Estimating twitter user location using social interactions - a content based approach S Chandra, L Khan, FB Muhaya Privacy, Security, Risk and Trust (PASSAT) and 2011 IEEE Third Inernational …, 2011 | 191 | 2011 |
Adaptive encrypted traffic fingerprinting with bi-directional dependence K Al-Naami, S Chandra, A Mustafa, L Khan, Z Lin, K Hamlen, ... Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016 | 74 | 2016 |
Towards a systematic study of the covert channel attacks in smartphones S Chandra, Z Lin, A Kundu, L Khan International Conference on Security and Privacy in Communication Networks …, 2015 | 58 | 2015 |
Securing data analytics on sgx with randomization S Chandra, V Karande, Z Lin, L Khan, M Kantarcioglu, B Thuraisingham Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017 | 53 | 2017 |
An adaptive framework for multistream classification S Chandra, A Haque, L Khan, C Aggarwal Proceedings of the 25th ACM International on Conference on Information and …, 2016 | 47 | 2016 |
Fusion: An online method for multistream classification A Haque, Z Wang, S Chandra, B Dong, L Khan, KW Hamlen Proceedings of the 2017 ACM on Conference on Information and Knowledge …, 2017 | 44 | 2017 |
Automated threat report classification over multi-source data G Ayoade, S Chandra, L Khan, K Hamlen, B Thuraisingham 2018 IEEE 4th International Conference on Collaboration and Internet …, 2018 | 42 | 2018 |
Robust high dimensional stream classification with novel class detection Z Wang, Z Kong, S Changra, H Tao, L Khan 2019 IEEE 35th International Conference on Data Engineering (ICDE), 1418-1429, 2019 | 38 | 2019 |
Saccos: A semi-supervised framework for emerging class detection and concept drift adaption over data streams Y Gao, S Chandra, Y Li, L Khan, T Bhavani IEEE Transactions on Knowledge and Data Engineering 34 (3), 1416-1426, 2020 | 26 | 2020 |
Towards self-adaptive metric learning on the fly Y Gao, YF Li, S Chandra, L Khan, B Thuraisingham The World Wide Web Conference, 503-513, 2019 | 25 | 2019 |
Focus location extraction from political news reports with bias correction MB Imani, S Chandra, S Ma, L Khan, B Thuraisingham 2017 IEEE International Conference on Big Data (Big Data), 1956-1964, 2017 | 22 | 2017 |
A framework for multistream regression with direct density ratio estimation A Haque, H Tao, S Chandra, J Liu, L Khan Proceedings of the AAAI Conference on Artificial Intelligence 32 (1), 2018 | 16 | 2018 |
Multistream classification with relative density ratio estimation B Dong, Y Gao, S Chandra, L Khan Proceedings of the AAAI Conference on Artificial Intelligence 33 (01), 3478-3485, 2019 | 15 | 2019 |
Efficient sampling-based kernel mean matching S Chandra, A Haque, L Khan, C Aggarwal 2016 IEEE 16th International Conference on Data Mining (ICDM), 811-816, 2016 | 12 | 2016 |
Distributed adaptive importance sampling on graphical models using mapreduce A Haque, S Chandra, L Khan, C Aggarwal 2014 IEEE International Conference on Big Data (Big Data), 597-602, 2014 | 12 | 2014 |
BCD: Decomposing binary code into components using graph-based clustering V Karande, S Chandra, Z Lin, J Caballero, L Khan, K Hamlen Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018 | 11 | 2018 |
Stream mining using statistical relational learning S Chandra, J Sahs, L Khan, B Thuraisingham, C Aggarwal 2014 IEEE International Conference on Data Mining, 743-748, 2014 | 11 | 2014 |
Ensemble direct density ratio estimation for multistream classification S Chandra, A Haque, H Tao, J Liu, L Khan, C Aggarwal 2018 IEEE 34th International Conference on Data Engineering (ICDE), 1364-1367, 2018 | 9 | 2018 |
Efficient multistream classification using direct density ratio estimation A Haque, S Chandra, L Khan, K Hamlen, C Aggarwal 2017 IEEE 33rd International Conference on Data Engineering (ICDE), 155-158, 2017 | 8 | 2017 |
GCI: A GPU-Based Transfer Learning Approach for Detecting Cheats of Computer Game MS Islam, B Dong, S Chandra, L Khan, B Thuraisingham IEEE Transactions on Dependable and Secure Computing 19 (2), 804-816, 2020 | 7 | 2020 |