Selected Publications

Research in the College of Information Sciences and Technology explores topics across a variety of core and cross-cutting domains. Filter the list below by publication author, research area, and year to explore recent publications from IST researchers.

  • Zhaohui
  • Wu
  • Sujatha
  • Das
  • Zhenhui
  • Li
  • Prasenjit
  • Mitra
  • C. Lee
  • Giles
, 2013
, DocEng 2013 - Proceedings of the 2013 ACM Symposium on Document Engineering
on p. 81-90
  • Tao
  • Yang
  • Dongwon
  • Lee
  • Su
  • Yan
, 2013
, Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2013
on p. 684-691
  • Lu
  • Xiao
  • John M.
  • Carroll
, 2013
, International Journal of e-Collaboration
on p. 78-95
  • Hung Hsuan
  • Chen
  • David J.
  • Miller
  • C. Lee
  • Giles
, 2013
, Proceedings of the ACM SIGMOD Workshop on Databases and Social Networks, DBSocial 2013
on p. 43-48
  • Adrian
  • Nistor
  • Linhai
  • Song
  • Darko
  • Marinov
  • Shan
  • Lu
, 2013
, 2013 35th International Conference on Software Engineering, ICSE 2013 - Proceedings
on p. 562-571
  • Shengzhi
  • Zhang
  • Wenjie
  • Wang
  • Haishan
  • Wu
  • Athanasios V.
  • Vasilakos
  • Peng
  • Liu
, 2013
, Future Generation Computer Systems
on p. 913-925
  • Kyle
  • Williams
  • Hung Hsuan
  • Chen
  • Sagnik Ray
  • Choudhury
  • C. Lee
  • Giles
, 2013
, CEUR Workshop Proceedings
  • Ganesh Ram
  • Santhanam
  • Samik
  • Basu
  • Vasant
  • Honavar
, 2013
, Algorithmic Decision Theory - Third International Conference, ADT 2013, Proceedings
on p. 324-335
  • Donald R.
  • Kretz
  • B. J.
  • Simpson
  • Colonel Jacob
  • Graham
, 2012
, 2012 IEEE International Conference on Technologies for Homeland Security, HST 2012
on p. 439-444
  • Sashi
  • Gurung
  • Anna
  • Squicciarini
  • Dan
  • Lin
  • Ozan K.
  • Tonguz
, 2012
, Proceedings of the 2012 8th International Conference on Network and Service Management, CNSM 2012
on p. 184-188
  • Anna Cinzia
  • Squicciarini
  • Giuseppe
  • Petracca
  • Elisa
  • Bertino
, 2012
, Proceedings of the 2012 8th International Conference on Network and Service Management, CNSM 2012
on p. 140-144
  • Jeffrey C.
  • Rimland
  • Dan
  • Coughlin
  • David L.
  • Hall
  • Jacob L.
  • Graham
, 2012
, Multisensor, Multisource Information Fusion
  • Honglu
  • Du
  • Mary Beth
  • Rosson
  • John M.
  • Carroll
, 2012
, GROUP'12 - Proceedings of the ACM 2012 International Conference on Support Group Work
on p. 155-164
  • Xiang
  • Zhang
  • Shunping
  • Huang
  • Zhaojun
  • Zhang
  • Wei
  • Wang
, 2012
, PLoS computational biology
  • Haibin
  • Liu
  • Woo Cheol
  • Kim
  • Dongwon
  • Lee
, 2012
, Proceedings - 2012 8th Latin American Web Congress, LA-WEB 2012
on p. 100-107
  • Michael
  • Tyworth
  • Nicklaus A.
  • Giacobe
  • Vincent
  • Mancuso
, 2012
, Cyber Sensing 2012
  • Ryan
  • Kaulakis
  • Changkun
  • Zhao
  • Jonathan H.
  • Morgan
  • Jeremiah W.
  • Hiam
  • Joseph P.
  • Sanford
  • Frank E.
  • Ritter
, 2012
, Proceedings of the 11th International Conference on Cognitive Modeling, ICCM 2012
on p. 117-122
  • Ho Cheng
  • Yu
  • Ting Hao
  • Huang
  • Hsin Hsi
  • Chen
, 2012
, Proceedings of the 24th Conference on Computational Linguistics and Speech Processing, ROCLING 2012
on p. 30-31
  • Madian
  • Khabsa
  • Pucktada
  • Treeratpituk
  • C. Lee
  • Giles
, 2012
, CIKM 2012 - Proceedings of the 21st ACM International Conference on Information and Knowledge Management
on p. 2363-2366
  • Jingqiang
  • Lin
  • Jiwu
  • Jing
  • Peng
  • Liu
, 2012
, Quality and Reliability Engineering International
on p. 825-841
  • Mingyi
  • Zhao
  • Chen
  • Zhong
  • Richard
  • Ciamaichelo
  • Michael
  • Konek
  • Neela
  • Sawant
  • Nicklaus A.
  • Giacobe
, 2012
, IEEE Conference on Visual Analytics Science and Technology 2012, VAST 2012 - Proceedings
on p. 303-304
  • William G.
  • Kennedy
  • Frank E.
  • Ritter
  • Christian
  • Lebiere
  • Ion
  • Juvina
  • Alessandro
  • Oltramari
  • Jonathan
  • Gratch
  • Richard M.
  • Young
, 2012
, Proceedings of the 11th International Conference on Cognitive Modeling, ICCM 2012
on p. 55-58
  • Carleen F.
  • Maitland
  • Herschel F.
  • Thomas
  • Louis Marie
  • Ngamassi Tchouakeu
, 2012
, Journal of Information Technology
on p. 285-300
  • Shengzhi
  • Zhang
  • Peng
  • Liu
, 2012
, ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security
on p. 91-92
  • Heng
  • Xu
  • Sumeet
  • Gupta
  • Mary Beth
  • Rosson
  • John
  • Carroll
, 2012
, International Conference on Information Systems, ICIS 2012
on p. 2278-2293
  • Eric Yi
  • Liu
  • Zhishan
  • Guo
  • Xiang
  • Zhang
  • Vladimir
  • Jojic
  • Wei
  • Wang
, 2012
, Proceedings - 12th IEEE International Conference on Data Mining, ICDM 2012
on p. 978-983
  • Hau Wen
  • Chang
  • Dongwon
  • Lee
  • Mohammed
  • Eltaher
  • Jeongkyu
  • Lee
, 2012
, Proceedings of the 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2012
on p. 111-118
  • Frank E.
  • Ritter
  • Jonathan H.
  • Morgan
  • Jong W.
  • Kim
, 2012
, 21st Annual Conference on Behavior Representation in Modeling and Simulation 2012, BRiMS 2012
on p. 229-235
  • Jia
  • Tao
  • Giora
  • Slutzki
  • Vasant
  • Honavar
, 2012
, Journal of Automated Reasoning
on p. 551-582
  • Wenyi
  • Huang
  • Saurabh
  • Kataria
  • Cornelia
  • Caragea
  • Prasenjit
  • Mitra
  • C. Lee
  • Giles
  • Lior
  • Rokach
, 2012
, CIKM 2012 - Proceedings of the 21st ACM International Conference on Information and Knowledge Management
on p. 1910-1914
  • Sushama
  • Karumanchi
  • Anna
  • Squicciarini
  • Dan
  • Lin
, 2012
, Network and System Security - 6th International Conference, NSS 2012, Proceedings
on p. 445-461
  • Liang
  • Gou
  • Xiaolong
  • Zhang
  • Airong
  • Luo
  • Patricia F.
  • Anderson
, 2012
, IEEE Conference on Visual Analytics Science and Technology 2012, VAST 2012 - Proceedings
on p. 133-142
  • Changkun
  • Zhao
  • Ryan
  • Kaulakis
  • Jonathan H.
  • Morgan
  • Jeremiah W.
  • Hiam
  • Joseph P.
  • Sanford
  • Frank E.
  • Ritter
  • Geoffrey P.
  • Morgan
, 2012
, 21st Annual Conference on Behavior Representation in Modeling and Simulation 2012, BRiMS 2012
on p. 21-28
  • Shomir
  • Wilson
, 2012
, 50th Annual Meeting of the Association for Computational Linguistics, ACL 2012 - Proceedings of the Conference
on p. 638-646
  • Christopher L.
  • Dancy
  • Frank E.
  • Ritter
  • Keith
  • Berry
, 2012
, 21st Annual Conference on Behavior Representation in Modeling and Simulation 2012, BRiMS 2012
on p. 75-82
  • Kewei
  • Tu
  • Vasant
  • Honavar
, 2012
, EMNLP-CoNLL 2012 - 2012 Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning, Proceedings of the Conference
on p. 1324-1334
  • George H L
  • Fletcher
  • Prasenjit
  • Mitra
, 2012
, CIKM 2012 - Proceedings of the 21st ACM International Conference on Information and Knowledge Management
on p. 2778-2779
  • George H L
  • Fletcher
  • Prasenjit
  • Mitra
, 2012
, International Conference on Information and Knowledge Management, Proceedings
on p. iii
  • Mohamed
  • Shehab
  • Anna
  • Squicciarini
  • Gail Joon
  • Ahn
  • Irini
  • Kokkinou
, 2012
, Computers and Security
on p. 897-911
  • Shaoke
  • Zhang
  • Hao
  • Jiang
  • John
  • Carroll
, 2012
, SIGDOC'12 - Proceedings of the 30th ACM International Conference on Design of Communication
on p. 37-45
  • Qijun
  • Gu
  • Wanyu
  • Zang
  • Meng
  • Yu
  • Peng
  • Liu
, 2012
, Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012
on p. 793-800
  • Cornelia
  • Caragea
  • Adrian
  • Silvescu
  • Prasenjit
  • Mitra
, 2012
, AAAI-12 / IAAI-12 - Proceedings of the 26th AAAI Conference on Artificial Intelligence and the 24th Innovative Applications of Artificial Intelligence Conference
on p. 3-9
  • Honglu
  • Du
  • Mary Beth
  • Rosson
  • John
  • Carroll
, 2012
, SIGDOC'12 - Proceedings of the 30th ACM International Conference on Design of Communication
on p. 127-136
  • Arej
  • Muhammed
  • Dan
  • Lin
  • Anna
  • Squicciarini
, 2012
, Information and Communications Security - 14th International Conference, ICICS 2012, Proceedings
on p. 427-434
  • Pucktada
  • Treeratpituk
  • C. Lee
  • Giles
, 2012
, AAAI-12 / IAAI-12 - Proceedings of the 26th AAAI Conference on Artificial Intelligence and the 24th Innovative Applications of Artificial Intelligence Conference
on p. 1141-1147
  • Jing
  • Fang
  • Prasenjit
  • Mitra
  • Zhi
  • Tang
  • C. Lee
  • Giles
, 2012
, AAAI-12 / IAAI-12 - Proceedings of the 26th AAAI Conference on Artificial Intelligence and the 24th Innovative Applications of Artificial Intelligence Conference
on p. 599-605
  • Saeed
  • Abdullah
  • Nicholas D.
  • Lane
  • Tanzeem
  • Choudhury
, 2012
, AAAI-12 / IAAI-12 - Proceedings of the 26th AAAI Conference on Artificial Intelligence and the 24th Innovative Applications of Artificial Intelligence Conference
on p. 851-857
  • Jingqiang
  • Lin
  • Peng
  • Liu
  • Jiwu
  • Jing
, 2012
, Decision and Game Theory for Security - Third International Conference, GameSec 2012, Proceedings
on p. 118-137