Остановите войну!
for scientists:
default search action
Kevin W. Hamlen
- > Home > Persons > Kevin W. Hamlen
Publications
- 2023
- [j18]Xiaodi Li, Latifur Khan, Mahmoud Zamani, Shamila Wickramasuriya, Kevin W. Hamlen, Bhavani Thuraisingham:
Con2Mix: A semi-supervised method for imbalanced tabular security data. J. Comput. Secur. 31(6): 705-726 (2023) - [c72]Md Shihabul Islam, Mahmoud Zamani, Chung Hwan Kim, Latifur Khan, Kevin W. Hamlen:
Confidential Execution of Deep Learning Inference at the Untrusted Edge with ARM TrustZone. CODASPY 2023: 153-164 - [c71]Basel Abdeen, Ehab Al-Shaer, Anoop Singhal, Latifur Khan, Kevin W. Hamlen:
SMET: Semantic Mapping of CVE to ATT&CK and Its Application to Cybersecurity. DBSec 2023: 243-260 - [c70]Mahmoud Zamani, Saquib Irtiza, Shamila Wickramasuriya, Latifur Khan, Kevin W. Hamlen:
Cross Domain Vulnerability Detection using Graph Contrastive Learning. Tiny Papers @ ICLR 2023 - 2022
- [c68]Sadaf Md. Halim, Latifur Khan, Kevin W. Hamlen, Bhavani Thuraisingham, Md Delwar Hossain:
A Federated Approach for Learning from Electronic Health Records. BigDataSecurity/HPSC/IDS 2022: 218-223 - [c67]Saquib Irtiza, Latifur Khan, Kevin W. Hamlen:
SentMod: Hidden Backdoor Attack on Unstructured Textual Data. BigDataSecurity/HPSC/IDS 2022: 224-231 - [c66]Xiaodi Li, Latifur Khan, Mahmoud Zamani, Shamila Wickramasuriya, Kevin W. Hamlen, Bhavani Thuraisingham:
MCoM: A Semi-Supervised Method for Imbalanced Tabular Security Data. DBSec 2022: 48-67 - [c65]Yibo Hu, Yu Lin, Erick Skorupa Parolin, Latifur Khan, Kevin W. Hamlen:
Controllable Fake Document Infilling for Cyber Deception. EMNLP (Findings) 2022: 6505-6519 - [c64]Zhuoyi Wang, Yibo Hu, Latifur Khan, Kevin W. Hamlen, Bhavani Thuraisingham:
CAPT: Contrastive Pre-Training based Semi-Supervised Open-Set Learning. MIPR 2022: 7-13 - [i1]Yibo Hu, Yu Lin, Erick Skorupa Parolin, Latifur Khan, Kevin W. Hamlen:
Controllable Fake Document Infilling for Cyber Deception. CoRR abs/2210.09917 (2022) - 2021
- [j16]Frederico Araujo, Gbadebo Ayoade, Khaled Al-Naami, Yang Gao, Kevin W. Hamlen, Latifur Khan:
Crook-sourced intrusion detection as a service. J. Inf. Secur. Appl. 61: 102880 (2021) - [j15]Khaled Al-Naami, Amir El-Ghamry, Md Shihabul Islam, Latifur Khan, Bhavani Thuraisingham, Kevin W. Hamlen, Mohammed F. Alrahmawy, Magdi Zakria Rashad:
BiMorphing: A Bi-Directional Bursting Defense against Website Fingerprinting Attacks. IEEE Trans. Dependable Secur. Comput. 18(2): 505-517 (2021) - 2020
- [c62]Zhuoyi Wang, Yigong Wang, Bo Dong, Pracheta Sahoo, Kevin W. Hamlen, Latifur Khan:
Adaptive Margin Based Deep Adversarial Metric Learning. BigDataSecurity/HPSC/IDS 2020: 100-108 - [c60]Gbadebo Ayoade, Frederico Araujo, Khaled Al-Naami, Ahmad M. Mustafa, Yang Gao, Kevin W. Hamlen, Latifur Khan:
Automating Cyberdeception Evaluation with Deep Learning. HICSS 2020: 1-10 - 2019
- [c58]Frederico Araujo, Gbadebo Ayoade, Khaled Al-Naami, Yang Gao, Kevin W. Hamlen, Latifur Khan:
Improving intrusion detectors by crook-sourcing. ACSAC 2019: 245-256 - [c57]Gbadebo Ayoade, Erick Bauman, Latifur Khan, Kevin W. Hamlen:
Smart Contract Defense through Bytecode Rewriting. Blockchain 2019: 384-389 - 2018
- [c52]Vishal Karande, Swarup Chandra, Zhiqiang Lin, Juan Caballero, Latifur Khan, Kevin W. Hamlen:
BCD: Decomposing Binary Code Into Components Using Graph-Based Clustering. AsiaCCS 2018: 393-398 - [c51]Gbadebo Ayoade, Swarup Chandra, Latifur Khan, Kevin W. Hamlen, Bhavani Thuraisingham:
Automated Threat Report Classification over Multi-Source Data. CIC 2018: 236-245 - [c49]Gbadebo Ayoade, Vishal Karande, Latifur Khan, Kevin W. Hamlen:
Decentralized IoT Data Management Using BlockChain and Trusted Execution Environment. IRI 2018: 15-22 - 2017
- [c45]Ahmad M. Mustafa, Gbadebo Ayoade, Khaled Al-Naami, Latifur Khan, Kevin W. Hamlen, Bhavani Thuraisingham, Frederico Araujo:
Unsupervised deep embedding for novel class detection over data stream. IEEE BigData 2017: 1830-1839 - [c43]Ahsanul Haque, Zhuoyi Wang, Swarup Chandra, Bo Dong, Latifur Khan, Kevin W. Hamlen:
FUSION: An Online Method for Multistream Classification. CIKM 2017: 919-928 - [c42]Ahsanul Haque, Swarup Chandra, Latifur Khan, Kevin W. Hamlen, Charu C. Aggarwal:
Efficient Multistream Classification Using Direct Density Ratio Estimation. ICDE 2017: 155-158 - 2016
- [c40]Khaled Al-Naami, Swarup Chandra, Ahmad M. Mustafa, Latifur Khan, Zhiqiang Lin, Kevin W. Hamlen, Bhavani Thuraisingham:
Adaptive encrypted traffic fingerprinting with bi-directional dependence. ACSAC 2016: 177-188 - [c39]Bhavani Thuraisingham, Murat Kantarcioglu, Kevin W. Hamlen, Latifur Khan, Tim Finin, Anupam Joshi, Tim Oates, Elisa Bertino:
A Data Driven Approach for the Science of Cyber Security: Challenges and Directions. IRI 2016: 1-10 - 2013
- [j10]Pallabi Parveen, Nathan McDaniel, Zackary R. Weger, Jonathan Evans, Bhavani Thuraisingham, Kevin W. Hamlen, Latifur Khan:
Evolving Insider Threat Detection Stream Mining Perspective. Int. J. Artif. Intell. Tools 22(5) (2013) - 2012
- [j8]Bhavani Thuraisingham, Tahseen Al-Khateeb, Latifur Khan, Mehedy Masud, Kevin W. Hamlen, Vaibhav Khadilkar, Satyen Abrol:
Design and Implementation of a Data Mining System for Malware Detection. J. Integr. Des. Process. Sci. 16(2): 33-49 (2012) - [c24]Bhavani Thuraisingham, Vaibhav Khadilkar, Jyothsna Rachapalli, Tyrone Cadenhead, Murat Kantarcioglu, Kevin W. Hamlen, Latifur Khan, Mohammad Farhan Husain:
Cloud-Centric Assured Information Sharing. PAISI 2012: 1-26 - 2011
- [j5]Mohammad M. Masud, Clay Woolam, Jing Gao, Latifur Khan, Jiawei Han, Kevin W. Hamlen, Nikunj C. Oza:
Facing the reality of data stream classification: coping with scarcity of labeled data. Knowl. Inf. Syst. 33(1): 213-244 (2011) - [j4]Mohammad M. Masud, Tahseen Al-Khateeb, Kevin W. Hamlen, Jing Gao, Latifur Khan, Jiawei Han, Bhavani Thuraisingham:
Cloud-based malware detection for evolving data streams. ACM Trans. Manag. Inf. Syst. 2(3): 16:1-16:27 (2011) - [c19]Pallabi Parveen, Zackary R. Weger, Bhavani Thuraisingham, Kevin W. Hamlen, Latifur Khan:
Supervised Learning for Insider Threat Detection Using Stream Mining. ICTAI 2011: 1032-1039 - [c16]Pallabi Parveen, Jonathan Evans, Bhavani Thuraisingham, Kevin W. Hamlen, Latifur Khan:
Insider Threat Detection Using Stream Mining and Graph Mining. SocialCom/PASSAT 2011: 1102-1110 - 2010
- [j3]Kevin W. Hamlen, Murat Kantarcioglu, Latifur Khan, Bhavani Thuraisingham:
Security Issues for Cloud Computing. Int. J. Inf. Secur. Priv. 4(2): 36-48 (2010) - [c13]Arindam Khaled, Mohammad Farhan Husain, Latifur Khan, Kevin W. Hamlen, Bhavani Thuraisingham:
A Token-Based Access Control System for RDF Data in the Clouds. CloudCom 2010: 104-111 - 2009
- [j2]Kevin W. Hamlen, Vishwath Mohan, Mohammad M. Masud, Latifur Khan, Bhavani Thuraisingham:
Exploiting an antivirus interface. Comput. Stand. Interfaces 31(6): 1182-1189 (2009) - 2008
- [c5]Bhavani Thuraisingham, Latifur Khan, Mohammad M. Masud, Kevin W. Hamlen:
Data Mining for Security Applications. EUC (2) 2008: 585-589
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-03-20 01:13 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint