A new intrusion detection system using support vector machines and hierarchical clustering L Khan, M Awad, B Thuraisingham The VLDB journal 16, 507-521, 2007 | 570 | 2007 |
Classification and novel class detection in concept-drifting data streams under time constraints M Masud, J Gao, L Khan, J Han, BM Thuraisingham IEEE Transactions on knowledge and data engineering 23 (6), 859-874, 2010 | 510 | 2010 |
A machine learning approach to android malware detection J Sahs, L Khan 2012 European intelligence and security informatics conference, 141-147, 2012 | 480 | 2012 |
Hypoglycaemic activity of Coccinia indica and Momordica charantia in diabetic rats: depression of the hepatic gluconeogenic enzymes glucose-6-phosphatase … BA Shibib, LA Khan, R Rahman Biochemical Journal 292 (1), 267-270, 1993 | 387 | 1993 |
Image annotations by combining multiple evidence & wordnet Y Jin, L Khan, L Wang, M Awad Proceedings of the 13th annual ACM international conference on Multimedia …, 2005 | 359 | 2005 |
Security issues for cloud computing K Hamlen, M Kantarcioglu, L Khan, B Thuraisingham International Journal of Information Security and Privacy (IJISP) 4 (2), 36-48, 2010 | 356 | 2010 |
Systems and methods for determining user attribute values by mining user network data and information S Abrol, V Khadilkar, LR Khan, BM Thuraisingham US Patent 8,965,974, 2015 | 310 | 2015 |
Constructing gene co-expression networks and predicting functions of unknown genes by random matrix theory F Luo, Y Yang, J Zhong, H Gao, L Khan, DK Thompson, J Zhou BMC bioinformatics 8, 1-17, 2007 | 291 | 2007 |
Heuristics-based query processing for large RDF graphs using cloud computing M Husain, J McGlothlin, MM Masud, L Khan, BM Thuraisingham IEEE Transactions on Knowledge and Data Engineering 23 (9), 1312-1327, 2011 | 284 | 2011 |
Ontology construction for information selection L Khan, F Luo 14th IEEE International Conference on Tools with Artificial Intelligence …, 2002 | 259 | 2002 |
Retrieval effectiveness of an ontology-based model for information selection L Khan, D McLeod, E Hovy the VLDB Journal 13, 71-85, 2004 | 251 | 2004 |
Smv-hunter: Large scale, automated detection of ssl/tls man-in-the-middle vulnerabilities in android apps DSJSG Greenwood, ZLL Khan Network and Distributed System Security Symposium (NDSS). Internet Society …, 2014 | 248 | 2014 |
Data mining techniques J Han Proceedings of the 1996 ACM SIGMOD international conference on Management of …, 1996 | 215* | 1996 |
A practical approach to classify evolving data streams: Training with limited amount of labeled data MM Masud, J Gao, L Khan, J Han, B Thuraisingham 2008 Eighth IEEE International Conference on Data Mining, 929-934, 2008 | 211 | 2008 |
Systems and methods for automated detection of application vulnerabilities L Khan, Z Lin, B Thuraisingham, J Sahs, D Sounthiraraj, G Greenwood US Patent 9,977,904, 2018 | 203 | 2018 |
Sand: Semi-supervised adaptive novel class detection and classification over data stream A Haque, L Khan, M Baron Proceedings of the AAAI Conference on Artificial Intelligence 30 (1), 2016 | 199 | 2016 |
Estimating twitter user location using social interactions--a content based approach S Chandra, L Khan, FB Muhaya 2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011 | 199 | 2011 |
Decentralized IoT data management using blockchain and trusted execution environment G Ayoade, V Karande, L Khan, K Hamlen 2018 IEEE international conference on information reuse and integration (IRI …, 2018 | 194 | 2018 |
Secure knowledge management: confidentiality, trust, and privacy E Bertino, LR Khan, R Sandhu, B Thuraisingham IEEE Transactions on systems, man, and cybernetics-Part A: Systems and …, 2006 | 181 | 2006 |
Storage and retrieval of large rdf graph using hadoop and mapreduce M Farhan Husain, P Doshi, L Khan, B Thuraisingham Cloud Computing: First International Conference, CloudCom 2009, Beijing …, 2009 | 177 | 2009 |