Search Results - "Gangopadhyay, Aryya"

Refine Results
  1. 1

    Machine Learning Based Algorithms for Global Dust Aerosol Detection from Satellite Images: Inter-Comparisons and Evaluation by Lee, Jangho, Shi, Yingxi Rona, Cai, Changjie, Ciren, Pubu, Wang, Jianwu, Gangopadhyay, Aryya, Zhang, Zhibo

    Published in Remote sensing (Basel, Switzerland) (01-02-2021)
    “…Identifying dust aerosols from passive satellite images is of great interest for many applications. In this study, we developed five different machine-learning…”
    Get full text
    Journal Article
  2. 2

    STenSr: Spatio-temporal tensor streams for anomaly detection and pattern discovery by Shi, Lei, Gangopadhyay, Aryya, Janeja, Vandana P.

    Published in Knowledge and information systems (01-05-2015)
    “…The focus of this paper is anomaly detection and pattern discovery in spatio-temporal tensor streams. As an example, sensor networks comprising of multiple…”
    Get full text
    Journal Article
  3. 3
  4. 4

    Mining sensor datasets with spatiotemporal neighborhoods by McGuire, Michael Patrick, Janeja, Vandana, Gangopadhyay, Aryya

    Published in Journal of spatial information science (01-01-2013)
    “…Many spatiotemporal data mining methods are dependent on how relationships between a spatiotemporal unit and its neighbors are defined. These relationships are…”
    Get full text
    Journal Article
  5. 5

    Using Randomness to Improve Robustness of Tree-Based Models Against Evasion Attacks by Yang, Fan, Chen, Zhiyuan, Gangopadhyay, Aryya

    “…Machine learning models have been widely used in security applications. However, it is well-known that adversaries can adapt their attacks to evade detection…”
    Get full text
    Journal Article
  6. 6

    Multimode co-clustering for analyzing terrorist networks by Aleroud, Ahmed, Gangopadhyay, Aryya

    Published in Information systems frontiers (01-10-2018)
    “…The phenomenon of terrorism is deemed one of the fundamental challenges in national security. Creating defensive technologies to mitigate terrorist attacks…”
    Get full text
    Journal Article
  7. 7

    Gradient Inversion Attacks on Acoustic Signals: Revealing Security Risks in Audio Recognition Systems by Ovi, Pretom Roy, Gangopadhyay, Aryya

    “…With a greater emphasis on data confidentiality and legislation, distributed training and collaborative machine learning algorithms are being developed to…”
    Get full text
    Conference Proceeding
  8. 8

    SAM-VQA: Supervised Attention-Based Visual Question Answering Model for Post-Disaster Damage Assessment on Remote Sensing Imagery by Sarkar, Argho, Chowdhury, Tashnim, Murphy, Robin, Gangopadhyay, Aryya, Rahnemoonfar, Maryam

    “…Each natural disaster leaves a trail of destruction and damage that must be effectively managed to reduce its negative impact on human life. Any delay in…”
    Get full text
    Journal Article
  9. 9

    Fuzzy Approach Topic Discovery in Health and Medical Corpora by Karami, Amir, Gangopadhyay, Aryya, Zhou, Bin, Kharrazi, Hadi

    Published in International journal of fuzzy systems (01-04-2018)
    “…The majority of medical documents and electronic health records are in text format that poses a challenge for data processing and finding relevant documents…”
    Get full text
    Journal Article
  10. 10

    Analyzing The Emotions of Crowd For Improving The Emergency Response Services by Singh, Neha, Roy, Nirmalya, Gangopadhyay, Aryya

    Published in Pervasive and mobile computing (01-08-2019)
    “…Twitter is an extremely popular micro-blogging social platform with millions of users, generating thousands of tweets per second. The huge amount of Twitter…”
    Get full text
    Journal Article
  11. 11

    An edge–cloud integrated framework for flexible and dynamic stream analytics by Wang, Xin, Khan, Azim, Wang, Jianwu, Gangopadhyay, Aryya, Busart, Carl, Freeman, Jade

    Published in Future generation computer systems (01-12-2022)
    “…With the popularity of Internet of Things (IoT), edge computing and cloud computing, more and more stream analytics applications are being developed including…”
    Get full text
    Journal Article
  12. 12

    STAR-Lite: A light-weight scalable self-taught learning framework for older adults’ activity recognition by Ramasamy Ramamurthy, Sreenivasan, Ghosh, Indrajeet, Gangopadhyay, Aryya, Galik, Elizabeth, Roy, Nirmalya

    Published in Pervasive and mobile computing (01-12-2022)
    “…Recognizing activities for older adults is challenging as we observe a variety of activity patterns caused due to aging (e.g., limited dexterity, limb control,…”
    Get full text
    Journal Article
  13. 13

    CCS-GAN: COVID-19 CT Scan Generation and Classification with Very Few Positive Training Images by Menon, Sumeet, Mangalagiri, Jayalakshmi, Galita, Josh, Morris, Michael, Saboury, Babak, Yesha, Yaacov, Yesha, Yelena, Nguyen, Phuong, Gangopadhyay, Aryya, Chapman, David

    Published in Journal of digital imaging (01-08-2023)
    “…We present a novel algorithm that is able to generate deep synthetic COVID-19 pneumonia CT scan slices using a very small sample of positive training images in…”
    Get full text
    Journal Article
  14. 14

    Reproducible and Portable Big Data Analytics in the Cloud by Wang, Xin, Guo, Pei, Li, Xingyan, Gangopadhyay, Aryya, Busart, Carl E., Freeman, Jade, Wang, Jianwu

    Published in IEEE transactions on cloud computing (01-07-2023)
    “…Cloud computing has become a major approach to help reproduce computational experiments. Yet there are still two main difficulties in reproducing batch based…”
    Get full text
    Journal Article
  15. 15

    Target-Based, Privacy Preserving, and Incremental Association Rule Mining by Ahluwalia, Madhu V., Gangopadhyay, Aryya, Zhiyuan Chen, Yesha, Yelena

    Published in IEEE transactions on services computing (01-07-2017)
    “…We consider a special case in association rule mining where mining is conducted by a third party over data located at a central location that is updated from…”
    Get full text
    Journal Article
  16. 16

    A privacy-preserving technique for Euclidean distance-based mining algorithms using Fourier-related transforms by Mukherjee, Shibnath, Chen, Zhiyuan, Gangopadhyay, Aryya

    Published in The VLDB journal (01-11-2006)
    “…Privacy preserving data mining has become increasingly popular because it allows sharing of privacy-sensitive data for analysis purposes. However, existing…”
    Get full text
    Journal Article
  17. 17

    A data recipient centered de-identification method to retain statistical attributes by Gal, Tamas S., Tucker, Thomas C., Gangopadhyay, Aryya, Chen, Zhiyuan

    Published in Journal of biomedical informatics (01-08-2014)
    “…[Display omitted] •Recipient’s needs are not considered when data is de-identified.•We present a framework for data recipient centered anonymization.•We…”
    Get full text
    Journal Article
  18. 18

    A Wavelet-Based Approach to Preserve Privacy for Classification Mining by Bapna, Sanjay, Gangopadhyay, Aryya

    Published in Decision sciences (01-11-2006)
    “…ABSTRACT Despite the commercial success of data mining, a major drawback has been acknowledged across academic, industry, and government sectors, namely, the…”
    Get full text
    Journal Article
  19. 19

    A smart segmentation technique towards improved infrequent non-speech gestural activity recognition model by Alam, Mohammad Arif Ul, Roy, Nirmalya, Gangopadhyay, Aryya, Galik, Elizabeth

    Published in Pervasive and mobile computing (01-01-2017)
    “…Infrequent Non-Speech Gestural Activities (IGAs) such as coughing, deglutition and yawning help identify fine-grained physiological symptoms and chronic…”
    Get full text
    Journal Article
  20. 20

    A generic and distributed privacy preserving classification method with a worst-case privacy guarantee by Banerjee, Madhushri, Chen, Zhiyuan, Gangopadhyay, Aryya

    “…It is often necessary for organizations to perform data mining tasks collaboratively without giving up their own data. This necessity has led to the…”
    Get full text
    Journal Article