Machine learning-based android malware detection using manifest permissions N Herron, WB Glisson, JT McDonald, RK Benton Proceedings of the 54th Hawaii International Conference on System Sciences, 2021 | 43 | 2021 |
Framework for real-time event detection using multiple social media sources S Katragadda, R Benton, V Raghavan | 29 | 2017 |
Network Attack Detection Using an Unsupervised Machine Learning Algorithm A Kumar, W Glisson, R Benton Proceedings of the 53rd Hawaii International Conference on System Sciences …, 2020 | 26 | 2020 |
Detection of event onset using twitter S Katragadda, S Virani, R Benton, V Raghavan 2016 international joint conference on neural networks (IJCNN), 1539-1546, 2016 | 26 | 2016 |
Insight from a docker container introspection T Watts, RG Benton, WB Glisson, J Shropshire Hawaii International Conference on System Sciences 2019, 2019 | 24 | 2019 |
Development of a support vector machine learning and smart phone Internet of Things-based architecture for real-time sleep apnea diagnosis B Ma, Z Wu, S Li, R Benton, D Li, Y Huang, MV Kasukurthi, J Lin, ... BMC Medical Informatics and Decision Making 20, 1-13, 2020 | 23 | 2020 |
Detecting adverse drug effects using link classification on twitter data S Katragadda, H Karnati, M Pusala, V Raghavan, R Benton 2015 IEEE International conference on bioinformatics and biomedicine (BIBM …, 2015 | 22 | 2015 |
A partial encryption algorithm for medical images based on quick response code and reversible data hiding technology J Li, Z Zhang, S Li, R Benton, Y Huang, MV Kasukurthi, D Li, J Lin, ... BMC Medical Informatics and Decision Making 20, 1-16, 2020 | 19 | 2020 |
Min-max itemset trees for dense and categorical datasets J Lavergne, R Benton, VV Raghavan Foundations of Intelligent Systems: 20th International Symposium, ISMIS 2012 …, 2012 | 19 | 2012 |
Soft computing approach to steganalysis of LSB embedding in digital images R Benton, H Chu ITRE 2005. 3rd International Conference on Information Technology: Research …, 2005 | 19 | 2005 |
Procedural generation of stylized 2d maps M Prachyabrued, TE Roden, RG Benton Proceedings of the international conference on Advances in computer …, 2007 | 18 | 2007 |
Identifying stealth malware using CPU power consumption and learning algorithms P Luckett, JT McDonald, WB Glisson, R Benton, J Dawson, BA Doyle Journal of Computer Security 26 (5), 589-613, 2018 | 17 | 2018 |
TRARM-RelSup: targeted rare association rule mining using itemset trees and the relative support measure J Lavergne, R Benton, VV Raghavan Foundations of Intelligent Systems: 20th International Symposium, ISMIS 2012 …, 2012 | 16 | 2012 |
Data fusion and feature selection for Alzheimer’s diagnosis B Lemoine, S Rayburn, R Benton International Conference on Brain Informatics, 320-327, 2010 | 13 | 2010 |
Automatic and semi-automatic techniques for image annotation B Shah, R Benton, Z Wu, V Raghavan Semantic-based visual information retrieval, 112-134, 2007 | 13 | 2007 |
Deception detection using machine learning AA Ceballos Delgado, W Glisson, N Shashidhar, J Mcdonald, G Grispos, ... | 12 | 2021 |
A holistic end-to-end prescriptive maintenance framework S Choubey, RG Benton, T Johnsten Data-Enabled Discovery and Applications 4, 1-20, 2020 | 11 | 2020 |
Prescriptive equipment maintenance: a framework S Choubey, R Benton, T Johnsten 2019 IEEE international conference on big data (Big Data), 4366-4374, 2019 | 11 | 2019 |
Muscle fatigue detection and treatment system driven by internet of things B Ma, C Li, Z Wu, Y Huang, AC van der Zijp-Tan, S Tan, D Li, A Fong, ... BMC Medical Informatics and Decision Making 19, 1-9, 2019 | 11 | 2019 |
A SVM-based algorithm to diagnose sleep apnea B Ma, Z Wu, S Li, R Benton, D Li, Y Huang, MV Kasukurthi, J Lin, ... 2019 IEEE international conference on bioinformatics and biomedicine (BIBM …, 2019 | 11 | 2019 |