متابعة
Bhavani Thuraisingham
Bhavani Thuraisingham
Cyber Security Research and Education Institute, University of Texas at Dallas
بريد إلكتروني تم التحقق منه على utdallas.edu
عنوان
عدد مرات الاقتباسات
عدد مرات الاقتباسات
السنة
A new intrusion detection system using support vector machines and hierarchical clustering
L Khan, M Awad, B Thuraisingham
The VLDB journal 16, 507-521, 2007
5892007
Classification and novel class detection in concept-drifting data streams under time constraints
M Masud, J Gao, L Khan, J Han, BM Thuraisingham
IEEE Transactions on knowledge and data engineering 23 (6), 859-874, 2010
5372010
Privacy preservation in wireless sensor networks: A state-of-the-art survey
N Li, N Zhang, SK Das, B Thuraisingham
Ad Hoc Networks 7 (8), 1501-1514, 2009
4442009
Systems and methods for determining user attribute values by mining user network data and information
S Abrol, V Khadilkar, LR Khan, BM Thuraisingham
US Patent 8,965,974, 2015
3622015
Security issues for cloud computing
K Hamlen, M Kantarcioglu, L Khan, B Thuraisingham
International Journal of Information Security and Privacy (IJISP) 4 (2), 36-48, 2010
3582010
ROWLBAC: representing role based access control in OWL
T Finin, A Joshi, L Kagal, J Niu, R Sandhu, W Winsborough, ...
Proceedings of the 13th ACM symposium on Access control models and …, 2008
3452008
Inferring private information using social network data
J Lindamood, R Heatherly, M Kantarcioglu, B Thuraisingham
Proceedings of the 18th international conference on World wide web, 1145-1146, 2009
3262009
Technologies, techniques, tools, and trends
B Thuraisingham, D Maning
CRC press, 1999
2921999
Heuristics-based query processing for large RDF graphs using cloud computing
M Husain, J McGlothlin, MM Masud, L Khan, BM Thuraisingham
IEEE Transactions on Knowledge and Data Engineering 23 (9), 1312-1327, 2011
2892011
A semantic web based framework for social network access control
B Carminati, E Ferrari, R Heatherly, M Kantarcioglu, B Thuraisingham
Proceedings of the 14th ACM symposium on Access control models and …, 2009
2382009
Effective software fault localization using an RBF neural network
WE Wong, V Debroy, R Golden, X Xu, B Thuraisingham
IEEE Transactions on Reliability 61 (1), 149-169, 2011
2262011
Systems and methods for automated detection of application vulnerabilities
L Khan, Z Lin, B Thuraisingham, J Sahs, D Sounthiraraj, G Greenwood
US Patent 9,977,904, 2018
2202018
A practical approach to classify evolving data streams: Training with limited amount of labeled data
MM Masud, J Gao, L Khan, J Han, B Thuraisingham
2008 Eighth IEEE International Conference on Data Mining, 929-934, 2008
2162008
Knowledge management: Classic and contemporary works
D Morey, MT Maybury, BM Thuraisingham
MIT Press, 2002
2162002
Preventing private information inference attacks on social networks
R Heatherly, M Kantarcioglu, B Thuraisingham
IEEE Transactions on Knowledge and Data Engineering 25 (8), 1849-1862, 2012
2052012
Deepsweep: An evaluation framework for mitigating DNN backdoor attacks using data augmentation
H Qiu, Y Zeng, S Guo, T Zhang, M Qiu, B Thuraisingham
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
2042021
Least cost rumor blocking in social networks
L Fan, Z Lu, W Wu, B Thuraisingham, H Ma, Y Bi
2013 IEEE 33rd International Conference on Distributed Computing Systems …, 2013
2032013
Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry
M Qiu, K Gai, B Thuraisingham, L Tao, H Zhao
Future generation computer systems 80, 421-429, 2018
2012018
Privacy preserving synthetic data release using deep learning
NC Abay, Y Zhou, M Kantarcioglu, B Thuraisingham, L Sweeney
Machine Learning and Knowledge Discovery in Databases: European Conference …, 2019
1982019
Eksploracja danych
DJ Hand, H Mannila, P Smyth
Wydawnictwa Naukowo-Techniczne, 2005
1962005
يتعذر على النظام إجراء العملية في الوقت الحالي. عاود المحاولة لاحقًا.
مقالات 1–20