2016 faculty publications
Hill SM, Heiser LM, Cokelaer T, Unger M, Nesser NK, Carlin DE, Zhang Y, Sokolov A, Paull EO, Wong CK, Graim K, Bivol A, Wang H, Zhu F, Afsari B, Danilova LV, Favorov AV, Shing Lee W, Taylor D, Hu CW, Long BL, Noren DP, Bisberg AJ; HPN DREAM Consortium: Al-Ouran R, Anton B, Arodz, T Askari Sichani O, Bagheri N, Berlow N, Bohler A, Bonet J, Bonneau R, Budak G, Bunescu R, Caglar M, Cai, B Cai C, Carlon A, Chen L, Ciaccio MF, Cooper G, Creighton CJ, Daneshmand S, de la Fuente A, Di Camillo B, Dutta-Moscato J, Emmett K, Evelo C, Fassia MH, Finkle JD, Finotello F, Gao X, Gao J, Garcia-Garcia J, Ghosh S, Giaretta A, Grosseholz R, Guinney J, Hafemeister C, Hahn O, Haider S, Hase T, Hodgson J, Hoff B, Hao Hsu C, Hu Y, Huang X, Jalili M, Jiang X, Kacprowski T, Kaderali L, Kang M, Kannan V, Kikuchi K, Kim D, H Kitano, Knapp B, Komatsoulis G, Krämer A, Kursa MB, Kutmon M, Li Y, Liang X, Liu Z, Liu Y, Lu S, Lu X, Manfrini M, Matos MRA, Meerzaman D, Min W, Müller CL, Neapolitan RE, Oliva B, Obol Opiyo S, Pal R, Palinkas A, Planas-Iglesias J, Poglayen D, Sambo F, Sanavia T, Sharifi-Zarchi A, Slawek J, Streck A, Strunz S, Tegnér J, Thobe K, Toffolo GM, Trifoglio E, Wan Q, Welch L, Wu JJ, Xue AY, Yamanaka R, Yan C, Zairis S, Zengerling M, Zenil H, Zhang S, Zi Z; Mills GB, Gray JW, Kellen M, Norman T, Friend S, Qutub AA, Fertig EJ, Guan Y, Song M, Stuart JM, Spellman PT, Koeppl H, Stolovitzky G, Saez-Rodriguez J, Mukherjee S. 2016. Inferring causal molecular networks: empirical assessment through a community-based effort. Nature Methods 13, 310–318, http://www.nature.com/nmeth/journal/v13/n4/full/nmeth.3773.html IF: 25.328
Lu X, Bulut E, Szymanski B. 2016. Towards Limited Scale-free Topology with Dynamic Peer Participation, Computer Networks, vol. 106, pp. 109-121. IF: 1.44
Capurso NN, Song T, Cheng W, Yu J, Cheng X. 2016. An Android-based Mechanism for Energy Efficient Localization depending on Indoor/Outdoor Context. IEEE Internet of Things Journal, http://ieeexplore.ieee.org/document/7451199/ IF: not yet published
Jing T, Wei X, Cheng W, Guan M, Huo Y, Cheng X. 2016. An Efficient Scheme for Tag Information Update in RFID Systems on Roads. IEEE Transactions on Vehicular Technology, vol. 65(4), pp. 2435-2444 http://ieeexplore.ieee.org/document/7089276/ IF: 2.243
Damevski K, Shepherd D, Schneider J, Pollock L. 2016. Mining Sequences of Developer Interactions in Visual Studio for Usage Smells. IEEE Transactions on Software Engineering. http://dx.doi.org/10.1109/TSE.2016.2592905 IF: 1.5
Ge X, Shepherd D, Damevski K, Murphy-Hill E. 2016. Design and Evaluation of a Multi-Recommendation System for Local Code Search. Journal of Visual Languages and Computing. http://dx.doi.org/10.1016/j.jvlc.2016.07.002 IF: 0.6
Lee J-S, Damevski K, Chen H. 2016. Exploring Computer Science Students’ Learning of Sensor-Driven Mobile App Design: A Case Study. International Journal of Teaching and Case Studies. http://dx.doi.org/10.1504/IJTCS.2016.10001507 IF: not yet published
Luna JM, Cano A, Sakalauskas V, Ventura S. 2016. Discovering Useful Patterns from Multiple Instance Data. Information Sciences, vol. 357, pp. 23-38. http://www.sciencedirect.com/science/article/pii/S0020025516302365 IF 3.36
Cano A, Rojas A. 2016. Cellular automata and applications. UNION, Latin-American Journal of Mathematical Education, vol. 46, pp. 33-48. http://www.fisem.org/www/union/revistas/2016/46/01_13-307-1-ED.pdf IF: not yet published
Rashidi B, Fung C, Bertino E. 2016. Android Resource Usage Risk Assessment using Hidden Markov Model and Online Learning. Computers and Security (COSE). http://www.sciencedirect.com/science/article/pii/S0167404816301596 IF: 1.64
Fung C, Zhu Q. 2016. FACID: A Trust-based Collaborative Decision Framework for Intrusion Detection Networks. Ad Hoc Networks Journal (ADHOC). IF: 1.66
Gharbaouia M, Martini B, Fung C, Paolucci F, Giorgetti A, Castoldi P. 2016. An Incentive-compatible and Trust-aware Multi-Provider Path Computation Element (PCE). Computer Networks (COMNET). http://www.sciencedirect.com/science/article/pii/S1389128616302407 IF: 1.40
Rashidi B, Fung C, Vu T. 2016. Android Fine-grained Permission Control System with Real-Time Expert Recommendations. Pervasive and Mobile Computing. http://www.sciencedirect.com/science/article/pii/S1574119216300475 IF: 1.70
Nalluri J, Barh D, Azevedo V, Ghosh P. 2016. miRsig: a consensus-based network inference methodology to identify pan-cancer miRNA-miRNA interaction signatures. Nature Scientific Reports, IF: 5.228
Dean DN, Das PK, Rana P, Burg F, Levites Y, Morgan SE, Ghosh P, Rangachari V. 2016. Strain-specific Fibril Propagation by an Aβ Dodecamer, Nature Scientific Reports, IF: 5.228
Mariano DCB, Pereira FL, Aguiar EL, Oliveira LC, Benevides L, Guimarães L, Folador EL, Sousa TJ, Viana MVS, Ghosh P, Barh D, Figueiredo HCP, Silva A, Ramos RTJ, Azevedo V. 2016. SIMBA: a web tool for managing bacterial genome assembly, BMC Bioinformatics, 17:1344. http://bmcbioinformatics.biomedcentral.com/articles/10.1186/s12859-016-1344-7 IF: 2.435.
Folador EL, Carvalho PVS, Silva WM, Hassan SS, Ferreira RS, Silva A, Baumbach J, Gromiha M, Ghosh P, Barh D, Rottger R, Azevedo V. 2016. In silico protein-protein interactions derive conserved essential proteins in nine strains of Corynebacterium pseudotuberculosis. BMC Systems Biology, 10:103. https://bmcsystbiol.biomedcentral.com/articles/10.1186/s12918-016-0346-4 IF: 2.213.
Saraiva TDL, Etelvino GM, Oliveira M, de Sousa CS, Azevedo MSP, LeBlanc AM, LeBlanc JG, Barh D, Ghosh P, Venanzi F, Figueiredo HCP, Santos RAS, Azevedo V. 2016. Lactococcus lactis NCDO2118 produces anti-hypertensive GABA and exerts acute hypotensive in spontaneously hypertensive rats. Medical Research Archives. http://journals.ke-i.org/index.php/mra/article/view/620 IF: not yet published.
Nalluri J, Barh D, Azevedo V, Ghosh P. 2016. Towards a comprehensive understanding of miRNA regulome and miRNA interaction networks, Journal of Pharmacogenomics and Pharmacoproteomics, 7:160. https://www.omicsonline.org/open-access/towards-a-comprehensive-understanding-of-mirna-regulome-andmirna-interaction-networks-2153-0645-1000160.php?aid=80047 IF: 1.55.
Sousa CS, Barros BL, Barros EG, Barh D, Ghosh P, Azevedo V, Moreira MA. 2016. In silico characterization of genes encoding enzymes 1,2-diacylglycerol cholinephosphotransferase and lysophosphatidylcholine acyltransferase involved in lipid biosynthesis in soybean (Glycine max L. Merril), Genetics and Molecular Research, 15(3). https://www.ncbi.nlm.nih.gov/labs/articles/27706605/ IF: 0.78.
Oliveira A, Teixeira P, Azevedo M, Jamal S, Tiwari S, Almeida S, Barh D, Dorneles E, Haas D, Heinemann M, Ghosh P, Lage A, Ferreira R, Azevedo V. 2016. Corynebacterium pseudotuberculosis may be under anagenesis and biovar equi forms biovar ovis: a phylogenic inference from sequence and structural analysis. BMC Microbiology, 16:100. https://bmcmicrobiol.biomedcentral.com/articles/10.1186/s12866-016-0717-4 IF: 2.58.
Kamapantula B, Mayo M, Perkins E, Ghosh P. 2016. The structural role of the feed forward loop transcriptional motif, Springer Mobile Networks and Applications (MONET), 21(1), pp. 191-205. http://dl.acm.org/citation.cfm?id=2913328 IF: 1.54.
Almeida S, Tiwari S, Mariano D, Souza F, Jamal SB, Coimbra N, Raittz RT, Dorella FA, de Carvalho AF, Pereira FL, de Castro Soares S, Leal CAG, Barh D, Ghosh P, Figueiredo H, Moura-Costa LF, Portela R, Meyer R, Silva A, Azevedo V. 2016. The genome anatomy of Corynebacterium pseudotuberculosis VD57 a highly virulent strain causing Caseous lymphadenitis, Standards in Genomic Sciences, 11(29), pp. 1-8. https://www.ncbi.nlm.nih.gov/pubmed/27066196 IF: 1.594.
Ghosh P, Vaidya A, Rangachari V. 2016. Determination of Critical Nucleation Number for Amyloid-β Aggregation, Mathematical BioSciences, 273, pp. 70-79. https://www.ncbi.nlm.nih.gov/pubmed/26774039 IF: 1.49.
Saez JA, Krawczyk B, Wozniak M. 2016. Analyzing the oversampling of different classes and types of examples in multi-class imbalanced datasets. Pattern Recognition, vol. 57, pp. 164-178 http://www.sciencedirect.com/science/article/pii/S0031320316001072 IF: 3.399
Zhang Z, Krawczyk B, Garcia S, Rosales-Perez A, Herrera F. 2016. Empowering one-vs-one decomposition with ensemble learning for multi-class imbalanced data. Knowledge-Based Systems, vol 106, pp. 251-263 http://www.sciencedirect.com/science/article/pii/S0950705116301459 IF: 3.325
Krawczyk B, Wozniak M. 2016. Dynamic classifier selection for one-class classification. Knowledge-Based Systems, vol. 107, pp. 43-53 IF: 3.325
Krawczyk B, Galar M, Jelen L, Herrera F. 2016. Evolutionary undersampling boosting for imbalanced classification of breast cancer malignancy. Applied Soft Computing, vol. 38, pp. 714-726 IF 2.857
Krawczyk B, Wozniak M. 2016. Untrained weighted classifier combination with embedded ensemble pruning. Neurocomputing, vol. 196, pp. 14-22 IF: 2.392
Cyganek B, Grana M, Krawczyk B, Kasprzak A, Porwik P, Walkowiak K, Wozniak M. 2016. A Survey of Big Data Issues in Electronic Health Record Analysis. Applied Artificial Intelligence, vol. 30(6), pp. 497-520 http://www.tandfonline.com/doi/abs/10.1080/08839514.2016.1193714?journalCode=uaai20 IF: 0.540
Saez JA, Krawczyk B, Wozniak M. 2016. On the Influence of Class Noise in Medical Data Classification: Treatment Using Noise Filtering Methods. Applied Artificial Intelligence, vol. 30(6), pp: 590-609 http://www.tandfonline.com/doi/abs/10.1080/08839514.2016.1193719?journalCode=uaai20 IF: 0.540
Krawczyk B. 2016. Learning from imbalanced data: open challenges and future directions. Progress in Artificial Intelligence, vol. 5(4), pp. 221-232 http://link.springer.com/article/10.1007%2Fs13748-016-0094-0 IF: not yet published
Peng Z, Uversky VN, Kurgan L. 2016. Genes Encoding Intrinsic Disorder in Eukaryota Have High GC Content. Intrinsically Disordered Proteins, http://www.tandfonline.com/doi/full/10.1080/21690707.2016.1262225 IF: not yet published
Lieutaud P, Ferron F, Uversky AV, Kurgan L, Uversky VN, Longhi S. 2016. How Disordered is My Protein and What is Its Disorder For? A Guide through the “Dark Side” of the Protein Universe. Intrinsically Disordered Proteins, accepted on Nov 4. IF: not yet published
Wu Z, Hu G, Wang K, Zaslavsky BY, Kurgan L, Uversky. VN 2016. What are the Structural Features that Drive Partitioning of Proteins in Aqueous Two-phase Systems? BBA Proteins and Proteomics, vol. 1865(1), pp. 113-120 IF: 3.02
Gao J, Cui W, Sheng Y, Jishou J, Kurgan L. 2016. PSIONplus: Accurate Sequence-Based Predictor of Ion Channels and Their Types. PLoS ONE, vol. 11(4), article e0152964 http://journals.plos.org/plosone/article?id=10.1371/journal.pone.0152964 IF: 3.06
Na I, Meng F, Kurgan L, Uversky VN. 2016. Autophagy-related Intrinsically Disordered Proteins in Intra-nuclear Compartments. Molecular BioSystems, vol. 12, pp. 2798-2817 http://pubs.rsc.org/en/content/articlelanding/2016/mb/c6mb00069j IF: 2.83
Meng F, Kurgan L. 2016. DFLpred: High Throughput Prediction of Disordered Flexible Linker Regions in Protein Sequences. Bioinformatics, vol. 32(12), pp. i341-i350 https://academic.oup.com/bioinformatics/article-lookup/doi/10.1093/bioinformatics/btw280 IF: 5.77
Wang C, Uversky VN, Kurgan L. 2016. Disordered Nucleiome: Abundance of Intrinsic Disorder in the DNA- and RNA-binding Proteins in 1121 Species from Eukaryota, Bacteria and Archaea. Proteomics, vol. 16, pp. 1486-1498 http://onlinelibrary.wiley.com/doi/10.1002/pmic.201500177/abstract IF: 4.08
Yan J, Dunker AK, Uversky VN, Kurgan L. 2016. Molecular Recognition Features (MoRFs) in Three Domains of Life. Molecular BioSystems, vol. 12, pp. 697-710 (cover story) http://pubs.rsc.org/en/content/articlelanding/2016/mb/c5mb00640f IF: 2.83
Meng F, Na I, Kurgan L, Uversky VN. 2016. Compartmentalization and Functionality of Nuclear Disorder: Intrinsic Disorder and Protein-Protein Interactions in Intra-Nuclear Compartments. International Journal of Molecular Sciences, vol. 17(1), article 24 http://www.mdpi.com/1422-0067/17/1/24 IF: 3.26
Navarro G, Umberger DK, Manic M. 2016. VD-IT2, Virtual Disk Cloning on Disk Arrays using a Type-2 Fuzzy Controller, IEEE Transactions on Fuzzy Systems, DOI: 10.1109/TFUZZ.2016.2633371 IF: 6.701
Manic M, Wijayasekara D, Amarasinghe K, Rodriguez-Andina JJ. 2016. Building Energy Management Systems: The Age of Intelligent and Adaptive Buildings, IEEE Industrial Electronics Magazine, vol. 10(1), pp. 25-39, http://ieeexplore.ieee.org/xpl/topAccessedArticles.jsp?punumber=4154573 IF: 5.30
Bulut E, Szymanski B. 2016. Rethinking Offloading WiFi Access Point Deployment from User Perspective, In Proceedings of IEEE WiMob 2016, Workshop on Smart Environments & Urban Networking, (SEUNet), New York, NY http://dx.doi.org/10.1109/WiMOB.2016.7763179
Mei B, Cheng X, Cheng W, Cheng X. 2016. Personal Information Prediction Based on Movie Rating Data, In Proceedings of IIKI 2016, Oct. 20-21, Beijing, China. http://business.bnu.edu.cn/IIKI2016/iiki2016.pdf
Jing T, Li J, Huang P, Cheng W, Xing X, Hou Y. 2016. LSKA: Location Similarity Based Key Agreement Scheme for Smartphone Networks, In Proceedings of EUC 2016, Aug 24-26, Paris, France. http://euc2016.conferences-events.org/files/euc_cse_dcabes_2016.pdf
Huang B, Jia F, Yu J, Cheng W. 2016. A Transparent Framework Based on Accessing Bridge and Mobile App for Protecting Database Privacy with PKI, In Proceedings of Mobihoc 2016 Workshop PAMCO, July 5-8, Paderborn, Germany. http://dl.acm.org/citation.cfm?id=2940350
Damevski K, Chen H, Shepherd D, Pollock L. 2016. Interactive Exploration of Developer Interaction Traces using a Hidden Markov Model. In Proceedings of the International Conference on Mining Software Repositories (MSR’16), Austin, TX, May, pp. 14-15, 2016, https://doi.org/10.1145/2901739.2901741 (acceptance rate: 27%)
Cano A, Garcia-Martinez C. 2016. 100 Million Dimensions Large-Scale Global Optimization Using Distributed GPU Computing, In Proceedings of the IEEE World Congress on Computational Intelligence, paper#16334. http://www.people.vcu.edu/~acano/pdf/WCCI_2016.pdf (CORE Rank A).
Padillo F, Luna JM, Cano A, Ventura S. 2016. A Data Structure to Speed-Up Machine Learning Algorithms on Massive Datasets. In Proceedings of the 11th International Conference on Hybrid Artificial Intelligent Systems, LNCS, vol. 9648, pp. 365-376. http://link.springer.com/chapter/10.1007%2F978-3-319-32034-2_31 (CORE Rank C).
Cano A, Garcia-Martinez C. 2016. Optimization of 100 million continuous variables using multiple graphic processing units, In Proceedings of the XI Spanish Conference on Metaheuristics, Evolutionary Algorithms and Bioinspired, pp. 377-386. http://www.people.vcu.edu/~acano/pdf/CAEPIA-2016.pdf
Nguyen HT, Thai MT, Dinh TN. 2016. Cost-aware Targeted Viral Marketing in Billion-scale Networks, In Proceedings of the IEEE Int. Conference on Computer Communications (INFOCOM) http://ieeexplore.ieee.org/document/7524377/ (acceptance rate: 18.3%)
Nguyen HT, Ghosh P, Mayo M, Dinh TN. 2016. Multiple Infection Sources Identification with Provable Guarantees, In Proceedings of the 25th ACM Int. Conf. on Info. and Knowledge Management (CIKM) (acceptance rate: ) http://dl.acm.org/citation.cfm?doid=2983323.2983817 (acceptance rate: 17.6%)
Nguyen HT, Thai MT, Dinh TN. 2016. Stop-and-Stare: Optimal Sampling Algorithms for Viral Marketing in Billion-scale Networks, In Proceedings of the Annual ACM SIGMOD/PODS Conference (SIGMOD) http://dl.acm.org/citation.cfm?id=2915207 (acceptance rate: 20%)
Li X, Smith JD, Dinh TN, Thai MT. 2016. Privacy Issues in Light of Reconnaissance Attacks with Incomplete Information, In Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence (WI)
Nguyen A, Alqurashi R, Raghebi Z, Banaei-kashani F, Halbower AC, Dinh TN, Vu T. 2016. In-ear Biosignal Recording System: A Wearable For Automatic Whole-night Sleep Staging, In Proceedings of the 14th ACM MobiSys 2016 (MOBISYS), WearSys workshop. http://dl.acm.org/citation.cfm?id=2935649
Nguyen HT, Dinh TN. 2016. Targeted Cyber-attacks: Unveiling Target Reconnaissance Strategy via Social Networks, In Proceedings of the IEEE Int. Conf. on Computer Com. (INFOCOM), Security and Privacy in BigData Workshop http://ieeexplore.ieee.org/document/7562088/
Yu H, Yang J, Fung C. 2016. SpongeNet+: A Two-layer Bandwidth Allocation Framework for Cloud Datacenter. In Proceedings of the 18th International Conferences on High Performance Computing and Communications. 2016. (HPCC'16)
Rashidi B, Fung C. 2016. CoFence: A Collaborative DDoS Defence Using Network Function Virtualization. In Proceedings of the 12th International Conference on Network and Service Management. 2016. (CNSM'16) (25% acceptance rate) http://www.people.vcu.edu/~rashidib/Pub_files/CNSM16/CNSM.pdf
Rashidi B, Fung C. 2016. XDroid: An Android Permission Control Using Hidden Markov Chain and Online Learning. In Proceedings of the IEEE Conference on Communications and Network Security 2016 (CNS'16) (29% acceptance rate) http://www.people.vcu.edu/~rashidib/Pub_files/CNS16/CNS16.pdf
Rashidi B, Fung C, Nguyen A, Vu T. 2016. Android Permission Recommendation using Transitive Bayesian Inference Model. In Proceedings of the 21st European Symposium on Research in Computer Security 2016 (ESORICS'16) (21% acceptance rate) http://link.springer.com/chapter/10.1007/978-3-319-45744-4_24
Huang S, Fung C, Wang K, Pei P, Luan Z, Qian D. 2016. Using Recurrent Neural Networks Toward Black-Box System Anomaly Prediction, In Proceedings of the IEEE/ACM International Symposium on Quality of Service 2016 (IWQoS'16) (20% acceptance rate) http://ieeexplore.ieee.org/abstract/document/7590435/
Jakaria AHM, Yang W, Rashidi B, Fung C, Rahman M. 2016. VFence: A Defense against Distributed Denial of Service Attacks using Network Function Virtualization, In Proceedings of the 11th IEEE International Workshop on Security, Trust, and Privacy for Software Applications (STPSA 2016). (32.5% acceptance rate) http://ieeexplore.ieee.org/abstract/document/7552250/
Yang W, Fung C. 2016. A survey on security in network functions virtualization, In Proceedings of the IEEE Conference on Network Softwarization (Netsoft'16). Seoul, Korea. Short paper. (37% acceptance rate) http://people.vcu.edu/~cfung/research/NetSoft2016.pdf
Rashidi B, Fung C. 2016. BotTracer: Bot User Detection Using Clustering Method in RecDroid. In In Proceedings of the IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies 2016 (DISSECT'16). Istanbul, Turkey. (40% acceptance rate) http://ieeexplore.ieee.org/document/7502994/?arnumber=7502994&tag=1
de Beaudrap N, Gharibian S. 2016. A linear time algorithm for quantum 2-SAT, In Proceedings of the 31st Conference on Computational Complexity (CCC), volume 50 of Leibniz International Proceedings in Informatics (LIPIcs), pp. 27:1-27:21 http://drops.dagstuhl.de/opus/volltexte/2016/5836/.
Nazi A, Raj M, di Francesco M, Ghosh P, Das SK. 2016. Efficient Communications in Wireless Sensor Networks Based on Biological Robustness, IEEE DCOSS 2016, pp. 161-168, http://ieeexplore.ieee.org/document/7536333/ (acceptance rate: 37%).
Kecman V, Melki G. 2016. Fast Online Algorithms for Support Vector Machines, In Proceedings of the of IEEE SE Conf, Norfolk, VA
Melki G, Kecman V. 2016. Speeding Up Online Training of L1 Support Vector Machines, In Proceedings of the of IEEE SE Conf, Norfolk, VA
Kecman V. 2016. Fast online algorithm for nonlinear support vector machines and other alike models, Invited Lecture, Lekcii po Neuroinformatike, Neuroinformatics 2016, ISBN 978-5-7262-2241-7, NRNU MEPhI, Moscow
Krawczyk B. 2016. Cost-sensitive one-vs-one ensemble for multi-class imbalanced data. In Proceedings of 2016 International Joint Conference on Neural Networks (IJCNN 2016), pp. 2447-2452 http://ieeexplore.ieee.org/document/7727503/ (CORE rank A)
Krawczyk B, Saez JA, Wozniak M. 2016. Tackling label noise with multi-class decomposition using fuzzy one-class support vector machines. In Proceedings of 2016 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE 2016), pp. 915-922 http://ieeexplore.ieee.org/document/7737786/ (CORE rank A)
Krawczyk B. 2016. GPU-Accelerated Extreme Learning Machines for Imbalanced Data Streams with Concept Drift. In Proceedings of International Conference on Computational Science 2016 (ICCS 2016), pp. 1692-1701 http://www.sciencedirect.com/science/article/pii/S1877050916309966 (CORE rank A)
Krawczyk B. 2016. Hybrid One-Class Ensemble for High-Dimensional Data Classification. In Proceedings of 8th Asian Conference on Intelligent Information and Database Systems (ACIIDS 2016), vol 2, pp. 136-144 http://link.springer.com/chapter/10.1007%2F978-3-662-49390-8_13
Koziarski M, Krawczyk B, Wozniak M. 2016. Forming Classifier Ensembles with Deterministic Feature Subspaces. In Proceedings of 2016 Federated Conference on Computer Science and Information Systems (FedCSIS 2016), pp. 89-95 https://fedcsis.org/proceedings/2016/drp/552.html
Marino D, Amarasinghe K, Manic M. 2016. Simultaneous Generation-Classification Using LSTM, In Proceedings of 2016 IEEE Symposium Series on Computational Intelligence IEEE SSCI 2016, Athens, Greece, Dec. 6-9, 2016. http://ssci2016.cs.surrey.ac.uk/
Pouri SR, Wijayasekara D, Manic M, Phongikaroon S. 2016. Development of a Smart Signal Detection Method for Cyclic Voltammetry via Artificial Neural Intelligence, In Proceedings of 2016 American Nuclear Society Winter Meeting and Expo, Las Vegas, NV, Nov. 6-10, 2016. http://www.ans.org/meetings/m_147
Marino D, Amarasinghe K, Manic M. 2016. Building Energy Load Forecasting using Deep Neural Networks, In Proceedings of 42nd Annual Conference of the IEEE Industrial Electronics Society, IEEE IECON 2016, Florence, Italy, Oct. 24-27, 2016. http://www.iecon2016.org/
Carey H, Manic M. 2016. Epileptic Spike Detection with EEG using Artificial Neural Networks, In Proceedings of IEEE 9th International Conference on Human System Interaction, IEEE HSI 2016, Portsmouth, England, July 6-8, 2016. DOI: 10.1109/HSI.2016.7529614.
Amarasinghe K, Sivils P, Manic M. 2016. EEG Feature Selection for Thought Driven Robots using Evolutionary Algorithms," In Proceedings of IEEE 9th International Conference on Human System Interaction, IEEE HSI 2016, Portsmouth, England, July 6-8, 2016. DOI: 10.1109/HSI.2016.7529657
Ostrom LT, Verner KM, Manic M, Amarasinghe K, Wijayasekara D. 2016. Multi-Use High-Technology Testbed, In Proceedings of IEEE 9th International Conference on Human System Interaction, IEEE HSI 2016, Portsmouth, England, July 6-8, 2016. DOI: 10.1109/HSI.2016.7529646
Carey H, Manic M. 2016. HTML Web Content Extraction Using Paragraph Tags, In Proceedings of 25th International Symposium on Industrial Electronics, IEEE ISIE 2016, Santa Clara, USA, June 8-10, 2016. DOI: 10.1109/ISIE.2016.7745047
Marino D, Manic M. 2016. Fast Trajectory Simplification Algorithm for Natural User Interfaces in Robot Programming by Demonstration, In Proceedings of 25th International Symposium on Industrial Electronics, IEEE ISIE 2016, Santa Clara, USA, June 8-10, 2016. DOI: 10.1109/ISIE.2016.7745011
McInnes BT, Murphy R, Jones G, Hodson M, Izadi T, Jimenez I, Lewinski N. 2016. Nanomedicine Entity Extraction. American Medical Informatics Symposium (AMIA).
Lewinski N, Hodson M, Izadi T, Jimenez I, Murphy R, Jones G, McInnes BT. 2016. END, an Annotated Nanomedicine Corpus. International Nanotoxicology Congress (nanoTOX).
McInnes BT. 2016. VCU at Semeval-2016 Task 14: Evaluating Similarity Measures for Semantic Taxonomy Enrichment. In Proceedings of the 10th International Workshop on Semantic Evaluation (SemEval).
Briones G, Amarasinghe K, McInnes BT. 2016. VCU-TSA at Semeval-2016 Task 4: Sentiment Analysis in Twitter. In Proceedings of the 10th International Workshop on Semantic Evaluation (SemEval), June 2016.
Korcovelos E, Pakhomov SV, McInnes BT. 2016. Automated Linguistic Analysis of Patients with Dementia and Mild Cognitive Impairment. In Proceedings of the Alzheimer’s Association International Conference (AAIC).
Russell A, Tang Q, Yung M, Zhou H-S. 2016. Cliptography: Clipping the Power of Kleptographic Attacks. In Proceedings of ASIACRYPT (2) 2016, pp. 34-64.
Kiayias A, Zhou H-S, Zikas V. 2016. Fair and Robust Multi-party Computation Using a Global Transaction Ledger. In Proceedings of EUROCRYPT (2) 2016, pp. 705-734
Chen Y-C, Chow S, Chung K-M, Lai R, Lin W-K, Zhou H-S. 2016. Cryptography for Parallel RAM from Indistinguishability Obfuscation. In Proceedings of ITCS 2016, pp. 179-190
Dachman-Soled D, Gordon SD, Liu F-H, O'Neill A, Zhou H-S. 2016. Leakage-Resilient Public-Key Encryption from Obfuscation. In Proceedings of Public Key Cryptography (2) 2016, pp. 101-128
Green MD, Katz J, Malozemoff AJ, Zhou H-S. 2016. A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation. In Proceedings of SCN 2016, pp. 587-603
Blocki J, Zhou H-S. 2016. Designing Proof of Human-Work Puzzles for Cryptocurrency and Beyond. In Proceedings of TCC (B2) 2016, pp. 517-546
Ventura S, Luna JM, Cano A. 2016. Big Data on Real-World Applications, InTech, ISBN 978-953-51-2490-0 http://www.intechopen.com/books/big-data-on-real-world-applications
Dinh TN, Thai MT (Eds). 2016. Computing and Combinatorics: Proceedings of 22nd International Conference, COCOON 2016, Ho Chi Minh City, Vietnam, LNCS, Springer, ISBN: 978-3-319-42633-4 http://link.springer.com/book/10.1007%2F978-3-319-42634-1
Arodz T, Gao X. 2016. Network Analysis of Inflammation. In: RF Diegelmann, CE Chalfant (Eds.) Frontiers in Inflammation, Vol. 1: Basic Biology and Clinical Aspects of Inflammation, pp. 451-473, Bentham Science, ISBN: 978-1-68108-228-8
Peng Z, Wang C, Uversky VN, Kurgan L. 2016. Prediction of Disordered RNA, DNA, and Protein Binding Regions Using DisoRDPbind, In: Zhou Y, Kloczkowski A, Faraggi E, Yang Y, (Eds.), Methods in Molecular Biology, vol. 1484, pp. 187-203, Humana Press, ISBN 978-1-4939-6404-8 http://link.springer.com/protocol/10.1007%2F978-1-4939-6406-2_14
Meng F, Kurgan L. 2016. Computational Prediction of Protein Secondary Structure from Sequence, In: Dunn BM, (Ed.), Current Protocols in Protein Science, unit 86:2.3.1-2.3.10, Wiley, ISBN 978-0-4711-4086-3 http://onlinelibrary.wiley.com/doi/10.1002/cpps.19/full
2015 faculty publications
Arodz T., and Bonchev D. 2015. Identifying influential nodes in a wound healing-related network of biological processes using mean first-passage time. New Journal of Physics 17:025002, IF: 3.558
Cano A., Luna J.M., Gibaja E.L., and Ventura S. 2015. LAIM discretization for multi-label data. Information Sciences, pp 1-15, IF: 4.03.
Luna J.M., Cano A., Pecheniskiy M., and Ventura S. 2015. Speeding-up Association Rule Mining with Inverted Index Compression. IEEE Transactions on Cybernetics, pp 1-15, http://dx.doi.org/10.1109/TCYB.2015.2496175IF: 3.46
Cano A., Luna J.M., Zafra A., and Ventura S. 2015. A Classification Module for Genetic Programming Algorithms in JCLEC. Journal of Machine Learning Research, vol. 16, pp 491-494, http://jmlr.org/papers/volume16/cano15a/cano15a.pdfIF: 2.47
Cano A., Yeguas E., Munoz R., Medina R., and Ventura S. 2015. Parallelization Strategies for Markerless Human Motion Capture. Journal of Real-Time Image Processing, pp 1-15, http://dx.doi.org/10.1007/s11554-014-0467-1IF: 2.02.
Cano A., Zafra A., and Ventura S. 2015. Speeding up multiple instance learning classification rules on GPUs. Knowledge and Information Systems, 44(1), pp 127-145, http://dx.doi.org/10.1007/s10115-014-0752-0IF: 1.78
Cano A., Ventura S. and Cios KJ. 2015. Multi-Objective Genetic Programming for Feature Extraction and Data Visualization. Soft Computing, October 26, pp1-21, http://link.springer.com/article/10.1007/s00500-015-1907-y, IF 1.3
Marquez-Vera C., Cano A., Romero C., Yousef A., Mousa H., and Ventura S. 2015. Early Dropout Prediction using Data Mining: A Case Study with High School Students. Expert Systems, pp 1-20, IF: 0.76
Tao Jing, Xing Wei, Wei Cheng, Mingyang Guan, Yan Huo, Xiuzhen Cheng, “An Efficient Scheme for Tag Information Update in RFID Systems on Roads” in press IEEE Transactions on Vehicular Technology. IF: 1.978
Wei Zhou, Tao Jing, Wei Cheng, Tao Chen, Yan Huo, “Combinatorial auction based spectrum allocation under heterogeneous supply and demand”, in Elsevier Computer Communications, vol. 60, pp. 109-118, April 2015. IF: 1.69
Tao Jing, Xuewei Cui, Wei Cheng, Shixiang Zhu, Yan Huo, Xiuzhen Cheng, “Enabling Smartphone Based HD Video Chats by Cooperative Transmissions in CRNs”, in EURASIP Journal on Wireless Communications and Networking, vol.2015, no.1, March 2015. IF: 0.72
Tao Jing, Fan Zhang, Wei Cheng, Yan Huo, Xiuzhen Cheng, “Online Auction Based Relay Selection for Cooperative Communication in CR Networks”, in EURASIP Journal on Wireless Communications and Networking, vol.2015, no.1, February 2015. IF: 0.72
Yuan Le, Liran Ma, Wei Cheng, Xiuzhen Cheng, Biao Chen, “A Time Fairness Based MAC Algorithm for Throughput Maximization in 802.11 Networks”, in IEEE Transactions on Computers, vol.64, no.1, pp.19-31, January 2015. IF: 1.659
David S Jackson, Wanyu Zang, Qijun Gu, Wei Cheng, Meng Yu, “Exploiting and Defending Trust Models in Cooperative Spectrum Sensing”, in EURASIP Journal on Wireless Communications and Networking,vol.2015, no.1, January 2015. IF: 0.72
Nguyen DT and Cios KJ. 2015. OneClass-DS Algorithm. Applied Soft Computing, October 2015, (35) 267-279, IF 2.8
Higuera C, Gardiner KJ and Cios KJ. 2015. Self-organizing Feature Maps Identify Proteins Critical to Learning in a mouse model of Down Syndrome. PloS One, published June 25, 2015, DOI: 10.1371/journal.pone.0129126. IF 3.2
Damevski K, Shepherd D, Pollock L. “A Field Study of How Developers Locate Features in Source Code”, Journal of Empirical Software Engineering, pp: 1-24, 2015. http://dx.doi.org/10.1007/s10664-015-9373-9. IF 2.2
Wang J, Damevski K, Chen H. “Sensor Data Modeling and Validating for Wireless Soil Sensor Networks”, Journal of Computers and Electronics in Agriculture, vol.112, pp.75-82, 2015. IF 1.8
Mishra, T. N. Dinh, M. T. Thai, J. Seo, I. Shin, Optimal Packet Scan Against Malicious Attacks in Smart Grids, Theoretical Computer Science (TCS), 2015, IF: 0.66
N. Dinh and M. T. Thai, Towards Optimal Community Detection: From Trees to General Weighted Networks, Internet Mathematics, 2015, DOI:10.1080/15427951.2014.950875
Bahman Rashidi, and Carol Fung, "A Survey of Android Security Threats and Defenses". In Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Vol. 6, No. 3, September 2015.
Bahman Rashidi, and Carol Fung, "Disincentivizing Malicious Users in RecDroid Using Bayesian Game Model". In Journal of Internet Services and Information Security (JISIS), Vol. 5, No. 2, May 2015.
Gharibian, Y. Huang, Z. Landau, S. W. Shin. Quantum Hamiltonian Complexity. Foundations and Trends in Theoretical Computer Science, 10 (3):159-282, 2015. http://dx.doi.org/10.1561/0400000066
Gharibian, Z. Landau, S. W. Shin, and G. Wang. Tensor network non-zero testing. Quantum Information & Computation 15 (9 & 10):885-899, 2015. IF 1.393.
Abdelzaher, A, Al-Musawi, A, Mayo, M, Perkins, E and Ghosh, P. Transcriptional Network growing Models using motif based preferential attachment, Frontiers in Bioengineering & Biotechnology, 2015, Oct 12;3:157. http://dx.doi.org/10.3389/fbioe.2015.00157. eCollection 2015. IF: not yet published.
Diego CB Mariano, Felipe L Pereira, Debmalya Barh, Preetam Ghosh, Rommel TJ Ramos, Vasco AC Azevedo. MapRepeat: an approach for effective assembly of repetitive regions in prokaryotic genomes, Bioinformation, 2015, 11(6): 276–279. doi: 10.6026/97320630011276 , IF: 0.5.
Folador, E.L., de Oliveira Junior, A.F., Tiwari, S, Jamal, S.B., Ferreira, R.S., Barh, Ghosh, P, D, Silva, A, Azevedo, V. In silico Prediction of Protein-Protein Interactions: avoiding data and method biases over sensitivity and specificity. Current Protein and Peptide Science, 2015, 16(8):689-700. DOI: 10.2174/1389203716666150505235437 IF: 3.154.
Mayo, M, Abdelzaher, A, Ghosh, P. Long range degree correlations in complex networks, Computational Social Networks, 2015, 2:4, 1-13. http://dx.doi.org/10.1186/s40649-015-0011-x IF: not yet published.
Abdelzaher, M. Mayo, E. Perkins and P. Ghosh. Contribution of Canonical Feed-forward Loop Motifs on the Fault-tolerance and Information Transport Efficiency of Transcriptional Regulatory Networks, Elsevier Nano Communication Networks 2015, 6:3, pp. 133-144. doi:10.1016/j.nancom.2015.04.002 IF: 0.678
Nalluri, J, Kamapantula, B, Barh, D, Azevedo, V, Almeida, S, Silva, A, Ramos, T, Jain, N, Bhattacharya, A, Ghosh, P. DISMIRA: Prioritization of disease candidates in miRNA-disease associations based on maximum weighted matching inference model and motif-based analysis. BMC Genomics, 2015, 16(Suppl 5):S12 doi:10.1186/1471-2164-16-S5-S12. IF: 3.99
Barh, D, Kamapantula, B, Jain, N, Nalluri, J, Juneja, L, Barve, N, Bhattacharya, A, Kumar, A, Miyoshi, A, Azevedo, V, Blum, K, Silva, A, Ghosh, P. miRegulome: a knowledge-base of miRNA regulomics and analysis. Nature Scientific Reports, 2015, 5: 12832. doi: 10.1038/srep12832 IF: 5.578
Wang C, Hu G, Wang K, Brylinski M, Xie L, Kurgan L. “PDID: Database of Molecular-level Putative Protein–drug Interactions in the Structural Human Proteome”, Bioinformatics, published October 26, 2015, DOI:10.1093/bioinformatics/btv597 IF 4.98
Hu G, Wu Z, Wang K, Uversky VN, Kurgan L. “Untapped Potential of Disordered Proteins in Current Druggable Human Proteome”. Current Drug Targets, published July 22, 2015 PMID:26201486 IF 3.02
Yan Y, Friedrich S, Kurgan L. “A Comprehensive Comparative Review of Sequence Based Predictors of DNA and RNA Binding Residues”. Briefings in Bioinformatics, published May 1, 2015, DOI:10.1093/bib/bbv023 IF 9.62
Peng Z, Kurgan L. “High-throughput Prediction of RNA, DNA, AND Protein Binding Regions Mediated by Intrinsic Disorder”. Nucleic Acids Research, 43(18):e121, 2015 http://nar.oxfordjournals.org/content/43/18/e121IF 9.11
Wu Z, Hu G, Yang J, Peng Z, Uversky VN, Kurgan L. “In Various Protein Complexes, Disordered Protomers Have Large Per-residue Surface Areas and Area of Protein-, DNA- and RNA Binding Interfaces”, FEBS Letters, 589(19):2561-2569, 2015 http://www.sciencedirect.com/science/article/pii/S0014579315007139IF 3.17
Fan X, Kurgan L. “Comprehensive Overview and Assessment of Computational Prediction of MicroRNA Targets in Animals”. Briefings in Bioinformatics, 16(5):780-794, 2015 http://bib.oxfordjournals.org/content/16/5/780IF 9.62
Meng F, Badierah R, Almehdar H, Redwan E, Kurgan L, Uversky VN. “Unstructural Biology of the Dengue Virus Proteins”. FEBS Journal, 282(17):3368-3394, 2015 http://onlinelibrary.wiley.com/doi/10.1111/febs.13349/abstractIF 4.00
Ferreira LA, Fan X, Madeira P, Kurgan L, Uversky VN, Zaslavsky B. “Analyzing the effects of protecting osmolytes on solute–water interactions by solvatochromic comparison method: II. Globular proteins”. RSC Advances, 5:59780-59791, 2015 IF 3.84
Chen K, Wang D, Kurgan L. “Systematic Investigation of Sequence and Structural Motifs that Recognize ATP”. Computational Biology and Chemistry, 56:131-141, 2015 http://www.sciencedirect.com/science/article/pii/S1476927115000584IF 1.18
Peng Z, Yan J, Fan, X, Mizianty MJ, Xue B, Wang K, Hu G., Uversky VN, Kurgan L. “Exceptionally Abundant Exceptions: Comprehensive Characterization of Intrinsic Disorder in All Domains of Life”. Cellular and Molecular Life Sciences, 72(1):137-15, 2015 http://link.springer.com/article/10.1007%2Fs00018-014-1661-9IF 5.81
Derr, M. Manic, "Wireless Sensor Networks - Node Localization for Various Industry Problems," in IEEE Transactions on Industrial Informatics, vol. 11, no. 3, pp. 752-762, Jan. 2015, DOI: 10.1109/TII.2015.2396007, IF 8.2
Lewinski, N. and McInnes, B.T. Using natural language processing techniques to inform research on nanotechnology. Beilstein J. Nanotechnol. 2015, 6, 1439-1449. http://www.beilstein-journals.org/bjnano/single/articleFullText.htm?publicId=2190-4286-6-149. IF 2.67
McInnes, B.T. and Pedersen, T. Evaluating Semantic Similarity and Relatedness over the Semantic Grouping of Clinical Term Pairs. Journal of Biomedical Informatics. 2015 Apr; 54:329-336. IF 2.126.
Moon, S., McInnes, B.T. and Melton, G.B. Challenges and Practical Approaches with Word Sense Disambiguation of Acronyms and Abbreviations in the Clinical Domain. Healthcare informatics research, 2015, 21 (1), 35-42. http://synapse.koreamed.org/DOIx.php?id=10.4258/hir.2015.21.1.35.
Bulut E., and Szymanski B., "Understanding User Behavior via Mobile Data Analysis", in Proc. of IEEE ICC (International Conference on Communications) Workshops, pp. 1548-1553, June 8, London, UK, 2015.Pinheiro D., Cano A., and Ventura S. Synthesis of In-Place Iterative Sorting Algorithms Using GP: A Comparison Between STGP, SFGP, G3P and GE. EPIA 2015 (Portuguese Conference on Artificial Intelligence), September 8-11, 2015, Coimbra, Portugal.
Bo Mei, Wei Cheng, Xiuzhen Cheng, “Fog Computing Based Ultraviolet Radiation Measurement via Smartphones”, in HotWeb 2015, Nov. 12-13, 2015, Washington DC.
Xiaolu Cheng, Jessica Lu, Wei Cheng, “A Survey on RFID Applications in Vehicle Networks”, in IIKI 2015, Oct. 22-23, Beijing, China.
Wei Cheng, Xiaolu Cheng, Dechang Chen, “Utilizing RSS-Ratio for Implementing Anonymous Communications in VANETs”, in ICCVE 2015, Oct. 19-23, Shenzhen, China.
Wei Cheng, Feng Chen, Xiuzhen Cheng, “Controlling the Spreads of Infectious Disease and Scare via Utilizing Location and Social Networking Information” in ACM Mobihoc 2015 workshops on Mobile Big Data, pp. 1-5, June 22-25, 2015, Hangzhou, China.
Zubair S. and Cios KJ. 2015. Extracting News Sentiment and Establishing its Relationship with the S&P 500 Index. HICSS’2015 (Hawaii International Conference on System Sciences), January 5-8, 2015, Kauai
Corley C, Damevski K, Kraft N. “Exploring the Use of Deep Learning for Feature Location”. ICSME 2015 (International Conference on Software Maintenance and Evolution), Sept. 29 – Oct. 1, 2015, Bremen, Germany.
Shepherd D, Damevski K, Pollock L. “How and When to Transfer Software Engineering Research via Extensions”. ICSE 2015 (International Conference on Software Engineering), May 18 – 22, 2015. Florence, Italy.
Damevski K, Shepherd D, Pollock L. “Scaling up Evaluation of Code Search Tools through Developer Usage Metrics”. SANER 2015 (IEEE International Conference on Software Analysis, Evolution, and Reengineering), March 2-6, 2015, Montreal, Canada.
Damevski K, Shepherd D, Kraft N, Pollock L. “Supporting Developers in Porting Software via Combined Textual and Structural Analysis of Software Artifacts”. CSESSP 2015 (NITRD Workshop on Computational Science & Engineering Software Sustainability and Productivity Challenges). October 14-16, 2015.
N. Dinh, X. Li, and M. T. Thai, Network Clustering via Maximizing Modularity: Approximation Algorithms and Theoretical Limits, The IEEE International Conference on Data Mining (ICDM), 2015. Regular paper, Acceptance rate: 8.4%)
Nguyen, T. N. Dinh, and T. Vu, Community Detection in Multiplex Social Networks, IEEE Workshop on Inter-Dependent Networks, INFOCOM (WIDN), 2015.
N. Dinhand M. T. Thai, Assessing Attack Vulnerability in Networks with Uncertainty, in Proceedings of the IEEE Int Conference on Computer Communications (INFOCOM), 2015 (acceptance rate: 19%).
T. Nguyen and T. N. Dinh, Unveiling the Structure of Multi-attributed Networks via Joint Non-negative Matrix Factorization, in Proceedings of the IEEE Military Communications Conference (MILCOM), 2015.
N. Dinh and R. Tiwari, Breaking Bad: Finding Triangle-Breaking Points in Large Networks, International Conference on Computational Social Networks (CSoNet), 2015. DOI:10.1007/978-3-319-21786-4_25
Dinh, T, Nguyen, H, Ghosh, P, Mayo, M. Social Influence Spectrum with Guarantees: Computing More in Less Time, Lecture Notes in Computer Science, LNCS 9197, Proceedings of the 4th International Conference on Computational Social Networks (CSoNet 2015), 84-103. http://dx.doi.org/10.1007/978-3-319-21786-4_8 (Best paper award)
Huanhuan Zhang, Jie Zhang, Carol Fungand Chang Xu. "Improving Sybil Detection via Graph Pruning and Regularization Techniques". In 7th Asian Conference on Machine Learning (ACML). November, 2015, Hong Kong.
Carol Fung and Bill McCormick. "VGuard: A Distributed Denial of Service Attack Mitigation Method using Network Function Virtualization". In 11th International Conference on Networks and Sevice Management (CNSM'15). Mini Conference Track. Barcelona, Spain.
Shaohan Huang, Carol Fung, Kui Wang, Yaqi Yang, Zhongzhi Luan, and Depei Qian. "Revisit Network Anomaly Ranking in Datacenter Network Using Re-ranking". In 4th IEEE International Conference on Cloud Computing (CloudNet'15). Niagara Falls, Canada.
Andrzej Kamisiński, and Carol Fung. "FlowMon: Detecting Malicious Switches in Software-Defined Networks". In ACM CCS workshop on Automated Decision Making for Active Cyber Defense 2015 (Safeconfig 2015). Denver, Colorado.
Bahman Rashidi, Carol Fung, Gerrit Bond, Steven Jackson, Marcus Pare, and Tam Vu. "RecDroid: An Android Resource Access Permission Recommendation System." ACM MobiHoc 2015. Demo paper. Hangzhou, China.
Chao Ding, Carol Fung, Kui Wang, Polo Peiz, You Meng, Zhongzhi Luan, Depei Qian. "A Methodology for Root-cause Analysis in Component Based Systems." IEEE/ACM International Symposium on Quality of Service (IWQoS) 2015. Short paper. Portland, Oregon.
Bahman Rashidi and Carol Fung. "A Game-Theoretic Model for Defending Against Malicious Users in RecDroid." Proceedings of the IEEE/IFIP IM2015 Workshop on Security for Emerging Distributed Network Technologies (DISSECT'15).
Lei Wei and Carol Fung. FlowRanger: "A Request Prioritizing Algorithm for Controller DoS Attacks in Software Defined Networks." IEEE International Conference on Communications (ICC 2015). London, UK.
Ioana Bara, Carol Fung, and T. N. Dinh. "Enhancing Twitter Spam Accounts Discovery Using Cross-Account Pattern Mining." IFIP/IEEE International Symposium on Integrated Network Management (IM 2015). Mini Conference. Ottawa, Canada.
Bahman Rashidi, Carol Fung, and Tam Vu. "Dude, Ask The Experts!: Resource Access Permission Recommendation with RecDroid." IFIP/IEEE International Symposium on Integrated Network Management (IM 2015). Main Track. Ottawa, Canada.
Gharibian, J. Sikora. Ground state connectivity of local Hamiltonians. Proceedings of the 42nd International Colloquium on Automata, Languages and Programming (ICALP), volume 9134 of Lecture Notes in Computer Science, pages 617 – 628, 2015, Kyoto, Japan.
Abdelzaher, T. Dinh, M. Mayo, P. Ghosh. Optimal topology of gene-regulatory networks: role of the average shortest path, Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS), 2015, pp. 1-4. http://bionetics.org/2015/show/accepted-papers
Pidaparti, S. Das and P. Ghosh. An Algorithm for Curvature Conformation in Microtubule Self-Assembly, Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS), 2015, pp. 1-4. http://bionetics.org/2015/show/accepted-papers.
Nalluri, P. Rana, V. Azevedo, D. Barh and P. Ghosh. Determining influential miRNA targets in diseases using influence diffusion model,BCB '15, Proceedings of the 6th ACM Conference on Bioinformatics, Computational Biology and Health Informatics, 519-20. doi>10.1145/2808719.2811440
Rana, P. Ghosh, K.R. Pilkiewicz, E.J. Perkins, C. Warner, M.L. Mayo. Capacity estimates of additive inverse Gaussian molecular channels with relay characteristics. Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS), 2015, pp. 1-4. http://bionetics.org/2015/show/accepted-papers.
Khajamoinuddin S, B. K. Kamapantula, M. Mayo, E. Perkins, P. Ghosh. Abundance of connected motifs in transcriptional networks, a case study using random forests regression. Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS), 2015, pp. 1-8. http://bionetics.org/2015/show/accepted-papers.
Nazi, A, Raj, M, Francesco, M.D, Ghosh, P, Das, S.K. Exploiting Gene Regulatory Networks for Robust Wireless Sensor Networking, Proceedings of the 2015 IEEE Global Communications Conference (GLOBECOM), pp. 1-6. http://globecom2015.ieee-globecom.org/content/technical-symposium-program-all-papers
Ghosh P., Kumar, A., Rangachari V. and Vaidya, A. Determination of Nucleation Mass for Amyloid-β Aggregation. Biophysical Journal 2015, 108(2), 525a.
Kecman V., Iterative k Data Algorithm for Solving Both The Least Squares SVM and The System of Linear Equations, Proceedings of the IEEE South-East Conf., Fort Lauderdale, FL, March, 2015
Amarasinghe, D. Wijayasekara, H. Carey, M. Manic, D. He, W. Chen, "Artificial Neural Networks based Thermal Energy Storage Control for Buildings," in Proc. 41st Annual Conference of the IEEE Industrial Electronics Society, IEEE IECON 2015, Yokohama, Japan, Nov. 09-12, 2015.
Wijayasekara, M. Manic, "Data-Fusion for Increasing Temporal Resolution of Building Energy Management System Data," in Proc. 41st Annual Conference of the IEEE Industrial Electronics Society, IEEE IECON 2015, Yokohama, Japan, Nov. 09-12, 2015. (Best student paper award)
Amarasinghe, M. Manic, R. Hruska, "Optimal Stop Word Selection for Text Mining in Critical Infrastructure Domain," in Proc. IEEE Symposium on Resilience Control Systems, ISRCS 2015, Philadelphia, PA, Aug. 18-20, 2015. DOI: 10.1109/RWEEK.2015.7287440
Wijayasekara, M. Manic, D. Gertman, "Data Driven Fuel Efficient Driving Behavior Feedback for Fleet Vehicles," in Proc. of IEEE 8th International Conference on Human System Interaction, IEEE HSI 2015, Warsaw, Poland, June 25-27, 2015. DOI: 10.1109/HSI.2015.7170646(Best paper award)
Joël Alwen, Rafail Ostrovsky, Hong-Sheng Zhou, Vassilis Zikas: Incoercible Multi-party Computation and Universally Composable Receipt-Free Voting. CRYPTO (2) 2015: 763-780
Dana Dachman-Soled, Feng-Hao Liu, Hong-Sheng Zhou: Leakage-Resilient Circuits Revisited - Optimal Number of Computing Components Without Leak-Free Hardware. EUROCRYPT (2) 2015: 131-158
Dov Gordon, Jonathan Katz, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou: Multi-Client Verifiable Computation with Stronger Security Guarantees. TCC (2) 2015: 144-168
Dana Dachman-Soled, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou: Locally Decodable and Updatable Non-malleable Codes and Their Applications. TCC (1) 2015: 427-450
Cios KJ and Nguyen DT. 2015. Data Mining and Data Visualization (Chapter 20, 294-323). In: Routledge International Handbook of Advanced Quantitative Methods in Nursing Research, Henly SJ (ed.)
Luna J.M., Cano A., and Ventura S. 2015. Genetic Programming for Mining Association Rules in Relational Database Environments. In Handbook of Genetic Programming Applications, Springer, ISBN 978-3-319-20882-4
Luna J.M., Cano A., and Ventura S. 2015. An Evolutionary Self-Adaptive Algorithm for Mining Association Rules. In Data Mining: Principles, Applications and Emerging Challenges, Nova Publishers, ISBN 978-1-63463-770-1
Snipes W, Murphy-Hill E, Fritz T, Vakilian M, Damevski K, Nair A, Shepherd D. 2015. A Practical Guide to Analyzing IDE Usage Data (Chapter 5, 85-136). In: The Art and Science of Analyzing Software Data, Bird C, Menzies T, Zimmerman T (ed.)
2014 Faculty Publications
Xinlei Wang, Wei Cheng, Prasant Mohapatra, Abdelzaher, T. “Enabling Reputation and Trust in Privacy-Preserving Mobile Sensing” in IEEE Transactions on Mobile Computing, vol. 13, no. 12, pp. 2777-2790, December 2014. IF: 2.912 http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6671556
Yanfei Lu, Xin Li, Xing Wei, Tao Jing, Wei Cheng, Yan Huo, “Secured access control for vehicles in RFID systems on roads” in Personal and Ubiquitous Computing, vol. 18, no. 8, pp. 1893-1900, September 2014. IF: 1.616 http://link.springer.com/article/10.1007%2Fs00779-014-0794-z
Wei Cheng, Shengling Wang, Xiuzhen Cheng, “Virtual Track: Applications and Challenges of the RFID System on Roads”, in IEEE Network, vol. 28, no. 1, pp 42-47, January 2014. IF: 3.72 http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6724105
Strack B, Jacobs K and Cios KJ. 2014. Simulating vertical and horizontal inhibition with short term dynamics in a multi-column multi-layer model of Neocortex. International Journal of Neural Systems, 24(5): 1440002 (2014) [19 pages] DOI: 10.1142/S0129065714400024. IF: 6.056 http://www.worldscientific.com/worldscinet/ijns
Strack B, Olmo J, DeShazo, Jennings C, Cios KJ and Clore JN. 2014. Impact of HbA1c Measurement on Hospital Readmission Rates: Analysis of 70,000 Clinical Database Patient Records. Hindawi Publishing Corp.: BioMed Research International, Volume 2014 (2014), Article ID 781670, 11 pages, http://dx.doi.org/10.1155/2014/781670, IF: 2.706 http://www.hindawi.com/journals/bmri/
Cano A, Nguyen DT, Ventura S and Cios KJ. 2014. ur-CAIM: An Improved CAIM Discretization Algorithm for Unbalanced and Balanced Data Sets. Soft Computing, October, DOI: 10.1007/s00500-014-1488-1, IF: 1.304 http://www.springer.com/engineering/computational+intelligence+and+complexity/journal/500
Cano A, Ventura S and Cios KJ. 2014. Scalable CAIM Discretization on Multiple GPUs Using Concurrent Kernels. The Journal of Supercomputing, July 2014, 69(1), pp 273-292, DOI: 10.1007/s11227-014-1151-8, IF: 0.841 http://www.springer.com/computer/swe/journal/11227
N. P. Nguyen, T. N. Dinh, Y. Shen, and My T. Thai, Dynamic social community detection and its applications, PLoS ONE, 2014. IF: 3.534 http://www.plosone.org/article/info%3Adoi%2F10.1371%2Fjournal.pone.0091431
T. N. Dinh and M. T. Thai, Network under Joint Node and Link Attacks: Vulnerability Assessment Methods and Analysis, IEEE/ ACM Transactions on Networking (ToN), 2014. IF:1.986, http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6805229
T. N. Dinh, H. Zhang, Y. Shen, D. T. Nguyen, and M. T. Thai, Cost-effective Viral Marketing for Time-critical Campaigns in Large-scale Social Networks, IEEE/ ACM Transactions on Networking (ToN), 2014. IF: 1.986 http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6678627
N. P. Nguyen, M. A. Alim, T. N. Dinh, M. T. Thai, A method to detect communities with stability in social networks, Social Network Analysis and Mining, 2014 http://link.springer.com/article/10.1007%2Fs13278-014-0224-2
Y Shen, T. N Dinh, M. T. Thai, HT Nguyen, Staying safe and visible via message sharing in online social networks, Journal of Combinatorial Optimization 28 (1), 186-217, 2014. IF: 1.043 http://link.springer.com/article/10.1007%2Fs10878-013-9667-z
T. N. Dinh and M. T. Thai, Bound and Exact Methods for Assessing Link Vulnerability in Complex Networks, Journal of Combinatorial Optimization (JOCO), 2014, IF: 1.043 http://link.springer.com/article/10.1007%2Fs10878-014-9742-0
S. Gharibian, J. Kempe. Hardness of approximation for quantum problems, Quantum Information & Computation 14 (5 & 6): 517-540, 2014. IF: 1.625 http://www.rintonpress.com/xxqic14/qic-14-56/0517-0540.pdf
D. Berry, R. Cleve, S. Gharibian. Gate-efficient discrete simulations of continuous-time quantum query algorithms. Quantum Information & Computation 14 (1 & 2): 0001-0030, 2014. IF: 1.625, http://www.rintonpress.com/xxqic14/qic-14-12/0001-0030.pdf
Mayo, M, Abdelzaher, A, Perkins, EJ, Ghosh, P. Top-level dynamics and the regulated gene response of feed-forward loop transcriptional motifs. Physical Review E, 90:3, pp. 032706-1 – 032706-12, 2014, IF: 2.326
Nazi, A, Raj, M, Francesco, M, Ghosh, P, Das, S.K. Deployment of Robust Wireless Sensor Networks using Gene Regulatory Networks: an Isomorphism-based Approach, Pervasive and Mobile Computing, 13, pp. 246-257, 2014, IF: 1.667.
Pokrajac D., Lazarevic A., Kecman V., Marcano A., Markushin Y., Vance T., Reljin N., McDaniel S., Melikechi N., Automatic Classification of Laser-Induced Breakdown Spectroscopy (LIBS) Data of Protein Biomarker Solutions, Applied Spectroscopy, Vol. 68, Iss. 9, pp. 1067-1075, 2014 IF: 2.014
D. Wijayasekara, O. Linda, M. Manic, C. Rieger, "Mining Building Energy Management System Data Using Fuzzy Anomaly Detection and Linguistic Descriptions," in IEEE Transactions on Industrial Informatics, vol. 10, no. 3, pp. 1829-1840, 03 June 2014. DOI: 10.1109/TII.2014.2328291. IF: 8.785
D. Wijayasekara, O. Linda, M. Manic, C. Rieger, "FN-DFE: Fuzzy-Neural Data Fusion Engine for Enhanced Resilient State-Awareness of Hybrid Energy Systems," Accepted for publication in IEEE Transactions on Cybernetics, May 2014. DOI: 10.1109/TCYB.2014.23238913. IF: 3.236
T. Vollmer, M. Manic, O. Linda, "Autonomic Intelligent Cyber Sensor to Support Industrial Control Network Awareness," in IEEE Transactions on Industrial Informatics, vol. 10, no. 2, pp. 1647-1658, May 2014. DOI: 10.1109/TII.2013.2270373. IF: 8.785
T. Vollmer, M. Manic, "Cyber-Physical System Security with Deceptive Virtual Hosts for Industrial Control Networks," in IEEE Transactions on Industrial Informatics, vol. 10, no. 2, pp. 1337-1347, May 2014. DOI: 10.1109/TII.2014.2304633. IF: 8.785
B.T. McInnes and M. Stevenson. Determining the difficulty of word sense disambiguation. Journal of Biomedical Informatics. 2014 Feb; 47:83-90, doi: 10.1016/j.jbi.2013.09.009, IF: 2.482
Xiangyu Liu, Bin Wang, Xiaochun Yang, Meng Yu, Wanyu Zang, Obtaining K-obfuscation for profile privacy in social networks. Security and Communication Networks 7(9): 1384-1398 (2014) http://onlinelibrary.wiley.com/doi/10.1002/sec.871/abstract;jsessionid=8FEB08F7D571853240A8042AD67BDF02.f04t04, IF 0.433
Yan Huo, Yumeng Lu, Wei Cheng, Tao Jing, “Vehicle Road Distance Measurement and Maintenance in RFID Systems on Roads”, in IEEE ICCVE 2014, Nov. 3-7, Austria. http://www.iccve.orgTao Jing, Fan Zhang, Wei Cheng, Yan Huo, Xiuzhen Cheng, “Online Auction Based Relay Selection for Cooperative Communications in CR Networks”, in WASA 2014, June 2014, China. http://www.cs.gsu.edu/WASA2014
David Jackson, Wanyu Zang, Qijun Gu, Wei Cheng “Exploiting and Defending Trust Models in Cooperative Spectrum Sensing”, in WASA 2014, June 2014, China. http://www.cs.gsu.edu/WASA2014
Tao Jing, Xuewei Cui, Wei Cheng, Shixiang Zhu, Yan Huo, “Enabling Smartphone Based HD Video Chats by Cooperative Transmissions in CRNs”, in WASA 2014, June 2014, China. http://www.cs.gsu.edu/WASA2014
Wei Cheng, Jindan Zhu, Prasant Mohapatra, Jie Wang, “Time and Energy Efficient Localization”, in IEEE SECON 2014, June 2014, Singapore. http://secon2014.ieee-secon.org
Y. Song and T. N. Dinh, Optimal Containment of Misinformation in Social Media: A Scenario-based Approach, International Workshop on Computational Networks (CSoNet), Hawaii, Lecture Note in Computer Science, 2014 http://link.springer.com/chapter/10.1007%2F978-3-319-12691-3_40
Md. A. Alim, N. P. Nguyen, T. N. Dinh, and M. T. Thai, Vulnerability Analysis of Overlapping Communities in Complex Networks, in Proceedings of the 2014 IEEE/WIC/ACM International Conference on Web Intelligence (WI), 2014 http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6927519
S. Mishra, T. N. Dinh, and M. T. Thai, Optimal Inspection Points for Malicious Attack Detection in Smart Grids, The 20th International Computing and Combinatorics Conference (COCOON), 2014, http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6927519
Bahman Rashidi, Carol Fung, and Tam Vu, “RecDroid: A Resource Access Permission Control Portal and Recommendation Service for Smartphone Users”. Workshop on Security and Privacy Aspects of Mobile Environment. 2014 (SPME14), http://dl.acm.org/citation.cfm?id=2646586
Carol Fung, M. Gharbaoui, F. Paolucci, A. Giorgetti, P. Castoldi, and B. Martini, “Quality of Interaction among Path Computation Elements for Trust-aware Inter-Provider Cooperation”. IEEE International Conference on Communications (ICC14), Sydney, Australia, 2014 http://icc2014.ieee-icc.org/
Carol Fung, Disney Lam, and Raouf Boutaba, “RevMatch: An Efficient and Robust Decision Model for Collaborative Malware Detection”. IEEE/IFIP Network Operation and Management Symposium (NOMS14). Krakow, Poland, 2014 http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6838251
S. Gharibian, Z. Landau, S. W. Shin, G. Wang. Tensor network non-zero testing, 14th Asian Quantum Information Science Conference (AQIS), August 20-24, 2014, in Kyoto, Japan. Presented by S. W. Shin. Preprint available at http://arxiv.org/abs/1406.5279.
S. Gharibian, J. Kempe. Hardness of approximation for quantum problems, ELC Workshop on Inapproximability, January 25-26, 2014, at University of Electro-Communications, Chofu, Japan. Invited talk.
M. Mayo, A. Abdelzaher, B. Kamapantula, E. Perkins, and P. Ghosh, Networks of interactions between feed-forward loop transcriptional motifs in gene-regulatory networks, BICT 2014, pp.1-4.
B. Kamapantula, M. Mayo, E. Perkins, A. Abdelzaher and P. Ghosh, Feature ranking in transcriptional networks: Packet receipt as a dynamical metric, BICT 2014, pp. 1-8, Best student paper award.
A. Abdelzaher, M. Mayo, E. Perkins and P. Ghosh. Correlating In silico Feed-forward Loop Knockout Experiments with the Topological Features of Transcriptional Regulatory Networks, BICT 2014, pp. 1-8.
B. K. Kamapantula, M. Mayo, E. Perkins and P. Ghosh. Dynamical impacts from structural redundancy of transcriptional motifs in gene-regulatory networks, BICT 2014, pp. 1-8.
S. Das, R. Pidaparti and P. Ghosh. Modeling Self-organization of Microtubules from Tubulins, BICT 2014, pp.1-4, http://bionetics.org/2014/media/uploads/BICT_program_v6.1-fin.pdf.
Mayo, M, Abdelzaher, A, Ghosh, P. Mixed Degree-Degree Correlations in Directed Social Networks, LNCS CSoNet, 2014, pp. 571-580, http://link.springer.com/chapter/10.1007%2F978-3-319-12691-3_42.
Ahmed F. Abdelzaher, Ahmad F. Al-Musawi, Preetam Ghosh, David S. Jackson, John A. Palesis and Jonathan P. Deshazo, Variations of Care Coordination Metrics for Sharing Patients among Physicians: A Social Network Analytic Approach, ACM BCB 2014, pp. 635-636, http://dl.acm.org/citation.cfm?id=2660811.
Winfrey, C.M., Baldwin, B.J., Cummings, M.A., Ghosh, P. OSM: An Evolutionary System of Systems Framework for Modeling and Simulation, ACM SpringSim 2014, pp. 1-8, http://dl.acm.org/citation.cfm?id=2664293.
Kecman V., Zigic Lj., Algorithms for Direct L2 Support Vector Machines, The IEEE International Symposium on INnovations in Intelligent SysTems and Applications, INISTA 2014, 978-1-4799-3020-3/14 ©2014 IEEE, Alberobello, Italy, June 2014 http://www.inista.org/
Zigic Lj., Kecman V., Variants and Performances of Novel Direct Learning Algorithms for L2 Support Vector Machines, in L. Rutkowski et al. (Eds.): ICAISC 2014, Part II, LNAI 8468, pp. 82–91, 2014 http://www.icaisc.eu/
Zigic Lj., Kecman V., Direct L2 Support Vector Machine Classifier and Performances of Its Two Implementations, Proceedings of the IEEE South-East Conf., Lexington, KY, March, 2014 http://ewh.ieee.org/reg/3/southeastcon2014/
V. Molano, C. Cobos, M. Mendoza, E. Herrera-Viedma, M. Manic, "Feature Selection based on Sampling and C4.5 Algorithm to Improve the Quality of Text Classification using Naive Bayes," Accepted for publication at the 13th Mexican International Conference on Artificial Intelligence, MICAI 2014, Tuxtla Gutierrez, Chiapas, Mexico, Nov. 16-24, 2014. http://www.micai.org/2014/
D. Wijayasekara, M. Manic, "Dynamic Fuzzy Force Field Based Force-Feedback for Collision Avoidance in Robot Manipulators," in Proc. 40th Annual Conference of the IEEE Industrial Electronics Society, IEEE IECON 2014, Dallas, TX- USA, Oct. 29 - Nov. 1, 2014. http://www.micai.org/2014/
D. Wijayasekara, M. Manic, M. McQueen, "Vulnerability Identification and Classification Via Text Mining Bug Databases," in Proc. 40th Annual Conference of the IEEE Industrial Electronics Society, IEEE IECON 2014, Dallas, TX- USA, Oct. 29 - Nov. 1, 2014. http://iecon2014.org/
D. Wijayasekara, M. Manic, "Data Driven Fuzzy Membership Function Generation for Increased Understandability," in Proc. of FUZZ-IEEE, 2014, within, IEEE World Congress On Computational Intelligence, WCCI 2014, Beijing, China, July 6-11, 2014. http://www.ieee-wcci2014.org/
K. McCarty, M. Manic, "Fuzzy Contexts (Type C) and Fuzzymorphism to Solve Situational Discontinuity Problems," in Proc. of FUZZ-IEEE, 2014, within, IEEE World Congress On Computational Intelligence, WCCI 2014, Beijing, China, July 6-11, 2014. http://www.ieee-wcci2014.org/
D. Wijayasekara, M. Manic, "Fuzzy Logic Based Force-Feedback for Obstacle Collision Avoidance of Robot Manipulators," in Proc. of IEEE 7th International Conference on Human System Interaction, IEEE HSI 2014, Lisbon, Portugal, June 16-18, 2014. http://sites.uninova.pt/hsi2014/
D. Wijayasekara, M. Manic, D. Gertman, "Driving Behavior Prompting Framework for Improving Fuel Efficiency," in Proc. of IEEE 7th International Conference on Human System Interaction, IEEE HSI 2014, Lisbon, Portugal, June 16-18, 2014. http://sites.uninova.pt/hsi2014/
K. Amarasinghe, D. Wijayasekara, M. Manic, "EEG based brain activity monitoring using Artificial Neural Networks," in Proc. of IEEE 7th International Conference on Human System Interaction, IEEE HSI 2014, Lisbon, Portugal, June 16-18, 2014. http://sites.uninova.pt/hsi2014/
K. McCarty, M. Manic, "A Database Driven Memetic Algorithm for Fuzzy Set Optimization," in Proc. of IEEE 7th International Conference on Human System Interaction, IEEE HSI 2014, Lisbon, Portugal, June 16-18, 2014, http://sites.uninova.pt/hsi2014/
K. Amarasinghe, D. Wijayasekara, M. Manic, "Neural Network Based Downscaling of Building Energy Management System Data," in Proc. IEEE International Symposium on Industrial Electronics, ISIE 2014, Istanbul, Turkey, June 1-4, 2014. http://www.isie.boun.edu.tr/
O. Linda, D. Wijayasekara, M. Manic, M. McQueen, "Optimal Placement of Phasor Measurement Units in Power Grids Using Memetic Algorithms," in Proc. IEEE International Symposium on Industrial Electronics, ISIE 2014, Istanbul, Turkey, June 1-4, 2014. http://www.isie.boun.edu.tr/
H. Hess, V. Gupta, D. Wijayasekara, E. William, M. Huff, O. Linda, M. Krei, M. Manic, A. Thakker, F. Rufus, J. Govar, "State of Charge Indicator (SOCI) Design for Li/CFx Battery", in Proc. 2014 Army Power Sources Conference, pp. 1-6, Jun. 9-12, 2014. http://www.powersourcesconference.com
M. Manic, D. Wijayasekara, K. Amarasinghe, J. Hewlett, K. Handy, C. Becker, B. Patterson, R. Peterson, "Next Generation Emergency Communication Systems via Software Defined Networks," in Proc. GENI Research and Educational Experiment Workshop (GREE 2014) - Jointly with the 19th GENI Engineering Conference (GEC 19), Atlanta Georgia, Mar. 19-20 2014, http://groups.geni.net/geni/wiki/APRAGENI/GREE2014
B.T. McInnes, T. Pedersen, Y. Liu, S. Pakhomov, and G.B. Melton. U-path: An undirected path-based measure of semantic similarity. Appears in the Proceedings of the Annual Symposium of the American Medical Informatics Association (AMIA), November 2014 http://www.amia.org/amia2014
Jonathan Katz, Aggelos Kiayias, Hong-Sheng Zhou, Vassilis Zikas, “Distributing the Setup in Universally Composable Multi-Party Computation”, PODC 2014 -- ACM Symposium on Principles of Distributed Computing, http://dl.acm.org/citation.cfm?doid=2611462.2611480
Shafi Goldwasser, Dov Gordon, Vipul Goyal, Abhishek Jain, Jonathan Katz, Feng-Hao Liu, Amit Sahai, Elaine Shi, Hong-Sheng Zhou, “Multi-Input Functional Encryption”, EUROCRYPT 2014 -- Advances of Cryptology http://link.springer.com/chapter/10.1007%2F978-3-642-55220-5_32
Seung Geol Choi, Jonathan Katz, Dominique Schröder, Arkady Yerukhimovich, Hong-Sheng Zhou, “(Efficient) Universally Composable Two-Party Computation Using a Minimal Number of Stateless Tokens”, TCC 2014 -- Theory of Cryptography Conference http://link.springer.com/chapter/10.1007%2F978-3-642-54242-8_27
Min Li, Zili Zha, Wanyu Zang, Meng Yu, Peng Liu, Kun Bai. “Detangling Resource Management Functions from the TCB in Privacy-Preserving Virtualization.” In The 19th European Symposium on Research in Computer Security (ESORICS 2014). September 7-11, 2014, Wroclaw, Poland
Bin Wang, Xiaochun Yang, Wanyu Zang and Meng Yu. “Approximate Self-Adaptive Data Collection in Wireless Sensor Networks.” In The 9th International Conference on Wireless Algorithms, Systems, and Applications (WASA 2014). June 23-25, 2014, Harbin, China http://www.cs.gsu.edu/WASA2014
2013 Faculty Publications
Slawek J, Arodz T. ENNET: Inferring Large Gene Regulatory Networks from Expression Data using Gradient Boosting. BMC Systems Biology 7:106, 2013. Impact Factor: 2.98Federici G, Gao X, Slawek J, Arodz T, Shitaye A, Wulfkuhle JD, de Maria R, Liotta LA, Petricoin EF. Systems Level Network Analysis of the NCI-60 Cancer Cell Lines by Alignment of Protein Pathway Activation Modules with Multiple "-omic" Data Fields and Therapeutic Response Signatures. Molecular Cancer Research 11:676-685, 2013. Impact Factor: 4.353
Arodz T, Plonka PM. Sequence and Structure Space Model of Protein Divergence driven by Point Mutations. Journal of Theoretical Biology 330:1-8, 2013. Impact Factor: 2.351
Arodz T, Bonchev D, Diegelmann RF. Network Approach to Wound Healing. Advances in Wound Care 2: 499-509, 2013
Shraboni Jana, Kai Zeng, Wei Cheng, Prasant Mohapatra, “Trusted Collaborative Spectrum Sensing for Mobile Cognitive Radio Networks”, in IEEE Transactions on Information Forensics and Security, vol. 8, no.9, pp. 1497-1507, 2013, Impact Factor 1.895.
Xiaoshuang Xing, Tao Jing, Wei Cheng, Yan Huo, Xiuzhen Cheng, “Spectrum Prediction in Cognitive Radio Networks”, IEEE Wireless Communications, vol. 20, no. 2, pp. 90-96, April 2013, Impact Factor 3.74.
Wei Cheng, Nan Zhang, Min Song, Dechang Chen, Xiuzhen Cheng, “Time-Bounded Essential Localization for Wireless Sensor Networks”, IEEE/ACM Transactions on Networking vol. 21, no.2, pp. 400-412, April 2013, Impact Factor 2.014.
Nguyen DT, Nguyen CD, Hobson R, Kurgan LA and Cios KJ. 2013. mi-DS: Multiple-Instance Learning Algorithm. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, 43(1)143-154, Impact Factor 3.236
Dinh TNand Thai MT, Community Detection in Scale-free Networks: Approximation Algorithms for Maximizing Modularity, IEEE Journal on Selected Areas in Communications: Special Issue on Network Science (JSAC), Vol. 31, Issue 6, pp. 997-1006, 2013, Impact Factor 3.121
Tiwari R, Dinh TN, and Thai TM, On Centralized and Localized approximation algorithms for Interference-Aware Broadcast Scheduling, IEEE Transaction on Mobile Computing (TMC), Vol. 12, Issue 2, pp. 233-247, 2013, Impact Factor 2.395
Ghag, G, Ghosh P., Mauro, A., Rangachari V. and Vaidya, A. Stability Analysis of 4-species A-beta Aggregation Model: A Novel Approach to Obtaining Physically Meaningful Rate Constants.Applied Mathematics and Computation, 224: 205-215, 2013, Impact factor: 1.349
Santos, AR, Barbosa, E, Fiaux, K, Zurita-Turk, M, Chaitankar, V, Kamapantula, B, Abdelzaher, A, Ghosh, P, Tiwari, S, Barve, N, Jain, N, Barh, D, Silva, A, Miyoshi, A, and Azevedo, V. Pannotator: An automated tool for annotation of pan-genomes. Genet. Mol. Res. 12 (3): 2982 – 2989, 2013, Impact factor: 0.99
Debmalya Barh, Neha Jain, Sandeep Tiwari, John K Field, Elena Padin-Iruegas, Alvaro Ruibal, Rafael López, Michel Herranz, Antaripa Bhattacharya, Lucky Juneja, Cedric Viero, Artur Silva, Anderson Miyoshi, Anil Kumar, Kenneth Blum, Vasco Azevedo, Preetam Ghosh, Triantafillos Liloglou. A novel in silico reverse-transcriptomics-based identification and blood-based validation of a panel of sub-type specific biomarkers in lung cancer, BMC Genomics, 14, Suppl 6: S5, 2013, Impact factor: 4.4
Kamapantula, B, Abdelzaher, A, Ghosh, P., Mayo, M., Perkins, E., and Das, S.K. Leveraging the Robustness of Genetic Networks: A Case Study on Bio-inspired Wireless Sensor Topologies. Journal of Ambient Intelligence and Humanized Computing, 2013, DOI : 10.1007/s12652-013-0180-0, Impact factor: 1.77
Barh, D, Gupta, K, Jain, N, Khatri, G, Leon Sicairos, N, Tiwari, S, Rahangdale, S, Verma, A, Hassan, S, Rodrigues dos Santos, A, Ali, A, Thiao Juca Ramos, R, Miyoshi, A, Silva, A, Kumavath, R, Kumar, A, Ghosh, P, Blum, K, Misra, AN and Azevedo, V. Globally conserved inter-species bacterial PPIs based conserved host-pathogen interactome derived novel target in C. pseudotuberculosis, C. diptheriae, M. tuberculosis, C. ulcerans, Y. pestis and E. coli targeted by Piper betel compounds, Journal of Integrative Biology, 2013, Impact factor: 4.321
Strack R., Kecman V., Strack B., Li Q., Sphere Support Vector Machines for Large Classification Tasks, Neurocomputing, Vol. 101, pp. 59–67, 2013, Impact Factor 1.634
Li Q., Salman R., Test E., Strack R., Kecman V., Parallel Multi-task Cross Validation for Support Vector Machine Using GPU, Journal of Parallel and Distributed Computing, Vol. 73, Issue 3, pp. 293-302, 2013, 1.116
Chengpo Mu, Meng Yu, Yingjiu Li, Wanyu Zang. “Risk balance defense approach against intrusions for network server.” International Journal of Information Security. October 2013. http://link.springer.com/article/10.1007%2Fs10207-013-0214-9.
Yan Yang, Yulong Zhang, Alex Hai Wang, Meng Yu, Wanyu Zang, Peng Liu, Sushil Jajodia,“Quantitative survivability evaluation of three virtual machine-based server architectures”. Journal of Network and Computer Applications, Volume 36, Issue 2, March 2013, Pages 781–790.
Gao X, Arodz T. Detecting Differentially Co-expressed Genes for Drug Target Analysis. In: "Proc. International Conference on Computational Science ICCS'2013, Barcelona, Spain, 5-7 June", Procedia Computer Science 18:1392-1401, Elsevier, 2013.Tao Jing, Xing Wei, Wei Cheng, Mingyang Guan, Yan Huo, “Emergent Information Diffusion in RFID Systems on Roads”, in IEEE ICCVE 2013, December 2-6, 2013, Las Vegas, USA.
Tao Jing, Xingni Li, Wei Cheng, Yan Huo, “Speeding Detection in RFID Systems on Roads”, in IEEE ICCVE 2013, December 2-6, 2013, Las Vegas, USA.
Wei Cheng, “Engineering Challenges in RFID Systems on Roads”, in ICAPEM 2013, Nov. 21-22, 2013, Shanghai, China.
Yanfei Lu, Xin Li, Xing Wei, Tao Jing, Wei Cheng, Yan Huo, “Secured Access Control for Vehicles in RFID Systems on Roads” in IIKI 2013, October 18-20, 2013, Beijing China.
Bowu Zhang, Wei Cheng, Limin Sun, Xiuzhen Cheng, Taieb Znati, Mznah A. Al-Rodhaan, Abdullah Al-Dhelaan, “Queuing Modeling for Delay Analysis in Mission Oriented Sensor Networks under the Protocol Interference Model”, in ACM MiSeNet’13, October 4, 2013, Miami, Florida, USA. (Best Paper Award)
Wei Zhou, Tao Jing, Wei Cheng, Tao Chen, Yan Huo, “Combinatorial Auction Based Channel Allocation in Cognitive Radio Networks”, in CROWNCOM, July 8-10, 2013, Washington DC, USA.
Tao Jing, Xiaoshuang Xing, Wei Cheng, Yan Huo, Taieb Znati , “Cooperative Spectrum Prediction in Multi-PU Multi-SU Cognitive Radio Networks” in CROWNCOM, July 8-10, 2013, Washington DC, USA.
Xianfu Chen, Tao Chen, Wei Cheng, Honggang Zhang, “Reciprocity Inspired Learning for Opportunistic Spectrum Access in Cognitive Radio Networks,” in CROWNCOM, July 8-10, 2013, Washington DC, USA.
Wei Cheng, Kefeng Tan, Victor Omwando, Jindan Zhu, Prasant Mohapatra, “RSS-Ratio for Enhancing Performance of RSS-based Applications, in IEEE INFOCOM, April 2013, Turin, Italy.
Xinlei Wang, Wei Cheng, Prasant Mohapatra, Tarek Abdelzaher, “AnonyTrust: An Provenance-based Scheme towards Anonymous Trust in Participatory Sensing”, in IEEE INFOCOM, April 2013 , Turin, Italy.
Ningning Cheng, Xinlei Wang, Wei Cheng, Prasant Mohapatra, Aruna Seneviratne, “Characterizing Privacy Leakage of Public WiFi Networks for Users on Travel”, in IEEE INFOCOM, April 2013, Turin, Italy.
Strack B, Jacobs K and Cios KJ. 2013. Biological Restraint on the Izhikevich Neuron Model Essential for Seizure Modeling. Conf. Proceedings of the 6th November, 395-398; Student Best Paper Award
Strack B, Jacobs K and Cios KJ. 2013. Simulating Lesions in Multi-layer, Multi-columnar Model of Neocortex. Conf. Proceedings of the 6th Int. IEEE EMBS Conference on Neural Engineering, San Diego, 6-8 November, 835-838
Dinh TN, Nguyen NP, and Thai MT, An Adaptive Approximation Algorithm for Community Detection in Dynamic Scale-free Networks, in Proceedings of the 32nd IEEE Int. Conference on Computer Communications, (INFOCOM) Mini-Conference, Turin, Italy, 2013
Nguyen DT, Zhang H, Das S, Thai MT, and Dinh TN, Least Cost Influence in Multiplex Social Networks: Model Representation and Analysis, The IEEE International Conference on Data Mining (ICDM), Dallas, Dec. 2013
Zhang, Dinh TN, and Thai MT, Maximizing the Spread of Positive Influence in Online Social Networks, The 33rd IEEE International Conference on Distributed Computing Systems (ICDCS), Philadelphia, 2013
Carol Fungand Raouf Boutaba, "Design and Management of Collaborative Intrusion Detection Networks". The 15th IFIP/IEEE International Symposium on Integrated Network Management (IM 2013). Dissertation Paper. Ghent, Belgium, 2013. Best Dissertation Award
Nalluri, J, Kamapantula, B, Ghosh, P, Barh, D, Jain, N, Juneja, L, Barve, N. Determining miRNA-disease associations using bipartite graph modelling, ACM BCB 2013, pp 672-674.
Nazi, A, Raj, M, Francesco, M.D, Ghosh, P, Das, S.K. Robust Deployment of Wireless Sensor Networks using Gene Regulatory Networks, ICDCN 2013, pp. 192-207.
Abdelzaher, A, Kamapantula, B, Ghosh, P., and Das, S.K. A Theoretical Framework for Quantifying the Robustness of Biological Network Topologies, In proc. of Complex Network Dynamics Workshop (CoNeD 2013) in conjunction with ICDCN 2013, pp. 1-6.
Zigic Lj., Strack R., Kecman V., L2 Support Vector Machines Revisited - Novel Direct Learning Algorithm and Some Geometric Insights, Proc. of 19th 339, 2013
Test E., Zigic Lj., Kecman V., Feature Ranking Using Gini Index, Scatter Ratios, and Nonlinear SVM, Proc. of IEEE South-East Conf., Jacksonville, FL, April 4-7, 2013
Albarakati N., Kecman V., Fast Neural Network Algorithm For Solving Classification Tasks, Proc. of IEEE South-East Conf., Jacksonville, FL, April 4-7, 2013
Chung K, Katz J, Zhou H. Functional Encryption from (Small) Hardware Tokens. ASIACRYPT 2013, Bengaluru, India, December 1-5, 2013.
Katz J, Thiruvengadam A, Zhou H. Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption. 16th International Conference on Practice and Theory in Public-Key Cryptography (PKC 2013), Nara, Japan, February 26 - March 1, 2013
Choi SG, Katz J, Wee H, Zhou H. Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS. 16th International Conference on Practice and Theory in Public-Key Cryptography (PKC 2013), Nara, Japan, February 26 - March 1, 2013
Fehr S, Katz J, Song F, Zhou H, Zikas V. Feasibility and Completeness of Cryptographic Tasks in the Quantum World. 10th Theory of Cryptography Conference (TCC 2013), Tokyo, Japan, March 3-6, 2013
Min Li, Wanyu Zang, Kun Bai, Meng Yu, Peng Liu. “MyCloud -- Supporting User-Configured Privacy Protection in Cloud Computing”. In Annual Computer Security Applications Conference. New Orleans, Louisiana USA, December 2013.
Carol Fung and Raouf Boutaba. "Intrusion Detection Networks: A Key to Distributed Security", CRC Press. 259 pages. ISBN: 978-1-4665-6412-1. November 2013.
Dinh TN, Thai MT, and Nguyen DT, A Unified Approach for Domination Problems on Different Network Topologies, Handbook of Combinatorial Optimization, (P. Pardalos, D. Du, and R. Graham eds), Springer Publisher, ISBN 978-1-4419-7996-4.Thai MT, Dinh TN, and Shen Y, Hardness and Approximation of Network Vulnerability, Handbook of Combinatorial Optimization, (P. Pardalos, D. Du, and R. Graham eds), Springer Publisher, ISBN 978-1-4419-7996-4.