A new learning paradigm: Learning using privileged information V Vapnik, A Vashist Neural Networks 22 (5), 544-557, 2009 | 913 | 2009 |
System and method for correlating historical attacks with diverse indicators to generate indicator profiles for detecting and predicting future network attacks A Vashist, R Chadha, A Ghosh, A Poylisher, Y Sawaya, A Yamada, ... US Patent 9,386,030, 2016 | 131 | 2016 |
SMO-Style Algorithms for Learning Using Privileged Information. D Pechyony, R Izmailov, A Vashist, V Vapnik Dmin 10, 235-241, 2010 | 76 | 2010 |
Learning using hidden information (learning with teacher) V Vapnik, A Vashist, N Pavlovitch 2009 International Joint Conference on Neural Networks, 3188-3195, 2009 | 49 | 2009 |
Cognitive network load prediction method and apparatus A Vashist, A Poylisher, SC Mau, A Ghosh, R Chadha US Patent App. 13/004,324, 2011 | 42 | 2011 |
Learning using hidden information: Master-class learning V Vapnik, A Vashist, N Pavlovitch Mining Massive Data sets for security, 3-14, 2008 | 41 | 2008 |
Multidimensional splines with infinite number of knots as SVM kernels R Izmailov, V Vapnik, A Vashist The 2013 International Joint Conference on Neural Networks (IJCNN), 1-7, 2013 | 23 | 2013 |
Ortholog clustering on a multipartite graph A Vashist, CA Kulikowski, I Muchnik IEEE/ACM Transactions on Computational Biology and Bioinformatics 4 (1), 17-27, 2007 | 22 | 2007 |
Biologically Inspired Cognitive Architectures 2011 AV Samsonovich, KR Jóhannsdóttir Proceedings of Second Annual Meeting of the BICA Society.–Amsterdam et al …, 2011 | 18 | 2011 |
Leveraging social network for predicting demand and estimating available resources for communication network management A Vashist, SC Mau, A Poylisher, R Chadha, A Ghosh 12th IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2011 | 13 | 2011 |
Communication node operable to estimate faults in an ad hoc network and method of performing the same C Serban, A Vashist, R Izmailov, R Chadha, K Manousakis, CYJ Chiang US Patent 9,167,463, 2015 | 12 | 2015 |
Communication node operable to estimate faults in an ad hoc network and method of performing the same C Serban, A Vashist, R Izmailov, R Chadha, K Manousakis, CYJ Chiang US Patent 9,167,463, 2015 | 12 | 2015 |
System and method for spammer host detection from network flow data profiles A Vashist, YM Gottlieb, A Ghosh, Y Sawaya, A Kubota US Patent 8,769,677, 2014 | 11 | 2014 |
Attention focusing model for nexting based on learning and reasoning A Vashist, S Loeb US Patent App. 13/207,660, 2011 | 10 | 2011 |
Insider attack detection using weak indicators over network flow data R Pagliari, A Ghosh, YM Gottlieb, R Chadha, A Vashist, G Hadynski MILCOM 2015-2015 IEEE Military Communications Conference, 1-6, 2015 | 9 | 2015 |
A new combinatorial approach to supervised learning: application to gait recognition R Zhang, A Vashist, I Muchnik, C Kulikowski, D Metaxas Analysis and Modelling of Faces and Gestures, 55-69, 2005 | 8 | 2005 |
Robust information fusion methods for decision making for multisource data A Vashist US Patent 8,589,334, 2013 | 7 | 2013 |
Ortholog clustering on a multipartite graph A Vashist, C Kulikowski, I Muchnik Algorithms in Bioinformatics, 328-340, 2005 | 7 | 2005 |
System and method using hidden information A Vashist, V Vapnik US Patent 8,315,956, 2012 | 6 | 2012 |
Detecting communication anomalies in tactical networks via graph learning A Vashist, R Chadha, M Kaplan, K Moeltner MILITARY COMMUNICATIONS CONFERENCE, 2012-MILCOM 2012, 1-6, 2012 | 6 | 2012 |