Learn More
During the last decade, anomaly detection has attracted the attention of many researchers to overcome the weakness of signature-based IDSs in detecting novel attacks, and KDDCUP'99 is the mostly widely used data set for the evaluation of these systems. Having conducted a statistical analysis on this data set, we found two important issues which highly(More)
We study the problem of reconstructing a sparse signal from a limited number of its linear projections when a part of its support is known, although the known part may contain some errors. The “known” part of the support, denoted T, may be available from prior knowledge. Alternatively, in a problem of recursively reconstructing time sequences(More)
Kempe et al. [4] (KKT) showed the problem of influence maximization is <b>NP</b>-hard and a simple greedy algorithm guarantees the best possible approximation factor in PTIME. However, it has two major sources of inefficiency. First, finding the expected spread of a node set is #<b>P</b>-hard. Second, the basic greedy algorithm is quadratic in the number of(More)
This work presents the technique of constrained independent component analysis (cICA) and demonstrates two applications, less-complete ICA, and ICA with reference (ICA-R). The cICA is proposed as a general framework to incorporate additional requirements and prior information in the form of constraints into the ICA contrast function. The adaptive solutions(More)
A memristor is a two-terminal electronic device whose conductance can be precisely modulated by charge or flux through it. Here we experimentally demonstrate a nanoscale silicon-based memristor device and show that a hybrid system composed of complementary metal-oxide semiconductor neurons and memristor synapses can support important synaptic functions such(More)
We carried out a genome-wide association study among Chinese women to identify risk variants for breast cancer. After analyzing 607,728 SNPs in 1,505 cases and 1,522 controls, we selected 29 SNPs for a fast-track replication in an independent set of 1,554 cases and 1,576 controls. We further investigated four replicated loci in a third set of samples(More)
In this paper, we present an algorithm for learning a generative model of natural language sentences together with their formal meaning representations with hierarchical structures. The model is applied to the task of mapping sentences to hierarchical representations of their underlying meaning. We introduce dynamic programming techniques for efficient(More)
Botnets have become one of the major threats on the Internet for serving as a vector for carrying attacks against organizations and committing cybercrimes. They are used to generate spam, carry out DDOS attacks and click-fraud, and steal sensitive information. In this paper, we propose a new approach for characterizing and detecting botnets using network(More)
We conducted a three-stage genetic study to identify susceptibility loci for type 2 diabetes (T2D) in east Asian populations. We followed our stage 1 meta-analysis of eight T2D genome-wide association studies (6,952 cases with T2D and 11,865 controls) with a stage 2 in silico replication analysis (5,843 cases and 4,574 controls) and a stage 3 de novo(More)
We present the technique of the ICA with Reference (ICA-R) to extract an interesting subset of independent sources from their linear mixtures when some a priori information of the sources are available in the form of rough templates (references). The constrained Independent Component Analysis (cICA) is extended to incorporate the reference signals that(More)