Theo dõi
Latifur Khan
Tiêu đề
Trích dẫn bởi
Trích dẫn bởi
Năm
Support vector machines
M Awad, L Khan
Intelligent Information Technologies: Concepts, Methodologies, Tools, and …, 2008
46932008
A new intrusion detection system using support vector machines and hierarchical clustering
L Khan, M Awad, B Thuraisingham
The VLDB journal 16, 507-521, 2007
5902007
Classification and novel class detection in concept-drifting data streams under time constraints
M Masud, J Gao, L Khan, J Han, BM Thuraisingham
IEEE Transactions on knowledge and data engineering 23 (6), 859-874, 2010
5402010
A machine learning approach to android malware detection
J Sahs, L Khan
2012 European intelligence and security informatics conference, 141-147, 2012
5132012
Hypoglycaemic activity of Coccinia indica and Momordica charantia in diabetic rats: depression of the hepatic gluconeogenic enzymes glucose-6-phosphatase …
BA Shibib, LA Khan, R Rahman
Biochemical Journal 292 (1), 267-270, 1993
4011993
Systems and methods for determining user attribute values by mining user network data and information
S Abrol, V Khadilkar, LR Khan, BM Thuraisingham
US Patent 8,965,974, 2015
3652015
Security issues for cloud computing
K Hamlen, M Kantarcioglu, L Khan, B Thuraisingham
International Journal of Information Security and Privacy (IJISP) 4 (2), 36-48, 2010
3592010
Image annotations by combining multiple evidence & wordnet
Y Jin, L Khan, L Wang, M Awad
Proceedings of the 13th annual ACM international conference on Multimedia …, 2005
3592005
Constructing gene co-expression networks and predicting functions of unknown genes by random matrix theory
F Luo, Y Yang, J Zhong, H Gao, L Khan, DK Thompson, J Zhou
BMC bioinformatics 8, 1-17, 2007
3032007
Heuristics-based query processing for large RDF graphs using cloud computing
M Husain, J McGlothlin, MM Masud, L Khan, BM Thuraisingham
IEEE Transactions on Knowledge and Data Engineering 23 (9), 1312-1327, 2011
2902011
Data mining techniques
J Han
ACM SIGMOD Record 25 (2), 545, 1996
280*1996
Ontology construction for information selection
L Khan, F Luo
14th IEEE International Conference on Tools with Artificial Intelligence …, 2002
2702002
Smv-hunter: Large scale, automated detection of ssl/tls man-in-the-middle vulnerabilities in android apps
D Greenwood, ZLL Khan
Network and Distributed System Security Symposium (NDSS). Internet Society …, 2014
2552014
Retrieval effectiveness of an ontology-based model for information selection
L Khan, D McLeod, E Hovy
the VLDB Journal 13, 71-85, 2004
2522004
Sand: Semi-supervised adaptive novel class detection and classification over data stream
A Haque, L Khan, M Baron
Proceedings of the AAAI Conference on Artificial Intelligence 30 (1), 2016
2222016
Systems and methods for automated detection of application vulnerabilities
L Khan, Z Lin, B Thuraisingham, J Sahs, D Sounthiraraj, G Greenwood
US Patent 9,977,904, 2018
2202018
A practical approach to classify evolving data streams: Training with limited amount of labeled data
MM Masud, J Gao, L Khan, J Han, B Thuraisingham
2008 Eighth IEEE International Conference on Data Mining, 929-934, 2008
2162008
Decentralized IoT data management using blockchain and trusted execution environment
G Ayoade, V Karande, L Khan, K Hamlen
2018 IEEE international conference on information reuse and integration (IRI …, 2018
2142018
Estimating twitter user location using social interactions--a content based approach
S Chandra, L Khan, FB Muhaya
2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011
1992011
Secure knowledge management: confidentiality, trust, and privacy
E Bertino, LR Khan, R Sandhu, B Thuraisingham
IEEE Transactions on systems, man, and cybernetics-Part A: Systems and …, 2006
1822006
Hệ thống không thể thực hiện thao tác ngay bây giờ. Hãy thử lại sau.
Bài viết 1–20