Tracking concept drift in malware families A Singh, A Walenstein, A Lakhotia Proceedings of the 5th ACM workshop on Security and artificial intelligence …, 2012 | 71 | 2012 |
Zero-inflated Poisson (ZIP) distribution: Parameter estimation and applications to model data from natural calamities S Beckett, J Jee, T Ncube, S Pompilus, Q Washington, A Singh, N Pal Involve, a Journal of Mathematics 7 (6), 751-767, 2014 | 56 | 2014 |
Vilo: a rapid learning nearest-neighbor classifier for malware triage A Lakhotia, A Walenstein, C Miles, A Singh Journal of Computer Virology and Hacking Techniques 9 (3), 109-123, 2013 | 42 | 2013 |
The safety of ultrasound guided central venous cannulation in patients with liver disease SA Singh, S Sharma, A Singh, AK Singh, U Sharma, AS Bhadoria Saudi Journal of Anaesthesia 9 (2), 155-160, 2015 | 21 | 2015 |
Context-sensitive analysis of obfuscated x86 executables A Lakhotia, DR Boccardo, A Singh, A Manacero Jr Proceedings of the 2010 ACM SIGPLAN workshop on Partial evaluation and …, 2010 | 16 | 2010 |
Context-sensitive analysis without calling-context A Lakhotia, DR Boccardo, A Singh, A Manacero Higher-Order and Symbolic Computation 23, 275-313, 2010 | 14 | 2010 |
Game-theoretic design of an information exchange model for detecting packed malware A Singh, A Lakhotia 2011 6th International Conference on Malicious and Unwanted Software, 1-7, 2011 | 9 | 2011 |
Igrf-rfe: a hybrid feature selection method for mlp-based network intrusion detection on unsw-nb15 dataset. J Big Data 10 (1): 1–26 Y Yin, J Jang-Jaccard, W Xu, A Singh, J Zhu, F Sabrina, J Kwak | 8 | 2023 |
Dimensional Scalability of Supervised and Unsupervised Concept Drift Detection: An Empirical Study JDD Lavaire, A Singh, M Yousef, S Singh, X Yue Advances in High Dimensional Big Data: IEEE Big Data, pp 2212-2218, 2015 | 8 | 2015 |
Machine learning techniques in exploring microRNA gene discovery, targets, and functions S Singh, RG Benton, A Singh, A Singh Bioinformatics in MicroRNA Research, 211-224, 2017 | 5 | 2017 |
On concept drift, deployability, and adversarial selection in machine learning-based malware detection A Singh University of Louisiana at Lafayette, 2012 | 2 | 2012 |
On optimal AV system strategies against obfuscated malware A Singh, B Mai, A Lakhotia, A Walenstein 4th Annual Symposium on Information Assurance (ASIA’09) 30, 2009 | 2 | 2009 |
Dimensional scalability of supervised and unsupervised concept drift detection: An empirical study J David Destephen Lavaire, A Singh, M Yousef, S Singh, X Yue Proceedings of the 2015 IEEE International Conference on Big Data (Big Data …, 2015 | 1 | 2015 |
On Temporal Population Drift in Malware Families A Singh, A Walenstein, A Lakhoita Proceedings of 22nd Virus Bulletin Conference., 20, 2012 | 1 | 2012 |
USING GAME THEORY TO ASSESS THE STRENGTH OF AN AV SYSTEM AGAINST EVOLVING OFFENCES B Mai, A Singh, A Walenstein, A Lakhotia Proceedings of 18th Virus Bulletin Conference., 147, 2008 | 1 | 2008 |
Improving Multi-Prime RSA Crypto-computations A Singh University of Louisiana at Lafayette, 2006 | 1 | 2006 |
Erratum: Predicting the Quality of Spatial Learning via Virtual Global Landmarks (IEEE Transactions on Neural Systems and Rehabilitation Engineering (2022) 30 (2418-2425 J Liu, AK Singh, CT Lin IEEE Transactions on Neural Systems and Rehabilitation Engineering, 2022 | | 2022 |
AI Maturity in Cybersecurity Assessments KJ Anshuman Singh, Vivek Kumar Singh HICSS Symposium on Cybersecurity Big Data Analytics, 2020 | | 2020 |
A conceptual framework for designing a big data course A Singh, S Singh, M Yousef Journal of Computing Sciences in Colleges 33 (5), 192-198, 2018 | | 2018 |
Deployable classifiers for malware detection A Singh, S Singh, A Walenstein, A Lakhotia Information Systems, Technology and Management: 6th International Conference …, 2012 | | 2012 |