Latifur R. Khan, Ph.D. - Publications

Affiliations: 
2000 University of Southern California, Los Angeles, CA, United States 
Area:
Computer Science, Biomechanics

40 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2021 Sahoo P, Roy I, Ahlawat R, Irtiza S, Khan L. Potential diagnosis of COVID-19 from chest X-ray and CT findings using semi-supervised learning. Physical and Engineering Sciences in Medicine. PMID 34780042 DOI: 10.1007/s13246-021-01075-2  0.602
2020 Sahoo P, Roy I, Wang Z, Mi F, Yu L, Balasubramani P, Khan L, Stoddart JF. MultiCon: A Semi-Supervised Approach for Predicting Drug Function from Chemical Structure Analysis. Journal of Chemical Information and Modeling. PMID 33140954 DOI: 10.1021/acs.jcim.0c00801  0.608
2020 Gao Y, Chandra S, Li Y, Khan L, Thuraisingham BM. SACCOS: A Semi-Supervised Framework for Emerging Class Detection and Concept Drift Adaption over Data Streams Ieee Transactions On Knowledge and Data Engineering. 1-1. DOI: 10.1109/Tkde.2020.2993193  0.348
2020 Islam S, Dong B, Chandra S, Khan L, Thuraisingham BM. GCI: A GPU Based Transfer Learning Approach for Detecting Cheats of Computer Game Ieee Transactions On Dependable and Secure Computing. 1-1. DOI: 10.1109/Tdsc.2020.3013817  0.371
2020 Huang H, Khan L, Zhou S. Classified enhancement model for big data storage reliability based on Boolean satisfiability problem Cluster Computing. 23: 483-492. DOI: 10.1007/S10586-019-02941-1  0.382
2019 Eirinaki M, Gao J, Khan L, Mazumder S, Potika K. Editorial for Special Issue on “Big Data and Smart Cities” Big Data Research. 17: 33-34. DOI: 10.1016/J.Bdr.2019.100122  0.301
2019 Ayoade G, El-Ghamry A, Karande V, Khan L, Alrahmawy M, Rashad MZ. Secure data processing for IoT middleware systems The Journal of Supercomputing. 75: 4684-4709. DOI: 10.1007/S11227-018-2686-X  0.348
2016 Al-Khateeb T, Masud MM, Al-Naami KM, Seker SE, Mustafa AM, Khan L, Trabelsi Z, Aggarwal C, Han J. Recurring and Novel Class Detection Using Class-Based Ensemble for Evolving Data Stream Ieee Transactions On Knowledge and Data Engineering. 28: 2752-2764. DOI: 10.1109/Tkde.2015.2507123  0.381
2016 Al-Naami KM, Seker SE, Khan L. GISQAF: MapReduce guided spatial query processing and analytics system Software - Practice and Experience. 46: 1329-1349. DOI: 10.1002/Spe.2383  0.347
2015 Ismail L, Khan L. Implementation and performance evaluation of a scheduling algorithm for divisible load parallel applications in a cloud computing environment Software - Practice and Experience. 45: 765-781. DOI: 10.1002/Spe.2258  0.325
2013 Parveen P, McDaniel N, Weger Z, Evans J, Thuraisingham B, Hamlen K, Khan L. Evolving insider threat detection stream mining perspective International Journal On Artificial Intelligence Tools. 22. DOI: 10.1142/S0218213013600130  0.454
2013 Masud MM, Chen Q, Khan L, Aggarwal CC, Gao J, Han J, Srivastava A, Oza NC. Classification and adaptive novel class detection of feature-evolving data streams Ieee Transactions On Knowledge and Data Engineering. 25: 1484-1497. DOI: 10.1109/Tkde.2012.109  0.394
2012 Thuraisingham B, Al-Khatib T, Khan L, Masud M, Hamlen K, Khadilkar V, Abrol S. Design and implementation of a data mining system for malware detection Journal of Integrated Design and Process Science. 16: 33-49. DOI: 10.3233/Jid-2012-0016  0.319
2012 Abu-Shareha AA, Mandava R, Khan L, Ramachandram D. Multimodal concept fusion using semantic closeness for image concept disambiguation Multimedia Tools and Applications. 61: 69-86. DOI: 10.1007/S11042-010-0707-8  0.303
2012 Masud MM, Woolam C, Gao J, Khan L, Han J, Hamlen KW, Oza NC. Facing the reality of data stream classification: Coping with scarcity of labeled data Knowledge and Information Systems. 33: 213-244. DOI: 10.1007/S10115-011-0447-8  0.445
2011 Husain MF, McGlothlin J, Masud MM, Khan LR, Thuraisingham B. Heuristics-based query processing for large RDF graphs using cloud computing Ieee Transactions On Knowledge and Data Engineering. 23: 1312-1327. DOI: 10.1109/Tkde.2011.103  0.345
2011 Masud M, Gao J, Khan L, Han J, Thuraisingham BM. Classification and Novel Class Detection in Concept-Drifting Data Streams under Time Constraints Ieee Transactions On Knowledge and Data Engineering. 23: 859-874. DOI: 10.1109/Tkde.2010.61  0.415
2011 Partyka J, Parveen P, Khan L, Thuraisingham B, Shekhar S. Enhanced geographically typed semantic schema matching Journal of Web Semantics. 9: 52-70. DOI: 10.1016/J.Websem.2010.11.002  0.307
2010 Awad M, Khan L, Thuraisingham B. Policy enforcement system for inter-organizational data sharing International Journal of Information Security and Privacy. 4: 22-39. DOI: 10.4018/Jisp.2010070102  0.331
2010 Abedin MAU, Ng V, Khan L. Cause identification from aviation safety incident reports via weakly supervised semantic lexicon construction Journal of Artificial Intelligence Research. 38: 569-631. DOI: 10.1613/Jair.2986  0.397
2010 Abedin M, Nessa S, Khan L, Al-Shaer E, Awad M. Analysis of firewall policy rules using traffic mining techniques International Journal of Internet Protocol Technology. 5: 3-22. DOI: 10.1504/Ijipt.2010.032611  0.304
2010 Ramanujam S, Khadilkar V, Khan L, Kantarcioglu M, Thuraisingham BM, Seida S. Update-Enabled Triplification Of Relational Data Into Virtual Rdf Stores International Journal of Semantic Computing. 4: 423-451. DOI: 10.1142/S1793351X10001073  0.358
2010 Tu M, Li P, Yen I, Thuraisingham BM, Khan L. Secure Data Objects Replication in Data Grid Ieee Transactions On Dependable and Secure Computing. 7: 50-64. DOI: 10.1109/Tdsc.2008.19  0.344
2010 Ramanujam S, Gupta A, Khan L, Seida S, Thuraisingham B. Relationalization of provenance data in complex RDF reification nodes Electronic Commerce Research. 10: 389-421. DOI: 10.1007/S10660-010-9061-1  0.339
2009 Ramanujam S, Gupta A, Khan L, Thuraisingham BM, Seida S. R2D: A Framework For The Relational Transformation Of Rdf Data International Journal of Semantic Computing. 3: 471-498. DOI: 10.1142/S1793351X09000884  0.368
2008 Woolam C, Khan L. Multi-label large margin hierarchical perceptron International Journal of Data Mining, Modelling and Management. 1: 5-22. DOI: 10.1504/Ijdmmm.2008.022535  0.433
2008 Masud MM, Khan L, Thuraisingham B. A scalable multi-level feature extraction technique to detect malicious executables Information Systems Frontiers. 10: 33-45. DOI: 10.1007/S10796-007-9054-3  0.32
2007 Masud MM, Khan L, Thuraisingham BM. E-Mail Worm Detection Using Data Mining International Journal of Information Security and Privacy. 1: 47-61. DOI: 10.4018/Jisp.2007100103  0.37
2007 Harris D, Khan L, Paul R, Thuraisingham B. Standards for secure data sharing across organizations Computer Standards and Interfaces. 29: 86-96. DOI: 10.1016/J.Csi.2006.01.004  0.304
2007 Lavee G, Khan L, Thuraisingham B. A framework for a video analysis tool for suspicious event detection Multimedia Tools and Applications. 35: 109-123. DOI: 10.1007/S11042-007-0117-8  0.387
2007 Petrushin VA, Khan L. Multimedia data mining and knowledge discovery Multimedia Data Mining and Knowledge Discovery. 1-521. DOI: 10.1007/978-1-84628-799-2  0.372
2006 Wang L, Khan L. Automatic image annotation and retrieval using weighted feature selection Multimedia Tools and Applications. 29: 55-71. DOI: 10.1007/S11042-006-7813-7  0.343
2006 Abedin M, Nessa S, Khan L, Thuraisingham B. Detection and resolution of anomalies in firewall policy rules Lecture Notes in Computer Science. 15-29. DOI: 10.1007/11805588_2  0.324
2005 Bouali F, Khan L, Masseglia F. The 6th international workshop on Multimedia Data Mining (MDM/KDD2005) Sigkdd Explorations. 7: 148-150. DOI: 10.1145/1117454.1117478  0.305
2005 Khan L, Luo F. Hierarchical clustering for complex data International Journal On Artificial Intelligence Tools. 14: 791-809. DOI: 10.1142/S0218213005002399  0.344
2005 Gupta M, Tu M, Khan L, Bastani F, Yen IL. A study of the model and algorithms for handling location-dependent continuous queries Knowledge and Information Systems. 8: 414-437. DOI: 10.1007/S10115-005-0196-7  0.327
2004 Khan L, Petrushin VA. The 5th international workshop on multimedia data mining (MDM/KDD2004) Sigkdd Explorations. 6: 144-146. DOI: 10.1145/1046456.1046483  0.314
2004 Petrushin VA, Kao A, Khan L. The 4th international workshop on multimedia data mining (MDM/KDD2003) Sigkdd Explorations. 6: 106-108. DOI: 10.1145/1007730.1007743  0.309
2001 Khan L, McLeod D, Shahabi C. An Adaptive Probe-Based Technique to Optimize Join Queries in Distributed Internet Databases Journal of Database Management. 12: 3-14. DOI: 10.4018/Jdm.2001100101  0.531
2000 Shahabi C, Khan L, McLeod D. A Probe-Based Technique to Optimize Join Queries in Distributed Internet Databases Knowledge and Information Systems. 2: 373-385. DOI: 10.1007/Pl00011648  0.532
Show low-probability matches.