Ayday, E.(2020).Tracking the Invisible: Privacy-Preserving Contact Tracing to Control the Spread of a Virus.Data Privacy Management (DPM) International Workshop .
Mi, Y., & Wang, A.(2019).ML-Pushback: Machine Learning Based Pushback Defense Against DDoS.Proceedings of the 15th International Conference on emerging Networking EXperiments and Technologies.
Wei, Y., & Chaudhary, V.(2019).The Representation of Wave Trend Direction in Stock Price Time Series via RNN.International Conference on Machine Learning and Data Mining (MLDM).
Rabinovich, M., Allman, M., Brennan, S., Pollack, B., & Xu, J.(2019).Rethinking Home Networks in the Ultrabroadband Era.Int. Conf. on Distributed Computing Systems, IEEE.
Lu, H., Lee, J., Ray, S., Tanaka, K., Bezerra, H., Rollins, A. M., & Wilson, D. L.(2019).Automated stent coverage analysis in intravascular OCT (IVOCT) image volumes using a support vector machine and mesh growing.Biomedical Optics Express,10(6).
Lu, H., Lee, J., Ray, S., Tanaka, K., Bezerra, H., Rollins, A. M., & Wilson, D. L.(2019).Automated stent coverage analysis in intravascular OCT (IVOCT) image volumes using a support vector machine and mesh growing.Biomedical Optics Express,10(6).
Liu, S., Wang, L., Chaudhary, V., & Liu, H.(2019).Attention Neural Model for Temporal Relation Extraction.Proceedings of the 2nd Clinical Natural Language Processing Workshop.
Lu, H., Lee, J., Ray, S., Tanaka, K., Bezerra, H., Rollins, A. M., & Wilson, D. L.(2019).Automated stent coverage analysis in intravascular OCT (IVOCT) image volumes using a support vector machine and mesh growing.Biomedical Optics Express,10(6).
Lu, S., Lee, J., Ray, S., Tanaka, K., Bezerra, H., Rollins, A. M., & Wilson, D. L.(2019).Automated stent coverage analysis in intravascular OCT (IVOCT) image volumes using a support vector machine and mesh growing..Biomedical optics express,10(6),2809-2828.
Liu, L., Wang, H., Wang, A., Xiao, M., Cheng, Y., & Chen, S.(2019).vCPU as a Container: Towards Accurate CPU Allocation for VMs.ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments .
Liu, D., Skomorovska, Y., Song, Y., Bowler, E., Harris, P., Ravasz, M., Bailey, S., Ayati, M., Tamai, K., Koyutürk, M., Yuan, X., Wang, Z., Wang, Y., & Ewing, R.(2019).ELF3 is an antagonist of oncogenic-signalling-induced expression of EMT-TF ZEB1.Cancer Biology and Therapy,20(1),90-100.
Zhou, M., Wang, Y., Srivastava, A., Wu, Y., & Banerjee, P.(2019).Ensemble-Based Algorithm for Synchrophasor Data Anomaly Detection.IEEE TRANSACTIONS ON SMART GRID,10(3),2979-2988.
Li, D., Li, Q., Ye, F., & Xu, S.(2019).Enhancing Robustness of Deep Neural Networks Against Adversarial Malware Samples: Principles, Framework, and Application to AICS’2019 Challenge.The AAAI-19 Workshop on Artificial Intelligence for Cyber Security (AICS).
Ma, H., Alipourlangouri, M., Wu, Y., Chiang, F., & Pi, J.(2019).Ontology-based Entity Matching in Attributed Graphs.PROCEEDINGS OF THE VLDB ENDOWMENT,12(10),1195-1207.
Zhu, X., Ayday, E., & Vitenberg, R.(2019).A privacy-preserving framework for outsourcing location-based services to the cloud.IEEE Transactions on Dependable and Secure Computing.
Zhang, Y., Fan, Y., Ye, F., Zhao, L., & Shi, C.(2019).Key Player Identification in Underground Forums over Attributed Heterogeneous Information Network Embedding Framework.ACM Press.