Year |
Citation |
Score |
2021 |
Sahoo P, Roy I, Ahlawat R, Irtiza S, Khan L. Potential diagnosis of COVID-19 from chest X-ray and CT findings using semi-supervised learning. Physical and Engineering Sciences in Medicine. PMID 34780042 DOI: 10.1007/s13246-021-01075-2 |
0.602 |
|
2020 |
Sahoo P, Roy I, Wang Z, Mi F, Yu L, Balasubramani P, Khan L, Stoddart JF. MultiCon: A Semi-Supervised Approach for Predicting Drug Function from Chemical Structure Analysis. Journal of Chemical Information and Modeling. PMID 33140954 DOI: 10.1021/acs.jcim.0c00801 |
0.608 |
|
2020 |
Gao Y, Chandra S, Li Y, Khan L, Thuraisingham BM. SACCOS: A Semi-Supervised Framework for Emerging Class Detection and Concept Drift Adaption over Data Streams Ieee Transactions On Knowledge and Data Engineering. 1-1. DOI: 10.1109/Tkde.2020.2993193 |
0.348 |
|
2020 |
Islam S, Dong B, Chandra S, Khan L, Thuraisingham BM. GCI: A GPU Based Transfer Learning Approach for Detecting Cheats of Computer Game Ieee Transactions On Dependable and Secure Computing. 1-1. DOI: 10.1109/Tdsc.2020.3013817 |
0.371 |
|
2020 |
Huang H, Khan L, Zhou S. Classified enhancement model for big data storage reliability based on Boolean satisfiability problem Cluster Computing. 23: 483-492. DOI: 10.1007/S10586-019-02941-1 |
0.382 |
|
2019 |
Eirinaki M, Gao J, Khan L, Mazumder S, Potika K. Editorial for Special Issue on “Big Data and Smart Cities” Big Data Research. 17: 33-34. DOI: 10.1016/J.Bdr.2019.100122 |
0.301 |
|
2019 |
Ayoade G, El-Ghamry A, Karande V, Khan L, Alrahmawy M, Rashad MZ. Secure data processing for IoT middleware systems The Journal of Supercomputing. 75: 4684-4709. DOI: 10.1007/S11227-018-2686-X |
0.348 |
|
2016 |
Al-Khateeb T, Masud MM, Al-Naami KM, Seker SE, Mustafa AM, Khan L, Trabelsi Z, Aggarwal C, Han J. Recurring and Novel Class Detection Using Class-Based Ensemble for Evolving Data Stream Ieee Transactions On Knowledge and Data Engineering. 28: 2752-2764. DOI: 10.1109/Tkde.2015.2507123 |
0.381 |
|
2016 |
Al-Naami KM, Seker SE, Khan L. GISQAF: MapReduce guided spatial query processing and analytics system Software - Practice and Experience. 46: 1329-1349. DOI: 10.1002/Spe.2383 |
0.347 |
|
2015 |
Ismail L, Khan L. Implementation and performance evaluation of a scheduling algorithm for divisible load parallel applications in a cloud computing environment Software - Practice and Experience. 45: 765-781. DOI: 10.1002/Spe.2258 |
0.325 |
|
2013 |
Parveen P, McDaniel N, Weger Z, Evans J, Thuraisingham B, Hamlen K, Khan L. Evolving insider threat detection stream mining perspective International Journal On Artificial Intelligence Tools. 22. DOI: 10.1142/S0218213013600130 |
0.454 |
|
2013 |
Masud MM, Chen Q, Khan L, Aggarwal CC, Gao J, Han J, Srivastava A, Oza NC. Classification and adaptive novel class detection of feature-evolving data streams Ieee Transactions On Knowledge and Data Engineering. 25: 1484-1497. DOI: 10.1109/Tkde.2012.109 |
0.394 |
|
2012 |
Thuraisingham B, Al-Khatib T, Khan L, Masud M, Hamlen K, Khadilkar V, Abrol S. Design and implementation of a data mining system for malware detection Journal of Integrated Design and Process Science. 16: 33-49. DOI: 10.3233/Jid-2012-0016 |
0.319 |
|
2012 |
Abu-Shareha AA, Mandava R, Khan L, Ramachandram D. Multimodal concept fusion using semantic closeness for image concept disambiguation Multimedia Tools and Applications. 61: 69-86. DOI: 10.1007/S11042-010-0707-8 |
0.303 |
|
2012 |
Masud MM, Woolam C, Gao J, Khan L, Han J, Hamlen KW, Oza NC. Facing the reality of data stream classification: Coping with scarcity of labeled data Knowledge and Information Systems. 33: 213-244. DOI: 10.1007/S10115-011-0447-8 |
0.445 |
|
2011 |
Husain MF, McGlothlin J, Masud MM, Khan LR, Thuraisingham B. Heuristics-based query processing for large RDF graphs using cloud computing Ieee Transactions On Knowledge and Data Engineering. 23: 1312-1327. DOI: 10.1109/Tkde.2011.103 |
0.345 |
|
2011 |
Masud M, Gao J, Khan L, Han J, Thuraisingham BM. Classification and Novel Class Detection in Concept-Drifting Data Streams under Time Constraints Ieee Transactions On Knowledge and Data Engineering. 23: 859-874. DOI: 10.1109/Tkde.2010.61 |
0.415 |
|
2011 |
Partyka J, Parveen P, Khan L, Thuraisingham B, Shekhar S. Enhanced geographically typed semantic schema matching Journal of Web Semantics. 9: 52-70. DOI: 10.1016/J.Websem.2010.11.002 |
0.307 |
|
2010 |
Awad M, Khan L, Thuraisingham B. Policy enforcement system for inter-organizational data sharing International Journal of Information Security and Privacy. 4: 22-39. DOI: 10.4018/Jisp.2010070102 |
0.331 |
|
2010 |
Abedin MAU, Ng V, Khan L. Cause identification from aviation safety incident reports via weakly supervised semantic lexicon construction Journal of Artificial Intelligence Research. 38: 569-631. DOI: 10.1613/Jair.2986 |
0.397 |
|
2010 |
Abedin M, Nessa S, Khan L, Al-Shaer E, Awad M. Analysis of firewall policy rules using traffic mining techniques International Journal of Internet Protocol Technology. 5: 3-22. DOI: 10.1504/Ijipt.2010.032611 |
0.304 |
|
2010 |
Ramanujam S, Khadilkar V, Khan L, Kantarcioglu M, Thuraisingham BM, Seida S. Update-Enabled Triplification Of Relational Data Into Virtual Rdf Stores International Journal of Semantic Computing. 4: 423-451. DOI: 10.1142/S1793351X10001073 |
0.358 |
|
2010 |
Tu M, Li P, Yen I, Thuraisingham BM, Khan L. Secure Data Objects Replication in Data Grid Ieee Transactions On Dependable and Secure Computing. 7: 50-64. DOI: 10.1109/Tdsc.2008.19 |
0.344 |
|
2010 |
Ramanujam S, Gupta A, Khan L, Seida S, Thuraisingham B. Relationalization of provenance data in complex RDF reification nodes Electronic Commerce Research. 10: 389-421. DOI: 10.1007/S10660-010-9061-1 |
0.339 |
|
2009 |
Ramanujam S, Gupta A, Khan L, Thuraisingham BM, Seida S. R2D: A Framework For The Relational Transformation Of Rdf Data International Journal of Semantic Computing. 3: 471-498. DOI: 10.1142/S1793351X09000884 |
0.368 |
|
2008 |
Woolam C, Khan L. Multi-label large margin hierarchical perceptron International Journal of Data Mining, Modelling and Management. 1: 5-22. DOI: 10.1504/Ijdmmm.2008.022535 |
0.433 |
|
2008 |
Masud MM, Khan L, Thuraisingham B. A scalable multi-level feature extraction technique to detect malicious executables Information Systems Frontiers. 10: 33-45. DOI: 10.1007/S10796-007-9054-3 |
0.32 |
|
2007 |
Masud MM, Khan L, Thuraisingham BM. E-Mail Worm Detection Using Data Mining International Journal of Information Security and Privacy. 1: 47-61. DOI: 10.4018/Jisp.2007100103 |
0.37 |
|
2007 |
Harris D, Khan L, Paul R, Thuraisingham B. Standards for secure data sharing across organizations Computer Standards and Interfaces. 29: 86-96. DOI: 10.1016/J.Csi.2006.01.004 |
0.304 |
|
2007 |
Lavee G, Khan L, Thuraisingham B. A framework for a video analysis tool for suspicious event detection Multimedia Tools and Applications. 35: 109-123. DOI: 10.1007/S11042-007-0117-8 |
0.387 |
|
2007 |
Petrushin VA, Khan L. Multimedia data mining and knowledge discovery Multimedia Data Mining and Knowledge Discovery. 1-521. DOI: 10.1007/978-1-84628-799-2 |
0.372 |
|
2006 |
Wang L, Khan L. Automatic image annotation and retrieval using weighted feature selection Multimedia Tools and Applications. 29: 55-71. DOI: 10.1007/S11042-006-7813-7 |
0.343 |
|
2006 |
Abedin M, Nessa S, Khan L, Thuraisingham B. Detection and resolution of anomalies in firewall policy rules Lecture Notes in Computer Science. 15-29. DOI: 10.1007/11805588_2 |
0.324 |
|
2005 |
Bouali F, Khan L, Masseglia F. The 6th international workshop on Multimedia Data Mining (MDM/KDD2005) Sigkdd Explorations. 7: 148-150. DOI: 10.1145/1117454.1117478 |
0.305 |
|
2005 |
Khan L, Luo F. Hierarchical clustering for complex data International Journal On Artificial Intelligence Tools. 14: 791-809. DOI: 10.1142/S0218213005002399 |
0.344 |
|
2005 |
Gupta M, Tu M, Khan L, Bastani F, Yen IL. A study of the model and algorithms for handling location-dependent continuous queries Knowledge and Information Systems. 8: 414-437. DOI: 10.1007/S10115-005-0196-7 |
0.327 |
|
2004 |
Khan L, Petrushin VA. The 5th international workshop on multimedia data mining (MDM/KDD2004) Sigkdd Explorations. 6: 144-146. DOI: 10.1145/1046456.1046483 |
0.314 |
|
2004 |
Petrushin VA, Kao A, Khan L. The 4th international workshop on multimedia data mining (MDM/KDD2003) Sigkdd Explorations. 6: 106-108. DOI: 10.1145/1007730.1007743 |
0.309 |
|
2001 |
Khan L, McLeod D, Shahabi C. An Adaptive Probe-Based Technique to Optimize Join Queries in Distributed Internet Databases Journal of Database Management. 12: 3-14. DOI: 10.4018/Jdm.2001100101 |
0.531 |
|
2000 |
Shahabi C, Khan L, McLeod D. A Probe-Based Technique to Optimize Join Queries in Distributed Internet Databases Knowledge and Information Systems. 2: 373-385. DOI: 10.1007/Pl00011648 |
0.532 |
|
Show low-probability matches. |