
https://doi.org/10.1007/s11036-010-0243-9
db/journals/monet/monet17.html#LiPJ12
Aditi Gupta 0003
Anupam Joshi
Ponnurangam Kumaraguru
Identifying and characterizing user communities on Twitter during crisis events.
23-26
2012
DUBMMSM
https://doi.org/10.1145/2390131.2390142
conf/cikm/2012dubmmsm
db/conf/cikm/dubmmsm2012.html#0003JK12
Rohit Kugaonkar
Aryya Gangopadhyay
Yelena Yesha
Anupam Joshi
Yaacov Yesha
Michael A. Grasso
Mary Brady
Naphtali Rishe
Finding associations among SNPS for prostate cancer using collaborative filtering.
57-60
2012
DTMBIO@CIKM
https://doi.org/10.1145/2390068.2390080
conf/cikm/2012dtmbio
db/conf/cikm/dtmbio2012.html#KugaonkarGYJYGB12
Lushan Han
Tim Finin
Anupam Joshi
Schema-free structured querying of DBpedia data.
2090-2093
2012
CIKM
https://doi.org/10.1145/2396761.2398579
https://www.wikidata.org/entity/Q87814239
conf/cikm/2012
db/conf/cikm/cikm2012.html#HanFJ12
M. Lisa Mathews
Paul Halvorsen
Anupam Joshi
Tim Finin
A collaborative approach to situational awareness for cybersecurity.
216-222
2012
CollaborateCom
https://doi.org/10.4108/icst.collaboratecom.2012.250794
https://ieeexplore.ieee.org/document/6450910/
https://www.wikidata.org/entity/Q29397253
conf/colcom/2012
db/conf/colcom/colcom2012.html#MathewsHJF12
Paridhi Jain 0001
Ponnurangam Kumaraguru
Anupam Joshi
Who's Who: Linking User's Multiple Identities on Online Social Media.
112
2012
COMAD
http://comad.in/comad2012/pdf/jain.pdf
conf/comad/2012
db/conf/comad/comad2012.html#JainKJ12
Nilanjan Banerjee
Dipanjan Chakraborty 0001
Anupam Joshi
Sumit Mittal
Angshu Rai
Balaraman Ravindran
Towards Analyzing Micro-Blogs for Detection and Classification of Real-Time Intentions.
2012
ICWSM
http://www.aaai.org/ocs/index.php/ICWSM/ICWSM12/paper/view/4632
conf/icwsm/2012
db/conf/icwsm/icwsm2012.html#BanerjeeCJMRR12
Ashwini Lahane
Yelena Yesha
Michael A. Grasso
Anupam Joshi
Adrian Park 0001
Jimmy Lo
Detection of unsafe action from laparoscopic cholecystectomy video.
315-322
2012
IHI
https://doi.org/10.1145/2110363.2110400
conf/ihi/2012
db/conf/ihi/ihi2012.html#LahaneYGJPL12
Palanivel A. Kodeswaran
Vikrant Nandakumar
Shalini Kapoor
Pavan Kamaraju
Anupam Joshi
Sougata Mukherjea
Securing Enterprise Data on Smartphones Using Run Time Information Flow Control.
300-305
2012
MDM
https://doi.org/10.1109/MDM.2012.50
https://doi.ieeecomputersociety.org/10.1109/MDM.2012.50
conf/mdm/2012
db/conf/mdm/mdm2012.html#KodeswaranNKKJM12
Sumit More
Mary Matthews
Anupam Joshi
Tim Finin
A Knowledge-Based Approach to Intrusion Detection Modeling.
75-81
2012
IEEE Symposium on Security and Privacy Workshops
https://doi.org/10.1109/SPW.2012.26
https://doi.ieeecomputersociety.org/10.1109/SPW.2012.26
conf/sp/2012w
db/conf/sp/spw2012.html#MoreMJF12
Dibyajyoti Ghosh
Anupam Joshi
Tim Finin
Pramod Jagtap
Privacy Control in Smart Phones Using Semantically Rich Reasoning and Context Modeling.
82-85
2012
IEEE Symposium on Security and Privacy Workshops
https://doi.org/10.1109/SPW.2012.27
https://doi.ieeecomputersociety.org/10.1109/SPW.2012.27
conf/sp/2012w
db/conf/sp/spw2012.html#GhoshJFJ12
Seema Nagar
Aaditeshwar Seth
Anupam Joshi
Characterization of social media response to natural disasters.
671-674
2012
WWW (Companion Volume)
https://doi.org/10.1145/2187980.2188177
conf/www/2012c
db/conf/www/www2012c.html#NagarSJ12
Varish Mulwad
Tim Finin
Anupam Joshi
A Domain Independent Framework for Extracting Linked Semantic Data from Tables.
16-33
2012
SeCO Book
https://doi.org/10.1007/978-3-642-34213-4_2
conf/seco/2012
db/conf/seco/seco2012.html#MulwadFJ12
Biplav Srivastava
Freddy Lécué
Anupam Joshi
Semantic Cities, Papers from the 2012 AAAI Workshop, Toronto, Ontario, Canada, July 22-23, 2012.
Semantic Cities @ AAAI
2012
AAAI Press
http://www.aaai.org/Library/Workshops/ws12-13.php
AAAI Technical Report
WS-12-13
db/conf/aaai/cities2012.html
Karl Aberer
Anupam Joshi
Sougata Mukherjea
Dipanjan Chakraborty 0001
Hua Lu 0001
Nalini Venkatasubramanian
Salil S. Kanhere
13th IEEE International Conference on Mobile Data Management, MDM 2012, Bengaluru, India, July 23-26, 2012
IEEE Computer Society
2012
978-1-4673-1796-2
https://ieeexplore.ieee.org/xpl/conhome/6341238/proceeding
http://www.computer.org/csdl/proceedings/mdm/2012/4713/00/index.html
MDM
db/conf/mdm/mdm2012.html
Palanivel A. Kodeswaran
Sethuram Balaji Kodeswaran
Anupam Joshi
Tim Finin
Enforcing security in semantics driven policy based networks.
2-12
2011
33
Comput. Stand. Interfaces
1
https://doi.org/10.1016/j.csi.2010.03.010
https://www.wikidata.org/entity/Q57397239
db/journals/csi/csi33.html#KodeswaranKJF11
Laura Zavala
Radhika Dharurkar
Pramod Jagtap
Tim Finin
Anupam Joshi
Mobile, Collaborative, Context-Aware Systems.
2011
Activity Context Representation
http://www.aaai.org/ocs/index.php/WS/AAAIW11/paper/view/3986
conf/aaai/2011acr
db/conf/aaai/acr2011.html#GutierrezDJFJ11
Lushan Han
Tim Finin
Anupam Joshi
GoRelations: An Intuitive Query System for DBpedia.
334-341
2011
JIST
https://doi.org/10.1007/978-3-642-29923-0_22
https://www.wikidata.org/entity/Q87814253
conf/aswc/2011
db/conf/aswc/jist2011.html#HanFJ11
Varish Mulwad
Wenjia Li
Anupam Joshi
Tim Finin
Krishnamurthy Viswanathan
Extracting Information about Security Vulnerabilities from Web Text.
257-260
2011
Web Intelligence/IAT Workshops
https://doi.org/10.1109/WI-IAT.2011.26
https://doi.ieeecomputersociety.org/10.1109/WI-IAT.2011.26
https://www.wikidata.org/entity/Q66711552
conf/iat/2011w
db/conf/iat/iatw2011.html#MulwadLJFV11
Wenjia Li
Anupam Joshi
Tim Finin
ATM: Automated Trust Management for Mobile Ad Hoc Networks Using Support Vector Machine.
291-292
2011
Mobile Data Management (1)
https://doi.org/10.1109/MDM.2011.21
https://doi.ieeecomputersociety.org/10.1109/MDM.2011.21
conf/mdm/2011-1
db/conf/mdm/mdm2011-1.html#LiJF11
Wenjia Li
Anupam Joshi
Tim Finin
SAT: an SVM-based automated trust management system for Mobile Ad-hoc Networks.
1102-1107
2011
MILCOM
https://doi.org/10.1109/MILCOM.2011.6127446
conf/milcom/2011
db/conf/milcom/milcom2011.html#LiJF11
Wenjia Li
Pramod Jagtap
Rosa Laura Zavala Gutierrez
Anupam Joshi
Tim Finin
CARE-CPS: Context-Aware Trust Evaluation for Wireless Networks in Cyber-Physical System Using Policies.
171-172
2011
POLICY
https://doi.org/10.1109/POLICY.2011.45
https://doi.ieeecomputersociety.org/10.1109/POLICY.2011.45
conf/policy/2011
db/conf/policy/policy2011.html#LiJGJF11
Pramod Jagtap
Anupam Joshi
Tim Finin
Rosa Laura Zavala Gutierrez
Preserving Privacy in Context-Aware Systems.
149-153
2011
ICSC
https://doi.org/10.1109/ICSC.2011.87
https://doi.ieeecomputersociety.org/10.1109/ICSC.2011.87
https://www.wikidata.org/entity/Q57397245
conf/semco/2011
db/conf/semco/icsc2011.html#JagtapJFG11
Akshaya Iyengar
Tim Finin
Anupam Joshi
Content-Based Prediction of Temporal Boundaries for Events in Twitter.
186-191
2011
SocialCom/PASSAT
https://doi.org/10.1109/PASSAT/SocialCom.2011.196
https://doi.ieeecomputersociety.org/10.1109/PASSAT/SocialCom.2011.196
conf/socialcom/2011
db/conf/socialcom/socialcom2011.html#IyengarFJ11
Madan Oberoi
Pramod Jagtap
Anupam Joshi
Tim Finin
Lalana Kagal
Information Integration and Analysis: A Semantic Approach to Privacy.
959-965
2011
SocialCom/PASSAT
https://doi.org/10.1109/PASSAT/SocialCom.2011.190
https://doi.ieeecomputersociety.org/10.1109/PASSAT/SocialCom.2011.190
conf/socialcom/2011
db/conf/socialcom/socialcom2011.html#OberoiJJFK11
Varish Mulwad
Tim Finin
Anupam Joshi
Generating Linked Data by Inferring the Semantics of Tables.
17-22
2011
VLDS
https://ceur-ws.org/Vol-880/VLDS-p17-Mulwad.pdf
conf/vlds/2011
db/conf/vlds/vlds2011.html#MulwadFJ11
Jitendra Ajmera
Anupam Joshi
Sougata Mukherjea
Nitendra Rajput
Shrey Sahay
Mayank Shrivastava
Kundan Srivastava
Two-stream indexing for spoken web search.
503-512
2011
WWW (Companion Volume)
https://doi.org/10.1145/1963192.1963364
conf/www/2011c
db/conf/www/www2011c.html#AjmeraJMRSSS11
Ankur Narang
Raj Gupta
Anupam Joshi
Vikas K. Garg
Highly scalable parallel collaborative filtering algorithm.
1-10
2010
HiPC
https://doi.org/10.1109/HIPC.2010.5713175
https://doi.ieeecomputersociety.org/10.1109/HIPC.2010.5713175
conf/hipc/2010
db/conf/hipc/hipc2010.html#NarangGJG10
Randy Schauer
Anupam Joshi
A probabilistic approach to distributed system management.
77-78
2010
ICAC
https://doi.org/10.1145/1809049.1809063
conf/icac/2010
db/conf/icac/icac2010.html#SchauerJ10
Wenjia Li
Anupam Joshi
Tim Finin
Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-dimensional Trust Management Approach.
85-94
2010
Mobile Data Management
https://doi.org/10.1109/MDM.2010.57
https://doi.ieeecomputersociety.org/10.1109/MDM.2010.57
conf/mdm/2010
db/conf/mdm/mdm2010.html#LiJF10
Akhilesh Gupta
Anupam Joshi
Gopal Pingali
Enforcing Security Policies in Mobile Devices Using Multiple Personas.
297-302
2010
MobiQuitous
https://doi.org/10.1007/978-3-642-29154-8_25
http://eudl.eu/doi/10.1007/978-3-642-29154-8_25
conf/mobiquitous/2010
db/conf/mobiquitous/mobiquitous2010.html#GuptaJP10
Palanivel A. Kodeswaran
Anupam Joshi
Timothy W. Finin
Filip Perich
A declarative approach for secure and robust routing.
45-52
2010
SafeConfig
https://doi.org/10.1145/1866898.1866906
conf/safeconfig/2010
db/conf/safeconfig/safeconfig2010.html#KodeswaranJFP10
Varish Mulwad
Tim Finin
Zareen Syed
Anupam Joshi
T2LD: Interpreting and Representing Tables as Linked Data.
2010
ISWC (Posters & Demos)
https://ceur-ws.org/Vol-658/paper489.pdf
conf/semweb/2010pd
db/conf/semweb/pd2010.html#MulwadFSJ10
Varish Mulwad
Tim Finin
Zareen Syed
Anupam Joshi
Using Linked Data to Interpret Tables.
2010
COLD
https://ceur-ws.org/Vol-665/MulwadEtAl_COLD2010.pdf
conf/semweb/2010cold
db/conf/semweb/cold2010.html#MulwadFSJ10a
Nilanjan Banerjee
Dipanjan Chakraborty 0001
Koustuv Dasgupta
Sumit Mittal
Anupam Joshi
Seema Nagar
Angshu Rai
Sameer Madan
User interests in social media sites: an exploration with micro-blogs.
1823-1826
2009
CIKM
https://doi.org/10.1145/1645953.1646240
conf/cikm/2009
db/conf/cikm/cikm2009.html#BanerjeeCDMJNRM09
Justin Martineau
Tim Finin
Anupam Joshi
Shamit Patel
Improving binary classification on text problems using differential word features.
2019-2024
2009
CIKM
https://doi.org/10.1145/1645953.1646291
conf/cikm/2009
db/conf/cikm/cikm2009.html#MartineauFJP09
Wenjia Li
Anupam Joshi
Tim Finin
Policy-Based Malicious Peer Detection in Ad Hoc Networks.
76-82
2009
CSE (3)
https://doi.org/10.1109/CSE.2009.289
https://doi.ieeecomputersociety.org/10.1109/CSE.2009.289
https://www.wikidata.org/entity/Q57397244
conf/cse/2009
db/conf/cse/cse2009-3.html#LiJF09
Tim Finin
Anupam Joshi
Hillol Kargupta
Yelena Yesha
Joel Sachs
Elisa Bertino
Ninghui Li
Chris Clifton
Gene Spafford
Bhavani Thuraisingham
Murat Kantarcioglu
Alain Bensoussan 0001
Nathan Berg
Latifur Khan
Jiawei Han 0001
ChengXiang Zhai
Ravi S. Sandhu
Shouhuai Xu
Jim Massaro
Lada A. Adamic
Assured Information Sharing Life Cycle.
307-309
2009
ISI
https://doi.org/10.1109/ISI.2009.5137331
conf/isi/2009
db/conf/isi/isi2009.html#FininJKYSBLCSTKBBKHZSXMA09
Wenjia Li
Anupam Joshi
Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory.
112-121
2009
Mobile Data Management
https://doi.org/10.1109/MDM.2009.22
https://doi.ieeecomputersociety.org/10.1109/MDM.2009.22
conf/mdm/2009
db/conf/mdm/mdm2009.html#LiJ09
Anand Patwardhan
Jim Parker 0002
Michaela Iorga
Anupam Joshi
Tom Karygiannis
Yelena Yesha
Threshold-based intrusion detection in ad hoc networks and secure AODV.
578-599
2008
6
Ad Hoc Networks
4
https://doi.org/10.1016/j.adhoc.2007.05.001
db/journals/adhoc/adhoc6.html#PatwardhanPIJKY08
Tim Finin
Anupam Joshi
Pranam Kolari
Akshay Java
Anubhav Kale
Amit Karandikar
The Information Ecology of Social Media and Online Communities.
77-92
2008
29
AI Mag.
3
https://doi.org/10.1609/aimag.v29i3.2158
db/journals/aim/aim29.html#FininJKJKK08
Amit Anil Nanavati
Rahul Singh
Dipanjan Chakraborty 0001
Koustuv Dasgupta
Sougata Mukherjea
Gautam Das 0005
Siva Gurumurthy
Anupam Joshi
Analyzing the Structure and Evolution of Massive Telecom Graphs.
703-718
2008
20
IEEE Trans. Knowl. Data Eng.
5
https://doi.org/10.1109/TKDE.2007.190733
http://doi.ieeecomputersociety.org/10.1109/TKDE.2007.190733
db/journals/tkde/tkde20.html#NanavatiSCDMDGJ08
Boanerges Aleman-Meza
Meenakshi Nagarajan
Li Ding 0001
Amit P. Sheth
Ismailcem Budak Arpinar
Anupam Joshi
Timothy W. Finin
Scalable semantic analytics on social networks for addressing the problem of conflict of interest detection.
2008
2
ACM Trans. Web
1
https://doi.org/10.1145/1326561.1326568
db/journals/tweb/tweb2.html#Aleman-MezaNDSAJF08
7:1-7:29
Wenjia Li
James Parker
Anupam Joshi
Security through Collaboration in MANETs.
696-714
2008
CollaborateCom
https://doi.org/10.1007/978-3-642-03354-4_51
http://eudl.eu/doi/10.1007/978-3-642-03354-4_51
conf/colcom/2008
db/conf/colcom/colcom2008.html#LiPJ08
Koustuv Dasgupta
Rahul Singh
Balaji Viswanathan
Dipanjan Chakraborty 0001
Sougata Mukherjea
Amit Anil Nanavati
Anupam Joshi
Social ties and their relevance to churn in mobile telecom networks.
668-677
2008
EDBT
https://doi.org/10.1145/1353343.1353424
conf/edbt/2008
db/conf/edbt/edbt2008.html#DasguptaSVCMNJ08
Palanivel A. Kodeswaran
Sethuram Balaji Kodeswaran
Anupam Joshi
Tim Finin
Enforcing security in semantics driven policy based networks.
490-497
2008
ICDE Workshops
https://doi.org/10.1109/ICDEW.2008.4498365
https://doi.ieeecomputersociety.org/10.1109/ICDEW.2008.4498365
conf/icde/2008w
db/conf/icde/icdew2008.html#KodeswaranKJF08
Akshay Java
Anupam Joshi
Tim Finin
Approximating the Community Structure of the Long Tail.
2008
ICWSM
http://www.aaai.org/Library/ICWSM/2008/icwsm08-040.php
conf/icwsm/2008
db/conf/icwsm/icwsm2008.html#JavaJF08
Amit Karandikar
Akshay Java
Anupam Joshi
Tim Finin
Yaacov Yesha
Yelena Yesha
Second Space: A Generative Model for the Blogosphere.
2008
ICWSM
http://www.aaai.org/Library/ICWSM/2008/icwsm08-042.php
conf/icwsm/2008
db/conf/icwsm/icwsm2008.html#KarandikarJJFYY08
Zareen Saba Syed
Tim Finin
Anupam Joshi
Wikipedia as an Ontology for Describing Documents.
2008
ICWSM
http://www.aaai.org/Library/ICWSM/2008/icwsm08-024.php
conf/icwsm/2008
db/conf/icwsm/icwsm2008.html#SyedFJ08
Sheetal Gupta
Anupam Joshi
Justin Santiago
Anand Patwardhan
Query distribution estimation and predictive caching in mobile ad hoc networks.
24-30
2008
MobiDE
https://doi.org/10.1145/1626536.1626542
conf/mobide/2008
db/conf/mobide/mobide2008.html#GuptaJSP08
Tim Finin
Anupam Joshi
Lalana Kagal
Jianwei Niu 0001
Ravi S. Sandhu
William H. Winsborough
Bhavani Thuraisingham
Role Based Access Control and OWL.
2008
OWLED (Spring)
https://ceur-ws.org/Vol-496/owled2008dc_paper_21.pdf
conf/owled/2008-1
db/conf/owled/owled2008-1.html#FininJKNSWT08
Timothy W. Finin
Anupam Joshi
Lalana Kagal
Jianwei Niu 0001
Ravi S. Sandhu
William H. Winsborough
Bhavani Thuraisingham
ROWLBAC: representing role based access control in OWL.
73-82
2008
SACMAT
https://doi.org/10.1145/1377836.1377849
conf/sacmat/2008
db/conf/sacmat/sacmat2008.html#FininJKNSWT08
Lushan Han
Tim Finin
Cynthia Sims Parr
Joel Sachs
Anupam Joshi
RDF123: From Spreadsheets to RDF.
451-466
2008
ISWC
https://doi.org/10.1007/978-3-540-88564-1_29
https://www.wikidata.org/entity/Q57285250
conf/semweb/2008
db/conf/semweb/iswc2008.html#HanFPSJ08
Anupam Joshi
Tim Finin
Akshay Java
Anubhav Kale
Pranam Kolari
Web 2.0 Mining.
2008
Next Generation of Data Mining
https://doi.org/10.1201/9781420085877.pt3
books/tf/08/KHYMK2008
db/books/collections/KHYMK2008.html#JoshiFJKK08
Christian Bizer
Anupam Joshi
Proceedings of the Poster and Demonstration Session at the 7th International Semantic Web Conference (ISWC2008), Karlsruhe, Germany, October 28, 2008
ISWC (Posters & Demos)
CEUR-WS.org
CEUR Workshop Proceedings
401
2008
https://ceur-ws.org/Vol-401
https://nbn-resolving.org/urn:nbn:de:0074-401-7
db/conf/semweb/iswc2008p.html
Akshay Java
Sergei Nirenburg
Marjorie McShane
Timothy W. Finin
Jesse English
Anupam Joshi
Using a Natural Language Understanding System to Generate Semantic Web Content.
50-74
2007
3
Int. J. Semantic Web Inf. Syst.
4
https://doi.org/10.4018/jswis.2007100103
db/journals/ijswis/ijswis3.html#JavaNMFEJ07
Sheetal K. Agarwal
Anupam Joshi
Timothy W. Finin
Yelena Yesha
Tim Ganous
A Pervasive Computing System for the Operating Room of the Future.
215-228
2007
12
Mob. Networks Appl.
2-3
https://doi.org/10.1007/s11036-007-0010-8
db/journals/monet/monet12.html#AgarwalJFYG07
Justin Martineau
Akshay Java
Pranam Kolari
Timothy W. Finin
Anupam Joshi
James Mayfield
BlogVox: Learning Sentiment Classifiers.
1888-1889
2007
conf/aaai/2007
AAAI
db/conf/aaai/aaai2007.html#MartineauJKFJM07
http://www.aaai.org/Library/AAAI/2007/aaai07-319.php
Sethuram Balaji Kodeswaran
Olga Ratsimor
Anupam Joshi
Filip Perich
Utilizing Semantic Tags for Policy Based Networking.
1954-1958
2007
GLOBECOM
https://doi.org/10.1109/GLOCOM.2007.375
conf/globecom/2007
db/conf/globecom/globecom2007.html#KodeswaranRJP07
Akshay Java
Pranam Kolari
Tim Finin
Anupam Joshi
Tim Oates 0001
Feeds That Matter: A Study of Bloglines Subscriptions.
2007
ICWSM
http://www.icwsm.org/papers/paper17.html
conf/icwsm/2007
db/conf/icwsm/icwsm2007.html#JavaKFJO07
Anubhav Kale
Amit Karandikar
Pranam Kolari
Akshay Java
Tim Finin
Anupam Joshi
Modeling Trust and Influence in the Blogosphere Using Link Polarity.
2007
ICWSM
http://www.icwsm.org/papers/paper40.html
conf/icwsm/2007
db/conf/icwsm/icwsm2007.html#KaleKKJFJ07
Pranam Kolari
Tim Finin
Akshay Java
Anupam Joshi
Towards Spam Detection at Ping Servers.
2007
ICWSM
http://www.icwsm.org/papers/paper69.html
conf/icwsm/2007
db/conf/icwsm/icwsm2007.html#KolariFJJ07
Sandor Dornbush
Anupam Joshi
Zary Segall
Tim Oates 0001
A Human Activity Aware Learning Mobile Music Player.
107-122
2007
AITamI@IJCAI (best papers)
http://www.booksonline.iospress.nl/Content/View.aspx?piid=7299
conf/ijcai/2007aitami
db/conf/ijcai/aitami2007.html#DornbushJSO07
Patricia Ordóñez 0002
Palanivel A. Kodeswaran
Vlad Korolev
Wenjia Li
Onkar Walavalkar
Ben Elgamil
Anupam Joshi
Tim Finin
Yelena Yesha
I. George
A Ubiquitous Context-Aware Environment for Surgical Training.
1-6
2007
MobiQuitous
https://doi.org/10.1109/MOBIQ.2007.4451029
https://doi.ieeecomputersociety.org/10.1109/MOBIQ.2007.4451029
http://eudl.eu/doi/10.1109/MOBIQ.2007.4451029
conf/mobiquitous/2007
db/conf/mobiquitous/mobiquitous2007.html#OrdonezKKLWEJFYG07
Sandor Dornbush
Anupam Joshi
StreetSmart Traffic: Discovering and Disseminating Automobile Congestion Using VANET's.
11-15
2007
conf/vtc/2007s
VTC Spring
https://doi.org/10.1109/VETECS.2007.15
db/conf/vtc/vtc2007s.html#DornbushJ07
Avinash Shenoi
Yelena Yesha
Yaacov Yesha
Anupam Joshi
A framework for specification and performance evaluation of service discovery protocols in mobile ad-hoc networks.
1-23
2006
4
Ad Hoc Networks
1
https://doi.org/10.1016/j.adhoc.2004.03.015
db/journals/adhoc/adhoc4.html#ShenoiYYJ06
Dipanjan Chakraborty 0001
Anupam Joshi
Yelena Yesha
Integrating service discovery with routing and session management for ad-hoc networks.
204-224
2006
4
Ad Hoc Networks
2
https://doi.org/10.1016/j.adhoc.2004.03.016
db/journals/adhoc/adhoc4.html#ChakrabortyJY06
Lalana Kagal
Tim Finin
Anupam Joshi
Sol J. Greenspan
Security and Privacy Challenges in Open and Dynamic Environments.
89-91
2006
39
Computer
6
https://doi.org/10.1109/MC.2006.207
http://doi.ieeecomputersociety.org/10.1109/MC.2006.207
https://www.wikidata.org/entity/Q114847997
db/journals/computer/computer39.html#KagalFJG06
Anand Patwardhan
Filip Perich
Anupam Joshi
Tim Finin
Yelena Yesha
Querying in Packs: Trustworthy Data Management in Ad Hoc Networks.
263-274
2006
13
Int. J. Wirel. Inf. Networks
4
https://doi.org/10.1007/s10776-006-0040-3
db/journals/ijwin/ijwin13.html#PatwardhanPJFY06
Dipanjan Chakraborty 0001
Anupam Joshi
Yelena Yesha
Timothy W. Finin
Toward Distributed Service Discovery in Pervasive Computing Environments.
97-112
2006
5
IEEE Trans. Mob. Comput.
2
https://doi.org/10.1109/TMC.2006.26
http://doi.ieeecomputersociety.org/10.1109/TMC.2006.26
db/journals/tmc/tmc5.html#ChakrabortyJYF06
Pranam Kolari
Akshay Java
Tim Finin
Tim Oates 0001
Anupam Joshi
Detecting Spam Blogs: A Machine Learning Approach.
2006
conf/aaai/2006
AAAI
db/conf/aaai/aaai2006.html#KolariJFOJ06
http://www.aaai.org/Library/AAAI/2006/aaai06-212.php
1351-1356
Pranam Kolari
Tim Finin
Anupam Joshi
SVMs for the Blogosphere: Blog Identification and Splog Detection.
92-99
2006
AAAI Spring Symposium: Computational Approaches to Analyzing Weblogs
http://www.aaai.org/Library/Symposia/Spring/2006/ss06-03-019.php
conf/aaaiss/2006-3
db/conf/aaaiss/aaaiss2006-3.html#KolariFJ06
Jim Parker 0002
Anand Patwardhan
Anupam Joshi
Cross-layer analysis for detecting wireless misbehavior.
6-9
2006
CCNC
https://doi.org/10.1109/CCNC.2006.1592977
conf/ccnc/2006
db/conf/ccnc/ccnc2006.html#ParkerPJ06
Amit Anil Nanavati
Siva Gurumurthy
Gautam Das 0005
Dipanjan Chakraborty 0001
Koustuv Dasgupta
Sougata Mukherjea
Anupam Joshi
On the structural properties of massive telecom call graphs: findings and implications.
435-444
2006
conf/cikm/2006
CIKM
https://doi.org/10.1145/1183614.1183678
db/conf/cikm/cikm2006.html#NanavatiGDCDMJ06
Sethuram Balaji Kodeswaran
Anupam Joshi
Content and Context Aware Networking Using Semantic Tagging.
77
2006
conf/icde/2006w
ICDE Workshops
https://doi.org/10.1109/ICDEW.2006.41
https://doi.ieeecomputersociety.org/10.1109/ICDEW.2006.41
db/conf/icde/icdew2006.html#KodeswaranJ06
Anand Patwardhan
Anupam Joshi
Tim Finin
Yelena Yesha
A Data Intensive Reputation Management Scheme for Vehicular Ad Hoc Networks.
1-8
2006
MobiQuitous
https://doi.org/10.1109/MOBIQ.2006.340422
https://doi.ieeecomputersociety.org/10.1109/MOBIQ.2006.340422
http://eudl.eu/doi/10.1109/MOBIQW.2006.361754
conf/mobiquitous/2006
db/conf/mobiquitous/mobiquitous2006.html#PatwardhanJFY06
Akshay Java
Pranam Kolari
Timothy W. Finin
Anupam Joshi
Justin Martineau
The BlogVox Opinion Retrieval System.
2006
TREC
http://trec.nist.gov/pubs/trec15/papers/umbc-jhu.blog.final.pdf
conf/trec/2006
db/conf/trec/trec2006.html#JavaKFJM06
Boanerges Aleman-Meza
Meenakshi Nagarajan
Cartic Ramakrishnan
Li Ding 0001
Pranam Kolari
Amit P. Sheth
Ismailcem Budak Arpinar
Anupam Joshi
Tim Finin
Semantic analytics on social networks: experiences in addressing the problem of conflict of interest detection.
407-416
2006
conf/www/2006
WWW
https://doi.org/10.1145/1135777.1135838
db/conf/www/www2006.html#Aleman-MezaNRDKSAJF06
Jim Parker 0002
Anand Patwardhan
Filip Perich
Anupam Joshi
Tim Finin
Trust in Pervasive Computing.
519-543
2006
The Handbook of Mobile Middleware
https://doi.org/10.1201/9781420013153.ch21
reference/crc/2006momi
db/reference/crc/momi2006.html#ParkerPPJF06
Li Ding 0001
Timothy W. Finin
Anupam Joshi
Yun Peng
Rong Pan
Pavan Reddivari
Search on the Semantic Web.
62-69
2005
38
Computer
10
https://doi.org/10.1109/MC.2005.350
http://doi.ieeecomputersociety.org/10.1109/MC.2005.350
db/journals/computer/computer38.html#DingFJPPR05
Steffen Staab
Pedro M. Domingos
Peter Mika
Jennifer Golbeck
Li Ding 0001
Timothy W. Finin
Anupam Joshi
Andrzej Nowak
Robin R. Vallacher
Social Networks Applied.
80-93
2005
20
IEEE Intell. Syst.
1
https://doi.org/10.1109/MIS.2005.16
http://doi.ieeecomputersociety.org/10.1109/MIS.2005.16
https://www.wikidata.org/entity/Q61963652
db/journals/expert/expert20.html#StaabDMGDFJNV05
John G. Michopoulos
Panagiota E. Tsompanopoulou
Elias N. Houstis
Charbel Farhat
Michel Lesoinne
John R. Rice
Anupam Joshi
On a data-driven environment for multiphysics applications.
953-968
2005
21
Future Gener. Comput. Syst.
6
https://doi.org/10.1016/j.future.2003.12.023
db/journals/fgcs/fgcs21.html#MichopoulosTHFLRJ05
Tapan Kamdar
Anupam Joshi
Using incremental Web log mining to create adaptive web servers.
133-150
2005
5
Int. J. Digit. Libr.
2
https://doi.org/10.1007/s00799-003-0057-5
db/journals/jodl/jodl5.html#KamdarJ05
Dipanjan Chakraborty 0001
Anupam Joshi
Timothy W. Finin
Yelena Yesha
Service Composition for Mobile Environments.
435-451
2005
10
Mob. Networks Appl.
4
https://doi.org/10.1007/s11036-005-1556-y
https://www.wikidata.org/entity/Q57397248
db/journals/monet/monet10.html#ChakrabortyJFY05
Filip Perich
Anupam Joshi
Yelena Yesha
Timothy W. Finin
Collaborative joins in a pervasive computing environment.
182-196
2005
14
VLDB J.
2
https://doi.org/10.1007/s00778-004-0127-3
https://www.wikidata.org/entity/Q57397236
db/journals/vldb/vldb14.html#PerichJYF05
Timothy W. Finin
Li Ding 0001
Rong Pan
Anupam Joshi
Pranam Kolari
Akshay Java
Yun Peng
Swoogle: Searching for Knowledge on the Semantic Web.
1682-1683
2005
conf/aaai/2005
AAAI
db/conf/aaai/aaai2005.html#FininDPJKJP05
http://www.aaai.org/Library/AAAI/2005/isd05-007.php
Li Ding 0001
Pranam Kolari
Tim Finin
Anupam Joshi
Yun Peng
Yelena Yesha
On Homeland Security and the Semantic Web: A Provenance and Trust Aware Inference Framework.
157-160
2005
AAAI Spring Symposium: AI Technologies for Homeland Security
http://www.aaai.org/Library/Symposia/Spring/2005/ss05-01-032.php
conf/aaaiss/2005-1
db/conf/aaaiss/aaaiss2005-1.html#DingKFJPY05
Sethuram Balaji Kodeswaran
Anupam Joshi
Using location information for scheduling in 802.15.3 MAC.
718-725
2005
conf/broadnets/2005
BROADNETS
db/conf/broadnets/broadnets2005.html#KodeswaranJ05
https://doi.org/10.1109/ICBN.2005.1589672
http://eudl.eu/doi/10.1109/ICBN.2005.1589672
Li Ding 0001
Lina Zhou
Timothy W. Finin
Anupam Joshi
How the Semantic Web is Being Used: An Analysis of FOAF Documents.
2005
conf/hicss/2005
HICSS
https://doi.org/10.1109/HICSS.2005.299
https://doi.ieeecomputersociety.org/10.1109/HICSS.2005.299
db/conf/hicss/hicss2005.html#DingZFJ05
Timothy W. Finin
James Mayfield
Anupam Joshi
R. Scott Cost
Clayton Fink
Information Retrieval and the Semantic Web.
2005
conf/hicss/2005
HICSS
https://doi.org/10.1109/HICSS.2005.319
https://doi.ieeecomputersociety.org/10.1109/HICSS.2005.319
db/conf/hicss/hicss2005.html#FininMJCF05
Haimonti Dutta
Hillol Kargupta
Anupam Joshi
Orthogonal Decision Trees for Resource-Constrained Physiological Data Stream Monitoring Using Mobile Devices.
118-127
2005
conf/hipc/2005
HiPC
https://doi.org/10.1007/11602569_16
db/conf/hipc/hipc2005.html#DuttaKJ05
Anand Patwardhan
Filip Perich
Anupam Joshi
Tim Finin
Yelena Yesha
Active collaborations for trustworthy data management in ad hoc networks.
2005
MASS
https://doi.org/10.1109/MAHSS.2005.1542827
https://doi.ieeecomputersociety.org/10.1109/MAHSS.2005.1542827
conf/mass/2005
db/conf/mass/mass2005.html#PatwardhanPJFY05
Anand Patwardhan
Jim Parker 0002
Anupam Joshi
Michaela Iorga
Tom Karygiannis
Secure Routing and Intrusion Detection in Ad Hoc Networks.
191-199
2005
conf/percom/2005
PerCom
https://doi.org/10.1109/PERCOM.2005.38
https://doi.ieeecomputersociety.org/10.1109/PERCOM.2005.38
db/conf/percom/percom2005.html#PatwardhanPJIK05
Pranam Kolari
Li Ding 0001
Shashidhara Ganjugunte
Anupam Joshi
Timothy W. Finin
Lalana Kagal
Enhancing Web Privacy Protection through Declarative Policies.
57-66
2005
conf/policy/2005
POLICY
https://doi.org/10.1109/POLICY.2005.15
https://doi.ieeecomputersociety.org/10.1109/POLICY.2005.15
db/conf/policy/policy2005.html#KolariDSJFK05
Li Ding 0001
Rong Pan
Timothy W. Finin
Anupam Joshi
Yun Peng
Pranam Kolari
Finding and Ranking Knowledge on the Semantic Web.
156-170
2005
conf/semweb/2005
ISWC
https://doi.org/10.1007/11574620_14
db/conf/semweb/iswc2005.html#DingPFJPK05
Pranam Kolari
Anupam Joshi
Web mining: research and practice.
49-53
2004
6
Comput. Sci. Eng.
4
https://doi.org/10.1109/mcse.2004.23
https://www.wikidata.org/entity/Q113313414
db/journals/cse/cse6.html#KolariJ04
Harry Chen 0001
Timothy W. Finin
Anupam Joshi
Lalana Kagal
Filip Perich
Dipanjan Chakraborty 0001
Intelligent Agents Meet the Semantic Web in Smart Spaces.
69-79
2004
8
IEEE Internet Comput.
6
https://doi.org/10.1109/MIC.2004.66
http://doi.ieeecomputersociety.org/10.1109/MIC.2004.66
db/journals/internet/internet8.html#ChenFJKPC04
Olga Ratsimore
Dipanjan Chakraborty 0001
Anupam Joshi
Timothy W. Finin
Yelena Yesha
Service Discovery in Agent-Based Pervasive Computing Environments.
679-692
2004
9
Mob. Networks Appl.
6
https://doi.org/10.1023/B:MONE.0000042506.96219.cc
db/journals/monet/monet9.html#RatsimorCJFY04
Filip Perich
Anupam Joshi
Timothy W. Finin
Yelena Yesha
On Data Management in Pervasive Computing Environments.
621-634
2004
16
IEEE Trans. Knowl. Data Eng.
5
https://doi.org/10.1109/TKDE.2004.1277823
http://doi.ieeecomputersociety.org/10.1109/TKDE.2004.1277823
db/journals/tkde/tkde16.html#PerichJFY04
Harry Chen 0001
Filip Perich
Dipanjan Chakraborty 0001
Timothy W. Finin
Anupam Joshi
Intelligent Agents Meet Semantic Web in a Smart Meeting Room.
854-861
2004
conf/atal/2004
AAMAS
https://doi.ieeecomputersociety.org/10.1109/AAMAS.2004.10110
http://dl.acm.org/citation.cfm?id=1018837
db/conf/atal/aamas2004.html#ChenPCFJ04
Li Ding 0001
Timothy W. Finin
Anupam Joshi
Rong Pan
R. Scott Cost
Yun Peng
Pavan Reddivari
Vishal Doshi
Joel Sachs
Swoogle: a search and metadata engine for the semantic web.
652-659
2004
conf/cikm/2004
CIKM
https://doi.org/10.1145/1031171.1031289
https://www.wikidata.org/entity/Q56564310
db/conf/cikm/cikm2004.html#DingFJPCPRDS04
John G. Michopoulos
Panagiota E. Tsompanopoulou
Elias N. Houstis
Anupam Joshi
Agent-Based Simulation of Data-Driven Fire Propagation Dynamics.
732-739
https://doi.org/10.1007/978-3-540-24688-6_95
2004
conf/iccS/2004-3
International Conference on Computational Science
db/conf/iccS/iccS2004-3.html#MichopoulosTHJ04
James Parker
Jeffrey Undercoffer
John Pinkston
Anupam Joshi
On intrusion detection and response for mobile ad hoc networks.
747-752
2004
IPCCC
https://doi.org/10.1109/PCCC.2004.1395172
https://doi.ieeecomputersociety.org/10.1109/PCCC.2004.1395172
conf/ipccc/2004
db/conf/ipccc/ipccc2004.html#ParkerUPJ04
Sasikanth Avancha
Chintan Patel
Anupam Joshi
Ontology-Driven Adaptive Sensor Networks.
194-202
2004
conf/mobiquitous/2004
MobiQuitous
https://doi.org/10.1109/MOBIQ.2004.1331726
https://doi.ieeecomputersociety.org/10.1109/MOBIQ.2004.1331726
http://eudl.eu/doi/10.1109/MOBIQ.2004.1331726
db/conf/mobiquitous/mobiquitous2004.html#AvanchaPJ04
Harry Chen 0001
Filip Perich
Timothy W. Finin
Anupam Joshi
SOUPA: Standard Ontology for Ubiquitous and Pervasive Applications.
258-267
2004
conf/mobiquitous/2004
MobiQuitous
https://doi.org/10.1109/MOBIQ.2004.1331732
https://doi.ieeecomputersociety.org/10.1109/MOBIQ.2004.1331732
http://eudl.eu/doi/10.1109/MOBIQ.2004.1331732
db/conf/mobiquitous/mobiquitous2004.html#ChenPFJ04
Anand Patwardhan
Vlad Korolev
Lalana Kagal
Anupam Joshi
Enforcing Policies in Pervasive Environments.
299-308
2004
conf/mobiquitous/2004
MobiQuitous
https://doi.org/10.1109/MOBIQ.2004.1331736
https://doi.ieeecomputersociety.org/10.1109/MOBIQ.2004.1331736
http://eudl.eu/doi/10.1109/MOBIQ.2004.1331736
db/conf/mobiquitous/mobiquitous2004.html#PatwardhanKKJ04
Filip Perich
Jeffrey Undercoffer
Lalana Kagal
Anupam Joshi
Timothy W. Finin
Yelena Yesha
In Reputation We Believe: Query Processing in Mobile Ad-Hoc Networks.
326-334
2004
conf/mobiquitous/2004
MobiQuitous
https://doi.org/10.1109/MOBIQ.2004.1331739
https://doi.ieeecomputersociety.org/10.1109/MOBIQ.2004.1331739
http://eudl.eu/doi/10.1109/MOBIQ.2004.1331739
db/conf/mobiquitous/mobiquitous2004.html#PerichUKJFY04
Harry Chen 0001
Timothy W. Finin
Anupam Joshi
Semantic Web in the Context Broker Architecture.
277-286
2004
conf/percom/2004
PerCom
https://doi.org/10.1109/PERCOM.2004.1276865
https://doi.ieeecomputersociety.org/10.1109/PERCOM.2004.1276865
db/conf/percom/percom2004.html#ChenFJ04
Dipanjan Chakraborty 0001
Yelena Yesha
Anupam Joshi
A distributed service composition protocol for pervasive environments.
2575-2580
2004
WCNC
https://doi.org/10.1109/WCNC.2004.1311494
conf/wcnc/2004
db/conf/wcnc/wcnc2004.html#ChakrabortyYJ04
Sasikanth Avancha
Dipanjan Chakraborty 0001
Filip Perich
Anupam Joshi
Data and Services for Mobile Computing.
2004
The Practical Handbook of Internet Computing
https://doi.org/10.1201/9780203507223.ch36
reference/crc/2004ic
db/reference/crc/ic2004.html#Avancha0PJ04
Tim Finin
Harry Chen 0001
Jim Parker 0002
Anupam Joshi
Lalana Kagal
Security, Trust, and Privacy in Mobile Computing Environments.
2004
Mobile Computing Handbook
https://doi.org/10.1201/9780203504086.ch40
reference/crc/2004mc
db/reference/crc/mc2004.html#FininCPJK04
Sasikanth Avancha
Jeffrey Undercoffer
Anupam Joshi
John Pinkston
Secure sensor networks for perimeter protection.
421-435
2003
43
Comput. Networks
4
https://doi.org/10.1016/S1389-1286(03)00352-9
db/journals/cn/cn43.html#AvanchaUJP03
Karuna P. Joshi
Anupam Joshi
Yelena Yesha
On Using a Warehouse to Analyze Web Logs.
161-180
2003
13
Distributed Parallel Databases
2
db/journals/dpd/dpd13.html#JoshiJY03
https://doi.org/10.1023/A:1021515408295
Harry Chen 0001
Tim Finin
Anupam Joshi
An ontology for context-aware pervasive computing environments.
197-207
2003
18
Knowl. Eng. Rev.
3
https://doi.org/10.1017/S0269888904000025
https://www.wikidata.org/entity/Q56873650
db/journals/ker/ker18.html#ChenFJ03
Jeffrey Undercoffer
Anupam Joshi
Tim Finin
John Pinkston
Using DAML+OIL to classify intrusive behaviours.
221-241
2003
18
Knowl. Eng. Rev.
3
https://doi.org/10.1017/S0269888904000049
https://www.wikidata.org/entity/Q57397252
db/journals/ker/ker18.html#UndercofferJFP03
Jeffrey Undercoffer
Filip Perich
Andrej Cedilnik
Lalana Kagal
Anupam Joshi
A Secure Infrastructure for Service Discovery and Access in Pervasive Computing.
113-125
2003
8
Mob. Networks Appl.
2
db/journals/monet/monet8.html#UndercofferPCKJ03
Sasikanth Avancha
Peter D'Souza
Filip Perich
Anupam Joshi
Yelena Yesha
P2P M-commerce in pervasive environments.
1-9
2003
3
SIGecom Exch.
4
https://doi.org/10.1145/844351.844353
db/journals/sigecom/sigecom3.html#AvanchaDPJY03
Dipanjan Chakraborty 0001
Anupam Joshi
MobiCom poster: Anamika: distributed service composition architecture for pervasive environments.
38-40
2003
7
ACM SIGMOBILE Mob. Comput. Commun. Rev.
1
https://doi.org/10.1145/881978.881989
db/journals/sigmobile/sigmobile7.html#ChakrabortyJ03
Vijay Atluri
Anupam Joshi
Yelena Yesha
Guest editorial.
285
2003
12
VLDB J.
4
https://doi.org/10.1007/s00778-003-0109-x
db/journals/vldb/vldb12.html#AtluriJY03
Olga Ratsimor
Timothy W. Finin
Anupam Joshi
Yelena Yesha
eNcentive: a framework for intelligent marketing in mobile peer-to-peer environments.
87-94
2003
conf/ACMicec/2003
ICEC
https://doi.org/10.1145/948005.948017
db/conf/ACMicec/icec2003.html#RatsimorFJY03
Filip Perich
Anupam Joshi
Yelena Yesha
Timothy W. Finin
Neighborhood-Consistent Transaction Management for Pervasive Computing Environments.
276-286
https://doi.org/10.1007/978-3-540-45227-0_28
2003
conf/dexa/2003
DEXA
db/conf/dexa/dexa2003.html#PerichJYF03
Hiren Shah
Jeffrey Undercoffer
Anupam Joshi
Fuzzy clustering for intrusion detection.
1274-1278
2003
FUZZ-IEEE
https://doi.org/10.1109/FUZZ.2003.1206614
conf/fuzzIEEE/2003
db/conf/fuzzIEEE/fuzzIEEE2003.html#ShahUJ03
Anupam Joshi
James M. Keller
Olfa Nasraoui
Panel on computational intelligence for homeland defense and counterterrorism.
1485-1486
2003
FUZZ-IEEE
https://doi.org/10.1109/FUZZ.2003.1206652
conf/fuzzIEEE/2003
db/conf/fuzzIEEE/fuzzIEEE2003.html#JoshiKN03
Vipul Hingne
Anupam Joshi
Elias N. Houstis
John G. Michopoulos
On the Grid and Sensor Networks.
166-175
2003
conf/grid/2003
GRID
https://doi.org/10.1109/GRID.2003.1261712
https://doi.ieeecomputersociety.org/10.1109/GRID.2003.1261712
http://dl.acm.org/citation.cfm?id=952052
db/conf/grid/grid2003.html#HingneJHM03
Vipul Hingne
Anupam Joshi
Timothy W. Finin
Hillol Kargupta
Elias N. Houstis
Towards a Pervasive Grid.
207
2003
conf/ipps/2003
IPDPS
https://doi.org/10.1109/IPDPS.2003.1213380
https://doi.ieeecomputersociety.org/10.1109/IPDPS.2003.1213380
db/conf/ipps/ipdps2003.html#HingneJFKH03
Harry Chen 0001
Timothy W. Finin
Anupam Joshi
Using OWL in a Pervasive Computing Broker.
9-16
2003
conf/oas/2003
OAS
https://ceur-ws.org/Vol-73/oas03-chen.pdf
db/conf/oas/oas2003.html#ChenFJ03
Sethuram Balaji Kodeswaran
Olga Ratsimore
Anupam Joshi
Timothy W. Finin
Yelena Yesha
Using Peer-to-Peer Data Routing for Infrastructure-Based Wireless Networks.
305-
2003
conf/percom/2003
PerCom
https://doi.org/10.1109/PERCOM.2003.1192754
https://doi.ieeecomputersociety.org/10.1109/PERCOM.2003.1192754
db/conf/percom/percom2003.html#KodeswaranRJFY03
Lalana Kagal
Timothy W. Finin
Anupam Joshi
A Policy Language for a Pervasive Computing Environment.
63-
2003
conf/policy/2003
POLICY
https://doi.org/10.1109/POLICY.2003.1206958
https://doi.ieeecomputersociety.org/10.1109/POLICY.2003.1206958
db/conf/policy/policy2003.html#KagalFJ03
Jeffrey Undercoffer
Anupam Joshi
John Pinkston
Modeling Computer Attacks: An Ontology for Intrusion Detection.
113-135
https://doi.org/10.1007/978-3-540-45248-5_7
2003
conf/raid/2003
RAID
db/conf/raid/raid2003.html#UndercofferJP03
Bernhard P. Bettig
C. Sandu
Anupam Joshi
K. Birru
Dynamic Solver Selection for an Internet Simulation Backbone.
153-160
2003
conf/sac/2003
SAC
db/conf/sac/sac2003.html#BettigSJB03
https://doi.org/10.1145/952532.952566
Lalana Kagal
Timothy W. Finin
Anupam Joshi
A Policy Based Approach to Security for the Semantic Web.
402-418
https://doi.org/10.1007/978-3-540-39718-2_26
2003
conf/semweb/2003
ISWC
db/conf/semweb/iswc2003.html#KagalFJ03
Sasikanth Avancha
Vlad Korolev
Anupam Joshi
Timothy W. Finin
Yelena Yesha
On experiments with a transport protocol for pervasive computing environments.
515-535
2002
40
Comput. Networks
4
db/journals/cn/cn40.html#AvanchaKJFY02
https://doi.org/10.1016/S1389-1286(02)00294-3
Sasikanth Avancha
Anupam Joshi
Timothy W. Finin
Enhanced Service Discovery in Bluetooth.
96-99
2002
35
Computer
6
https://doi.org/10.1109/MC.2002.1009177
http://doi.ieeecomputersociety.org/10.1109/MC.2002.1009177
db/journals/computer/computer35.html#AvanchaJF02
R. Scott Cost
Timothy W. Finin
Anupam Joshi
Yun Peng
Charles K. Nicholas
Ian Soboroff
Harry Chen 0001
Lalana Kagal
Filip Perich
Youyong Zou
Sovrin Tolia
ITtalks: A Case Study in the Semantic Web and DAML+OIL.
40-47
2002
17
IEEE Intell. Syst.
1
https://doi.org/10.1109/5254.988447
http://doi.ieeecomputersociety.org/10.1109/5254.988447
db/journals/expert/expert17.html#CostFJPNSCKPZT02
Timothy W. Finin
Anupam Joshi
Lalana Kagal
Olga Ratsimore
Sasikanth Avancha
Vlad Korolev
Harry Chen 0001
Filip Perich
R. Scott Cost
Intelligent Agents for Mobile and Embedded Devices.
205-230
2002
11
Int. J. Cooperative Inf. Syst.
3
https://doi.org/10.1142/S021884300200056X
db/journals/ijcis/ijcis11.html#FininJKRAKCPC02
Timothy W. Finin
Anupam Joshi
Agents, Turst, and Information Access on the Semantic Web.
30-35
2002
31
SIGMOD Rec.
4
https://doi.org/10.1145/637411.637416
https://www.wikidata.org/entity/Q57397234
db/journals/sigmod/sigmod31.html#FininJ02
Lalana Kagal
Vlad Korolev
Sasikanth Avancha
Anupam Joshi
Timothy W. Finin
Yelena Yesha
Centaurus: An Infrastructure for Service Management in Ubiquitous Computing Environments.
619-635
2002
8
Wirel. Networks
6
db/journals/winet/winet8.html#KagalKAJFY02
https://doi.org/10.1023/A:1020385804671
https://www.wikidata.org/entity/Q57397253
Urvi Shah
Timothy W. Finin
Anupam Joshi
Information retrieval on the semantic web.
461-468
2002
conf/cikm/2002
CIKM
https://doi.org/10.1145/584792.584868
db/conf/cikm/cikm2002.html#ShahFJ02
Filip Perich
Sasikanth Avancha
Dipanjan Chakraborty 0001
Anupam Joshi
Yelena Yesha
Profile Driven Data Management for Pervasive Environments.
361-370
2002
conf/dexa/2002
DEXA
https://doi.org/10.1007/3-540-46146-9_36
db/conf/dexa/dexa2002.html#PerichACJY02
Dipanjan Chakraborty 0001
Filip Perich
Anupam Joshi
Timothy W. Finin
Yelena Yesha
Middleware for Mobile Information Access.
729-733
2002
conf/dexaw/2002
DEXA Workshops
https://doi.org/10.1109/DEXA.2002.1045984
https://doi.ieeecomputersociety.org/10.1109/DEXA.2002.1045984
db/conf/dexaw/dexaw2002.html#ChakrabortyPJFY02
Dipanjan Chakraborty 0001
Filip Perich
Anupam Joshi
Timothy W. Finin
Yelena Yesha
A Reactive Service Composition Architecture for Pervasive Computing Environments.
53-62
2002
conf/ifip6-8/2002
PWC
db/conf/ifip6-8/ifip6-8-2002.html#ChakrabortyPJFY02
https://doi.org/10.1007/978-0-387-35618-1_7
Purnima Chandrasekaran
Anupam Joshi
MobileIQ: A Framework for Mobile Information Access.
43-50
2002
conf/mdm/2002
Mobile Data Management
https://doi.org/10.1109/MDM.2002.994359
https://doi.ieeecomputersociety.org/10.1109/MDM.2002.994359
db/conf/mdm/mdm2002.html#ChandrasekaranJ02
Dipanjan Chakraborty 0001
Anupam Joshi
Yelena Yesha
Timothy W. Finin
GSD: a novel group-based service discovery protocol for MANETS.
140-144
2002
conf/mwcn/2002
MWCN
https://doi.org/10.1109/MWCN.2002.1045711
db/conf/mwcn/mwcn2002.html#ChakrabortyJYF02
Amit Mahajan
Padmavathi Mundur
Anupam Joshi
Adaptive Multimedia System Architecture for Improving QoS in Wireless Networks.
712-719
2002
conf/pcm/2002
IEEE Pacific Rim Conference on Multimedia
https://doi.org/10.1007/3-540-36228-2_88
db/conf/pcm/pcm2002.html#MahajanMJ02
Bhagyalaxmi Bethala
Anupam Joshi
Dhananjay S. Phatak
Sasikanth Avancha
Tom Goff
Simulation of a Common Access Point for Bluetooth, 802.11 and Wired LANs.
918-922
2002
conf/pdpta/2002-2
PDPTA
db/conf/pdpta/pdpta2002-2.html#BethalaJPAG02
Anupam Joshi
Timothy W. Finin
Yelena Yesha
Me-Services: A Framework for Secure & Personalized Discovery, Composition and Management of Services in Pervasive Environments.
248-259
2002
conf/wes/2002
WES
https://doi.org/10.1007/3-540-36189-8_20
db/conf/wes/wes2002.html#JoshiFY02
Olga Ratsimor
Dipanjan Chakraborty 0001
Anupam Joshi
Timothy W. Finin
Allia: alliance-based service discovery for ad-hoc environments.
1-9
2002
Workshop Mobile Commerce
https://doi.org/10.1145/570705.570707
conf/wmc/2002
db/conf/wmc/wmc2002.html#RatsimorCJF02
Harry Chen 0001
Sovrin Tolia
Craig Sayers
Timothy W. Finin
Anupam Joshi
Creating Context-Aware Software Agents.
186-200
https://doi.org/10.1007/978-3-540-45173-0_15
2002
conf/wrac/2002
WRAC
db/conf/wrac/wrac2002.html#ChenTSFJ02
Youyong Zou
Timothy W. Finin
Yun Peng
Anupam Joshi
R. Scott Cost
Agent Communication in DAML World.
347-354
https://doi.org/10.1007/978-3-540-45173-0_26
2002
conf/wrac/2002
WRAC
db/conf/wrac/wrac2002.html#ZouFPJC02
Lalana Kagal
Filip Perich
Harry Chen 0001
Sovrin Tolia
Youyong Zou
Timothy W. Finin
Anupam Joshi
Yun Peng
R. Scott Cost
Charles K. Nicholas
Agents Making Sense of the Semantic Web.
417-433
https://doi.org/10.1007/978-3-540-45173-0_32
2002
conf/wrac/2002
WRAC
db/conf/wrac/wrac2002.html#KagalPCTZFJPCN02
Harry Chen 0001
Anupam Joshi
Timothy W. Finin
Dynamic Service Discovery for Mobile Computing: Intelligent Agents Meet Jini in the Aether.
343-354
2001
4
Clust. Comput.
4
db/journals/cluster/cluster4.html#ChenJF01
https://doi.org/10.1023/A:1011820829206
https://www.wikidata.org/entity/Q57397254
Lalana Kagal
Timothy W. Finin
Anupam Joshi
Communications - Trust-Based Security in Pervasive Computing Environments.
154-157
2001
34
Computer
12
https://doi.org/10.1109/2.970591
http://doi.ieeecomputersociety.org/10.1109/2.970591
https://www.wikidata.org/entity/Q114991963
db/journals/computer/computer34.html#KagalFJ01
Anupam Joshi
Arvind Krishna
Broadband Wireless.
1-6
2001
10
J. High Speed Networks
1
http://content.iospress.com/articles/journal-of-high-speed-networks/jhs209
db/journals/jhsn/jhsn10.html#JoshiK01
Raghu Krishnapuram
Anupam Joshi
Olfa Nasraoui
Liyu Yi
Low-complexity fuzzy relational clustering algorithms for Web mining.
595-607
2001
9
IEEE Trans. Fuzzy Syst.
4
https://doi.org/10.1109/91.940971
db/journals/tfs/tfs9.html#KrishnapuramJNY01
Timothy W. Finin
Anupam Joshi
Lalana Kagal
Olga Ratsimore
Vlad Korolev
Harry Chen 0001
Information Agents for Mobile and Embedded Devices.
264-286
2001
conf/cia/2001
CIA
https://doi.org/10.1007/3-540-44799-7_30
db/conf/cia/cia2001.html#FininJKRKC01
Filip Perich
Lalana Kagal
Harry Chen 0001
Sovrin Tolia
Youyong Zou
Timothy W. Finin
Anupam Joshi
Yun Peng
R. Scott Cost
Charles K. Nicholas
ITTALKS: An Application of Agents in the Semantic Web.
175-194
2001
conf/esaw/2001
ESAW
https://doi.org/10.1007/3-540-45584-1_12
db/conf/esaw/esaw2001.html#PerichKCTZFJPCN01
Purnima Chandrasekaran
Anupam Joshi
Michelle Shu Yang
Ramya Ramakrishnan
An Expertise Recommender Using Web Mining.
291-294
2001
conf/flairs/2001
FLAIRS
db/conf/flairs/flairs2001.html#ChandrasekaranJYR01
http://www.aaai.org/Library/FLAIRS/2001/flairs01-056.php
Sasikanth Avancha
Vladimir Korolev
Anupam Joshi
Timothy W. Finin
Transport protocols in wireless networks.
310-317
2001
ICCCN
https://doi.org/10.1109/ICCCN.2001.956278
conf/icccn/2001
db/conf/icccn/icccn2001.html#AvanchaKJF01
Lalana Kagal
Vlad Korolev
Harry Chen 0001
Anupam Joshi
Timothy W. Finin
Centaurus: A Framework for Intelligent Services in a Mobile Environment.
195-201
2001
conf/icdcsw/2001
ICDCS Workshops
https://doi.org/10.1109/CDCS.2001.918705
https://doi.ieeecomputersociety.org/10.1109/CDCS.2001.918705
db/conf/icdcsw/icdcsw2001.html#KagalKCJF01
Vlad Korolev
Anupam Joshi
An End-End Approach to Wireless Web Access.
473-478
2001
conf/icdcsw/2001
ICDCS Workshops
https://doi.org/10.1109/CDCS.2001.918747
https://doi.ieeecomputersociety.org/10.1109/CDCS.2001.918747
db/conf/icdcsw/icdcsw2001.html#KorolevJ01
Hillol Kargupta
Anupam Joshi
Data mining "to go": ubiquitous KDD for mobile and distributed environments.
2001
conf/kdd/2001t
KDD Tutorials
http://portal.acm.org/citation.cfm?id=502786.502791
db/conf/kdd/kdd2001t.html#KarguptaJ01
Anupam Joshi
Timothy W. Finin
Yelena Yesha
Agents, Mobility, and M-services: Creating the Next Generation Applications and Infrastructure on Mobile Ad-Hoc Networks.
106-118
2001
conf/nsf/2001
Infrastructure for Mobile and Wireless Systems
https://doi.org/10.1007/3-540-36257-6_10
db/conf/nsf/imws2001.html#JoshiFY01
R. Scott Cost
Timothy W. Finin
Anupam Joshi
Yun Peng
Charles K. Nicholas
Harry Chen 0001
Lalana Kagal
Filip Perich
Youyong Zou
Sovrin Tolia
ITTALKS: A Case Study in the Semantic Web and DAML.
477-494
2001
conf/semweb/2001swws
SWWS
http://www.semanticweb.org/SWWS/program/full/paper41.pdf
db/conf/semweb/swws2001.html#CostFJPNCKPZT01
Olga Ratsimor
Vlad Korolev
Anupam Joshi
Timothy W. Finin
Agents2Go: an infrastructure for location-dependent service discovery in the mobile electronic commerce environment.
31-37
2001
Workshop Mobile Commerce
https://doi.org/10.1145/381461.381467
conf/wmc/2001
db/conf/wmc/wmc2001.html#RatsimorKJF01
Murthy V. Devarakonda
Anupam Joshi
Marisa S. Viveros
Proceedings of the 1st International Workshop on Mobile Commerce, Rome, Italy, July, 21, 2001
Workshop Mobile Commerce
ACM
2001
1-58113-376-6
https://doi.org/10.1145/381461
db/conf/wmc/wmc2001.html
Olfa Nasraoui
Hichem Frigui
Raghu Krishnapuram
Anupam Joshi
Extracting Web User Profiles Using Relational Competitive Fuzzy Clustering.
509-526
2000
9
Int. J. Artif. Intell. Tools
4
https://doi.org/10.1142/S021821300000032X
db/journals/ijait/ijait9.html#NasraouiFKJ00
Anupam Joshi
On proxy agents, mobility, and web access.
233-241
2000
5
Mob. Networks Appl.
4
db/journals/monet/monet5.html#Joshi00
https://doi.org/10.1023/A:1019120915034
Anupam Joshi
Raghu Krishnapuram
On Mining Web Access Logs.
63-69
2000
conf/dmkd/2000
ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery
db/conf/dmkd/dmkd2000.html#JoshiK00
Timothy W. Finin
Anupam Joshi
Yannis Labrou
Yun Peng
Multi-Agent Systems, Internet and Applications - Introduction.
2000
conf/hicss/2000
HICSS
https://doi.org/10.1109/HICSS.2000.926994
https://doi.ieeecomputersociety.org/10.1109/HICSS.2000.926994
db/conf/hicss/hicss2000.html#FininJLP00
Chaitanya Pullela
Liang Xu
Dipanjan Chakraborty 0001
Anupam Joshi
A Component Based Architecture for Mobile Information Access.
65-72
2000
conf/icppw/2000
ICPP Workshops
https://doi.org/10.1109/ICPPW.2000.869089
https://doi.ieeecomputersociety.org/10.1109/ICPPW.2000.869089
db/conf/icppw/icppw2000.html#PullelaXCJ00
Anupam Joshi
Munindar P. Singh
Multiagent Systems on the Net - Introduction.
38-40
1999
42
Commun. ACM
3
db/journals/cacm/cacm42.html#JoshiS99
https://doi.org/10.1145/295685.295695
https://doi.org/10.1023/A:1008779426681
Jin Jing
Anupam Joshi
Guest Editorial.
255-256
1999
7
Distributed Parallel Databases
3
db/journals/dpd/dpd7.html#JingJ99
DPD/7/P255.pdf
Anupam Joshi
On mobility and agents.
161-170
1999
Mobile Networks and Computing
conf/dimacs/dimacs52
db/conf/dimacs/dimacs52.html#Joshi99
https://doi.org/10.1090/dimacs/052/09
Karuna P. Joshi
Anupam Joshi
Yelena Yesha
Raghu Krishnapuram
Warehousing and Mining Web Logs.
63-68
WIDM1999/P063.pdf
1999
conf/widm/99
Workshop on Web Information and Data Management
https://doi.org/10.1145/319759.319792
db/conf/widm/widm1999.html#JoshiJYK99
conf/adl/ZaianeXH98
...
journals/cn/PerkowitzE99
conf/ride/ShahabiZAS97
...
...
...
...
conf/vldb/AgrawalS94
...
...
...
conf/kdd/LentAS97
conf/pkdd/AhonenHKV97
conf/cikm/ZarkeshASSS97
journals/tkde/ChenPY98
journals/ibmsj/WuYB98
Elias N. Houstis
John R. Rice
Naren Ramakrishnan
Tzvetan T. Drashansky
Sanjiva Weerawarana
Anupam Joshi
Catherine E. Houstis
Multidisciplinary Problem Solving Environments for Computational Science.
401-438
1998
46
Adv. Comput.
db/journals/ac/ac46.html#HoustisRRDWJH98
https://doi.org/10.1016/S0065-2458(08)60209-0
Anupam Joshi
Naren Ramakrishnan
Elias N. Houstis
Multiagent System Support of Networked Scientific Computing.
69-83
1998
2
IEEE Internet Comput.
3
db/journals/internet/internet2.html#JoshiRH98
https://doi.org/10.1109/MIC.1998.683802
http://doi.ieeecomputersociety.org/10.1109/MIC.1998.683802
Haitao Jiang
Abdelsalam Helal
Ahmed K. Elmagarmid
Anupam Joshi
Scene Change Detection Techniques for Video Database Systems.
186-195
1998
6
Multim. Syst.
3
db/journals/mms/mms6.html#JiangHEJ98
https://doi.org/10.1007/s005300050087
Anupam Joshi
Sansanee Auephanwiriyakul
Raghu Krishnapuram
On Fuzzy Clustering and Content Based Access to Networked Video Databases.
42-49
1998
conf/ride/98
RIDE
db/conf/ride/ride98.html#JoshiAK98
https://doi.org/10.1109/RIDE.1998.658277
https://doi.ieeecomputersociety.org/10.1109/RIDE.1998.658277
Harini Bharadvaj
Anupam Joshi
Sansanee Auephanwiriyakul
An Active Transcoding Proxy to Support Mobile Web Access.
118-123
1998
conf/srds/1998
SRDS
db/conf/srds/srds98.html#BharadvajJA98
https://doi.org/10.1109/RELDIS.1998.740482
https://doi.ieeecomputersociety.org/10.1109/RELDIS.1998.740482
Vineeth Subramanyam
Anupam Joshi
Security in Mobile Systems.
407-410
1998
conf/srds/1998
SRDS
db/conf/srds/srds98.html#SubramanyamJ98
https://doi.org/10.1109/RELDIS.1998.740532
https://doi.ieeecomputersociety.org/10.1109/RELDIS.1998.740532
Jozsef Vass
Jia Yao
Anupam Joshi
Kannappan Palaniappan
Xinhua Zhuang
Interactive Image Retrieval over the Internet.
461-466
1998
conf/srds/1998
SRDS
db/conf/srds/srds98.html#VassYJPZ98
https://doi.org/10.1109/RELDIS.1998.740541
https://doi.ieeecomputersociety.org/10.1109/RELDIS.1998.740541
Anupam Joshi
C. K. Punyapu
P. Karnam
Personalization & Asynchronicity to Support Mobile Web Access.
17-20
1998
conf/widm/1998
Workshop on Web Information and Data Management
db/conf/widm/widm1998.html#JoshiPK98
Ahmed K. Elmagarmid
Haitao Jiang
Abdelsalam Helal
Anupam Joshi
Magdy A. Ahmed
Video Database Systems - Issues, Products and Applications
5
1997
1-124
Kluwer
Advances in Database Systems
https://doi.org/10.1007/b102355
978-0-7923-9872-1
Sanjiva Weerawarana
Anupam Joshi
Elias N. Houstis
John R. Rice
Ann Christine Catlin
Notebook interfaces for networked scientific computing: design and WWW implementation.
675-695
1997
9
Concurr. Pract. Exp.
7
db/journals/concurrency/concurrency9.html#WeerawaranaJHRC97
https://doi.org/10.1002/(SICI)1096-9128(199707)9:7<675::AID-CPE261>3.0.CO;2-3
Anupam Joshi
Narendran Ramakrishman
Elias N. Houstis
Purdue R. Rice
On neurobiological, neuro-fuzzy, machine learning, and statistical pattern recognition techniques.
18-31
1997
8
IEEE Trans. Neural Networks
1
https://doi.org/10.1109/72.554188
https://www.wikidata.org/entity/Q45967502
db/journals/tnn/tnn8.html#JoshiRHR97
Anupam Joshi
Panel on Cooperative MultiAgent Systems for the Web.
74-77
COOPIS1997/79460074.pdf
1997
conf/coopis/97
CoopIS
https://doi.org/10.1109/COOPIS.1997.613804
https://doi.ieeecomputersociety.org/10.1109/COOPIS.1997.613804
db/conf/coopis/coopis97.html#Joshi97
Naren Ramakrishnan
Anupam Joshi
Elias N. Houstis
John R. Rice
Neuro-fuzzy approaches to collaborative scientific computing.
473-478
1997
ICNN
https://doi.org/10.1109/ICNN.1997.611714
conf/icnn/1997
db/conf/icnn/icnn1997.html#RamakrishnanJHR97
Tzvetan T. Drashansky
Anupam Joshi
John R. Rice
Elias N. Houstis
Sanjiva Weerawarana
A MultiAgent Environment for MPSE's.
1997
conf/ppsc/1997
PPSC
db/conf/ppsc/ppsc1997.html#DrashanskyJRHW97
Anupam Joshi
Sanjiva Weerawarana
Elias N. Houstis
On Disconnected Browsing of Distributed Information.
101-107
1997
conf/ride/97
RIDE
db/conf/ride/ride97.html#JoshiWH97
https://doi.org/10.1109/RIDE.1997.583714
https://doi.ieeecomputersociety.org/10.1109/RIDE.1997.583714
Tzvetan T. Drashansky
Sanjiva Weerawarana
Anupam Joshi
Ranjeewa A. Weerasinghe
Elias N. Houstis
Software Architecture of Ubiquitous Scientific Computing Environments for Mobile Platforms.
421-432
1996
1
Mob. Networks Appl.
4
db/journals/monet/monet1.html#DrashanskyWJWH96
Sanjiva Weerawarana
Elias N. Houstis
John R. Rice
Anupam Joshi
Catherine E. Houstis
PYTHIA: A Knowledge-Based System to Select Scientific Algorithms.
447-468
1996
22
ACM Trans. Math. Softw.
4
https://doi.org/10.1145/235815.235820
https://www.wikidata.org/entity/Q113310367
db/journals/toms/toms22.html#WeerawaranaHRJH96
Ramanathan Kavasseri
Todd Keating
Michael Wittman
Anupam Joshi
Sanjiva Weerawarana
Web Intelligent Query - Disconnected Web Browsing using Cooperative Techniques.
167-174
1996
conf/coopis/1996
CoopIS
db/conf/coopis/coopis96.html#KavasseriKWJW96
https://doi.org/10.1109/COOPIS.1996.555008
https://doi.ieeecomputersociety.org/10.1109/COOPIS.1996.555008
Anupam Joshi
Naren Ramakrishnan
John R. Rice
Elias N. Houstis
A neuro-fuzzy approach to agglomerative clustering.
1028-1033
1996
ICNN
https://doi.org/10.1109/ICNN.1996.549039
conf/icnn/1996
db/conf/icnn/icnn1996.html#JoshiRRH96
Elias N. Houstis
Anupam Joshi
Mikhail J. Atallah
Sanjiva Weerawarana
Ahmed K. Elmagarmid
Internet, education, and the Web.
27-33
1996
conf/wetice/1996
WETICE
https://doi.org/10.1109/ENABL.1996.555036
https://doi.ieeecomputersociety.org/10.1109/ENABL.1996.555036
db/conf/wetice/wetice1996.html#HoustisJAWE96
Chia-Hoang Lee
Anupam Joshi
On correspondence, line tokens and missing tokens.
1751-1764
1995
28
Pattern Recognit.
11
https://doi.org/10.1016/0031-3203(95)00035-X
db/journals/pr/pr28.html#LeeJ95
Anupam Joshi
Chia-Hoang Lee
On the problem of correspondence in range data and some inelastic uses for elastic nets.
716-723
1995
6
IEEE Trans. Neural Networks
3
https://doi.org/10.1109/72.377976
https://www.wikidata.org/entity/Q33319060
db/journals/tnn/tnn6.html#JoshiL95
Tzvetan T. Drashansky
Anupam Joshi
John R. Rice
SciAgents-an agent based environment for distributed, cooperative scientific computing.
452-459
1995
ICTAI
https://doi.org/10.1109/TAI.1995.479840
https://doi.ieeecomputersociety.org/10.1109/TAI.1995.479840
conf/ictai/1995
db/conf/ictai/ictai1995.html#DrashanskyJR95
Anupam Joshi
To Learn or Not do Learn.
127-139
1995
conf/ijcai/1995ma
Adaption and Learning in Multi-Agent Systems
db/conf/ijcai/ijcai95ma.html#Joshi95
https://doi.org/10.1007/3-540-60923-7_23
Anupam Joshi
Chia-Hoang Lee
Backpropagation learns Marr's operator.
65-73
1993
70
Biol. Cybern.
1
https://doi.org/10.1007/BF00202567
db/journals/bc/bc70.html#JoshiL93
Chia-Hoang Lee
Anupam Joshi
Correspondence problem in image sequence analysis.
47-61
1993
26
Pattern Recognit.
1
https://doi.org/10.1016/0031-3203(93)90087-D
db/journals/pr/pr26.html#LeeJ93
Anupam Joshi
Chia-Hoang Lee
Using elastic nets for correspondence in range data.
1908-1913
1993
ICNN
https://doi.org/10.1109/ICNN.1993.298848
conf/icnn/1993
db/conf/icnn/icnn1993.html#JoshiL93
Mahmoud Abdelsalam
Karl Aberer
Tülay Adali
Lada A. Adamic
Sheetal K. Agarwal
Magdy A. Ahmed
Jitendra Ajmera
Boanerges Aleman-Meza
Mike Anoruo
Ismailcem Budak Arpinar
Mikhail J. Atallah
Vijayalakshmi AtluriVijay Atluri
Sansanee Auephanwiriyakul
Sasikanth Avancha
Bal Krishna Bal
Nilanjan Banerjee
Alain Bensoussan 0001
Nathan Berg
Elisa Bertino
Bhagyalaxmi Bethala
Bernhard P. Bettig
Harini Bharadvaj
K. Birru
Christian Bizer
Aniket Bochare
Ranjan Bose
Zois Boukouvalas
Mary Brady
Barbara Carminati
Ann Christine Catlin
Andrej Cedilnik
Dipanjan Chakraborty 0001
Purnima Chandrasekaran
Harry Chen 0001
Doreen Cheng
Khyati Chopra
Nitu Kedarmal Choudhary
Sai Sree Laya Chukkapalli
Chris Clifton
R. Scott Cost
Evan Crothers
Gautam Das 0005
Nilanjana Das
Prajit Kumar Das
Koustuv Dasgupta
Soham Dasgupta
Murthy V. Devarakonda
Sanorita Dey
Deepal S. Dhariwal
Radhika Dharurkar
Alejandra Diaz
Li Ding 0001
Sharad Dixit
Pedro M. Domingos
Sandor Dornbush
Vishal Doshi
Tzvetan T. Drashansky
Peter D'Souza
Haimonti Dutta
Sofia Dutta
Ben Elgamil
Lavanya Elluri
Ahmed K. Elmagarmid
Jesse English
Robert F. Erbacher
Charbel Farhat
Kayode Fasaye
Maribel Fernández
Francis Ferraro
Tim FininTimothy W. Finin
Clayton Fink
Hichem Frigui
Ashwinkumar Ganesan
Aryya Gangopadhyay
Shashidhara Ganjugunte
Tim Ganous
Vikas K. Garg
Manas Gaur
I. George
Dibyajyoti Ghosh
Tom Goff
Jennifer Golbeck
Narayana Murari Gowrishetty
Clare Grasso
Michael A. Grasso
Sol J. Greenspan
Aditi Gupta 0003
Akhilesh Gupta
Deepti Gupta
Maanak Gupta
Raj Gupta
Sheetal Gupta
Siva Gurumurthy
Paul Halvorsen
Kevin W. Hamlen
Jiawei Han 0001
Lushan Han
Casey Hanks
Abdelsalam Helal
Vipul Hingne
James Holt
Catherine E. Houstis
Elias N. Houstis
Michaela Iorga
Akshaya Iyengar
Pramod Jagtap
Paridhi Jain 0001
Nathalie Japkowicz
Akshay Java
Haitao Jiang
Jin Jing
Arnav Joshi
Karuna P. JoshiKaruna Pande Joshi
Lalana Kagal
Anubhav Kale
Pavan Kamaraju
Tapan Kamdar
Salil S. Kanhere
Murat Kantarcioglu
Shalini Kapoor
Amit Karandikar
Hillol Kargupta
P. Karnam
Tom Karygiannis
Abhay L. Kashyap
Ramanathan Kavasseri
Todd Keating
James Keller 0001James M. Keller
Latifur Khan
Kush Khanna
Nitika Khurana
Palanivel A. Kodeswaran
Sethuram Balaji Kodeswaran
Pranam Kolari
Vlad KorolevVladimir Korolev
Anantaa Kotal
Arvind Krishna
Raghu Krishnapuram
Swathi Krithivasan
Rohit Kugaonkar
Vijay S. Kumar
Ponnurangam Kumaraguru
Yannis Labrou
Ashwini Lahane
Ravendar Lal
Hemank Lamba
Freddy Lécué
Chia-Hoang Lee
Michel Lesoinne
Ninghui Li
Wenjia Li
Jimmy Lo
Hua Lu 0001
Sameer Madan
Morgan Madeira
Amit Mahajan
Michael Maiden
Christine Mallinson
Varun Mandalapu
Justin Martineau
Jim Massaro
M. Lisa Mathews
Mary Matthews
Cynthia Matuszek
James Mayfield
Paul McNamee
Marjorie McShane
Sharad Mehrotra
Eduardo Mena
John G. Michopoulos
Peter Mika
Shaswata Mitra
Sudip Mittal
Sumit Mittal
Seyedreza Mohseni
Sumit More
Caitlin Moroney
Sougata Mukherjea
Varish Mulwad
Padmavathi Mundur
Pradeep K. Murukannaiah
Seema Nagar
Meena NagarajanMeenakshi Nagarajan
Amit Anil Nanavati
Vikrant Nandakumar
Ankur Narang
Sandeep Nair Narayanan
Olfa Nasraoui
Lorenzo Neil
Charles K. Nicholas
Piyush Nimbalkar
Sergei Nirenburg
Jianwei Niu 0001
Andrzej Nowak
Tim Oates 0001
Madan Oberoi
Patricia Ordóñez 0002
Ankur Padia
Kannappan Palaniappan
Rong Pan
Shimei Pan
Bijaya K. PanigrahiBijaya Ketan Panigrahi
Primal Pappachan
Adrian Park 0001
Youngja Park
James Parker
Jim Parker 0002
Cynthia Sims Parr
Chintan Patel
Shamit Patel
Anand Patwardhan
Claudia Pearce
Yun Peng
Filip Perich
Dhananjay S. Phatak
Nisha Pillai
Gopal Sarma PingaliGopal Pingali
Aditya Pingle
John Pinkston
Aritran Piplai
Nithyananthan Poosamani
Chaitanya Pullela
C. K. Punyapu
Nikhil Puranik
Angshu Rai
Nitendra Rajput
Narendran Ramakrishman
Cartic Ramakrishnan
Naren Ramakrishnan
Ramya Ramakrishnan
Sowmya Ramapatruni
Priyanka Ranade
Vishal Rathod
Olga RatsimorOlga Ratsimore
Balaraman Ravindran
Pavan Reddivari
Arya Renjan
Injong Rhee
John R. Rice
Purdue R. Rice
Ahmad Ridley
Naphtali Rishe
Daniel Roseberry
Arpita Roy
Joel Sachs
Shrey Sahay
Ravi S. Sandhu
C. Sandu
Justin Santiago
Taneeya Satyapanich
Craig Sayers
Randy Schauer
Zary Segall
Aaditeshwar Seth
Hiren Shah
Urvi Shah
Nitin Kumar Sharma 0002
Parikshit Sharma
Puneet Sharma
Avinash Shenoi
Alan T. Sherman
Amit P. Sheth
Mayank Shrivastava
Eliot L. Siegel
Gurpreet Singh
Munindar P. Singh
Oyesh Mann Singh
Rahul Singh
Sandeep Kumar Singh 0004
Jennifer Sleeman
Ian Soboroff
Sina Sontowski
Eugene H. SpaffordGene Spafford
Biplav Srivastava
Kundan Srivastava
Steffen Staab
Vineeth Subramanyam
Madhura Sulgekar
Christopher Swartz
Zareen SyedZareen Saba Syed
Bhavani Thuraisingham
Sandesh Timilsina
Sovrin Tolia
Panagiota E. Tsompanopoulou
Jeffrey Undercoffer
Robin R. Vallacher
Jozsef Vass
Nalini Venkatasubramanian
Rakesh M. Verma
Balaji Viswanathan
Krishnamurthy Viswanathan
Marisa S. Viveros
Onkar Walavalkar
Ranjeewa A. Weerasinghe
Sanjiva Weerawarana
Jenny Weisenberg Williams
William H. Winsborough
Michael Wittman
Liang Xu
Shouhuai Xu
Michelle Shu Yang
Jia Yao
Yaacov Yesha
Yelena Yesha
Liyu Yi
Roberto Yus
Richard Zak
Laura ZavalaRosa Laura Zavala Gutierrez
ChengXiang Zhai
Lina Zhou
Xinhua Zhuang
Youyong Zou