A methodology for hiding knowledge in databases T Johnsten, VV Raghavan Proceedings of the IEEE international conference on Privacy, security and …, 2002 | 36 | 2002 |
Impact of decision-region based classification mining algorithms on database security T Johnsten, VV Raghavan Research Advances in Database and Information Systems Security: IFIP TC11 …, 2000 | 28 | 2000 |
A threat tree for health information security and privacy JP Landry, JH Pardue, T Johnsten, M Campbell, P Patidar | 18 | 2011 |
FAARM: Frequent association action rules mining using FP-Tree DE Difallah, RG Benton, V Raghavan, T Johnsten 2011 IEEE 11th International Conference on Data Mining Workshops, 398-404, 2011 | 11 | 2011 |
A holistic end-to-end prescriptive maintenance framework S Choubey, RG Benton, T Johnsten Data-Enabled Discovery and Applications 4, 1-20, 2020 | 10 | 2020 |
Prescriptive equipment maintenance: a framework S Choubey, R Benton, T Johnsten 2019 IEEE international conference on big data (Big Data), 4366-4374, 2019 | 10 | 2019 |
On Security and Privacy Risks in Association Mining Algorithms T Johnsten, V Raghavan, K Hill Research Directions in Data and Applications Security: IFIP TC11/WG11. 3 …, 2003 | 10 | 2003 |
Security procedures for classification mining algorithms T Johnsten, VV Raghavan Database and Application Security XV: IFIP TC11/WG11. 3 Fifteenth Annual …, 2002 | 9 | 2002 |
Towards poisoning the neural collaborative filtering-based recommender systems Y Zhang, J Lou, L Chen, X Yuan, J Li, T Johnsten, NF Tzeng Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020 | 8 | 2020 |
A multi-objective evolutionary action rule mining method G Daly, R Benton, T Johnsten 2018 IEEE Congress on Evolutionary Computation (CEC), 1-8, 2018 | 6 | 2018 |
Multi-layered Vector Spaces for Classifying and Analyzing Biological Sequences. C Akkoç, T Johnsten, RG Benton BICoB, 160-166, 2011 | 6 | 2011 |
Android malware detection using step-size based multi-layered vector space models C Parker, JT McDonald, T Johnsten, RG Benton 2018 13th international conference on malicious and unwanted software …, 2018 | 5 | 2018 |
A comprehensive granular model for decision making with complex Y Xie, T Johnsten, VV Raghavan, RG Benton, W Bush Granular Computing and Decision-Making: Interactive and Iterative Approaches …, 2015 | 4 | 2015 |
On discovering" potentially useful" patterns from databases Y Xie, T Johnsten, VV Raghavan, K Ramachandran 2006 IEEE International Conference on Granular Computing, 494-497, 2006 | 4 | 2006 |
A methodology for hiding knowledge in XML document collections T Johnsten, RB Sweeney, VV Raghavan Proceedings 27th Annual International Computer Software and Applications …, 2003 | 4 | 2003 |
Precise weather parameter predictions for target regions via neural networks Y Zhang, X Yuan, SK Kimball, E Rappin, L Chen, P Darby, T Johnsten, ... Machine Learning and Knowledge Discovery in Databases. Applied Data Science …, 2021 | 3 | 2021 |
Exploiting multi-layered vector spaces for signal peptide detection T Johnsten, L Fain, L Fain, RG Benton, E Butler, L Pannell, M Tan International Journal of Data Mining and Bioinformatics 13 (2), 141-157, 2015 | 3 | 2015 |
Targeted action rule discovery T Johnsten, S Alihamad, A Kannalath, RG Benton 2013 12th International Conference on Machine Learning and Applications 1 …, 2013 | 3 | 2013 |
An efficient algorithm for discovering positive and negative patterns R Singh, T Johnsten, V Raghavan, Y Xie 2009 IEEE International Conference on Granular Computing, 507-512, 2009 | 3 | 2009 |
Representations for Large-Scale Sequence Data Mining: A Tale of Two Vector Space Models VV Raghavan, RG Benton, T Johnsten, Y Xie Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing: 14th …, 2013 | 2 | 2013 |