Efficient machine learning for big data: A review OY Al-Jarrah, PD Yoo, S Muhaidat, GK Karagiannidis, K Taha Big Data Research 2 (3), 87-93, 2015 | 688 | 2015 |
Data randomization and cluster-based partitioning for botnet intrusion detection OY Al-Jarrah, O Alhussein, PD Yoo, S Muhaidat, K Taha, K Kim IEEE transactions on cybernetics 46 (8), 1796-1806, 2015 | 153 | 2015 |
IMPACT: Impersonation attack detection via edge computing using deep autoencoder and feature abstraction SJ Lee, PD Yoo, AT Asyhari, Y Jhi, L Chermak, CY Yeun, K Taha IEEE Access 8, 65520-65529, 2020 | 95 | 2020 |
Simplified subspaced regression network for identification of defect patterns in semiconductor wafer maps F Adly, O Alhussein, PD Yoo, Y Al-Hammadi, K Taha, S Muhaidat, ... IEEE Transactions on Industrial Informatics 11 (6), 1267-1276, 2015 | 82 | 2015 |
SIIMCO: A forensic investigation tool for identifying the influential members of a criminal organization K Taha, PD Yoo IEEE Transactions on Information Forensics and Security 11 (4), 811-822, 2015 | 54 | 2015 |
Using the spanning tree of a criminal network for identifying its leaders K Taha, PD Yoo IEEE Transactions on Information Forensics and security 12 (2), 445-453, 2016 | 45 | 2016 |
Analyzing a co-occurrence gene-interaction network to identify disease-gene association A Al-Aamri, K Taha, Y Al-Hammadi, M Maalouf, D Homouz BMC bioinformatics 20, 1-15, 2019 | 35 | 2019 |
Impacts and role of group purchasing organization in healthcare supply chain R Jayaraman, K Taha, KS Park, J Lee IIE Annual Conference. Proceedings, 3842, 2014 | 35 | 2014 |
DEMISe: Interpretable deep extraction and mutual information selection techniques for IoT intrusion detection LR Parker, PD Yoo, TA Asyhari, L Chermak, Y Jhi, K Taha Proceedings of the 14th international conference on availability …, 2019 | 34 | 2019 |
XCDSearch: An XML context-driven search engine K Taha, R Elmasri IEEE Transactions on Knowledge and Data Engineering 22 (12), 1781-1796, 2010 | 34 | 2010 |
Automatic academic advisor K Taha 8th International Conference on Collaborative Computing: Networking …, 2012 | 33 | 2012 |
Clustering the dominant defective patterns in semiconductor wafer maps K Taha, K Salah, PD Yoo IEEE Transactions on Semiconductor Manufacturing 31 (1), 156-165, 2017 | 31 | 2017 |
CISRI: A crime investigation system using the relative importance of information spreaders in networks depicting criminals communications M Alzaabi, K Taha, TA Martin IEEE Transactions on Information Forensics and Security 10 (10), 2196-2211, 2015 | 31 | 2015 |
CXLEngine: A comprehensive XML loosely structured search engine K Taha, R Elmasri Proceedings of the 2008 EDBT workshop on Database technologies for handling …, 2008 | 29 | 2008 |
Methods that optimize multi-objective problems: A survey and experimental evaluation K Taha IEEE Access 8, 80855-80878, 2020 | 27 | 2020 |
R2BN: An Adaptive Model for Keystroke-Dynamics-Based Educational Level Classification I Tsimperidis, PD Yoo, K Taha, A Mylonas, V Katos IEEE transactions on cybernetics 50 (2), 525-535, 2018 | 26 | 2018 |
Semi-supervised and un-supervised clustering: A review and experimental evaluation K Taha Information Systems 114, 102178, 2023 | 24 | 2023 |
Determining the semantic similarities among gene ontology terms K Taha IEEE journal of biomedical and health informatics 17 (3), 512-525, 2013 | 22 | 2013 |
BusSEngine: a business search engine K Taha, R Elmasri Knowledge and information systems 23, 153-197, 2010 | 22 | 2010 |
GRank: A middleware search engine for ranking genes by relevance to given genes K Taha, D Homouz, H Al Muhairi, Z Al Mahmoud BMC bioinformatics 14, 1-15, 2013 | 21 | 2013 |