Seguir
Latifur Khan
Título
Citado por
Citado por
Año
A new intrusion detection system using support vector machines and hierarchical clustering
L Khan, M Awad, B Thuraisingham
The VLDB journal 16, 507-521, 2007
5372007
Classification and novel class detection in concept-drifting data streams under time constraints
M Masud, J Gao, L Khan, J Han, BM Thuraisingham
IEEE Transactions on knowledge and data engineering 23 (6), 859-874, 2010
4522010
A machine learning approach to android malware detection
J Sahs, L Khan
2012 European intelligence and security informatics conference, 141-147, 2012
4262012
Hypoglycaemic activity of Coccinia indica and Momordica charantia in diabetic rats: depression of the hepatic gluconeogenic enzymes glucose-6-phosphatase …
BA Shibib, LA Khan, R Rahman
Biochemical Journal 292 (1), 267-270, 1993
3661993
Image annotations by combining multiple evidence & wordnet
Y Jin, L Khan, L Wang, M Awad
Proceedings of the 13th annual ACM international conference on Multimedia …, 2005
3482005
Security issues for cloud computing
K Hamlen, M Kantarcioglu, L Khan, B Thuraisingham
International Journal of Information Security and Privacy (IJISP) 4 (2), 36-48, 2010
3402010
Heuristics-based query processing for large RDF graphs using cloud computing
M Husain, J McGlothlin, MM Masud, L Khan, BM Thuraisingham
IEEE Transactions on Knowledge and Data Engineering 23 (9), 1312-1327, 2011
2732011
Constructing gene co-expression networks and predicting functions of unknown genes by random matrix theory
F Luo, Y Yang, J Zhong, H Gao, L Khan, DK Thompson, J Zhou
BMC bioinformatics 8 (1), 1-17, 2007
2552007
Retrieval effectiveness of an ontology-based model for information selection
L Khan, D McLeod, E Hovy
The VLDB Journal 13, 71-85, 2004
2522004
Ontology construction for information selection
L Khan, F Luo
14th IEEE International Conference on Tools with Artificial Intelligence …, 2002
2462002
Smv-hunter: Large scale, automated detection of ssl/tls man-in-the-middle vulnerabilities in android apps
DSJSG Greenwood, ZLL Khan
Network and Distributed System Security Symposium (NDSS). Internet Society …, 2014
2312014
Systems and methods for determining user attribute values by mining user network data and information
S Abrol, V Khadilkar, LR Khan, BM Thuraisingham
US Patent 8,965,974, 2015
2102015
A practical approach to classify evolving data streams: Training with limited amount of labeled data
MM Masud, J Gao, L Khan, J Han, B Thuraisingham
2008 Eighth IEEE International Conference on Data Mining, 929-934, 2008
1982008
Data mining techniques
AS Osman
190*2019
Estimating twitter user location using social interactions--a content based approach
S Chandra, L Khan, FB Muhaya
2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011
1882011
Secure knowledge management: confidentiality, trust, and privacy
E Bertino, LR Khan, R Sandhu, B Thuraisingham
IEEE Transactions on systems, man, and cybernetics-Part A: Systems and …, 2006
1762006
Storage and Retrieval of Large RDF Graph Using Hadoop and MapReduce.
MF Husain, P Doshi, L Khan, BM Thuraisingham
CloudCom 9, 680-686, 2009
1692009
Systems and methods for automated detection of application vulnerabilities
L Khan, Z Lin, B Thuraisingham, J Sahs, D Sounthiraraj, G Greenwood
US Patent 9,977,904, 2018
1632018
Sand: Semi-supervised adaptive novel class detection and classification over data stream
A Haque, L Khan, M Baron
Proceedings of the AAAI Conference on Artificial Intelligence 30 (1), 2016
1542016
Facing the reality of data stream classification: coping with scarcity of labeled data
MM Masud, C Woolam, J Gao, L Khan, J Han, KW Hamlen, NC Oza
Knowledge and information systems 33, 213-244, 2012
1532012
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20