Selected Publications

Research in the College of Information Sciences and Technology explores topics across a variety of core and cross-cutting domains. Filter the list below by publication author, research area, and year to explore recent publications from IST researchers.

  • Haitao
  • Du
  • Changzhou
  • Wang
  • Tao
  • Zhang
  • Shanchieh Jay
  • Yang
  • Jai
  • Choi
  • Peng
  • Liu
, 2015
, Studies in Computational Intelligence
on p. 201-217
  • Lei
  • Chen
  • Dongwon
  • Lee
  • Tova
  • Milo
, 2015
, Proceedings - International Conference on Data Engineering
on p. 1527-1529
  • Chien Wen
  • Yuan
  • Benjamin V.
  • Hanrahan
  • Sooyeon
  • Lee
  • John M.
  • Carroll
, 2015
, Interaction Design and Architecture(s)
on p. 93-106
  • Sarah
  • Rajtmajer
  • Christopher
  • Griffin
  • Anna
  • Squicciarini
, 2015
, Decision and Game Theory for Security - 6th International Conference, GameSec 2015, Proceedings
on p. 208-227
  • Vasant
  • Honavar
, 2015
, 20th Pacific Symposium on Biocomputing, PSB 2015
on p. 482
  • Antonio Jesús
  • Fernández-García
  • Luis
  • Iribarne
  • Antonio
  • Corral
  • James Z.
  • Wang
, 2015
, On the Move to Meaningful Internet Systems
on p. 401-410
  • Suhang
  • Wang
  • Jiliang
  • Tang
  • Yilin
  • Wang
  • Huan
  • Liu
, 2015
, IJCAI 2015 - Proceedings of the 24th International Joint Conference on Artificial Intelligence
on p. 1813-1819
  • Benjamin
  • Johnson
  • Aron
  • Laszka
  • Jens
  • Grossklags
, 2015
on p. 57-73
  • Nick
  • LaLone
  • Andrea H.
  • Tapia
  • Nathan A.
  • Case
  • Elizabeth
  • MacDonald
  • Michelle
  • Hall
  • Matt
  • Heavner
, 2015
, ISCRAM 2015 Conference Proceedings - 12th International Conference on Information Systems for Crisis Response and Management
on p. 203-213
  • Frank G.
  • Hillary
  • Cristina A.
  • Roman
  • Umesh
  • Venkatesan
  • Sarah M.
  • Rajtmajer
  • Ricardo
  • Bajo
  • Nazareth D.
  • Castellanos
, 2015
, Neuropsychology
on p. 59-75
  • Hong
  • Hu
  • Zheng Leong
  • Chua
  • Zhenkai
  • Liang
  • Prateek
  • Saxena
, 2015
, Computer Security – ESORICS 2015 - 20th European Symposium on Research in Computer Security, Proceedings
on p. 312-331
  • Xiaoyan
  • Sun
  • Jun
  • Dai
  • Anoop
  • Singhal
  • Peng
  • Liu
, 2015
, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
on p. 3-23
  • Alexander G.
  • Ororbia
  • C. Lee
  • Giles
  • David
  • Reitter
, 2015
, Conference Proceedings - EMNLP 2015: Conference on Empirical Methods in Natural Language Processing
on p. 471-481
  • Thanh H.
  • Nguyen
  • Francesco M.
  • Delle Fave
  • Debarun
  • Kar
  • Aravind S.
  • Lakshminarayanan
  • Amulya
  • Yadav
  • Milind
  • Tambe
  • Noa
  • Agmon
  • Andrew J.
  • Plumptre
  • Margaret
  • Driciru
  • Fred
  • Wanyama
  • Aggrey
  • Rwetsiba
, 2015
, Decision and Game Theory for Security - 6th International Conference, GameSec 2015, Proceedings
on p. 170-191
  • Taegyu
  • Kim
  • Ki Woong
  • Park
, 2015
on p. 31-48
  • Taegyu
  • Kim
  • Woomin
  • Hwang
  • Chulmin
  • Kim
  • Dong Jae
  • Shin
  • Ki Woong
  • Park
  • Kyu Ho
  • Park
, 2015
on p. 17-26
  • Chen
  • Liang
  • Zhaohui
  • Wu
  • Wenyi
  • Huang
  • C. Lee
  • Giles
, 2015
, Conference Proceedings - EMNLP 2015
on p. 1668-1674
  • Jiang
  • Ming
  • Dongpeng
  • Xu
  • Dinghao
  • Wu
, 2015
, ICT Systems Security and Privacy Protection - 30th IFIP TC 11 International Conference, SEC 2015, Proceedings
on p. 416-430
  • Siddhartha
  • Banerjee
  • Prasenjit
  • Mitra
  • Kazunari
  • Sugiyama
, 2015
, IJCAI 2015 - Proceedings of the 24th International Joint Conference on Artificial Intelligence
on p. 1208-1214
  • Tao
  • Xu
  • Xiaolei
  • Huang
  • Edward
  • Kim
  • L. Rodney
  • Long
  • Sameer
  • Antani
, 2015
, Medical Imaging 2015
  • Aron
  • Laszka
  • Assane
  • Gueye
, 2015
, Internet Mathematics
on p. 588-626
  • Hadi
  • Hosseini
, 2015
, AAMAS 2015 - Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems
on p. 2005-2006
  • Alexander G.
  • Ororbia
  • David
  • Reitter
  • Jian
  • Wu
  • C.
  • Leegiles
, 2015
, Machine Learning and Knowledge Discovery in Databases - European Conference, ECML PKDD 2015, Proceedings
on p. 516-532
  • Anna C.
  • Squicciarini
  • Dan
  • Lin
  • Smitha
  • Sundareswaran
  • Jingwei
  • Li
, 2015
, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
on p. 55-72
  • Yafei
  • Wang
  • John
  • Yen
  • David T.
  • Reitter
, 2015
on p. 9-18
  • A.
  • Yadav
  • L.
  • Marcolino
  • E.
  • Rice
  • R.
  • Petering
  • H.
  • Winetrobe
  • H.
  • Rhoades
  • M.
  • Tambe
  • H.
  • Carmichael
, 2015
, Planning, Search, and Optimization - Papers Presented at the 29th AAAI Conference on Artificial Intelligence, Technical Report
on p. 92-99
  • Shuai
  • Wang
  • Pei
  • Wang
  • Dinghao
  • Wu
, 2015
, Proceedings of the 24th USENIX Security Symposium
on p. 627-642
  • Yubao
  • Wu
  • Ruoming
  • Jin
  • Jing
  • Li
  • Xiang
  • Zhang
, 2015
, Proceedings of the VLDB Endowment
on p. 798-809
  • Sushama
  • Karumanchi
  • Jingwei
  • Li
  • Anna
  • Squicciarini
, 2015
, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
on p. 153-173
  • Aron
  • Laszka
  • Jens
  • Grossklags
, 2015
on p. 483-502
  • Ting
  • Xu
  • Dimitrios
  • Vavylonis
  • Feng Ching
  • Tsai
  • Gijsje H.
  • Koenderink
  • Wei
  • Nie
  • Eddy
  • Yusuf
  • I. Ju
  • Lee
  • Jian Qiu
  • Wu
  • Xiaolei
  • Huang
, 2015
, Scientific reports
  • Syed Masum
  • Billah
  • Susan
  • Gauch
, 2015
, KDIR
on p. 27-35
  • Zhaohui
  • Wu
  • Chen
  • Liang
  • C. Lee
  • Giles
, 2015
, ACL-IJCNLP 2015 - 53rd Annual Meeting of the Association for Computational Linguistics and the 7th International Joint Conference on Natural Language Processing, Proceedings of System Demonstrations
on p. 133-138
  • Jingwei
  • Li
  • Dan
  • Lin
  • Anna
  • Squicciarini
  • Chunfu
  • Jia
, 2015
, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
on p. 36-44
  • Jiang
  • Ming
  • Dinghao
  • Wu
  • Gaoyao
  • Xiao
  • Jun
  • Wang
  • Peng
  • Liu
, 2015
, Proceedings of the 24th USENIX Security Symposium
on p. 65-80
  • Cindy Lin
  • Kaiying
  • Daniela Alina
  • Plewe
  • Carsten
  • Röcker
, 2015
, Procedia Manufacturing
on p. 2155-2161
  • Martin
  • Krallinger
  • Obdulia
  • Rabal
  • Florian
  • Leitner
  • Miguel
  • Vazquez
  • David
  • Salgado
  • Zhiyong
  • Lu
  • Robert
  • Leaman
  • Yanan
  • Lu
  • Donghong
  • Ji
  • Daniel M.
  • Lowe
  • Roger A.
  • Sayle
  • Riza Theresa
  • Batista-Navarro
  • Rafal
  • Rak
  • Torsten
  • Huber
  • Tim
  • Rocktäschel
  • Sérgio
  • Matos
  • David
  • Campos
  • Buzhou
  • Tang
  • Hua
  • Xu
  • Tsendsuren
  • Munkhdalai
  • Keun Ho
  • Ryu
  • S. V.
  • Ramanan
  • Senthil
  • Nathan
  • Slavko
  • Žitnik
  • Marko
  • Bajec
  • Lutz
  • Weber
  • Matthias
  • Irmer
  • Saber A.
  • Akhondi
  • Jan A.
  • Kors
  • Shuo
  • Xu
  • Xin
  • An
  • Utpal Kumar
  • Sikdar
  • Asif
  • Ekbal
  • Masaharu
  • Yoshioka
  • Thaer M.
  • Dieb
  • Miji
  • Choi
  • Karin
  • Verspoor
  • Madian
  • Khabsa
  • C. Lee
  • Giles
  • Hongfang
  • Liu
  • Komandur Elayavilli
  • Ravikumar
  • Andre
  • Lamurias
  • Francisco M.
  • Couto
  • Hong Jie
  • Dai
  • Richard Tzong Han
  • Tsai
  • Caglar
  • Ata
  • Tolga
  • Can
  • Anabel
  • Usié
  • Rui
  • Alves
  • Isabel
  • Segura-Bedmar
  • Paloma
  • Martinez
  • Julen
  • Oyarzabal
  • Alfonso
  • Valencia
, 2015
, Journal of Cheminformatics
  • Lynette
  • Kvasny
, 2015
, Wiley Encyclopedia of Management
  • Michel
  • Avital
  • John M.
  • Carroll
  • Anders
  • Hjalmarsson
  • Natalia
  • Levina
  • Arvind
  • Malhotra
  • Arun
  • Sundararajan
, 2015
  • Mingyi
  • Zhao
  • Peng
  • Liu
  • Jorge
  • Lobo
, 2015
, Data and Applications Security and Privacy XXIX - 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Proceedings
on p. 19-34
  • Hongmin
  • Li
  • Nicolais
  • Guevara
  • Nic
  • Herndon
  • Doina
  • Caragea
  • Kishore
  • Neppalli
  • Cornelia
  • Caragea
  • Anna
  • Squicciarini
  • Andrea H.
  • Tapia
, 2015
, ISCRAM 2015 Conference Proceedings - 12th International Conference on Information Systems for Crisis Response and Management
  • Christopher L.
  • Dancy
  • Frank E.
  • Ritter
  • Glenn
  • Gunzelmann
, 2015
, Proceedings of ICCM 2015 - 13th International Conference on Cognitive Modeling
on p. 258-263
  • Prakhar
  • Biyani
  • Sumit
  • Bhatia
  • Cornelia
  • Caragea
  • Prasenjit
  • Mitra
, 2015
, Advances in Information Retrieval - 37th European Conference on IR Research, ECIR 2015, Proceedings
on p. 495-500
  • Alan
  • Tsang
  • John A.
  • Doucette
  • Hadi
  • Hosseini
, 2015
, AAMAS 2015 - Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems
on p. 1841-1842
  • Aron
  • Laszka
  • Benjamin
  • Johnson
  • Jens
  • Grossklags
, 2015
on p. 63-77
  • Siddhartha
  • Banerjee
  • Prasenjit
  • Mitra
, 2015
, ACL-IJCNLP 2015 - 53rd Annual Meeting of the Association for Computational Linguistics and the 7th International Joint Conference on Natural Language Processing of the Asian Federation of Natural Language Processing, Proceedings of the Conference
on p. 867-877
  • Jia
  • Tao
  • Giora
  • Slutzki
  • Vasant
  • Honavar
, 2014
, ACM Transactions on Computational Logic
  • Zhaohui
  • Wu
  • Wenyi
  • Huang
  • Chen
  • Liang
  • C. Lee
  • Giles
, 2014
, 2014 IEEE/ACM Joint Conference on Digital Libraries, JCDL 2014
on p. 141-144
  • Hongsheng
  • Li
  • Xiaolei
  • Huang
  • Junzhou
  • Huang
  • Shaoting
  • Zhang
, 2014
, IEEE Transactions on Pattern Analysis and Machine Intelligence
on p. 2407-2422
  • Andrea H.
  • Tapia
  • Kathleen
  • Moore
, 2014
, Computer Supported Cooperative Work: CSCW: An International Journal
on p. 483-512