Adaptive Sketching for Fast and Convergent Canonical Polyadic Decomposition | 0 | 0.34 | 2020 |
Thwarting finite difference adversarial attacks with output randomization. | 0 | 0.34 | 2019 |
Quantifying error contributions of computational steps, algorithms and hyperparameter choices in image classification pipelines. | 0 | 0.34 | 2019 |
Short Paper: Creating Adversarial Malware Examples using Code Insertion. | 0 | 0.34 | 2019 |
Deep density ratio estimation for change point detection. | 1 | 0.34 | 2019 |
Generation & Evaluation of Adversarial Examples for Malware Obfuscation. | 1 | 0.35 | 2019 |
Cybersecurity in the Era of Data Science: Examining New Adversarial Models | 0 | 0.34 | 2019 |
Focal onset seizure prediction using convolutional networks. | 13 | 0.78 | 2018 |
Learning filter widths of spectral decompositions with wavelets. | 0 | 0.34 | 2018 |
Accelerating a Distributed CPD Algorithm for Large Dense, Skewed Tensors | 0 | 0.34 | 2018 |
Cell-graphs: image-driven modeling of structure-function relationship | 1 | 0.36 | 2017 |
A computational study on convolutional feature combination strategies for grade classification in colon cancer using fluorescence microscopy data. | 1 | 0.34 | 2017 |
Environmental Authentication in Malware. | 0 | 0.34 | 2017 |
Model coupling for predicting a developmental patterning process. | 0 | 0.34 | 2016 |
From Image to Translation: Processing the Endangered Nyushu Script. | 1 | 0.37 | 2016 |
A machine learning approach to quantifying noise in medical images. | 0 | 0.34 | 2016 |
Adapting to data sparsity for efficient parallel PARAFAC tensor decomposition in Hadoop | 0 | 0.34 | 2016 |
Prediction of Growth Factor-Dependent Cleft Formation During Branching Morphogenesis Using A Dynamic Graph-Based Growth Model. | 6 | 0.41 | 2016 |
Seizure Prediction by Graph Mining, Transfer Learning, and Transformation Learning | 1 | 0.41 | 2015 |
Context-Aware Entity Morph Decoding | 1 | 0.37 | 2015 |
Graph-theoretic analysis of epileptic seizures on scalp EEG recordings | 4 | 0.48 | 2014 |
Be Appropriate And Funny: Automatic Entity Morph Encoding | 1 | 0.38 | 2014 |
Biologically-driven cell-graphs for breast tissue grading | 3 | 0.46 | 2013 |
Global Changes in the Connectome in Autism Spectrum Disorders. | 2 | 0.39 | 2013 |
On the Security of Key Extraction From Measuring Physical Quantities | 10 | 0.49 | 2013 |
Cell-based multi-parametric model of cleft progression during submandibular salivary gland branching morphogenesis. | 2 | 0.39 | 2013 |
Follicular lymphoma grading using cell-graphs and multi-scale feature analysis | 8 | 0.52 | 2012 |
Effective graph classification based on topological and label attributes | 32 | 1.12 | 2012 |
A novel dynamic graph-based computational model for predicting salivary gland branching morphogenesis | 0 | 0.34 | 2012 |
Visualization of tuberculosis patient and Mycobacterium tuberculosis complex genotype data via host-pathogen maps | 0 | 0.34 | 2011 |
Classification of breast cancer grades through quantitative characterization of ductal structure morphology in three-dimensional cultures | 0 | 0.34 | 2011 |
On passive inference attacks against physical-layer key extraction? | 10 | 0.58 | 2011 |
Data-driven insights into deletions of Mycobacterium tuberculosis complex chromosomal DR region using spoligoforests. | 0 | 0.34 | 2011 |
Quantitative metric profiles capture three-dimensional temporospatial architecture to discriminate cellular functional states. | 4 | 0.52 | 2011 |
Examining the sublineage structure of Mycobacterium tuberculosis complex strains with multiple-biomarker tensors | 0 | 0.34 | 2010 |
ECM-aware cell-graph mining for bone tissue modeling and classification | 18 | 1.19 | 2010 |
On anonymity in an electronic society: A survey of anonymous communication systems | 45 | 1.36 | 2009 |
Minimum delay routing for wireless networks with STDMA | 7 | 0.76 | 2009 |
Privacy-Preserving Information Markets for Computing Statistical Data | 2 | 0.41 | 2009 |
Analysis of Load-Balanced Switch with Finite Buffers | 6 | 0.56 | 2008 |
Contention-free MAC protocols for asynchronous wireless sensor networks | 8 | 0.47 | 2008 |
Multiway modeling and analysis in stem cell systems biology. | 13 | 1.06 | 2008 |
Multiway analysis of epilepsy tensors. | 87 | 5.06 | 2007 |
Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks | 152 | 6.79 | 2007 |
Joint problem of power optimal connectivity and coverage in wireless sensor networks | 12 | 0.77 | 2007 |
Decentralized detector generation in cooperative intrusion detection systems | 5 | 0.55 | 2007 |
A Combinatorial Approach to Measuring Anonymity | 43 | 1.42 | 2007 |
Robust key generation from signal envelopes in wireless networks | 157 | 8.29 | 2007 |
Expander Graph Based Key Distribution Mechanisms In Wireless Sensor Networks | 11 | 1.15 | 2006 |
Collective sampling and analysis of high order tensors for chatroom communications | 14 | 1.74 | 2006 |