Follow
Tom Johnsten
Tom Johnsten
Associate Professor of Computer Science
Verified email at southalabama.edu
Title
Cited by
Cited by
Year
A methodology for hiding knowledge in databases
T Johnsten, VV Raghavan
Proceedings of the IEEE international conference on Privacy, security and …, 2002
362002
Impact of decision-region based classification mining algorithms on database security
T Johnsten, VV Raghavan
Research Advances in Database and Information Systems Security: IFIP TC11 …, 2000
282000
A threat tree for health information security and privacy
JP Landry, JH Pardue, T Johnsten, M Campbell, P Patidar
182011
FAARM: Frequent association action rules mining using FP-Tree
DE Difallah, RG Benton, V Raghavan, T Johnsten
2011 IEEE 11th International Conference on Data Mining Workshops, 398-404, 2011
112011
A holistic end-to-end prescriptive maintenance framework
S Choubey, RG Benton, T Johnsten
Data-Enabled Discovery and Applications 4, 1-20, 2020
102020
Prescriptive equipment maintenance: a framework
S Choubey, R Benton, T Johnsten
2019 IEEE international conference on big data (Big Data), 4366-4374, 2019
102019
On Security and Privacy Risks in Association Mining Algorithms
T Johnsten, V Raghavan, K Hill
Research Directions in Data and Applications Security: IFIP TC11/WG11. 3 …, 2003
102003
Security procedures for classification mining algorithms
T Johnsten, VV Raghavan
Database and Application Security XV: IFIP TC11/WG11. 3 Fifteenth Annual …, 2002
92002
Towards poisoning the neural collaborative filtering-based recommender systems
Y Zhang, J Lou, L Chen, X Yuan, J Li, T Johnsten, NF Tzeng
Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020
82020
A multi-objective evolutionary action rule mining method
G Daly, R Benton, T Johnsten
2018 IEEE Congress on Evolutionary Computation (CEC), 1-8, 2018
62018
Multi-layered Vector Spaces for Classifying and Analyzing Biological Sequences.
C Akkoç, T Johnsten, RG Benton
BICoB, 160-166, 2011
62011
Android malware detection using step-size based multi-layered vector space models
C Parker, JT McDonald, T Johnsten, RG Benton
2018 13th international conference on malicious and unwanted software …, 2018
52018
A comprehensive granular model for decision making with complex
Y Xie, T Johnsten, VV Raghavan, RG Benton, W Bush
Granular Computing and Decision-Making: Interactive and Iterative Approaches …, 2015
42015
On discovering" potentially useful" patterns from databases
Y Xie, T Johnsten, VV Raghavan, K Ramachandran
2006 IEEE International Conference on Granular Computing, 494-497, 2006
42006
A methodology for hiding knowledge in XML document collections
T Johnsten, RB Sweeney, VV Raghavan
Proceedings 27th Annual International Computer Software and Applications …, 2003
42003
Precise weather parameter predictions for target regions via neural networks
Y Zhang, X Yuan, SK Kimball, E Rappin, L Chen, P Darby, T Johnsten, ...
Machine Learning and Knowledge Discovery in Databases. Applied Data Science …, 2021
32021
Exploiting multi-layered vector spaces for signal peptide detection
T Johnsten, L Fain, L Fain, RG Benton, E Butler, L Pannell, M Tan
International Journal of Data Mining and Bioinformatics 13 (2), 141-157, 2015
32015
Targeted action rule discovery
T Johnsten, S Alihamad, A Kannalath, RG Benton
2013 12th International Conference on Machine Learning and Applications 1 …, 2013
32013
An efficient algorithm for discovering positive and negative patterns
R Singh, T Johnsten, V Raghavan, Y Xie
2009 IEEE International Conference on Granular Computing, 507-512, 2009
32009
Representations for Large-Scale Sequence Data Mining: A Tale of Two Vector Space Models
VV Raghavan, RG Benton, T Johnsten, Y Xie
Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing: 14th …, 2013
22013
The system can't perform the operation now. Try again later.
Articles 1–20