
Anupam Joshi
Person information
- affiliation: University of Maryland, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2020
- [j74]Sai Sree Laya Chukkapalli, Sudip Mittal, Maanak Gupta
, Mahmoud Abdelsalam
, Anupam Joshi
, Ravi Sandhu, Karuna P. Joshi
:
Ontologies and Artificial Intelligence Systems for the Cooperative Smart Farming Ecosystem. IEEE Access 8: 164045-164064 (2020) - [j73]Aritran Piplai
, Sudip Mittal
, Anupam Joshi
, Tim Finin
, James Holt
, Richard Zak:
Creating Cybersecurity Knowledge Graphs From Malware After Action Reports. IEEE Access 8: 211691-211703 (2020) - [j72]Alejandra Diaz
, Alan T. Sherman
, Anupam Joshi:
Phishing in an academic community: A study of user susceptibility and behavior. Cryptologia 44(1): 53-67 (2020) - [j71]Kush Khanna
, Bijaya Ketan Panigrahi
, Anupam Joshi
:
Priority-Based Protection Against the Malicious Data Injection Attacks on State Estimation. IEEE Syst. J. 14(2): 1945-1952 (2020) - [c193]Anantaa Kotal, Karuna Pande Joshi, Anupam Joshi:
ViCLOUD: Measuring Vagueness in Cloud Service Privacy Policies and Terms of Services. CLOUD 2020: 71-79 - [c192]Aritran Piplai, Sudip Mittal, Mahmoud Abdelsalam, Maanak Gupta, Anupam Joshi, Tim Finin:
Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior. ISI 2020: 1-6 - [i12]Aritran Piplai, Sai Sree Laya Chukkapalli, Anupam Joshi:
NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion. CoRR abs/2002.08527 (2020) - [i11]Zois Boukouvalas, Christine Mallinson, Evan Crothers, Nathalie Japkowicz, Aritran Piplai, Sudip Mittal, Anupam Joshi, Tülay Adali:
Independent Component Analysis for Trustworthy Cyberspace during High Impact Events: An Application to Covid-19. CoRR abs/2006.01284 (2020)
2010 – 2019
- 2019
- [j70]Khyati Chopra, Ranjan Bose, Anupam Joshi
:
Stackelberg game for price and power control in secure cooperative relay network. IET Cyper-Phys. Syst.: Theory & Appl. 4(1): 58-67 (2019) - [j69]Sandeep Kumar Singh, Ranjan Bose, Anupam Joshi
:
Energy theft detection for AMI using principal component analysis based reconstructed data. IET Cyper-Phys. Syst.: Theory & Appl. 4(2): 179-185 (2019) - [c191]Aditya Pingle, Aritran Piplai, Sudip Mittal, Anupam Joshi
, James Holt, Richard Zak
:
RelExt: relation extraction using deep learning approaches for cybersecurity knowledge graph improvement. ASONAM 2019: 879-886 - [c190]Oyesh Mann Singh, Ankur Padia, Anupam Joshi
:
Named Entity Recognition for Nepali Language. CIC 2019: 184-190 - [c189]Nitika Khurana, Sudip Mittal, Aritran Piplai, Anupam Joshi
:
Preventing Poisoning Attacks On AI Based Threat Intelligence Systems. MLSP 2019: 1-6 - [i10]Aditya Pingle, Aritran Piplai, Sudip Mittal, Anupam Joshi, James Holt, Richard Zak:
RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement. CoRR abs/1905.02497 (2019) - [i9]Sudip Mittal, Anupam Joshi, Tim Finin:
Cyber-All-Intel: An AI for Security related Threat Intelligence. CoRR abs/1905.02895 (2019) - [i8]Oyesh Mann Singh, Ankur Padia, Anupam Joshi:
Named Entity Recognition for Nepali Language. CoRR abs/1908.05828 (2019) - 2018
- [j68]Khyati Chopra
, Ranjan Bose, Anupam Joshi
:
Secrecy outage of threshold-based cooperative relay network with and without direct links. EURASIP J. Inf. Secur. 2018: 7 (2018) - [j67]Sandeep Kumar Singh, Ranjan Bose, Anupam Joshi:
Entropy-based electricity theft detection in AMI network. IET Cyper-Phys. Syst.: Theory & Appl. 3(2): 99-105 (2018) - [j66]Khyati Chopra, Ranjan Bose, Anupam Joshi
:
Secrecy performance of threshold-based cognitive relay network with diversity combining. J. Commun. Networks 20(4): 383-395 (2018) - [j65]Sandeep Kumar Singh
, Kush Khanna, Ranjan Bose, Bijaya Ketan Panigrahi, Anupam Joshi
:
Joint-Transformation-Based Detection of False Data Injection Attacks in Smart Grid. IEEE Trans. Ind. Informatics 14(1): 89-97 (2018) - [c188]Sandeep Nair Narayanan, Ashwinkumar Ganesan, Karuna P. Joshi
, Tim Oates, Anupam Joshi
, Tim Finin:
Early Detection of Cybersecurity Threats Using Collaborative Cognition. CIC 2018: 354-363 - [c187]Vishal Rathod, Sandeep Nair Narayanan, Sudip Mittal, Anupam Joshi
:
Semantically Rich, Context Aware Access Control for Openstack. CIC 2018: 460-465 - [c186]Lorenzo Neil, Sudip Mittal, Anupam Joshi
:
Mining Threat Intelligence about Open-Source Projects and Libraries from Code Repository Issues and Bug Reports. ISI 2018: 7-12 - [c185]Arya Renjan, Karuna Pande Joshi
, Sandeep Nair Narayanan, Anupam Joshi
:
DAbR: Dynamic Attribute-based Reputation scoring for Malicious IP Address Detection. ISI 2018: 64-69 - [c184]Priyanka Ranade, Sudip Mittal, Anupam Joshi
, Karuna Pande Joshi
:
Using Deep Neural Networks to Translate Multi-lingual Threat Intelligence. ISI 2018: 238-243 - [c183]Ankur Padia, Arpita Roy, Taneeya Satyapanich, Francis Ferraro, Shimei Pan, Youngja Park, Anupam Joshi, Tim Finin:
UMBC at SemEval-2018 Task 8: Understanding Text about Malware. SemEval@NAACL-HLT 2018: 878-884 - [c182]Sandeep Kumar Singh, Ranjan Bose, Anupam Joshi
:
Energy theft detection in advanced metering infrastructure. WF-IoT 2018: 529-534 - [i7]Nitika Khurana, Sudip Mittal, Anupam Joshi:
Preventing Poisoning Attacks on AI based Threat Intelligence Systems. CoRR abs/1807.07418 (2018) - [i6]Priyanka Ranade, Sudip Mittal, Anupam Joshi, Karuna P. Joshi:
Using Deep Neural Networks to Translate Multi-lingual Threat Intelligence. CoRR abs/1807.07517 (2018) - [i5]Sandeep Nair Narayanan, Ashwinkumar Ganesan, Karuna P. Joshi, Tim Oates, Anupam Joshi, Tim Finin:
Cognitive Techniques for Early Detection of Cybersecurity Events. CoRR abs/1808.00116 (2018) - [i4]Lorenzo Neil, Sudip Mittal, Anupam Joshi:
Mining Threat Intelligence about Open-Source Projects and Libraries from Code Repository Issues and Bug Reports. CoRR abs/1808.04673 (2018) - [i3]Alejandra Diaz, Alan T. Sherman, Anupam Joshi:
Phishing in an Academic Community: A Study of User Susceptibility and Behavior. CoRR abs/1811.06078 (2018) - 2017
- [j64]Khyati Chopra, Ranjan Bose, Anupam Joshi
:
Secrecy performance of threshold-based decode-and-forward cooperative cognitive radio network. IET Commun. 11(9): 1396-1406 (2017) - [c181]Sudip Mittal, Aditi Gupta, Karuna P. Joshi
, Claudia Pearce, Anupam Joshi
:
A Question and Answering System for Management of Cloud Service Level Agreements. CLOUD 2017: 684-687 - [c180]Prajit Kumar Das, Anupam Joshi
, Tim Finin:
Personalizing Context-Aware Access Control on Mobile Platforms. CIC 2017: 107-116 - [c179]Prajit Kumar Das, Anupam Joshi
, Tim Finin:
App behavioral analysis using system calls. INFOCOM Workshops 2017: 487-492 - [c178]Khyati Chopra, Ranjan Bose, Anupam Joshi
:
Secrecy outage of cooperative relay network with and without eavesdropper's direct link. NCC 2017: 1-6 - [i2]Sudip Mittal, Anupam Joshi, Tim Finin:
Thinking, Fast and Slow: Combining Vector Spaces and Knowledge Graphs. CoRR abs/1708.03310 (2017) - 2016
- [j63]Randy Schauer, Anupam Joshi:
Distributed system configuration management using Markov logic networks. Int. J. Auton. Comput. 2(2): 137-154 (2016) - [j62]Paridhi Jain
, Ponnurangam Kumaraguru, Anupam Joshi
:
Other times, other values: leveraging attribute history to link user profiles across online social networks. Soc. Netw. Anal. Min. 6(1): 85:1-85:16 (2016) - [c177]Aditi Gupta, Sudip Mittal, Karuna P. Joshi
, Claudia Pearce, Anupam Joshi:
Streamlining Management of Multiple Cloud Services. CLOUD 2016: 481-488 - [c176]Zareen Syed, Ankur Padia, Tim Finin, M. Lisa Mathews, Anupam Joshi:
UCO: A Unified Cybersecurity Ontology. AAAI Workshop: Artificial Intelligence for Cyber Security 2016 - [c175]Karuna P. Joshi, Aditi Gupta, Sudip Mittal, Claudia Pearce, Anupam Joshi, Tim Finin:
ALDA: Cognitive Assistant for Legal Document Analytics. AAAI Fall Symposia 2016 - [c174]Sudip Mittal, Prajit Kumar Das, Varish Mulwad, Anupam Joshi
, Tim Finin:
CyberTwitter: Using Twitter to generate alerts for cybersecurity threats and vulnerabilities. ASONAM 2016: 860-867 - [c173]Karuna P. Joshi
, Aditi Gupta, Sudip Mittal, Claudia Pearce, Anupam Joshi
, Tim Finin:
Semantic approach to automating management of big data privacy policies. BigData 2016: 482-491 - [c172]Prajit Kumar Das, Anupam Joshi, Tim Finin:
Capturing Policies for Fine-Grained Access Control on Mobile Devices. CIC 2016: 54-63 - [c171]Sudip Mittal, Karuna P. Joshi
, Claudia Pearce, Anupam Joshi
:
Automatic Extraction of Metrics from SLAs for Cloud Service Management. IC2E 2016: 139-142 - [c170]M. Lisa Mathews, Anupam Joshi
, Tim Finin:
Detecting Botnets using a Collaborative Situational-aware IDPS. ICISSP 2016: 290-298 - [c169]Bhavani M. Thuraisingham, Murat Kantarcioglu, Kevin W. Hamlen, Latifur Khan, Tim Finin, Anupam Joshi
, Tim Oates, Elisa Bertino:
A Data Driven Approach for the Science of Cyber Security: Challenges and Directions. IRI 2016: 1-10 - [c168]Piyush Nimbalkar, Varish Mulwad, Nikhil Puranik, Anupam Joshi
, Tim Finin:
Semantic Interpretation of Structured Log Files. IRI 2016: 549-555 - [c167]Kush Khanna, Bijaya Ketan Panigrahi, Anupam Joshi
:
Bid Modification Attack in Smart Grid for Monetary Benefits. iNIS 2016: 224-229 - [c166]Sandeep Nair Narayanan, Sudip Mittal, Anupam Joshi
:
Using semantic technologies to mine vehicular context for security. Sarnoff Symposium 2016: 124-129 - [c165]Clare Grasso, Anupam Joshi
, Eliot L. Siegel:
Visualization of Pain Severity Events in Clinical Records Using Semantic Structures. ICSC 2016: 321-324 - [c164]Nitin Kumar Sharma, Anupam Joshi
:
Representing Attribute Based Access Control Policies in OWL. ICSC 2016: 333-336 - [c163]Prajit Kumar Das, Abhay L. Kashyap, Gurpreet Singh, Cynthia Matuszek, Tim Finin, Anupam Joshi:
Semantic Knowledge and Privacy in the Physical Web. PrivOn@ISWC 2016 - [c162]Prajit Kumar Das, Sandeep Nair Narayanan, Nitin Kumar Sharma, Anupam Joshi
, Karuna Pande Joshi
, Tim Finin:
Context-Sensitive Policy Based Security in Internet of Things. SMARTCOMP 2016: 1-6 - [c161]Sandeep Nair Narayanan, Sudip Mittal, Anupam Joshi
:
OBD_SecureAlert: An Anomaly Detection System for Vehicles. SMARTCOMP 2016: 1-6 - 2015
- [j61]Jennifer Sleeman, Tim Finin, Anupam Joshi
:
Entity Type Recognition for Heterogeneous Semantic Graphs. AI Mag. 36(1): 75-86 (2015) - [j60]Rosa Laura Zavala Gutierrez, Pradeep K. Murukannaiah, Nithyananthan Poosamani, Tim Finin, Anupam Joshi
, Injong Rhee, Munindar P. Singh
:
Platys: From Position to Place-Oriented Mobile Computing. AI Mag. 36(2): 50-62 (2015) - [c160]Sudip Mittal, Karuna P. Joshi
, Claudia Pearce, Anupam Joshi
:
Parallelizing natural language techniques for knowledge extraction from cloud service level agreements. BigData 2015: 2831-2833 - [c159]Paridhi Jain, Ponnurangam Kumaraguru, Anupam Joshi
:
Other Times, Other Values: Leveraging Attribute History to Link User Profiles across Online Social Networks. HT 2015: 247-255 - [c158]Clare Grasso, Anupam Joshi, Eliot L. Siegel:
Beyond NER: Towards Semantics in Clinical Text. BDM2I@ISWC 2015 - [c157]Primal Pappachan, Roberto Yus, Prajit Kumar Das, Sharad Mehrotra, Tim Finin, Anupam Joshi:
Building a Mobile Applications Knowledge Base for the Linked Data Cloud. MoDeST@ISWC 2015: 14-25 - [c156]Primal Pappachan, Roberto Yus, Prajit Kumar Das, Sharad Mehrotra, Tim Finin, Anupam Joshi:
Mobipedia: Mobile Applications Linked Data. International Semantic Web Conference (Posters & Demos) 2015 - [c155]Jennifer Sleeman, Tim Finin, Anupam Joshi:
Topic Modeling for RDF Graphs. LD4IE@ISWC 2015: 48-62 - [c154]Lushan Han, Tim Finin, Anupam Joshi
, Doreen Cheng:
Querying RDF data with text annotated graphs. SSDBM 2015: 27:1-27:12 - [c153]Wenjia Li
, Anupam Joshi
, Tim Finin:
SVM-CASE: An SVM-Based Context Aware Security Framework for Vehicular Ad-Hoc Networks. VTC Fall 2015: 1-5 - [i1]Sandeep Nair Narayanan, Sudip Mittal, Anupam Joshi:
Using Data Analytics to Detect Anomalous States in Vehicles. CoRR abs/1512.08048 (2015) - 2014
- [j59]Aniket Bochare, Aryya Gangopadhyay, Yelena Yesha, Anupam Joshi
, Yaacov Yesha, Mary Brady, Michael A. Grasso, Naphtali Rishe:
Integrating domain knowledge in supervised machine learning to assess the risk of breast cancer. Int. J. Medical Eng. Informatics 6(2): 87-99 (2014) - [c152]Clare Grasso, Anupam Joshi:
Longitudinal Tracking of Pain Phenotypes in Electronic Health Records Using an SVM. AMIA 2014 - [c151]Primal Pappachan, Roberto Yus, Anupam Joshi
, Tim Finin:
Rafiki: A semantic and collaborative approach to community health-care in underserved areas. CollaborateCom 2014: 322-331 - [c150]Varish Mulwad, Tim Finin, Anupam Joshi
:
Interpreting medical tables as linked data for generating meta-analysis reports. IRI 2014: 677-686 - [c149]Roberto Yus, Primal Pappachan, Prajit Kumar Das, Eduardo Mena
, Anupam Joshi
, Tim Finin:
Demo: FaceBlock: privacy-aware pictures for google glass. MobiSys 2014: 366 - [c148]Primal Pappachan, Roberto Yus, Prajit Kumar Das, Tim Finin, Eduardo Mena, Anupam Joshi:
A Semantic Context-Aware Privacy Model for FaceBlock. PrivOn@ISWC 2014 - [c147]Roberto Yus, Primal Pappachan, Prajit Kumar Das, Tim Finin, Anupam Joshi, Eduardo Mena:
Semantics for Privacy and Shared Context. PrivOn@ISWC 2014 - 2013
- [j58]Wenjia Li
, Anupam Joshi
, Tim Finin:
CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using policies. Distributed Parallel Databases 31(2): 353-376 (2013) - [j57]Prajit Kumar Das, Dibyajyoti Ghosh, Anupam Joshi, Tim Finin:
ACM HotMobile 2013 poster: an energy efficient semantic context model for managing privacy on smartphones. ACM SIGMOBILE Mob. Comput. Commun. Rev. 17(3): 34-35 (2013) - [j56]Lushan Han, Tim Finin, Paul McNamee, Anupam Joshi
, Yelena Yesha:
Improving Word Similarity by Augmenting PMI with Estimates of Word Polysemy. IEEE Trans. Knowl. Data Eng. 25(6): 1307-1322 (2013) - [c146]Deepal S. Dhariwal, Anupam Joshi, Michael A. Grasso:
Text and Ontology Driven Clinical Decision Support System. AMIA 2013 - [c145]Vlad Korolev, Michael A. Grasso, Anupam Joshi:
On Use of Machine Learning Techniques and Genotypes for Prediction of Chronic Diseases. AMIA 2013 - [c144]Palanivel A. Kodeswaran, Dipanjan Chakraborty, Parikshit Sharma, Sougata Mukherjea, Anupam Joshi
:
Combining smart phone and infrastructure sensors to improve security in enterprise settings. UbiComp (Adjunct Publication) 2013: 1151-1158 - [c143]Puneet Sharma, Anupam Joshi
, Tim Finin:
Detecting data exfiltration by integrating information across layers. IRI 2013: 309-316 - [c142]Nilanjan Banerjee, Dipanjan Chakraborty, Anupam Joshi
, Sumit Mittal, Angshu Rai, Balaraman Ravindran:
Detection of Real-Time Intentions from Micro-blogs. MobiQuitous 2013: 116-128 - [c141]Arnav Joshi, Ravendar Lal, Tim Finin, Anupam Joshi
:
Extracting Cybersecurity Related Linked Data from Text. ICSC 2013: 252-259 - [c140]Prajit Kumar Das, Anupam Joshi, Tim Finin:
Energy Efficient Sensing for Managing Context and Privacy on Smartphones. PrivOn@ISWC 2013 - [c139]Varish Mulwad, Tim Finin, Anupam Joshi
:
Semantic Message Passing for Generating Linked Data from Tables. International Semantic Web Conference (1) 2013: 363-378 - [c138]Morgan Madeira, Anupam Joshi
:
Analyzing Close Friend Interactions in Social Media. SocialCom 2013: 932-935 - [c137]Aditi Gupta, Hemank Lamba, Ponnurangam Kumaraguru, Anupam Joshi:
Faking Sandy: characterizing and identifying fake images on Twitter during Hurricane Sandy. WWW (Companion Volume) 2013: 729-736 - [c136]Paridhi Jain, Ponnurangam Kumaraguru, Anupam Joshi:
@i seek 'fb.me': identifying users across multiple online social networks. WWW (Companion Volume) 2013: 1259-1268 - 2012
- [j55]Wenjia Li
, James Parker, Anupam Joshi
:
Security Through Collaboration and Trust in MANETs. Mob. Networks Appl. 17(3): 342-352 (2012) - [c135]Aditi Gupta, Anupam Joshi
, Ponnurangam Kumaraguru:
Identifying and characterizing user communities on Twitter during crisis events. DUBMMSM 2012: 23-26 - [c134]Rohit Kugaonkar, Aryya Gangopadhyay, Yelena Yesha, Anupam Joshi
, Yaacov Yesha, Michael A. Grasso, Mary Brady, Naphtali Rishe:
Finding associations among SNPS for prostate cancer using collaborative filtering. DTMBIO@CIKM 2012: 57-60 - [c133]Lushan Han, Tim Finin, Anupam Joshi
:
Schema-free structured querying of DBpedia data. CIKM 2012: 2090-2093 - [c132]M. Lisa Mathews, Paul Halvorsen, Anupam Joshi
, Tim Finin:
A collaborative approach to situational awareness for cybersecurity. CollaborateCom 2012: 216-222 - [c131]Paridhi Jain, Ponnurangam Kumaraguru, Anupam Joshi:
Who's Who: Linking User's Multiple Identities on Online Social Media. COMAD 2012: 112 - [c130]Nilanjan Banerjee, Dipanjan Chakraborty, Anupam Joshi, Sumit Mittal, Angshu Rai, Balaraman Ravindran:
Towards Analyzing Micro-Blogs for Detection and Classification of Real-Time Intentions. ICWSM 2012 - [c129]Ashwini Lahane, Yelena Yesha, Michael A. Grasso, Anupam Joshi
, Adrian Park, Jimmy Lo:
Detection of unsafe action from laparoscopic cholecystectomy video. IHI 2012: 315-322 - [c128]Palanivel A. Kodeswaran, Vikrant Nandakumar, Shalini Kapoor, Pavan Kamaraju, Anupam Joshi
, Sougata Mukherjea:
Securing Enterprise Data on Smartphones Using Run Time Information Flow Control. MDM 2012: 300-305 - [c127]Sumit More, Mary Matthews, Anupam Joshi
, Tim Finin:
A Knowledge-Based Approach to Intrusion Detection Modeling. IEEE Symposium on Security and Privacy Workshops 2012: 75-81 - [c126]Dibyajyoti Ghosh, Anupam Joshi
, Tim Finin, Pramod Jagtap:
Privacy Control in Smart Phones Using Semantically Rich Reasoning and Context Modeling. IEEE Symposium on Security and Privacy Workshops 2012: 82-85 - [c125]Seema Nagar, Aaditeshwar Seth, Anupam Joshi
:
Characterization of social media response to natural disasters. WWW (Companion Volume) 2012: 671-674 - [p2]Varish Mulwad, Tim Finin, Anupam Joshi
:
A Domain Independent Framework for Extracting Linked Semantic Data from Tables. SeCO Book 2012: 16-33 - [e4]Biplav Srivastava, Freddy Lécué, Anupam Joshi:
Semantic Cities, Papers from the 2012 AAAI Workshop, Toronto, Ontario, Canada, July 22-23, 2012. AAAI Workshops WS-12-13, AAAI Press 2012 [contents] - [e3]Karl Aberer, Anupam Joshi, Sougata Mukherjea, Dipanjan Chakraborty, Hua Lu, Nalini Venkatasubramanian, Salil S. Kanhere:
13th IEEE International Conference on Mobile Data Management, MDM 2012, Bengaluru, India, July 23-26, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-1796-2 [contents] - 2011
- [j54]Palanivel A. Kodeswaran, Sethuram Balaji Kodeswaran, Anupam Joshi
, Tim Finin
:
Enforcing security in semantics driven policy based networks. Comput. Stand. Interfaces 33(1): 2-12 (2011) - [c124]Laura Zavala, Radhika Dharurkar, Pramod Jagtap, Tim Finin, Anupam Joshi:
Mobile, Collaborative, Context-Aware Systems. Activity Context Representation 2011 - [c123]Lushan Han, Tim Finin, Anupam Joshi
:
GoRelations: An Intuitive Query System for DBpedia. JIST 2011: 334-341 - [c122]Varish Mulwad, Wenjia Li
, Anupam Joshi
, Tim Finin, Krishnamurthy Viswanathan:
Extracting Information about Security Vulnerabilities from Web Text. Web Intelligence/IAT Workshops 2011: 257-260 - [c121]Wenjia Li
, Anupam Joshi
, Tim Finin:
ATM: Automated Trust Management for Mobile Ad Hoc Networks Using Support Vector Machine. Mobile Data Management (1) 2011: 291-292 - [c120]Wenjia Li
, Anupam Joshi
, Tim Finin:
SAT: an SVM-based automated trust management system for Mobile Ad-hoc Networks. MILCOM 2011: 1102-1107 - [c119]Wenjia Li
, Pramod Jagtap, Rosa Laura Zavala Gutierrez, Anupam Joshi
, Tim Finin:
CARE-CPS: Context-Aware Trust Evaluation for Wireless Networks in Cyber-Physical System Using Policies. POLICY 2011: 171-172 - [c118]Pramod Jagtap, Anupam Joshi
, Tim Finin
, Rosa Laura Zavala Gutierrez:
Preserving Privacy in Context-Aware Systems. ICSC 2011: 149-153 - [c117]Akshaya Iyengar, Tim Finin, Anupam Joshi
:
Content-Based Prediction of Temporal Boundaries for Events in Twitter. SocialCom/PASSAT 2011: 186-191 - [c116]Madan Oberoi, Pramod Jagtap, Anupam Joshi
, Tim Finin, Lalana Kagal:
Information Integration and Analysis: A Semantic Approach to Privacy. SocialCom/PASSAT 2011: 959-965 - [c115]Varish Mulwad, Tim Finin, Anupam Joshi:
Generating Linked Data by Inferring the Semantics of Tables. VLDS 2011: 17-22 - [c114]Jitendra Ajmera, Anupam Joshi
, Sougata Mukherjea, Nitendra Rajput, Shrey Sahay, Mayank Shrivastava, Kundan Srivastava:
Two-stream indexing for spoken web search. WWW (Companion Volume) 2011: 503-512 - 2010
- [c113]Ankur Narang, Raj Gupta, Anupam Joshi
, Vikas K. Garg:
Highly scalable parallel collaborative filtering algorithm. HiPC 2010: 1-10 - [c112]Randy Schauer, Anupam Joshi
:
A probabilistic approach to distributed system management. ICAC 2010: 77-78 - [c111]Wenjia Li
, Anupam Joshi
, Tim Finin:
Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-dimensional Trust Management Approach. Mobile Data Management 2010: 85-94 - [c110]Akhilesh Gupta, Anupam Joshi, Gopal Pingali:
Enforcing Security Policies in Mobile Devices Using Multiple Personas. MobiQuitous 2010: 297-302 - [c109]Palanivel A. Kodeswaran, Anupam Joshi
, Timothy W. Finin, Filip Perich:
A declarative approach for secure and robust routing. SafeConfig 2010: 45-52 - [c108]Varish Mulwad, Tim Finin, Zareen Syed, Anupam Joshi:
T2LD: Interpreting and Representing Tables as Linked Data. ISWC Posters&Demos 2010 - [c107]Varish Mulwad, Tim Finin, Zareen Syed, Anupam Joshi:
Using Linked Data to Interpret Tables. COLD 2010
2000 – 2009
- 2009
- [c106]Nilanjan Banerjee, Dipanjan Chakraborty, Koustuv Dasgupta, Sumit Mittal, Anupam Joshi
, Seema Nagar, Angshu Rai, Sameer Madan:
User interests in social media sites: an exploration with micro-blogs. CIKM 2009: 1823-1826 - [c105]Justin Martineau, Tim Finin, Anupam Joshi
, Shamit Patel:
Improving binary classification on text problems using differential word features. CIKM 2009: 2019-2024 - [c104]Wenjia Li
, Anupam Joshi
, Tim Finin
:
Policy-Based Malicious Peer Detection in Ad Hoc Networks. CSE (3) 2009: 76-82 - [c103]Tim Finin, Anupam Joshi
, Hillol Kargupta, Yelena Yesha, Joel Sachs, Elisa Bertino, Ninghui Li, Chris Clifton, Gene Spafford
, Bhavani M. Thuraisingham, Murat Kantarcioglu,