Arun Lakhotia - Publications

Affiliations: 
University of Louisiana at Lafayette, Lafayette, LA, United States 
Area:
Computer Science, Artificial Intelligence, Robotics Engineering

22 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2020 Black P, Gondal I, Vamplew P, Lakhotia A. Function Similarity Using Family Context Electronics. 9: 1163. DOI: 10.3390/Electronics9071163  0.345
2013 Chouchane R, Stakhanova N, Walenstein A, Lakhotia A. Detecting machine-morphed malware variants via engine attribution Journal in Computer Virology. 9: 137-157. DOI: 10.1007/S11416-013-0183-6  0.396
2013 Lakhotia A, Walenstein A, Miles C, Singh A. VILO: A rapid learning nearest-neighbor classifier for malware triage Journal in Computer Virology. 9: 109-123. DOI: 10.1007/S11416-013-0178-3  0.478
2012 Miles C, Lakhotia A, Walenstein A. In situ reuse of logically extracted functional components Journal in Computer Virology. 8: 73-84. DOI: 10.1007/S11416-012-0167-Y  0.358
2008 Chouchane MR, Walenstein A, Lakhotia A. Using markov chains to filter machine-morphed variants of malicious programs 3rd International Conference On Malicious and Unwanted Software, Malware 2008. 77-84. DOI: 10.1109/MALWARE.2008.4690861  0.72
2008 Walenstein A, Mathur R, Chouchane MR, Lakhotia A. Constructing malware normalizers using term rewriting Journal in Computer Virology. 4: 307-322. DOI: 10.1007/S11416-008-0081-5  0.715
2007 Chouchane MR, Walenstein A, Lakhotia A. Statistical signatures for fast filtering of instruction-substituting metamorphic malware Worm'07 - Proceedings of the 2007 Acm Workshop On Recurring Malcode. 31-37. DOI: 10.1145/1314389.1314397  0.679
2006 Chouchane MR, Lakhotia A. Using engine signature to detect metamorphic malware Proceedings of the 4th Acm Workshop On Recurring Malcode, Worm'06. Co-Located With the 13th Acm Conference On Computer and Communications Security, Ccs'06. 73-78. DOI: 10.1145/1179542.1179558  0.69
2006 Walenstein A, Mathur R, Chouchane MR, Lakhotia A. Normalizing metamorphic malware using term rewriting Proceedings - Sixth Ieee International Workshop On Source Code Analysis and Manipulation, Scam 2006. 75-84. DOI: 10.1109/SCAM.2006.20  0.675
2006 Harman M, Lakhotia A, Binkley D. Theory and algorithms for slicing unstructured programs Information and Software Technology. 48: 549-565. DOI: 10.1016/J.Infsof.2005.06.001  0.394
2006 Karim ME, Parida L, Lakhotia A. Using permutation patterns for content-based phylogeny Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4146: 115-125.  0.577
2005 Lakhotia A, Kumar EU, Venable M. A method for detecting obfuscated calls in malicious binaries Ieee Transactions On Software Engineering. 31: 955-967. DOI: 10.1109/Tse.2005.120  0.366
2005 Karim ME, Walenstein A, Lakhotia A, Parida L. Malware phylogeny generation using permutations of code Journal in Computer Virology. 1: 13-23. DOI: 10.1007/S11416-005-0002-9  0.323
2005 Venable M, Chouchane MR, Karim ME, Lakhotia A. Analyzing memory accesses in obfuscated x86 executables Lecture Notes in Computer Science. 3548: 1-18.  0.677
2004 Walenstein A, Lakhotia A, Koschke R. The Second International Workshop on Detection of Software Clones: workshop report Acm Sigsoft Software Engineering Notes. 29: 1-5. DOI: 10.1145/979743.979752  0.307
2002 Singh PK, Lakhotia A. Analysis and detection of computer viruses and worms: an annotated bibliography Sigplan Notices. 37: 29-35. DOI: 10.1145/568600.568608  0.307
1998 Lakhotia A, Deprez JC. Restructuring programs by tucking statements into functions Information and Software Technology. 40: 677-689. DOI: 10.1016/S0950-5849(98)00091-3  0.648
1998 Chan TW, Lakhotia A. Debugging program failure exhibited by voluminous data Journal of Software Maintenance and Evolution. 10: 111-150. DOI: 10.1002/(Sici)1096-908X(199803/04)10:2<111::Aid-Smr167>3.0.Co;2-8  0.316
1997 Lakhotia A. A unified framework for expressing software subsystem classification techniques Journal of Systems and Software. 36: 211-231. DOI: 10.1016/0164-1212(95)00098-4  0.322
1994 Li J, Lakhotia A. Using mathematical induction in systematic program development International Journal of Software Engineering and Knowledge Engineering. 4: 561-574. DOI: 10.1142/S0218194094000271  0.406
1990 Lakhotia A, Sterling L. How to control unfolding when specializing interpreters New Generation Computing. 8: 61-70. DOI: 10.1007/Bf03037513  0.361
1988 Lakhotia A, Sterling L. Composing recursive logic programs with Clausal join New Generation Computing. 6: 211-225. DOI: 10.1007/Bf03037138  0.372
Show low-probability matches.