Latifur Khan
Cited by
Cited by
A new intrusion detection system using support vector machines and hierarchical clustering
L Khan, M Awad, B Thuraisingham
The VLDB journal 16, 507-521, 2007
Classification and novel class detection in concept-drifting data streams under time constraints
M Masud, J Gao, L Khan, J Han, BM Thuraisingham
IEEE Transactions on knowledge and data engineering 23 (6), 859-874, 2010
A machine learning approach to android malware detection
J Sahs, L Khan
2012 European intelligence and security informatics conference, 141-147, 2012
Hypoglycaemic activity of Coccinia indica and Momordica charantia in diabetic rats: depression of the hepatic gluconeogenic enzymes glucose-6-phosphatase …
BA Shibib, LA Khan, R Rahman
Biochemical Journal 292 (1), 267-270, 1993
Image annotations by combining multiple evidence & wordnet
Y Jin, L Khan, L Wang, M Awad
Proceedings of the 13th annual ACM international conference on Multimedia …, 2005
Security issues for cloud computing
K Hamlen, M Kantarcioglu, L Khan, B Thuraisingham
International Journal of Information Security and Privacy (IJISP) 4 (2), 36-48, 2010
Heuristics-based query processing for large RDF graphs using cloud computing
M Husain, J McGlothlin, MM Masud, L Khan, BM Thuraisingham
IEEE Transactions on Knowledge and Data Engineering 23 (9), 1312-1327, 2011
Constructing gene co-expression networks and predicting functions of unknown genes by random matrix theory
F Luo, Y Yang, J Zhong, H Gao, L Khan, DK Thompson, J Zhou
BMC bioinformatics 8 (1), 1-17, 2007
Retrieval effectiveness of an ontology-based model for information selection
L Khan, D McLeod, E Hovy
The VLDB Journal 13, 71-85, 2004
Ontology construction for information selection
L Khan, F Luo
14th IEEE International Conference on Tools with Artificial Intelligence …, 2002
Smv-hunter: Large scale, automated detection of ssl/tls man-in-the-middle vulnerabilities in android apps
DSJSG Greenwood, ZLL Khan
Network and Distributed System Security Symposium (NDSS). Internet Society …, 2014
Systems and methods for determining user attribute values by mining user network data and information
S Abrol, V Khadilkar, LR Khan, BM Thuraisingham
US Patent 8,965,974, 2015
Data mining techniques
AS Osman
A practical approach to classify evolving data streams: Training with limited amount of labeled data
MM Masud, J Gao, L Khan, J Han, B Thuraisingham
2008 Eighth IEEE International Conference on Data Mining, 929-934, 2008
Estimating twitter user location using social interactions--a content based approach
S Chandra, L Khan, FB Muhaya
2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011
Systems and methods for automated detection of application vulnerabilities
L Khan, Z Lin, B Thuraisingham, J Sahs, D Sounthiraraj, G Greenwood
US Patent 9,977,904, 2018
Secure knowledge management: confidentiality, trust, and privacy
E Bertino, LR Khan, R Sandhu, B Thuraisingham
IEEE Transactions on systems, man, and cybernetics-Part A: Systems and …, 2006
Storage and Retrieval of Large RDF Graph Using Hadoop and MapReduce.
MF Husain, P Doshi, L Khan, BM Thuraisingham
CloudCom 9, 680-686, 2009
Sand: Semi-supervised adaptive novel class detection and classification over data stream
A Haque, L Khan, M Baron
Proceedings of the AAAI Conference on Artificial Intelligence 30 (1), 2016
Facing the reality of data stream classification: coping with scarcity of labeled data
MM Masud, C Woolam, J Gao, L Khan, J Han, KW Hamlen, NC Oza
Knowledge and information systems 33, 213-244, 2012
The system can't perform the operation now. Try again later.
Articles 1–20