College of Information Sciences and Technology

  • United States

Fingerprint Dive into the research topics where College of Information Sciences and Technology is active. These topic labels come from the works of this organization's members. Together they form a unique fingerprint.

  • Network Recent external collaboration on country level. Dive into details by clicking on the dots.

    Profiles

    No photo of Guoray Cai

    Guoray Cai

    Person: Academic

    19862019
    No photo of Chen Cao

    Chen Cao

    Person: Academic

    20152019
    No photo of John Carroll

    John Carroll

    Person: Academic

    19762020
    No photo of Patrick M. Dudas

    Patrick M. Dudas

    Person: Academic

    20092019
    No photo of Frederico T. Fonseca
    19992019
    No photo of Peter Kent Forster
    20042018
    No photo of Nicklaus A. Giacobe
    20102019

    Research Output

    Accelerating Substructure Similarity Search for Formula Retrieval

    Zhong, W., Rohatgi, S., Wu, J., Giles, C. L. & Zanibbi, R., 2020, Advances in Information Retrieval - 42nd European Conference on IR Research, ECIR 2020, Proceedings. Jose, J. M., Yilmaz, E., Magalhães, J., Martins, F., Castells, P., Ferro, N. & Silva, M. J. (eds.). Springer, p. 714-727 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12035 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Adversarial Attacks on Graph Neural Networks via Node Injections: A Hierarchical Reinforcement Learning Approach

    Sun, Y., Wang, S., Tang, X., Hsieh, T. Y. & Honavar, V., Apr 20 2020, The Web Conference 2020 - Proceedings of the World Wide Web Conference, WWW 2020. Association for Computing Machinery, Inc, p. 673-683 11 p. (The Web Conference 2020 - Proceedings of the World Wide Web Conference, WWW 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Adversarial Models for Deterministic Finite Automata

    Zhang, K., Wang, Q. & Giles, C. L., 2020, Advances in Artificial Intelligence - 33rd Canadian Conference on Artificial Intelligence, Canadian AI 2020, Proceedings. Goutte, C. & Zhu, X. (eds.). Springer, p. 540-552 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12109 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • AI-PLAX: AI-based placental assessment and examination using photos

    Chen, Y., Zhang, Z., Wu, C., Davaasuren, D., Goldstein, J. A., Gernand, A. D. & Wang, J. Z., Sep 2020, In : Computerized Medical Imaging and Graphics. 84, 101744.

    Research output: Contribution to journalArticle

    Open Access
  • Are These Comments Triggering? Predicting Triggers of Toxicity in Online Discussions

    Almerekhi, H., Kwak, H., Salminen, J. & Jansen, B. J., Apr 20 2020, The Web Conference 2020 - Proceedings of the World Wide Web Conference, WWW 2020. Association for Computing Machinery, Inc, p. 3033-3040 8 p. (The Web Conference 2020 - Proceedings of the World Wide Web Conference, WWW 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • AsgLDP: Collecting and Generating Decentralized Attributed Graphs with Local Differential Privacy

    Wei, C., Ji, S., Liu, C., Chen, W. & Wang, T., Jan 1 2020, In : IEEE Transactions on Information Forensics and Security. 15, p. 3239-3254 16 p., 9056817.

    Research output: Contribution to journalArticle

  • Automatic recognition of advanced persistent threat tactics for enterprise security

    Zou, Q., Singhal, A., Sun, X. & Liu, P., Mar 16 2020, IWSPA 2020 - Proceedings of the 6th International Workshop on Security and Privacy Analytics. Association for Computing Machinery, Inc, p. 43-52 10 p. (IWSPA 2020 - Proceedings of the 6th International Workshop on Security and Privacy Analytics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation

    Zhong, H., Liao, C., Squicciarini, A., Zhu, S. & Miller, D., Mar 16 2020, CODASPY 2020 - Proceedings of the 10th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 97-108 12 p. (CODASPY 2020 - Proceedings of the 10th ACM Conference on Data and Application Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Projects