• Publications
  • Influence
Classification and Novel Class Detection in Concept-Drifting Data Streams under Time Constraints
TLDR
We propose a data stream classification technique that integrates a novel class detection mechanism into traditional classifiers, enabling automatic detection of novel classes before the true labels of the novel class instances arrive. Expand
  • 315
  • 39
  • PDF
Remaining Useful Life Estimation Based on a Nonlinear Diffusion Degradation Process
Remaining useful life estimation is central to the prognostics and health management of systems, particularly for safety-critical systems, and systems that are very expensive. We present a non-linearExpand
  • 186
  • 31
  • PDF
Privacy preservation in wireless sensor networks: A state-of-the-art survey
TLDR
This paper provides a state-of-the-art survey of privacy-preserving techniques for WSNs. Expand
  • 314
  • 21
  • PDF
Heuristics-Based Query Processing for Large RDF Graphs Using Cloud Computing
TLDR
We describe a framework that we built using Hadoop to store and retrieve large numbers of RDF triples by exploiting the cloud computing paradigm. Expand
  • 206
  • 19
  • PDF
ROWLBAC: representing role based access control in OWL
TLDR
This paper studies the relationship between the Web Ontology Language (OWL) and the Role Based Access Control (RBAC) model. Expand
  • 246
  • 19
  • PDF
A new intrusion detection system using support vector machines and hierarchical clustering
TLDR
This paper presents a study for enhancing the training time of SVM, specifically when dealing with large data sets, using hierarchical clustering analysis. Expand
  • 376
  • 16
  • PDF
A semantic web based framework for social network access control
TLDR
We propose an extensible fine grained access control model based on semantic web tools to address the existing security and privacy concerns related to on-line social networks. Expand
  • 179
  • 11
  • PDF
Semantic web-based social network access control
TLDR
We propose an extensible fine-grained online social network access control model based on semantic web tools that are modeled using OWL and SWRL. Expand
  • 122
  • 11
  • PDF
Inferring private information using social network data
TLDR
In this paper, we explore how to launch inference attacks using released social networking data to predict undisclosed private information about individuals. Expand
  • 230
  • 10
  • PDF
Preventing Private Information Inference Attacks on Social Networks
TLDR
In this paper, we explore how to launch inference attacks using released social networking data to predict private information. Expand
  • 162
  • 10
  • PDF