Zobrazeno 1 - 10
of 384
pro vyhledávání: '"V. S. Subrahmanian"'
Autor:
Rui Liu, Kevin T. Greene, Ruibo Liu, Mihovil Mandic, Benjamin A. Valentino, Soroush Vosoughi, V. S. Subrahmanian
Publikováno v:
Scientific Reports, Vol 11, Iss 1, Pp 1-10 (2021)
Abstract Influence, the ability to change the beliefs and behaviors of others, is the main currency on social media. Extant studies of influence on social media, however, are limited by publicly available data that record expressions (active engageme
Externí odkaz:
https://doaj.org/article/614a3eed5d5c41fca2d67b914c10f39e
Publikováno v:
Humanities & Social Sciences Communications, Vol 8, Iss 1, Pp 1-8 (2021)
Abstract Since the 1960s China and India have engaged in a dispute about the demarcation of their shared border. This territorial dispute led to a brief war in 1962, and recurring flare-ups over the following decades, including during the summer of 2
Externí odkaz:
https://doaj.org/article/4ca6e488f14d42d6845cb6d446e2009b
Publikováno v:
ACM Transactions on Multimedia Computing, Communications, and Applications. 19:1-24
We consider the problem of predicting the impression that one subject has of another in a video clip showing a group of interacting people. Our novel Dyadic Impression Prediction System ( DIPS ) contains two major innovations. First, we develop a nov
Publikováno v:
IEEE Transactions on Multimedia. 25:942-952
Identifying persuasive speakers in an adversarial environment is a critical task. In a national election, politicians would like to have persuasive speakers campaign on their behalf. When a company faces adverse publicity, they would like to engage p
Autor:
Sushil Jajodia, V. S. Subrahmanian, Giridhar Kaushik Ramachandran, Rajesh Ganesan, Yanhai Xiong
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 19:1434-1445
According to research from Symantec, there is a gap of 312 days on average between the time an enterprise is compromised by a zero-day attack and the time the attack is discovered by the victim. This leaves an adversary with a lot of time to exfiltra
Publikováno v:
ACM Transactions on Internet Technology. 22:1-24
We propose PCAM , a Probabilistic Cyber-Alert Management framework, that enables chief information security officers to better manage cyber-alerts. Workers in Cyber Security Operation Centers usually work in 8- or 12-hour shifts. Before a shift, PCAM
Autor:
Youdinghuan Chen, Chongyang Gao, Daveed Gartenstein-Ross, Kevin T. Greene, Karin Kalif, Sarit Kraus, Francesco Parisi, Chiara Pulice, Anja Subasic, V. S. Subrahmanian
Publikováno v:
IEEE Transactions on Computational Social Systems. :1-13
Autor:
Giovanni Apruzzese, V. S. Subrahmanian
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. :1-19
Although machine learning based algorithms have been extensively used for detecting phishing websites, there has been relatively little work on how adversaries may attack such "phishing detectors" (PDs for short). In this paper, we propose a set of G
Publikováno v:
2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech).
Publikováno v:
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence.
Efficient algorithms computing a Nash equilibrium have been successfully applied to large zero- sum two-player extensive-form games (e.g., poker). However, in multiplayer games, computing a Nash equilibrium is generally hard, and the equilibria are n