关注
Akshay Vashist
Akshay Vashist
Otsuka Pharmaceutical Co.
在 otsuka-us.com 的电子邮件经过验证
标题
引用次数
引用次数
年份
A new learning paradigm: Learning using privileged information
V Vapnik, A Vashist
Neural Networks 22 (5), 544-557, 2009
9882009
System and method for correlating historical attacks with diverse indicators to generate indicator profiles for detecting and predicting future network attacks
A Vashist, R Chadha, A Ghosh, A Poylisher, Y Sawaya, A Yamada, ...
US Patent 9,386,030, 2016
1562016
SMO-Style Algorithms for Learning Using Privileged Information.
D Pechyony, R Izmailov, A Vashist, V Vapnik
Dmin 10, 235-241, 2010
752010
Learning using hidden information (learning with teacher)
V Vapnik, A Vashist, N Pavlovitch
2009 International Joint Conference on Neural Networks, 3188-3195, 2009
522009
Cognitive network load prediction method and apparatus
A Vashist, A Poylisher, SC Mau, A Ghosh, R Chadha
US Patent App. 13/004,324, 2011
482011
Learning using hidden information: Master-class learning
V Vapnik, A Vashist, N Pavlovitch
Mining Massive Data sets for security, 3-14, 2008
412008
Multidimensional splines with infinite number of knots as SVM kernels
R Izmailov, V Vapnik, A Vashist
The 2013 International Joint Conference on Neural Networks (IJCNN), 1-7, 2013
272013
Ortholog clustering on a multipartite graph
A Vashist, CA Kulikowski, I Muchnik
IEEE/ACM Transactions on Computational Biology and Bioinformatics 4 (1), 17-27, 2007
232007
Biologically inspired cognitive architectures 2019: Proceedings of the tenth annual meeting of the BICA Society
AV Samsonovich
Springer, 2019
22*2019
Leveraging social network for predicting demand and estimating available resources for communication network management
A Vashist, SC Mau, A Poylisher, R Chadha, A Ghosh
12th IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2011
132011
System and method for spammer host detection from network flow data profiles
A Vashist, YM Gottlieb, A Ghosh, Y Sawaya, A Kubota
US Patent 8,769,677, 2014
112014
Attention focusing model for nexting based on learning and reasoning
A Vashist, S Loeb
US Patent App. 13/207,660, 2011
102011
Insider attack detection using weak indicators over network flow data
R Pagliari, A Ghosh, YM Gottlieb, R Chadha, A Vashist, G Hadynski
MILCOM 2015-2015 IEEE Military Communications Conference, 1-6, 2015
82015
A new combinatorial approach to supervised learning: application to gait recognition
R Zhang, A Vashist, I Muchnik, C Kulikowski, D Metaxas
Analysis and Modelling of Faces and Gestures, 55-69, 2005
82005
Ortholog clustering on a multipartite graph
A Vashist, C Kulikowski, I Muchnik
Algorithms in Bioinformatics, 328-340, 2005
72005
Robust information fusion methods for decision making for multisource data
A Vashist
US Patent 8,589,334, 2013
62013
Managing high volume data for network attack detection using real-time flow filtering
A Ghosh, YM Gottlieb, A Naidu, A Vashist, A Poylisher, A Kubota, ...
China Communications 10 (3), 56-66, 2013
62013
System and method using hidden information
A Vashist, V Vapnik
US Patent 8,315,956, 2012
62012
Detecting communication anomalies in tactical networks via graph learning
A Vashist, R Chadha, M Kaplan, K Moeltner
MILITARY COMMUNICATIONS CONFERENCE, 2012-MILCOM 2012, 1-6, 2012
62012
Combinatorial and statistical methods for part selection for object recognition
Z Zhao, A Vashist, A Elgammal, I Muchnik, C Kulikowski
International Journal of Computer Mathematics 84 (9), 1285-1297, 2007
62007
系统目前无法执行此操作,请稍后再试。
文章 1–20