Follow
Latifur Khan
Title
Cited by
Cited by
Year
A new intrusion detection system using support vector machines and hierarchical clustering
L Khan, M Awad, B Thuraisingham
The VLDB journal 16, 507-521, 2007
5442007
Classification and novel class detection in concept-drifting data streams under time constraints
M Masud, J Gao, L Khan, J Han, BM Thuraisingham
IEEE Transactions on knowledge and data engineering 23 (6), 859-874, 2010
4702010
A machine learning approach to android malware detection
J Sahs, L Khan
2012 European intelligence and security informatics conference, 141-147, 2012
4462012
Hypoglycaemic activity of Coccinia indica and Momordica charantia in diabetic rats: depression of the hepatic gluconeogenic enzymes glucose-6-phosphatase …
BA Shibib, LA Khan, R Rahman
Biochemical Journal 292 (1), 267-270, 1993
3731993
Image annotations by combining multiple evidence & wordnet
Y Jin, L Khan, L Wang, M Awad
Proceedings of the 13th annual ACM international conference on Multimedia …, 2005
3492005
Security issues for cloud computing
K Hamlen, M Kantarcioglu, L Khan, B Thuraisingham
International Journal of Information Security and Privacy (IJISP) 4 (2), 36-48, 2010
3432010
Heuristics-based query processing for large RDF graphs using cloud computing
M Husain, J McGlothlin, MM Masud, L Khan, BM Thuraisingham
IEEE Transactions on Knowledge and Data Engineering 23 (9), 1312-1327, 2011
2792011
Constructing gene co-expression networks and predicting functions of unknown genes by random matrix theory
F Luo, Y Yang, J Zhong, H Gao, L Khan, DK Thompson, J Zhou
BMC bioinformatics 8 (1), 1-17, 2007
2602007
Retrieval effectiveness of an ontology-based model for information selection
L Khan, D McLeod, E Hovy
The VLDB Journal 13, 71-85, 2004
2542004
Ontology construction for information selection
L Khan, F Luo
14th IEEE International Conference on Tools with Artificial Intelligence …, 2002
2512002
Smv-hunter: Large scale, automated detection of ssl/tls man-in-the-middle vulnerabilities in android apps
DSJSG Greenwood, ZLL Khan
Network and Distributed System Security Symposium (NDSS). Internet Society …, 2014
2312014
Systems and methods for determining user attribute values by mining user network data and information
S Abrol, V Khadilkar, LR Khan, BM Thuraisingham
US Patent 8,965,974, 2015
2302015
Data mining techniques
AS Osman
226*2019
A practical approach to classify evolving data streams: Training with limited amount of labeled data
MM Masud, J Gao, L Khan, J Han, B Thuraisingham
2008 Eighth IEEE International Conference on Data Mining, 929-934, 2008
2022008
Estimating twitter user location using social interactions--a content based approach
S Chandra, L Khan, FB Muhaya
2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011
1922011
Systems and methods for automated detection of application vulnerabilities
L Khan, Z Lin, B Thuraisingham, J Sahs, D Sounthiraraj, G Greenwood
US Patent 9,977,904, 2018
1832018
Secure knowledge management: confidentiality, trust, and privacy
E Bertino, LR Khan, R Sandhu, B Thuraisingham
IEEE Transactions on systems, man, and cybernetics-Part A: Systems and …, 2006
1772006
Storage and Retrieval of Large RDF Graph Using Hadoop and MapReduce.
MF Husain, P Doshi, L Khan, BM Thuraisingham
CloudCom 9, 680-686, 2009
1722009
Sand: Semi-supervised adaptive novel class detection and classification over data stream
A Haque, L Khan, M Baron
Proceedings of the AAAI Conference on Artificial Intelligence 30 (1), 2016
1652016
Facing the reality of data stream classification: coping with scarcity of labeled data
MM Masud, C Woolam, J Gao, L Khan, J Han, KW Hamlen, NC Oza
Knowledge and information systems 33, 213-244, 2012
1572012
The system can't perform the operation now. Try again later.
Articles 1–20