![](https://dblp.org/img/logo.320x120.png)
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
V. S. Subrahmanian
Venkatramanan Siva Subrahmanian
Person information
- affiliation: Dartmouth College, Institute for Security, Technology, and Society, Hanover, NH, USA
- affiliation: University of Maryland, Institute for Advanced Computer Studies, College Park, MD, USA
- affiliation (PhD 1989): Syracuse University, NY, USA
Refine list
![note](https://dblp.org/img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j172]Youzhi Zhang
, Sayak Chakrabarty, Rui Liu, Andrea Pugliese
, V. S. Subrahmanian
:
SockDef: A Dynamically Adaptive Defense to a Novel Attack on Review Fraud Detection Engines. IEEE Trans. Comput. Soc. Syst. 11(4): 5253-5265 (2024) - [j171]Tonmoay Deb, Mingi Jeong
, Cristian Molinaro
, Andrea Pugliese
, Alberto Quattrini Li
, Eugene Santos
, V. S. Subrahmanian
, Youzhi Zhang
:
Declarative Logic-Based Pareto-Optimal Agent Decision Making. IEEE Trans. Cybern. 54(12): 7147-7162 (2024) - [j170]Youzhi Zhang
, Dongkai Chen
, Sushil Jajodia
, Andrea Pugliese
, V. S. Subrahmanian
, Yanhai Xiong
:
GAIT: A Game-Theoretic Defense Against Intellectual Property Theft. IEEE Trans. Dependable Secur. Comput. 21(4): 1967-1980 (2024) - [j169]Chongyang Gao
, Sushil Jajodia
, Andrea Pugliese
, V. S. Subrahmanian
:
${\sf FakeDB}$FakeDB: Generating Fake Synthetic Databases. IEEE Trans. Dependable Secur. Comput. 21(6): 5553-5564 (2024) - [j168]Natalia Denisenko
, Youzhi Zhang
, Chiara Pulice
, Shohini Bhattasali
, Sushil Jajodia
, Philip Resnik
, V. S. Subrahmanian
:
A Psycholinguistics-inspired Method to Counter IP Theft Using Fake Documents. ACM Trans. Manag. Inf. Syst. 15(2): 7 (2024) - [c184]Pier Paolo Tricomi, Saurabh Kumar
, Mauro Conti, V. S. Subrahmanian:
Climbing the Influence Tiers on TikTok: A Multimodal Study. ICWSM 2024: 1503-1516 - [c183]Chongyang Gao, Yiren Jian, Natalia Denisenko, Soroush Vosoughi, V. S. Subrahmanian:
GEM: Generating Engaging Multimodal Content. IJCAI 2024: 7654-7662 - [c182]Maksim Bolonkin, Sayak Chakrabarty, Cristian Molinaro, V. S. Subrahmanian:
Judicial Support Tool: Finding the k Most Likely Judicial Worlds. SUM 2024: 53-69 - [i20]Chongyang Gao, Kezhen Chen, Jinmeng Rao, Baochen Sun, Ruibo Liu, Daiyi Peng, Yawen Zhang, Xiaoyuan Guo, Jie Yang, V. S. Subrahmanian:
Higher Layers Need More LoRA Experts. CoRR abs/2402.08562 (2024) - 2023
- [j167]Youdinghuan Chen, Chongyang Gao
, Daveed Gartenstein-Ross
, Kevin T. Greene, Karin Kalif, Sarit Kraus, Francesco Parisi
, Chiara Pulice
, Anja Subasic, V. S. Subrahmanian
:
Linking Terrorist Network Structure to Lethality: Algorithms and Analysis of Al Qaeda and ISIS. IEEE Trans. Comput. Soc. Syst. 10(5): 2814-2826 (2023) - [j166]Giovanni Apruzzese
, V. S. Subrahmanian
:
Mitigating Adversarial Gray-Box Attacks Against Phishing Detectors. IEEE Trans. Dependable Secur. Comput. 20(5): 3753-3769 (2023) - [j165]Chongyang Bai
, Haipeng Chen
, Srijan Kumar, Jure Leskovec
, V. S. Subrahmanian
:
M2P2: Multimodal Persuasion Prediction Using Adaptive Fusion. IEEE Trans. Multim. 25: 942-952 (2023) - [j164]Chongyang Bai
, Maksim Bolonkin
, Viney Regunath
, V. S. Subrahmanian
:
DIPS: A Dyadic Impression Prediction System for Group Interaction Videos. ACM Trans. Multim. Comput. Commun. Appl. 19(1s): 43:1-43:24 (2023) - [j163]Luca Pajola
, Dongkai Chen
, Mauro Conti
, V. S. Subrahmanian
:
A Novel Review Helpfulness Measure Based on the User-Review-Item Paradigm. ACM Trans. Web 17(4): 27:1-27:31 (2023) - [c181]Tonmoay Deb, Jürgen Dix, Mingi Jeong, Cristian Molinaro, Andrea Pugliese, Alberto Quattrini Li, Eugene Santos Jr., V. S. Subrahmanian, Shanchieh Yang, Youzhi Zhang:
DUCK: A Drone-Urban Cyber-Defense Framework Based on Pareto-Optimal Deontic Logic Agents. AAAI 2023: 16425-16427 - [c180]Youzhi Zhang, Bo An, V. S. Subrahmanian:
Finding Optimal Nash Equilibria in Multiplayer Games via Correlation Plans. AAMAS 2023: 2712-2714 - [c179]Youzhi Zhang, Bo An, Venkatramanan Siva Subrahmanian:
Computing Optimal Nash Equilibria in Multiplayer Games. NeurIPS 2023 - 2022
- [j162]Yanhai Xiong
, Giridhar Ramachandran, Rajesh Ganesan
, Sushil Jajodia
, V. S. Subrahmanian
:
Generating Realistic Fake Equations in Order to Reduce Intellectual Property Theft. IEEE Trans. Dependable Secur. Comput. 19(3): 1434-1445 (2022) - [j161]Qian Han
, Cristian Molinaro, Antonio Picariello, Giancarlo Sperlì
, V. S. Subrahmanian, Yanhai Xiong
:
Generating Fake Documents Using Probabilistic Logic Graphs. IEEE Trans. Dependable Secur. Comput. 19(4): 2428-2441 (2022) - [j160]Haipeng Chen
, Andrew Duncklee, Sushil Jajodia
, Rui Liu, Sean R. McNamara, V. S. Subrahmanian:
PCAM: A Data-driven Probabilistic Cyber-alert Management Framework. ACM Trans. Internet Techn. 22(3): 67:1-67:24 (2022) - [c178]Youzhi Zhang, Sayak Chakrabarty, Rui Liu, Andrea Pugliese, V. S. Subrahmanian:
A New Dynamically Changing Attack on Review Fraud Systems and a Dynamically Changing Ensemble Defense. DASC/PiCom/CBDCom/CyberSciTech 2022: 1-7 - [c177]Chongyang Bai
, Maksim Bolonkin
, Viney Regunath
, V. S. Subrahmanian
:
POLLY: A Multimodal Cross-Cultural Context-Sensitive Framework to Predict Political Lying from Videos. ICMI 2022: 520-530 - [c176]Youzhi Zhang, Bo An, V. S. Subrahmanian:
Correlation-Based Algorithm for Team-Maxmin Equilibrium in Multiplayer Extensive-Form Games. IJCAI 2022: 606-612 - [i19]Giovanni Apruzzese, V. S. Subrahmanian:
Mitigating Adversarial Gray-Box Attacks Against Phishing Detectors. CoRR abs/2212.05380 (2022) - 2021
- [b8]V. S. Subrahmanian, Chiara Pulice, James F. Brown, Jacob Bonen-Clark:
A Machine Learning Based Model of Boko Haram. Springer 2021, ISBN 978-3-030-60613-8, pp. 1-116 - [j159]Cristian Molinaro, Chiara Pulice, Anja Subasic, Abigail Bartolome, V. S. Subrahmanian:
STAR: Summarizing Timed Association Rules. Trans. Data Sci. 2(1): 6:1-6:36 (2021) - [j158]Tanmoy Chakraborty
, Sushil Jajodia
, Jonathan Katz, Antonio Picariello, Giancarlo Sperlì
, V. S. Subrahmanian
:
A Fake Online Repository Generation Engine for Cyber Deception. IEEE Trans. Dependable Secur. Comput. 18(2): 518-533 (2021) - [j157]Chongyang Bai
, Qian Han
, Ghita Mezzour
, Fabio Pierazzi
, V. S. Subrahmanian
:
$\sf {DBank}$DBank: Predictive Behavioral Analysis of Recent Android Banking Trojans. IEEE Trans. Dependable Secur. Comput. 18(3): 1378-1393 (2021) - [j156]Almas Abdibayev, Dongkai Chen
, Haipeng Chen
, Deepti Poluru, V. S. Subrahmanian:
Using Word Embeddings to Deter Intellectual Property Theft through Automated Generation of Fake Documents. ACM Trans. Manag. Inf. Syst. 12(2): 13:1-13:22 (2021) - [c175]Snow Kang, Cristian Molinaro, Andrea Pugliese, V. S. Subrahmanian:
Randomized Generation of Adversary-aware Fake Knowledge Graphs to Combat Intellectual Property Theft. AAAI 2021: 4155-4163 - [c174]Srijan Kumar, Chongyang Bai, V. S. Subrahmanian, Jure Leskovec:
Deception Detection in Group Video Conversations using Dynamic Interaction Networks. ICWSM 2021: 339-350 - [c173]V. S. Subrahmanian:
VEST: An Early Warning System for Future Cyber-Attacks. SECRYPT 2021: 7 - [i18]Srijan Kumar, Chongyang Bai, V. S. Subrahmanian, Jure Leskovec:
Deception Detection in Group Video Conversations using Dynamic Interaction Networks. CoRR abs/2106.06163 (2021) - 2020
- [j155]Noseong Park, Andrea Pugliese, Edoardo Serra
, V. S. Subrahmanian:
Top-k user-specified preferred answers in massive graph databases. Data Knowl. Eng. 127: 101798 (2020) - [j154]V. S. Subrahmanian:
The Future of AI: AI's 10 To Watch. IEEE Intell. Syst. 35(6): 3-6 (2020) - [j153]Haipeng Chen
, Qian Han
, Sushil Jajodia
, Roy Lindelauf
, V. S. Subrahmanian
, Yanhai Xiong
:
Disclose or Exploit? A Game-Theoretic Approach to Strategic Decision Making in Cyber-Warfare. IEEE Syst. J. 14(3): 3779-3790 (2020) - [j152]Haipeng Chen
, Mohammad Taghi Hajiaghayi, Sarit Kraus, Anshul Sawant, Edoardo Serra
, V. S. Subrahmanian
, Yanhai Xiong
:
PIE: A Data-Driven Payoff Inference Engine for Strategic Security Applications. IEEE Trans. Comput. Soc. Syst. 7(1): 42-57 (2020) - [j151]Daniele Bellutta
, Youdinghuan Chen, Daveed Gartenstein-Ross
, Chiara Pulice
, Anja Subasic, V. S. Subrahmanian
:
Understanding Shifting Triadic Relationships in the Al-Qaeda/ISIS Faction Ecosystem. IEEE Trans. Comput. Soc. Syst. 7(6): 1423-1434 (2020) - [j150]Tanmoy Chakraborty, Noseong Park, Ayush Agarwal, V. S. Subrahmanian:
Ensemble Detection and Analysis of Communities in Complex Networks. Trans. Data Sci. 1(1): 2:1-2:34 (2020) - [j149]Tanmoy Chakraborty
, Fabio Pierazzi
, V. S. Subrahmanian:
EC2: Ensemble Clustering and Classification for Predicting Android Malware Families. IEEE Trans. Dependable Secur. Comput. 17(2): 262-277 (2020) - [j148]Qian Han
, V. S. Subrahmanian
, Yanhai Xiong
:
Android Malware Detection via (Somewhat) Robust Irreversible Feature Transformations. IEEE Trans. Inf. Forensics Secur. 15: 3511-3525 (2020) - [j147]Rui Liu, Runze Liu, Andrea Pugliese
, V. S. Subrahmanian:
STARS: Defending against Sockpuppet-Based Targeted Attacks on Reviewing Systems. ACM Trans. Intell. Syst. Technol. 11(5): 56:1-56:25 (2020) - [j146]Fabio Pierazzi
, Ghita Mezzour, Qian Han
, Michele Colajanni, V. S. Subrahmanian:
A Data-driven Characterization of Modern Android Spyware. ACM Trans. Manag. Inf. Syst. 11(1): 4:1-4:38 (2020) - [e12]Sushil Jajodia
, George Cybenko, V. S. Subrahmanian, Vipin Swarup, Cliff Wang, Michael P. Wellman
:
Adaptive Autonomous Secure Cyber Systems. Springer 2020, ISBN 978-3-030-33431-4 [contents] - [i17]Subhra Mazumdar, Arindam Pal, Francesco Parisi, V. S. Subrahmanian:
BB_Evac: Fast Location-Sensitive Behavior-Based Building Evacuation. CoRR abs/2002.08114 (2020) - [i16]Chongyang Bai, Haipeng Chen, Srijan Kumar, Jure Leskovec, V. S. Subrahmanian:
M2P2: Multimodal Persuasion Prediction using Adaptive Fusion. CoRR abs/2006.11405 (2020)
2010 – 2019
- 2019
- [j145]Sachin Grover
, Chiara Pulice
, Gerardo I. Simari
, V. S. Subrahmanian
:
BEEF: Balanced English Explanations of Forecasts. IEEE Trans. Comput. Soc. Syst. 6(2): 350-364 (2019) - [c172]Chongyang Bai, Thomas White, Linda Xiao, V. S. Subrahmanian, Ziheng Zhou:
C2P2: A Collective Cryptocurrency Up/Down Price Prediction Engine. Blockchain 2019: 425-430 - [c171]Lezi Wang, Chongyang Bai, Maksim Bolonkin, Judee K. Burgoon, Norah E. Dunbar, V. S. Subrahmanian, Dimitris N. Metaxas:
Attention-based Facial Behavior Analytics inSocial Communication. BMVC 2019: 271 - [c170]V. S. Subrahmanian:
Logic, Machine Learning, and Security. FQAS 2019: 3-6 - [c169]Haipeng Chen
, Jing Liu, Rui Liu, Noseong Park, V. S. Subrahmanian:
VASE: A Twitter-Based Vulnerability Analysis and Score Engine. ICDM 2019: 976-981 - [c168]Chongyang Bai, Maksim Bolonkin, Judee K. Burgoon, Chao Chen, Norah E. Dunbar, Bharat Singh, V. S. Subrahmanian, Zhe Wu:
Automatic Long-Term Deception Detection in Group Interaction Videos. ICME 2019: 1600-1605 - [c167]Haipeng Chen
, Sushil Jajodia, Jing Liu, Noseong Park, Vadim Sokolov, V. S. Subrahmanian:
FakeTables: Using GANs to Generate Functional Dependency Preserving Tables with Bounded Real Data. IJCAI 2019: 2074-2080 - [c166]Chongyang Bai, Srijan Kumar
, Jure Leskovec, Miriam J. Metzger, Jay F. Nunamaker Jr., V. S. Subrahmanian:
Predicting the Visual Focus of Attention in Multi-Person Discussion Videos. IJCAI 2019: 4504-4510 - [c165]Chongyang Bai, Maksim Bolonkin, Srijan Kumar
, Jure Leskovec, Judee K. Burgoon, Norah E. Dunbar, V. S. Subrahmanian:
Predicting dominance in multi-person videos. IJCAI 2019: 4643-4650 - [c164]Haipeng Chen
, Jing Liu, Rui Liu, Noseong Park, V. S. Subrahmanian:
VEST: A System for Vulnerability Exploit Scoring & Timing. IJCAI 2019: 6503-6505 - [c163]Haipeng Chen
, Rui Liu, Noseong Park, V. S. Subrahmanian:
Using Twitter to Predict When Vulnerabilities will be Exploited. KDD 2019: 3143-3152 - [i15]Chongyang Bai, Maksim Bolonkin, Judee K. Burgoon, Chao Chen, Norah E. Dunbar, Bharat Singh, V. S. Subrahmanian, Zhe Wu:
Automatic Long-Term Deception Detection in Group Interaction Videos. CoRR abs/1905.08617 (2019) - [i14]Chongyang Bai, Tommy White, Linda Xiao, V. S. Subrahmanian, Ziheng Zhou:
C2P2: A Collective Cryptocurrency Up/Down Price Prediction Engine. CoRR abs/1906.00564 (2019) - 2018
- [j144]Tanmoy Chakraborty
, Sushil Jajodia
, Noseong Park, Andrea Pugliese, Edoardo Serra
, V. S. Subrahmanian:
Hybrid adversarial defense: Merging honeypots and traditional security methods. J. Comput. Secur. 26(5): 615-645 (2018) - [j143]Eric Lancaster, Tanmoy Chakraborty
, V. S. Subrahmanian:
MALTP: Parallel Prediction of Malicious Tweets. IEEE Trans. Comput. Soc. Syst. 5(4): 1096-1108 (2018) - [j142]Sushil Jajodia
, Noseong Park, Edoardo Serra
, V. S. Subrahmanian:
SHARE: A Stackelberg Honey-Based Adversarial Reasoning Engine. ACM Trans. Internet Techn. 18(3): 30:1-30:41 (2018) - [j141]Francesco Parisi, Noseong Park, Andrea Pugliese, V. S. Subrahmanian:
Top-k User-Defined Vertex Scoring Queries in Edge-Labeled Graph Databases. ACM Trans. Web 12(4): 21:1-21:35 (2018) - [c162]Zhe Wu, Bharat Singh, Larry S. Davis, V. S. Subrahmanian:
Deception Detection in Videos. AAAI 2018: 1695-1702 - [c161]Shang Li, Srijan Kumar, Tudor Dumitras, V. S. Subrahmanian:
Breaking Bad: Forecasting Adversarial Android Bad Behavior. From Database to Cyber Security 2018: 405-431 - [c160]Vadim Kagan, V. S. Subrahmanian:
Understanding Multi-Stage, Multi-Modal, Multimedia Events in Social Media. SocialSens@IoTDI 2018: 4 - [c159]V. S. Subrahmanian:
ParSocial 2018 Keynote. IPDPS Workshops 2018: 1142 - [c158]Srijan Kumar
, Bryan Hooi, Disha Makhija, Mohit Kumar, Christos Faloutsos, V. S. Subrahmanian:
REV2: Fraudulent User Prediction in Rating Platforms. WSDM 2018: 333-341 - [r10]V. S. Subrahmanian:
Probabilistic Temporal Databases. Encyclopedia of Database Systems (2nd ed.) 2018 - [r9]V. S. Subrahmanian, Maria Vanina Martinez, Diego Reforgiato Recupero:
Multimedia Presentation Databases. Encyclopedia of Database Systems (2nd ed.) 2018 - [r8]Matthias Brücheler, Andrea Pugliese, V. S. Subrahmanian:
Scaling Subgraph Matching Queries in Huge Networks. Encyclopedia of Social Network Analysis and Mining. 2nd Ed. 2018 - 2017
- [j140]V. S. Subrahmanian:
The Golden Age of AI. IEEE Intell. Syst. 32(1): 3-4 (2017) - [j139]Sushil Jajodia
, Noseong Park, Fabio Pierazzi
, Andrea Pugliese
, Edoardo Serra
, Gerardo I. Simari, V. S. Subrahmanian:
A Probabilistic Logic of Cyber Deception. IEEE Trans. Inf. Forensics Secur. 12(11): 2532-2544 (2017) - [j138]Michael Ovelgönne, Tudor Dumitras, B. Aditya Prakash, V. S. Subrahmanian, Benjamin Wang:
Understanding the Relationship between Human Behavior and Susceptibility to Cyber Attacks: A Data-Driven Approach. ACM Trans. Intell. Syst. Technol. 8(4): 51:1-51:25 (2017) - [j137]Bo An, Haipeng Chen
, Noseong Park, V. S. Subrahmanian:
Data-Driven Frequency-Based Airline Profit Maximization. ACM Trans. Intell. Syst. Technol. 8(4): 61:1-61:28 (2017) - [c157]Tanmoy Chakraborty
, Des Chandhok, V. S. Subrahmanian:
MC3: A Multi-class Consensus Classification Framework. PAKDD (1) 2017: 343-355 - [c156]Srijan Kumar, Justin Cheng, Jure Leskovec, V. S. Subrahmanian:
An Army of Me: Sockpuppets in Online Discussion Communities. WWW 2017: 857-866 - [p10]Massimiliano Albanese
, Nancy J. Cooke, González Coty, David Hall, Christopher G. Healey, Sushil Jajodia
, Peng Liu, Michael D. McNeese, Peng Ning, Douglas S. Reeves, V. S. Subrahmanian, Cliff Wang, John Yen:
Computer-Aided Human Centric Cyber Situation Awareness. Theory and Models for Cyber Situation Awareness 2017: 3-25 - [i13]Srijan Kumar, Justin Cheng, Jure Leskovec, V. S. Subrahmanian:
An Army of Me: Sockpuppets in Online Discussion Communities. CoRR abs/1703.07355 (2017) - [i12]Srijan Kumar, Bryan Hooi, Disha Makhija, Mohit Kumar, Christos Faloutsos, V. S. Subrahmanian:
FairJudge: Trustworthy User Prediction in Rating Platforms. CoRR abs/1703.10545 (2017) - [i11]Zhe Wu, Bharat Singh, Larry S. Davis, V. S. Subrahmanian:
Deception Detection in Videos. CoRR abs/1712.04415 (2017) - 2016
- [j136]Chanhyun Kang, Sarit Kraus, Cristian Molinaro, Francesca Spezzano
, V. S. Subrahmanian:
Diffusion centrality: A paradigm to maximize spread in social networks. Artif. Intell. 239: 70-96 (2016) - [j135]V. S. Subrahmanian, Amos Azaria
, Skylar Durst, Vadim Kagan, Aram Galstyan, Kristina Lerman, Linhong Zhu, Emilio Ferrara
, Alessandro Flammini, Filippo Menczer:
The DARPA Twitter Bot Challenge. Computer 49(6): 38-46 (2016) - [j134]Sushil Jajodia
, Noseong Park, Edoardo Serra
, V. S. Subrahmanian:
Using temporal probabilistic logic for optimal monitoring of security events with limited resources. J. Comput. Secur. 24(6): 735-791 (2016) - [c155]Tanmoy Chakraborty
, Noseong Park, V. S. Subrahmanian:
Ensemble-based algorithms to detect disjoint and overlapping communities in networks. ASONAM 2016: 73-80 - [c154]Srijan Kumar, Francesca Spezzano
, V. S. Subrahmanian:
Tutorial: Identifying Malicious Actors on Social Media. ASONAM 2016: xlivi - [c153]V. S. Subrahmanian, Lada A. Adamic, Lise Getoor, Evimaria Terzi, Brian Uzzi, Lisa Singh:
ASONAM 2016 panel: Social network analysis for social good. ASONAM 2016: xlvii - [c152]Srijan Kumar, Francesca Spezzano
, V. S. Subrahmanian, Christos Faloutsos:
Edge Weight Prediction in Weighted Signed Networks. ICDM 2016: 221-230 - [c151]Bo An, Haipeng Chen
, Noseong Park, V. S. Subrahmanian:
MAP: Frequency-Based Maximization of Airline Profits based on an Ensemble Forecasting Approach. KDD 2016: 421-430 - [c150]Srijan Kumar, Edoardo Serra
, Francesca Spezzano
, V. S. Subrahmanian:
Metric Logic Program Explanations for Complex Separator Functions. SUM 2016: 199-213 - [c149]Edoardo Serra
, Francesca Spezzano
, V. S. Subrahmanian:
ChoiceGAPs: Competitive Diffusion as a Massive Multi-player Game in Social Networks. SUM 2016: 303-319 - [c148]Chanhyun Kang, Noseong Park, B. Aditya Prakash, Edoardo Serra
, V. S. Subrahmanian:
Ensemble Models for Data-driven Prediction of Malware Infections. WSDM 2016: 583-592 - [e11]Sushil Jajodia
, V. S. Subrahmanian, Vipin Swarup, Cliff Wang:
Cyber Deception, Building the Scientific Foundation. Springer 2016, ISBN 978-3-319-32697-9 [contents] - [i10]V. S. Subrahmanian, Amos Azaria, Skylar Durst, Vadim Kagan, Aram Galstyan, Kristina Lerman, Linhong Zhu, Emilio Ferrara, Alessandro Flammini, Filippo Menczer, Rand Waltzman, Andrew Stevens, Alexander Dekhtyar, Shuyang Gao, Tad Hogg, Farshad Kooti, Yan Liu, Onur Varol, Prashant Shiralkar, V. G. Vinod Vydiswaran, Qiaozhu Mei, Tim Huang:
The DARPA Twitter Bot Challenge. CoRR abs/1601.05140 (2016) - [i9]Tanmoy Chakraborty, Noseong Park, V. S. Subrahmanian:
Ensemble-Based Algorithms to Detect Disjoint and Overlapping Communities in Networks. CoRR abs/1609.04903 (2016) - 2015
- [b7]V. S. Subrahmanian, Michael Ovelgönne, Tudor Dumitras, B. Aditya Prakash:
The Global Cyber-Vulnerability Report. Terrorism, Security, and Computation, Springer 2015, ISBN 978-3-319-25758-7, pp. 1-291 - [j133]Vadim Kagan, Andrew Stevens, V. S. Subrahmanian:
Using Twitter Sentiment to Forecast the 2013 Pakistani Election and the 2014 Indian Election. IEEE Intell. Syst. 30(1): 2-5 (2015) - [j132]Noseong Park, Edoardo Serra
, V. S. Subrahmanian:
Saving Rhinos with Predictive Analytics. IEEE Intell. Syst. 30(4): 86-88 (2015) - [j131]Noseong Park, Edoardo Serra
, Tom Snitch, V. S. Subrahmanian:
APE: A Data-Driven, Behavioral Model-Based Anti-Poaching Engine. IEEE Trans. Comput. Soc. Syst. 2(2): 15-37 (2015) - [j130]Edoardo Serra
, Sushil Jajodia
, Andrea Pugliese
, Antonino Rullo
, V. S. Subrahmanian:
Pareto-Optimal Adversarial Defense of Enterprise Systems. ACM Trans. Inf. Syst. Secur. 17(3): 11:1-11:39 (2015) - [j129]Anshul Sawant, John P. Dickerson, Mohammad Taghi Hajiaghayi, V. S. Subrahmanian:
Automated Generation of Counterterrorism Policies Using Multiexpert Input. ACM Trans. Intell. Syst. Technol. 6(4): 44:1-44:27 (2015) - [c147]Ian A. Andrews, Srijan Kumar, Francesca Spezzano
, V. S. Subrahmanian:
SPINN: Suspicion prediction in nuclear networks. ISI 2015: 19-24 - [c146]Srijan Kumar
, Francesca Spezzano
, V. S. Subrahmanian:
VEWS: A Wikipedia Vandal Early Warning System. KDD 2015: 607-616 - [p9]Vincenzo Moscato, Antonio Picariello, V. S. Subrahmanian:
Multimedia Social Networks for Cultural Heritage Applications: The GIVAS Project. Data Management in Pervasive Systems 2015: 169-182 - [e10]Manish Gupta, Y. Narahari, V. S. Subrahmanian, Indrajit Bhattacharya:
Proceedings of the Second ACM IKDD Conference on Data Sciences, Bangalore, CoDS 2015, India, March 18-21, 2015. ACM 2015, ISBN 978-1-4503-3436-5 [contents] - [e9]Manish Gupta, Y. Narahari, V. S. Subrahmanian, Indrajit Bhattacharya:
Companion Volume to the Proceedings of the 2nd IKDD Conference on Data Sciences, CODS 2015 Companion Volume, Bangalore, India, March 20, 2015. ACM 2015, ISBN 978-1-4503-3616-1 [contents] - [e8]Sushil Jajodia, Paulo Shakarian, V. S. Subrahmanian, Vipin Swarup, Cliff Wang:
Cyber Warfare - Building the Scientific Foundation. Advances in Information Security 56, Springer 2015, ISBN 978-3-319-14038-4 [contents] - [i8]Srijan Kumar, Francesca Spezzano, V. S. Subrahmanian:
VEWS: A Wikipedia Vandal Early Warning System. CoRR abs/1507.01272 (2015) - 2014
- [b6]Austin Parker, Gerardo I. Simari, Amy Sliva, V. S. Subrahmanian:
Data-driven Generation of Policies. Springer Briefs in Computer Science, Springer 2014, ISBN 978-1-4939-0273-6, pp. 1-48 - [j128]Francesca Spezzano
, V. S. Subrahmanian, Aaron Mannes:
Reshaping terrorist networks. Commun. ACM 57(8): 60-69 (2014) - [j127]Longbing Cao
, Thorsten Joachims, Can Wang
, Éric Gaussier, Jinjiu Li, Yuming Ou
, Dan Luo, Reza Zafarani, Huan Liu, Guandong Xu, Zhiang Wu, Gabriella Pasi
, Ya Zhang, Xiaokang Yang, Hongyuan Zha, Edoardo Serra
, V. S. Subrahmanian:
Behavior Informatics: A New Perspective. IEEE Intell. Syst. 29(4): 62-80 (2014) - [j126]Maria Vanina Martinez
, Francesco Parisi
, Andrea Pugliese
, Gerardo I. Simari
, V. S. Subrahmanian:
Policy-based inconsistency management in relational databases. Int. J. Approx. Reason. 55(2): 501-528 (2014) - [j125]Chanhyun Kang, Andrea Pugliese
, John Grant, V. S. Subrahmanian:
STUN: querying spatio-temporal uncertain (social) networks. Soc. Netw. Anal. Min. 4(1): 156 (2014) - [j124]Edoardo Serra
, V. S. Subrahmanian:
A Survey of Quantitative Models of Terror Group Behavior and an Analysis of Strategic Disclosure of Behavioral Models. IEEE Trans. Comput. Soc. Syst. 1(1): 66-88 (2014) - [j123]Amos Azaria
, Ariella Richardson, Sarit Kraus, V. S. Subrahmanian:
Behavioral Analysis of Insider Threat: A Survey and Bootstrapped Prediction in Imbalanced Data. IEEE Trans. Comput. Soc. Syst. 1(2): 135-155 (2014) - [j122]Massimiliano Albanese
, Cristian Molinaro
, Fabio Persia, Antonio Picariello
, V. S. Subrahmanian:
Discovering the Top-k Unexplained Sequences in Time-Stamped Observation Data. IEEE Trans. Knowl. Data Eng. 26(3): 577-594 (2014) - [j121]