default search action
Anupam Joshi
Person information
- affiliation: University of Maryland, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j81]Kirti Gupta, Bijaya Ketan Panigrahi, Anupam Joshi, Kolin Paul:
Demonstration of denial of charging attack on electric vehicle charging infrastructure and its consequences. Int. J. Crit. Infrastructure Prot. 46: 100693 (2024) - [i22]Leon Garza, Lavanya Elluri, Anantaa Kotal, Aritran Piplai, Deepti Gupta, Anupam Joshi:
PrivComp-KG : Leveraging Knowledge Graph and Large Language Models for Privacy Policy Compliance Verification. CoRR abs/2404.19744 (2024) - [i21]Anantaa Kotal, Brandon Luton, Anupam Joshi:
KiNETGAN: Enabling Distributed Network Intrusion Detection through Knowledge-Infused Synthetic Data Generation. CoRR abs/2405.16476 (2024) - 2023
- [j80]Aritran Piplai, Anantaa Kotal, Seyedreza Mohseni, Manas Gaur, Sudip Mittal, Anupam Joshi:
Knowledge-Enhanced Neurosymbolic Artificial Intelligence for Cybersecurity and Privacy. IEEE Internet Comput. 27(5): 43-48 (2023) - [c221]Varish Mulwad, Tim Finin, Vijay S. Kumar, Jenny Weisenberg Williams, Sharad Dixit, Anupam Joshi:
A Practical Entity Linking System for Tables in Scientific Literature. SDU@AAAI 2023 - [c220]Aritran Piplai, Anupam Joshi, Tim Finin:
Offline RL+CKG: A hybrid AI model for cybersecurity tasks. AAAI Spring Symposium: MAKE 2023 - [c219]Priyanka Ranade, Anupam Joshi:
FABULA: Intelligence Report Generation Using Retrieval-Augmented Narrative Construction. ASONAM 2023: 603-610 - [c218]Anantaa Kotal, Lavanya Elluri, Deepti Gupta, Varun Mandalapu, Anupam Joshi:
Privacy-Preserving Data Sharing in Agriculture: Enforcing Policy Rules for Secure and Confidential Data Synthesis. IEEE Big Data 2023: 5519-5528 - [c217]Varish Mulwad, Vijay S. Kumar, Jenny Weisenberg Williams, Tim Finin, Sharad Dixit, Anupam Joshi:
Towards Semantic Exploration of Tables in Scientific Documents. ESWC Workshops 2023 - [c216]Narayana Murari Gowrishetty, Sai Sree Laya Chukkapalli, Anupam Joshi:
Bewitching the Battlefield: Repurposing the MouseJack Attack for Crazyflie Drones. INFOCOM Workshops 2023: 1-6 - [c215]Nilanjana Das, Anantaa Kotal, Daniel Roseberry, Anupam Joshi:
Change Management using Generative Modeling on Digital Twins. ISI 2023: 1-6 - [c214]Vijay S. Kumar, Varish Mulwad, Jenny Weisenberg Williams, Tim Finin, Sharad Dixit, Anupam Joshi:
Knowledge Graph-driven Tabular Data Discovery from Scientific Documents. VLDB Workshops 2023 - [i20]Varish Mulwad, Tim Finin, Vijay S. Kumar, Jenny Weisenberg Williams, Sharad Dixit, Anupam Joshi:
A Practical Entity Linking System for Tables in Scientific Literature. CoRR abs/2306.10044 (2023) - [i19]Aritran Piplai, Anantaa Kotal, Seyedreza Mohseni, Manas Gaur, Sudip Mittal, Anupam Joshi:
Knowledge-enhanced Neuro-Symbolic AI for Cybersecurity and Privacy. CoRR abs/2308.02031 (2023) - [i18]Nilanjana Das, Anantaa Kotal, Daniel Roseberry, Anupam Joshi:
Change Management using Generative Modeling on Digital Twins. CoRR abs/2309.12421 (2023) - [i17]Priyanka Ranade, Anupam Joshi:
FABULA: Intelligence Report Generation Using Retrieval-Augmented Narrative Construction. CoRR abs/2310.13848 (2023) - [i16]Anantaa Kotal, Lavanya Elluri, Deepti Gupta, Varun Mandalapu, Anupam Joshi:
Privacy-Preserving Data Sharing in Agriculture: Enforcing Policy Rules for Secure and Confidential Data Synthesis. CoRR abs/2311.15460 (2023) - 2022
- [j79]Priyanka Ranade, Sanorita Dey, Anupam Joshi, Tim Finin:
Computational Understanding of Narratives: A Survey. IEEE Access 10: 101575-101594 (2022) - [j78]Sandeep Nair Narayanan, Anupam Joshi, Ranjan Bose:
ABATe: Automatic Behavioral Abstraction Technique to Detect Anomalies in Smart Cyber-Physical Systems. IEEE Trans. Dependable Secur. Comput. 19(3): 1673-1686 (2022) - [c213]Anantaa Kotal, Aritran Piplai, Sai Sree Laya Chukkapalli, Anupam Joshi:
PriveTAB: Secure and Privacy-Preserving sharing of Tabular Data. IWSPA@CODASPY 2022: 35-45 - [c212]Aritran Piplai, Mike Anoruo, Kayode Fasaye, Anupam Joshi, Tim Finin, Ahmad Ridley:
Knowledge Guided Two-player Reinforcement Learning for Cyber Attacks and Defenses. ICMLA 2022: 1342-1349 - [e6]Anupam Joshi, Maribel Fernández, Rakesh M. Verma:
CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24 - 27, 2022. ACM 2022, ISBN 978-1-4503-9220-4 [contents] - [i15]Casey Hanks, Michael Maiden, Priyanka Ranade, Tim Finin, Anupam Joshi:
Recognizing and Extracting Cybersecurtity-relevant Entities from Text. CoRR abs/2208.01693 (2022) - [i14]Sai Sree Laya Chukkapalli, Anupam Joshi, Tim Finin, Robert F. Erbacher:
CAPD: A Context-Aware, Policy-Driven Framework for Secure and Resilient IoBT Operations. CoRR abs/2208.01703 (2022) - 2021
- [j77]Lavanya Elluri, Sai Sree Laya Chukkapalli, Karuna Pande Joshi, Tim Finin, Anupam Joshi:
A BERT Based Approach to Measure Web Services Policies Compliance With GDPR. IEEE Access 9: 148004-148016 (2021) - [j76]Lavanya Elluri, Aritran Piplai, Anantaa Kotal, Anupam Joshi, Karuna Pande Joshi:
A Policy-Driven Approach to Secure Extraction of COVID-19 Data From Research Papers. Frontiers Big Data 4: 701966 (2021) - [c211]Soham Dasgupta, Aritran Piplai, Priyanka Ranade, Anupam Joshi:
Cybersecurity Knowledge Graph Improvement with Graph Neural Networks. IEEE BigData 2021: 3290-3297 - [c210]Shaswata Mitra, Aritran Piplai, Sudip Mittal, Anupam Joshi:
Combating Fake Cyber Threat Intelligence using Provenance in Cybersecurity Knowledge Graphs. IEEE BigData 2021: 3316-3323 - [c209]Priyanka Ranade, Aritran Piplai, Anupam Joshi, Tim Finin:
CyBERT: Contextualized Embeddings for the Cybersecurity Domain. IEEE BigData 2021: 3334-3342 - [c208]Caitlin Moroney, Evan Crothers, Sudip Mittal, Anupam Joshi, Tülay Adali, Christine Mallinson, Nathalie Japkowicz, Zois Boukouvalas:
The Case for Latent Variable Vs Deep Learning Methods in Misinformation Detection: An Application to COVID-19. DS 2021: 422-432 - [c207]Priyanka Ranade, Aritran Piplai, Sudip Mittal, Anupam Joshi, Tim Finin:
Generating Fake Cyber Threat Intelligence Using Transformer-Based Models. IJCNN 2021: 1-9 - [c206]Sai Sree Laya Chukkapalli, Nisha Pillai, Sudip Mittal, Anupam Joshi:
Cyber-Physical System Security Surveillance using Knowledge Graph based Digital Twins - A Smart Farming Usecase. ISI 2021: 1-6 - [c205]Anantaa Kotal, Anupam Joshi, Karuna Pande Joshi:
The Effect of Text Ambiguity on creating Policy Knowledge Graphs. ISPA/BDCloud/SocialCom/SustainCom 2021: 1491-1500 - [c204]Sai Sree Laya Chukkapalli, Priyanka Ranade, Sudip Mittal, Anupam Joshi:
A Privacy Preserving Anomaly Detection Framework for Cooperative Smart Farming Ecosystem. TPS-ISA 2021: 340-347 - [e5]Anupam Joshi, Barbara Carminati, Rakesh M. Verma:
CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, Virtual Event, USA, April 26-28, 2021. ACM 2021, ISBN 978-1-4503-8143-7 [contents] - [i13]Priyanka Ranade, Aritran Piplai, Sudip Mittal, Anupam Joshi, Tim Finin:
Generating Fake Cyber Threat Intelligence Using Transformer-Based Models. CoRR abs/2102.04351 (2021) - 2020
- [j75]Sai Sree Laya Chukkapalli, Sudip Mittal, Maanak Gupta, Mahmoud Abdelsalam, Anupam Joshi, Ravi S. Sandhu, Karuna P. Joshi:
Ontologies and Artificial Intelligence Systems for the Cooperative Smart Farming Ecosystem. IEEE Access 8: 164045-164064 (2020) - [j74]Aritran Piplai, Sudip Mittal, Anupam Joshi, Tim Finin, James Holt, Richard Zak:
Creating Cybersecurity Knowledge Graphs From Malware After Action Reports. IEEE Access 8: 211691-211703 (2020) - [j73]Alejandra Diaz, Alan T. Sherman, Anupam Joshi:
Phishing in an academic community: A study of user susceptibility and behavior. Cryptologia 44(1): 53-67 (2020) - [j72]Kush Khanna, Bijaya Ketan Panigrahi, Anupam Joshi:
Priority-Based Protection Against the Malicious Data Injection Attacks on State Estimation. IEEE Syst. J. 14(2): 1945-1952 (2020) - [c203]Anantaa Kotal, Karuna Pande Joshi, Anupam Joshi:
ViCLOUD: Measuring Vagueness in Cloud Service Privacy Policies and Terms of Services. CLOUD 2020: 71-79 - [c202]Oyesh Mann Singh, Sandesh Timilsina, Bal Krishna Bal, Anupam Joshi:
Aspect Based Abusive Sentiment Detection in Nepali Social Media Texts. ASONAM 2020: 301-308 - [c201]Nitu Kedarmal Choudhary, Sai Sree Laya Chukkapalli, Sudip Mittal, Maanak Gupta, Mahmoud Abdelsalam, Anupam Joshi:
YieldPredict: A Crop Yield Prediction Framework for Smart Farms. IEEE BigData 2020: 2340-2349 - [c200]Soham Dasgupta, Aritran Piplai, Anantaa Kotal, Anupam Joshi:
A Comparative Study of Deep Learning based Named Entity Recognition Algorithms for Cybersecurity. IEEE BigData 2020: 2596-2604 - [c199]Aritran Piplai, Priyanka Ranade, Anantaa Kotal, Sudip Mittal, Sandeep Nair Narayanan, Anupam Joshi:
Using Knowledge Graphs and Reinforcement Learning for Malware Analysis. IEEE BigData 2020: 2626-2633 - [c198]Sai Sree Laya Chukkapalli, Aritran Piplai, Sudip Mittal, Maanak Gupta, Anupam Joshi:
A Smart-Farming Ontology for Attribute Based Access Control. BigDataSecurity/HPSC/IDS 2020: 29-34 - [c197]Sofia Dutta, Sai Sree Laya Chukkapalli, Madhura Sulgekar, Swathi Krithivasan, Prajit Kumar Das, Anupam Joshi:
Context Sensitive Access Control in Smart Home Environments. BigDataSecurity/HPSC/IDS 2020: 35-41 - [c196]Aritran Piplai, Sai Sree Laya Chukkapalli, Anupam Joshi:
NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion. BigDataSecurity/HPSC/IDS 2020: 49-54 - [c195]Sina Sontowski, Maanak Gupta, Sai Sree Laya Chukkapalli, Mahmoud Abdelsalam, Sudip Mittal, Anupam Joshi, Ravi S. Sandhu:
Cyber Attacks on Smart Farming Infrastructure. CIC 2020: 135-143 - [c194]Aritran Piplai, Sudip Mittal, Mahmoud Abdelsalam, Maanak Gupta, Anupam Joshi, Tim Finin:
Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior. ISI 2020: 1-6 - [i12]Aritran Piplai, Sai Sree Laya Chukkapalli, Anupam Joshi:
NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion. CoRR abs/2002.08527 (2020) - [i11]Zois Boukouvalas, Christine Mallinson, Evan Crothers, Nathalie Japkowicz, Aritran Piplai, Sudip Mittal, Anupam Joshi, Tülay Adali:
Independent Component Analysis for Trustworthy Cyberspace during High Impact Events: An Application to Covid-19. CoRR abs/2006.01284 (2020)
2010 – 2019
- 2019
- [j71]Khyati Chopra, Ranjan Bose, Anupam Joshi:
Stackelberg game for price and power control in secure cooperative relay network. IET Cyper-Phys. Syst.: Theory & Appl. 4(1): 58-67 (2019) - [j70]Sandeep Kumar Singh, Ranjan Bose, Anupam Joshi:
Energy theft detection for AMI using principal component analysis based reconstructed data. IET Cyper-Phys. Syst.: Theory & Appl. 4(2): 179-185 (2019) - [c193]Aditya Pingle, Aritran Piplai, Sudip Mittal, Anupam Joshi, James Holt, Richard Zak:
RelExt: relation extraction using deep learning approaches for cybersecurity knowledge graph improvement. ASONAM 2019: 879-886 - [c192]Sowmya Ramapatruni, Sandeep Nair Narayanan, Sudip Mittal, Anupam Joshi, Karuna P. Joshi:
Anomaly Detection Models for Smart Home Security. BigDataSecurity/HPSC/IDS 2019: 19-24 - [c191]Oyesh Mann Singh, Ankur Padia, Anupam Joshi:
Named Entity Recognition for Nepali Language. CIC 2019: 184-190 - [c190]Nitika Khurana, Sudip Mittal, Aritran Piplai, Anupam Joshi:
Preventing Poisoning Attacks On AI Based Threat Intelligence Systems. MLSP 2019: 1-6 - [i10]Aditya Pingle, Aritran Piplai, Sudip Mittal, Anupam Joshi, James Holt, Richard Zak:
RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement. CoRR abs/1905.02497 (2019) - [i9]Sudip Mittal, Anupam Joshi, Tim Finin:
Cyber-All-Intel: An AI for Security related Threat Intelligence. CoRR abs/1905.02895 (2019) - [i8]Oyesh Mann Singh, Ankur Padia, Anupam Joshi:
Named Entity Recognition for Nepali Language. CoRR abs/1908.05828 (2019) - 2018
- [j69]Khyati Chopra, Ranjan Bose, Anupam Joshi:
Secrecy outage of threshold-based cooperative relay network with and without direct links. EURASIP J. Inf. Secur. 2018: 7 (2018) - [j68]Sandeep Kumar Singh, Ranjan Bose, Anupam Joshi:
Entropy-based electricity theft detection in AMI network. IET Cyper-Phys. Syst.: Theory & Appl. 3(2): 99-105 (2018) - [j67]Khyati Chopra, Ranjan Bose, Anupam Joshi:
Secrecy performance of threshold-based cognitive relay network with diversity combining. J. Commun. Networks 20(4): 383-395 (2018) - [j66]Sandeep Kumar Singh, Kush Khanna, Ranjan Bose, Bijaya Ketan Panigrahi, Anupam Joshi:
Joint-Transformation-Based Detection of False Data Injection Attacks in Smart Grid. IEEE Trans. Ind. Informatics 14(1): 89-97 (2018) - [c189]Sandeep Nair Narayanan, Ashwinkumar Ganesan, Karuna P. Joshi, Tim Oates, Anupam Joshi, Tim Finin:
Early Detection of Cybersecurity Threats Using Collaborative Cognition. CIC 2018: 354-363 - [c188]Vishal Rathod, Sandeep Nair Narayanan, Sudip Mittal, Anupam Joshi:
Semantically Rich, Context Aware Access Control for Openstack. CIC 2018: 460-465 - [c187]Lorenzo Neil, Sudip Mittal, Anupam Joshi:
Mining Threat Intelligence about Open-Source Projects and Libraries from Code Repository Issues and Bug Reports. ISI 2018: 7-12 - [c186]Arya Renjan, Karuna Pande Joshi, Sandeep Nair Narayanan, Anupam Joshi:
DAbR: Dynamic Attribute-based Reputation scoring for Malicious IP Address Detection. ISI 2018: 64-69 - [c185]Priyanka Ranade, Sudip Mittal, Anupam Joshi, Karuna Pande Joshi:
Using Deep Neural Networks to Translate Multi-lingual Threat Intelligence. ISI 2018: 238-243 - [c184]Ankur Padia, Arpita Roy, Taneeya Satyapanich, Francis Ferraro, Shimei Pan, Youngja Park, Anupam Joshi, Tim Finin:
UMBC at SemEval-2018 Task 8: Understanding Text about Malware. SemEval@NAACL-HLT 2018: 878-884 - [c183]Sandeep Kumar Singh, Ranjan Bose, Anupam Joshi:
Energy theft detection in advanced metering infrastructure. WF-IoT 2018: 529-534 - [i7]Nitika Khurana, Sudip Mittal, Anupam Joshi:
Preventing Poisoning Attacks on AI based Threat Intelligence Systems. CoRR abs/1807.07418 (2018) - [i6]Priyanka Ranade, Sudip Mittal, Anupam Joshi, Karuna P. Joshi:
Using Deep Neural Networks to Translate Multi-lingual Threat Intelligence. CoRR abs/1807.07517 (2018) - [i5]Sandeep Nair Narayanan, Ashwinkumar Ganesan, Karuna P. Joshi, Tim Oates, Anupam Joshi, Tim Finin:
Cognitive Techniques for Early Detection of Cybersecurity Events. CoRR abs/1808.00116 (2018) - [i4]Lorenzo Neil, Sudip Mittal, Anupam Joshi:
Mining Threat Intelligence about Open-Source Projects and Libraries from Code Repository Issues and Bug Reports. CoRR abs/1808.04673 (2018) - [i3]Alejandra Diaz, Alan T. Sherman, Anupam Joshi:
Phishing in an Academic Community: A Study of User Susceptibility and Behavior. CoRR abs/1811.06078 (2018) - 2017
- [j65]Khyati Chopra, Ranjan Bose, Anupam Joshi:
Secrecy performance of threshold-based decode-and-forward cooperative cognitive radio network. IET Commun. 11(9): 1396-1406 (2017) - [c182]Sudip Mittal, Aditi Gupta, Karuna P. Joshi, Claudia Pearce, Anupam Joshi:
A Question and Answering System for Management of Cloud Service Level Agreements. CLOUD 2017: 684-687 - [c181]Prajit Kumar Das, Anupam Joshi, Tim Finin:
Personalizing Context-Aware Access Control on Mobile Platforms. CIC 2017: 107-116 - [c180]Prajit Kumar Das, Anupam Joshi, Tim Finin:
App behavioral analysis using system calls. INFOCOM Workshops 2017: 487-492 - [c179]Khyati Chopra, Ranjan Bose, Anupam Joshi:
Secrecy outage of cooperative relay network with and without eavesdropper's direct link. NCC 2017: 1-6 - [i2]Sudip Mittal, Anupam Joshi, Tim Finin:
Thinking, Fast and Slow: Combining Vector Spaces and Knowledge Graphs. CoRR abs/1708.03310 (2017) - 2016
- [j64]Randy Schauer, Anupam Joshi:
Distributed system configuration management using Markov logic networks. Int. J. Auton. Comput. 2(2): 137-154 (2016) - [j63]Paridhi Jain, Ponnurangam Kumaraguru, Anupam Joshi:
Other times, other values: leveraging attribute history to link user profiles across online social networks. Soc. Netw. Anal. Min. 6(1): 85:1-85:16 (2016) - [c178]Aditi Gupta, Sudip Mittal, Karuna P. Joshi, Claudia Pearce, Anupam Joshi:
Streamlining Management of Multiple Cloud Services. CLOUD 2016: 481-488 - [c177]Zareen Syed, Ankur Padia, Tim Finin, M. Lisa Mathews, Anupam Joshi:
UCO: A Unified Cybersecurity Ontology. AAAI Workshop: Artificial Intelligence for Cyber Security 2016 - [c176]Karuna P. Joshi, Aditi Gupta, Sudip Mittal, Claudia Pearce, Anupam Joshi, Tim Finin:
ALDA: Cognitive Assistant for Legal Document Analytics. AAAI Fall Symposia 2016 - [c175]Sudip Mittal, Prajit Kumar Das, Varish Mulwad, Anupam Joshi, Tim Finin:
CyberTwitter: Using Twitter to generate alerts for cybersecurity threats and vulnerabilities. ASONAM 2016: 860-867 - [c174]Karuna P. Joshi, Aditi Gupta, Sudip Mittal, Claudia Pearce, Anupam Joshi, Tim Finin:
Semantic approach to automating management of big data privacy policies. IEEE BigData 2016: 482-491 - [c173]Prajit Kumar Das, Anupam Joshi, Tim Finin:
Capturing Policies for Fine-Grained Access Control on Mobile Devices. CIC 2016: 54-63 - [c172]Sudip Mittal, Karuna P. Joshi, Claudia Pearce, Anupam Joshi:
Automatic Extraction of Metrics from SLAs for Cloud Service Management. IC2E 2016: 139-142 - [c171]M. Lisa Mathews, Anupam Joshi, Tim Finin:
Detecting Botnets using a Collaborative Situational-aware IDPS. ICISSP 2016: 290-298 - [c170]Bhavani Thuraisingham, Murat Kantarcioglu, Kevin W. Hamlen, Latifur Khan, Tim Finin, Anupam Joshi, Tim Oates, Elisa Bertino:
A Data Driven Approach for the Science of Cyber Security: Challenges and Directions. IRI 2016: 1-10 - [c169]Piyush Nimbalkar, Varish Mulwad, Nikhil Puranik, Anupam Joshi, Tim Finin:
Semantic Interpretation of Structured Log Files. IRI 2016: 549-555 - [c168]Kush Khanna, Bijaya Ketan Panigrahi, Anupam Joshi:
Bid Modification Attack in Smart Grid for Monetary Benefits. iNIS 2016: 224-229 - [c167]Sandeep Nair Narayanan, Sudip Mittal, Anupam Joshi:
Using semantic technologies to mine vehicular context for security. Sarnoff Symposium 2016: 124-129 - [c166]Clare Grasso, Anupam Joshi, Eliot L. Siegel:
Visualization of Pain Severity Events in Clinical Records Using Semantic Structures. ICSC 2016: 321-324 - [c165]Nitin Kumar Sharma, Anupam Joshi:
Representing Attribute Based Access Control Policies in OWL. ICSC 2016: 333-336 - [c164]Prajit Kumar Das, Abhay L. Kashyap, Gurpreet Singh, Cynthia Matuszek, Tim Finin, Anupam Joshi:
Semantic Knowledge and Privacy in the Physical Web. PrivOn@ISWC 2016 - [c163]Prajit Kumar Das, Sandeep Nair Narayanan, Nitin Kumar Sharma, Anupam Joshi, Karuna Pande Joshi, Tim Finin:
Context-Sensitive Policy Based Security in Internet of Things. SMARTCOMP 2016: 1-6 - [c162]Sandeep Nair Narayanan, Sudip Mittal, Anupam Joshi:
OBD_SecureAlert: An Anomaly Detection System for Vehicles. SMARTCOMP 2016: 1-6 - 2015
- [j62]Jennifer Sleeman, Tim Finin, Anupam Joshi:
Entity Type Recognition for Heterogeneous Semantic Graphs. AI Mag. 36(1): 75-86 (2015) - [j61]Rosa Laura Zavala Gutierrez, Pradeep K. Murukannaiah, Nithyananthan Poosamani, Tim Finin, Anupam Joshi, Injong Rhee, Munindar P. Singh:
Platys: From Position to Place-Oriented Mobile Computing. AI Mag. 36(2): 50-62 (2015) - [c161]Sudip Mittal, Karuna P. Joshi, Claudia Pearce, Anupam Joshi:
Parallelizing natural language techniques for knowledge extraction from cloud service level agreements. IEEE BigData 2015: 2831-2833 - [c160]Paridhi Jain, Ponnurangam Kumaraguru, Anupam Joshi:
Other Times, Other Values: Leveraging Attribute History to Link User Profiles across Online Social Networks. HT 2015: 247-255 - [c159]Clare Grasso, Anupam Joshi, Eliot L. Siegel:
Beyond NER: Towards Semantics in Clinical Text. BDM2I@ISWC 2015 - [c158]Primal Pappachan, Roberto Yus, Prajit Kumar Das, Sharad Mehrotra, Tim Finin, Anupam Joshi:
Building a Mobile Applications Knowledge Base for the Linked Data Cloud. MoDeST@ISWC 2015: 14-25 - [c157]Primal Pappachan, Roberto Yus, Prajit Kumar Das, Sharad Mehrotra, Tim Finin, Anupam Joshi:
Mobipedia: Mobile Applications Linked Data. ISWC (Posters & Demos) 2015 - [c156]Jennifer Sleeman, Tim Finin, Anupam Joshi:
Topic Modeling for RDF Graphs. LD4IE@ISWC 2015: 48-62 - [c155]Lushan Han, Tim Finin, Anupam Joshi, Doreen Cheng:
Querying RDF data with text annotated graphs. SSDBM 2015: 27:1-27:12 - [c154]Wenjia Li, Anupam Joshi, Tim Finin:
SVM-CASE: An SVM-Based Context Aware Security Framework for Vehicular Ad-Hoc Networks. VTC Fall 2015: 1-5 - [i1]Sandeep Nair Narayanan, Sudip Mittal, Anupam Joshi:
Using Data Analytics to Detect Anomalous States in Vehicles. CoRR abs/1512.08048 (2015) - 2014
- [j60]Aniket Bochare, Aryya Gangopadhyay, Yelena Yesha, Anupam Joshi, Yaacov Yesha, Mary Brady, Michael A. Grasso, Naphtali Rishe:
Integrating domain knowledge in supervised machine learning to assess the risk of breast cancer. Int. J. Medical Eng. Informatics 6(2): 87-99 (2014) - [c153]Clare Grasso, Anupam Joshi:
Longitudinal Tracking of Pain Phenotypes in Electronic Health Records Using an SVM. AMIA 2014 - [c152]Primal Pappachan, Roberto Yus, Anupam Joshi, Tim Finin:
Rafiki: A semantic and collaborative approach to community health-care in underserved areas. CollaborateCom 2014: 322-331 - [c151]Varish Mulwad, Tim Finin, Anupam Joshi:
Interpreting medical tables as linked data for generating meta-analysis reports. IRI 2014: 677-686 - [c150]