College of Information Sciences and Technology

  • United States

Research Output 1976 2020

Filter
Conference contribution
2018
4 Citations (Scopus)

Investigating active learning for concept prerequisite learning

Liang, C., Ye, J., Wang, S., Pursel, B. & Giles, C. L., Jan 1 2018, 32nd AAAI Conference on Artificial Intelligence, AAAI 2018. AAAI press, p. 7913-7919 7 p. (32nd AAAI Conference on Artificial Intelligence, AAAI 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data mining
Learning systems
Labels
Physics
Education
3 Citations (Scopus)

"Is more better?": Impact of multiple photos on perception of persona profiles

Salminen, J., An, J., Nielsen, L., Kwak, H., Jung, S. G. & Jansen, B. J., Apr 20 2018, CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI. Association for Computing Machinery, (Conference on Human Factors in Computing Systems - Proceedings; vol. 2018-April).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Experiments
8 Citations (Scopus)

KAME: Knowledge-based attention model for diagnosis prediction in healthcare

Ma, F., Chitta, R., You, Q., Zhou, J., Xiao, H. & Gao, J., Oct 17 2018, CIKM 2018 - Proceedings of the 27th ACM International Conference on Information and Knowledge Management. Paton, N., Candan, S., Wang, H., Allan, J., Agrawal, R., Labrinidis, A., Cuzzocrea, A., Zaki, M., Srivastava, D., Broder, A. & Schuster, A. (eds.). Association for Computing Machinery, p. 743-752 10 p. (International Conference on Information and Knowledge Management, Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Prediction
Healthcare
Graph
Knowledge-based
Health information
1 Citation (Scopus)

Lambda obfuscation

Lan, P., Wang, P., Wang, S. & Wu, D., Jan 1 2018, Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Proceedings. Ghorbani, A., Lin, X., Ren, K., Zhu, S. & Zhang, A. (eds.). Springer Verlag, p. 206-224 19 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 238).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Reverse engineering
Intellectual property
Flow control
Semantics
Engineers
5 Citations (Scopus)

Learning a hierarchical latent-variable model of 3D shapes

Liu, S., Giles, C. L. & Ororbia, A., Oct 12 2018, Proceedings - 2018 International Conference on 3D Vision, 3DV 2018. Institute of Electrical and Electronics Engineers Inc., p. 542-551 10 p. 8491006. (Proceedings - 2018 International Conference on 3D Vision, 3DV 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sampling
Experiments
3 Citations (Scopus)

Learning to Parse Wireframes in Images of Man-Made Environments

Huang, K., Wang, Y., Zhou, Z., Ding, T., Gao, S. & Ma, Y., Dec 14 2018, Proceedings - 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2018. IEEE Computer Society, p. 626-635 10 p. 8578170. (Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Navigation
Neural networks
Geometry
Experiments
14 Citations (Scopus)

Lemna: Explaining deep learning based security applications

Guo, W., Mu, D., Xu, J., Su, P., Wang, G. & Xing, X., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 364-379 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Binary codes
Reverse engineering
Transparency
Image analysis
Learning systems

Leveraging social analytics data for identifying customer segments for online news media

Jansen, B. J., Jung, S. G., Salminen, J., An, J. & Kwa, H., Mar 7 2018, Proceedings - 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications, AICCSA 2017. IEEE Computer Society, Vol. 2017-October. p. 463-468 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Marketing
1 Citation (Scopus)

Leveraging the power of informative users for local event detection

Zhang, H., Ma, F., Li, Y., Zhang, C., Wang, T., Wang, Y., Gao, J. & Su, L., Oct 24 2018, Proceedings of the 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2018. Tagarelli, A., Reddy, C. & Brandes, U. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 429-436 8 p. 8508618. (Proceedings of the 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

event
social media
Accidents
Experiments
Event detection

Local and global information preserved network embedding

Ma, Y., Wang, S. & Tang, J., Oct 24 2018, Proceedings of the 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2018. Tagarelli, A., Reddy, C. & Brandes, U. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 222-225 4 p. 8508496. (Proceedings of the 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Learning algorithms
Learning systems
Aircraft
Experiments
data network

Local graph clustering by multi-network random walk with restart

Yan, Y., Luo, D., Ni, J., Fei, H., Fan, W., Yu, X., Yen, J. & Zhang, X., Jan 1 2018, Advances in Knowledge Discovery and Data Mining - 22nd Pacific-Asia Conference, PAKDD 2018, Proceedings. Webb, G. I., Phung, D., Ganji, M., Rashidi, L., Tseng, V. S. & Ho, B. (eds.). Springer Verlag, p. 490-501 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10939 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Graph Clustering
Restart
Electric network analysis
Random walk
Clustering Methods
3 Citations (Scopus)

Microbiomarkers Discovery in Inflammatory Bowel Diseases using Network-Based Feature Selection

Abbas, M., Le, T., Bensmail, H., Honavar, V. G. & Elmanzalawi, Y., Aug 15 2018, ACM-BCB 2018 - Proceedings of the 2018 ACM International Conference on Bioinformatics, Computational Biology, and Health Informatics. Association for Computing Machinery, Inc, p. 172-177 6 p. (ACM-BCB 2018 - Proceedings of the 2018 ACM International Conference on Bioinformatics, Computational Biology, and Health Informatics).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Biomarkers
Inflammatory Bowel Diseases
Feature extraction
Metagenomics
Phenotype
1 Citation (Scopus)

Modeling threats of mass incidents using scenario-based Bayesian network reasoning

Huang, L., Cai, G., Yuan, H., Chen, J., Wang, Y. & Sun, F., Jan 1 2018, Conference Proceedings - 15th International Conference on Information Systems for Crisis Response and Management, ISCRAM 2018. Tomaszewski, B. & Boersma, K. (eds.). Information Systems for Crisis Response and Management, ISCRAM, p. 121-134 14 p. (Proceedings of the International ISCRAM Conference; vol. 2018-May).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Bayesian networks
Law enforcement
Sensitivity analysis
Logistics
Analytical models
5 Citations (Scopus)

Model-reuse attacks on deep learning systems

Ji, Y., Zhang, X., Ji, S., Luo, X. & Wang, T., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 349-363 15 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Learning systems
Deep learning
Tuning
Speech recognition
Standardization
3 Citations (Scopus)

Multidimensional risk communication: Public discourse on risks during an emerging epidemic

Gui, X., Kou, Y., Pine, K., Ladaw, E., Kim, H., Suzuki-Gill, E. & Chen, Y., Apr 20 2018, CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI. Association for Computing Machinery, (Conference on Human Factors in Computing Systems - Proceedings; vol. 2018-April).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Risk perception
Communication
Risk management
Epidemiology
Public health

Multidisciplinary care for facial paralysis patients: Collaboration between carers

Zhu, H. & Carroll, J., Oct 30 2018, CSCW 2018 Companion - Companion of the 2018 ACM Conference on Computer Supported Cooperative Work and Social Computing. Association for Computing Machinery, p. 189-192 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Neurosurgery
Health
Recovery
Communication

Multimodal fusion of brain networks with longitudinal couplings

Zhang, W., Shu, K., Wang, S., Liu, H. & Wang, Y., Jan 1 2018, Medical Image Computing and Computer Assisted Intervention – MICCAI 2018 - 21st International Conference, 2018, Proceedings. Frangi, A. F., Davatzikos, C., Fichtinger, G., Alberola-López, C. & Schnabel, J. A. (eds.). Springer Verlag, p. 3-11 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11072 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Neuroimaging
Brain
Fusion
Fusion reactions
Factorise
2 Citations (Scopus)

Multi-party access control: Requirements, state of the art and open challenges

Squicciarini, A., Rajtmajer, S. & Zannone, N., Jun 7 2018, SACMAT 2018 - Proceedings of the 23rd ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery, 1 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Data privacy
Data mining
10 Citations (Scopus)

Multi-Scale Multi-Task FCN for Semantic Page Segmentation and Table Detection

He, D., Cohen, S., Price, B., Kifer, D. & Giles, C. L., Jan 25 2018, Proceedings - 14th IAPR International Conference on Document Analysis and Recognition, ICDAR 2017. IEEE Computer Society, Vol. 1. p. 254-261 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Semantics
Neural networks
Heuristic methods
Pixels
5 Citations (Scopus)

Multi-task Sparse Metric Learning for Monitoring Patient Similarity Progression

Suo, Q., Zhong, W., Ma, F., Ye, Y., Huai, M. & Zhang, A., Dec 27 2018, 2018 IEEE International Conference on Data Mining, ICDM 2018. Institute of Electrical and Electronics Engineers Inc., p. 477-486 10 p. 8594872. (Proceedings - IEEE International Conference on Data Mining, ICDM; vol. 2018-November).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Patient monitoring
Labels
Feature extraction
6 Citations (Scopus)

MuVAN: A Multi-view Attention Network for Multivariate Temporal Data

Yuan, Y., Xun, G., Ma, F., Wang, Y., Du, N., Jia, K., Su, L. & Zhang, A., Dec 27 2018, 2018 IEEE International Conference on Data Mining, ICDM 2018. Institute of Electrical and Electronics Engineers Inc., p. 717-726 10 p. 8594896. (Proceedings - IEEE International Conference on Data Mining, ICDM; vol. 2018-November).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Time series
Data mining
Data structures
Experiments
Deep learning
5 Citations (Scopus)

My friend leaks my privacy: Modeling and analyzing privacy in social networks

Yu, L., Motipalli, S. M., Lee, D., Liu, P., Xu, H., Liu, Q., Tan, J. & Luo, B., Jun 7 2018, SACMAT 2018 - Proceedings of the 23rd ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery, p. 93-104 12 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Information dissemination
Internet
2 Citations (Scopus)

Neural network hate deletion: Developing a machine learning model to eliminate hate from online comments

Salminen, J., Luotolahti, J., Almerekhi, H., Jansen, B. J. & Jung, S. G., Jan 1 2018, Internet Science - 5th International Conference, INSCI 2018, Proceedings. Bodrunova, S. S. (ed.). Springer Verlag, p. 25-39 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11193 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Deletion
Learning systems
Machine Learning
Eliminate
Neural Networks

New to a country: Barriers for international students tom access health services and opportunities for design

Tang, C., Gui, X., Chen, Y. & Magueramane, M., May 21 2018, Proceedings of the 12th EAI International Conference on Pervasive Computing Technologies for Healthcare, PervasiveHealth 2018. Association for Computing Machinery, p. 45-54 10 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Health
Students
Information services
Medicine
Communication

Not that much power: Linguistic alignment is influenced more by low-level linguistic features rather than social power

Xu, Y., Cole, J. & Reitter, D. T., Jan 1 2018, ACL 2018 - 56th Annual Meeting of the Association for Computational Linguistics, Proceedings of the Conference (Long Papers). Association for Computational Linguistics (ACL), p. 601-610 10 p. (ACL 2018 - 56th Annual Meeting of the Association for Computational Linguistics, Proceedings of the Conference (Long Papers); vol. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Linguistics
Logistics
Power (Psychology)
3 Citations (Scopus)

Online Hate Interpretation Varies by Country, but More by Individual: A Statistical Analysis Using Crowdsourced Ratings

Salminen, J., Veronesi, F., Almerekhi, H., Jung, S. G. & Jansen, B. J., Nov 30 2018, 2018 5th International Conference on Social Networks Analysis, Management and Security, SNAMS 2018. Institute of Electrical and Electronics Engineers Inc., p. 88-94 7 p. 8554954. (2018 5th International Conference on Social Networks Analysis, Management and Security, SNAMS 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

hate
statistical analysis
Statistical methods
rating
interpretation

On Multi-query Local Community Detection

Bian, Y., Yan, Y., Cheng, W., Wang, W., Luo, D. & Zhang, X., Dec 27 2018, 2018 IEEE International Conference on Data Mining, ICDM 2018. Institute of Electrical and Electronics Engineers Inc., p. 9-18 10 p. 8594825. (Proceedings - IEEE International Conference on Data Mining, ICDM; vol. 2018-November).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data storage equipment

Ordinary innovations of older adults: An interview study to understand interest development in aging

Wang, X., Knearem, T. & Carroll, J., Oct 30 2018, CSCW 2018 Companion - Companion of the 2018 ACM Conference on Computer Supported Cooperative Work and Social Computing. Association for Computing Machinery, p. 253-256 4 p. (Proceedings of the ACM Conference on Computer Supported Cooperative Work, CSCW).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sustainable development
Innovation
Aging of materials
Health

PATENet: Pairwise Alignment of Time Evolving Networks

Gur, S. & Honavar, V. G., Jan 1 2018, Machine Learning and Data Mining in Pattern Recognition - 14th International Conference, MLDM 2018, Proceedings. Perner, P. (ed.). Springer Verlag, p. 85-98 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10934 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Pairwise
Brain
Alignment
Aging of materials
Topology
7 Citations (Scopus)

Personalized privacy-preserving social recommendation

Meng, X., Wang, S., Shu, K., Li, J., Chen, B., Liu, H. & Zhang, Y., Jan 1 2018, 32nd AAAI Conference on Artificial Intelligence, AAAI 2018. AAAI press, p. 3796-3803 8 p. (32nd AAAI Conference on Artificial Intelligence, AAAI 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data privacy
Recommender systems
4 Citations (Scopus)

Persona perception scale: Developing and validating an instrument for human-like representations of data

Salminen, J., Kwak, H., Santos, J. M., Jung, S. G., An, J. & Jansen, B. J., Apr 20 2018, CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI. Association for Computing Machinery, LBW075. (Conference on Human Factors in Computing Systems - Proceedings; vol. 2018-April).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Human computer interaction
Software engineering
Systems analysis
2 Citations (Scopus)

PhamilyHealth: A photo sharing system for intergenerational family collaboration on health

Binda, J., Georgieva, E., Yang, Y., Gui, F., Beck, J. & Carroll, J., Oct 30 2018, CSCW 2018 Companion - Companion of the 2018 ACM Conference on Computer Supported Cooperative Work and Social Computing. Association for Computing Machinery, p. 337-340 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Health
1 Citation (Scopus)

Playing with streakiness in online games: How players perceive and react to winning and losing streaks in league of legends

Kou, Y., Li, Y., Gui, X. & Suzuki-Gill, E., Apr 20 2018, CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI. Association for Computing Machinery, (Conference on Human Factors in Computing Systems - Proceedings; vol. 2018-April).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Please be an influencer? Contingency-aware influence maximization

Yadav, A., Onasch-Vera, L., Noothigattu, R., Marcolino, L. S., Rice, E. & Tambe, M., Jan 1 2018, 17th International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2018. International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS), p. 1423-1431 9 p. (Proceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS; vol. 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Seed
Public health
Factorization
10 Citations (Scopus)

Point-of-interest recommendation: Exploiting self-attentive autoencoders with neighbor-aware influence

Ma, C., Wang, Q., Zhang, Y. & Liu, X., Oct 17 2018, CIKM 2018 - Proceedings of the 27th ACM International Conference on Information and Knowledge Management. Paton, N., Candan, S., Wang, H., Allan, J., Agrawal, R., Labrinidis, A., Cuzzocrea, A., Zaki, M., Srivastava, D., Broder, A. & Schuster, A. (eds.). Association for Computing Machinery, p. 697-706 10 p. (International Conference on Information and Knowledge Management, Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Evaluation
Modeling
Radial basis function
Kernel
Interaction
1 Citation (Scopus)

Privacy-aware tag recommendation for image sharing

Tonge, A., Caragea, C. & Squicciarini, A., Jul 3 2018, HT 2018 - Proceedings of the 29th ACM Conference on Hypertext and Social Media. Association for Computing Machinery, Inc, p. 52-56 5 p. (HT 2018 - Proceedings of the 29th ACM Conference on Hypertext and Social Media).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hard facing
1 Citation (Scopus)

Protecting million-user iOS apps with obfuscation: Motivations, pitfalls, and experience

Wang, P., Wu, D., Chen, Z. & Wei, T., May 27 2018, Proceedings 2018 ACM/IEEE 40th International Conference on Software Engineering: Software Engineering in Practice, ICSE-SEIP 2018. IEEE Computer Society, p. 235-244 10 p. (Proceedings - International Conference on Software Engineering).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programs
Reverse engineering
Ecosystems
Industry
Profitability
2 Citations (Scopus)

QR2: A third-party query reranking service over web databases

Durairaj Gunasekaran, Y., Asudeh, A., Hasani, S., Zhang, N., Jaoua, A. & Das, G., Oct 24 2018, Proceedings - IEEE 34th International Conference on Data Engineering, ICDE 2018. Institute of Electrical and Electronics Engineers Inc., p. 1653-1656 4 p. 8509420. (Proceedings - IEEE 34th International Conference on Data Engineering, ICDE 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Query processing
World Wide Web
Data base
Reranking
Query

Quantifying Graph Anonymity, Utility, and De-anonymity

Ji, S., Du, T., Hong, Z., Wang, T. & Beyah, R., Oct 8 2018, INFOCOM 2018 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., p. 1736-1744 9 p. 8486356. (Proceedings - IEEE INFOCOM; vol. 2018-April).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data structures
Computer systems
Mathematical models
3 Citations (Scopus)

Recovering 3D planes from a single image via convolutional neural networks

Yang, F. & Zhou, Z., Jan 1 2018, Computer Vision – ECCV 2018 - 15th European Conference, 2018, Proceedings. Hebert, M., Ferrari, V., Sminchisescu, C. & Weiss, Y. (eds.). Springer Verlag, p. 87-103 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11214 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Human robot interaction
Labeling
Labels
Navigation
Semantics

Recruiting older adults in the wild: Reflections on challenges and lessons learned from research experience

Binda, J., Wang, X. & Carroll, J., May 21 2018, Proceedings of the 12th EAI International Conference on Pervasive Computing Technologies for Healthcare, PervasiveHealth 2018. Association for Computing Machinery, p. 290-293 4 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

RedDroid: Android Application Redundancy Customization Based on Static Analysis

Jiang, Y., Bao, Q., Wang, S., Liu, X. & Wu, D., Nov 16 2018, Proceedings - 29th IEEE International Symposium on Software Reliability Engineering, ISSRE 2018. Ghosh, S., Cukic, B., Poston, R., Natella, R. & Laranjeiro, N. (eds.). IEEE Computer Society, p. 189-199 11 p. 8539081. (Proceedings - International Symposium on Software Reliability Engineering, ISSRE; vol. 2018-October).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Static analysis
Application programs
Redundancy
Smartphones
Hard disk storage
3 Citations (Scopus)

Representation learning for large-scale dynamic networks

Yu, Y., Yao, H., Wang, H., Tang, X. & Li, Z., Jan 1 2018, Database Systems for Advanced Applications - 23rd International Conference, DASFAA 2018, Proceedings. Pei, J., Sadiq, S., Li, J. & Manolopoulos, Y. (eds.). Springer Verlag, p. 526-541 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10828 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Dynamic Networks
Vector spaces
Network Structure
Vertex of a graph
Learning
10 Citations (Scopus)

Risk prediction on electronic health records with prior medical knowledge

Ma, F., You, Q., Gao, J., Zhou, J., Suo, Q. & Zhang, A., Jul 19 2018, KDD 2018 - Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Association for Computing Machinery, p. 1910-1919 10 p. (Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Health
Learning systems
Deep learning

ROAR: Robust label ranking for social emotion mining

Jiasheng Zhang, J. & Lee, D., Jan 1 2018, 32nd AAAI Conference on Artificial Intelligence, AAAI 2018. AAAI press, p. 4422-4429 8 p. (32nd AAAI Conference on Artificial Intelligence, AAAI 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Labels
Industry
4 Citations (Scopus)

RoboADS: Anomaly detection against sensor and actuator misbehaviors in mobile robots

Guo, P., Kim, H., Virani, N., Xu, J., Zhu, M. & Liu, P., Jul 19 2018, Proceedings - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2018. Institute of Electrical and Electronics Engineers Inc., p. 574-585 12 p. 8416517. (Proceedings - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile robots
Actuators
Sensors
Robots
Unmanned vehicles

ROPOB: Obfuscating binary code via return oriented programming

Mu, D., Guo, J., Ding, W., Wang, Z., Mao, B. & Shi, L., Jan 1 2018, Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Proceedings. Ghorbani, A., Lin, X., Ren, K., Zhu, S. & Zhang, A. (eds.). Springer Verlag, p. 721-737 17 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 238).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Binary codes
Computer programming
Flow control
Reverse engineering
Camouflage

Running OS Kernel in Separate Domains: A New Architecture for Applications and OS Services Quarantine

Zhang, W., Jia, X., Zhang, S., Wang, R. & Liu, P., Jul 2 2018, Proceedings - 25th Asia-Pacific Software Engineering Conference, APSEC 2018. IEEE Computer Society, p. 219-228 10 p. 8719561. (Proceedings - Asia-Pacific Software Engineering Conference, APSEC; vol. 2018-December).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Containers
Decomposition
Costs
Linux
Virtualization

SecControl: Bridging the gap between security tools and SDN controllers

Wang, L. & Wu, D., Jan 1 2018, Security and Privacy in Communication Networks - SecureComm 2017 International Workshops, ATCS and SePrIoT, Proceedings. Ghorbani, A., Ren, K., Zhu, S., Zhang, A. & Lin, X. (eds.). Springer Verlag, p. 11-31 21 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 239).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Controllers
Network security
Software defined networking
Experiments
1 Citation (Scopus)

Server-based manipulation attacks against machine learning models

Liao, C., Zhu, S., Zhong, H. & Squicciarini, A., Mar 13 2018, CODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 2-34 33 p. (CODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy; vol. 2018-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Learning systems
Servers
Image classification
Supervised learning
Electronic mail