Time-based software licensing approach BK Sy US Patent 7,231,360, 2007 | 66 | 2007 |
Probability model selection using information-theoretic optimization criterion BK Sy US Patent 6,961,685, 2005 | 57 | 2005 |
A statistical causal model for the assessment of dysarthric speech and the utility of computer-based speech recognition BK Sy, DM Horowitz IEEE Transactions on Biomedical Engineering 40 (12), 1282-1298, 1993 | 41 | 1993 |
Reasoning MPE to multiply connected belief networks using message passing BK Sy AAAI, 570-576, 1992 | 37 | 1992 |
Method of comparing private data without revealing the data BK Sy, APK Krishnan US Patent 9,197,637, 2015 | 31 | 2015 |
Integrating intrusion alert information to aid forensic explanation: An analytical intrusion detection framework for distributive IDS BK Sy Information Fusion 10 (4), 325-341, 2009 | 27 | 2009 |
Method for preserving privacy of a reputation inquiry in a peer-to-peer communication environment BK Sy US Patent 8,498,415, 2013 | 25 | 2013 |
Signature-based approach for intrusion detection BK Sy International workshop on machine learning and data mining in pattern …, 2005 | 20 | 2005 |
Information-statistical data mining: Warehouse integration with examples of Oracle basics BK Sy, AK Gupta Springer Science & Business Media, 2012 | 18 | 2012 |
A recurrence local computation approach towards ordering composite beliefs in Bayesian belief networks BK Sy International Journal of Approximate Reasoning 8 (1), 17-50, 1993 | 18 | 1993 |
Method of comparing private data without revealing the data BK Sy, APK Krishnan US Patent 8,776,250, 2014 | 16 | 2014 |
Secure computation for biometric data security—application to speaker verification BK Sy IEEE Systems Journal 3 (4), 451-460, 2009 | 13 | 2009 |
Information-statistical pattern based approach for data mining BK Sy Journal of Statistical Computation and Simulation 69 (2), 171-201, 2001 | 12 | 2001 |
Secure information processing with privacy assurance-standard based design and development for biometric applications BK Sy, A Ramirez, APK Krishnan 2010 Eighth International Conference on Privacy, Security and Trust, 223-230, 2010 | 11 | 2010 |
Generation of cryptographic keys from personal biometrics: An illustration based on fingerprints BK Sy, APK Krishnan New Trends and Developments in Biometrics, 191, 2012 | 9 | 2012 |
Probability model selection using information-theoretic optimization criterion BK Sy Journal of Statistical Computation and Simulation 69 (3), 203-224, 2001 | 9 | 2001 |
An AI-based communication system for motor and speech disabled persons: Design methodology and prototype testing BK Sy, JR Deller IEEE transactions on biomedical engineering 36 (5), 565-571, 1989 | 9 | 1989 |
Discovering association patterns based on mutual information BK Sy International Workshop on Machine Learning and Data Mining in Pattern …, 2003 | 7 | 2003 |
Secure computation for privacy preserving biometric data retrieval and authentication B Sy European Conference on Intelligence and Security Informatics, 143-154, 2008 | 6 | 2008 |
A theoretical foundation and a method for document table structure extraction and decompositon H Wasserman, K Yukawa, B Sy, KL Kwok, IT Phillips Document Analysis Systems V: 5th International Workshop, DAS 2002 Princeton …, 2002 | 6 | 2002 |