default search action
Paulo Shakarian
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2023
- [b4]Paulo Shakarian, Chitta Baral, Gerardo I. Simari, Bowen Xi, Lahari Pokala:
Neuro Symbolic Reasoning and Learning. Springer Briefs in Computer Science, Springer 2023, ISBN 978-3-031-39178-1, pp. 1-119 - 2021
- [b3]Hamidreza Alvari, Elham Shaabani, Paulo Shakarian:
Identification of Pathogenic Social Media Accounts - From Data to Intelligence to Prediction. Springer Briefs in Computer Science, Springer 2021, ISBN 978-3-030-61430-0, pp. 1-95 - 2015
- [b2]Paulo Shakarian, Abhinav Bhatnagar, Ashkan Aleali, Elham Shaabani, Ruocheng Guo:
Diffusion in Social Networks. Springer Briefs in Computer Science, Springer 2015, ISBN 978-3-319-23104-4, pp. 1-101 - 2011
- [b1]Paulo Shakarian:
Spatio-Temporal Reasoning About Agent Behavior. University of Maryland, College Park, MD, USA, 2011
Journal Articles
- 2022
- [j21]Mario A. Leiva, Alejandro Javier García, Paulo Shakarian, Gerardo I. Simari:
Argumentation-Based Query Answering under Uncertainty with Application to Cybersecurity. Big Data Cogn. Comput. 6(3): 91 (2022) - 2021
- [j20]Rui Zhang, Jonas Lukasczyk, Feng Wang, David S. Ebert, Paulo Shakarian, Elizabeth A. Mack, Ross Maciejewski:
Exploring geographic hotspots using topological data analysis. Trans. GIS 25(6): 3188-3209 (2021) - 2020
- [j19]Ericsson Marin, Ruocheng Guo, Paulo Shakarian:
Measuring Time-Constrained Influence to Predict Adoption in Online Social Networks. ACM Trans. Soc. Comput. 3(3): 13:1-13:26 (2020) - 2019
- [j18]Soumajyoti Sarkar, Ruocheng Guo, Paulo Shakarian:
Using network motifs to characterize temporal network evolution leading to diffusion inhibition. Soc. Netw. Anal. Min. 9(1): 14:1-14:24 (2019) - [j17]Soumajyoti Sarkar, Mohammad Almukaynizi, Jana Shakarian, Paulo Shakarian:
Mining user interaction patterns in the darkweb to predict enterprise cyber incidents. Soc. Netw. Anal. Min. 9(1): 57:1-57:28 (2019) - 2018
- [j16]Paulo Shakarian:
Dark-Web Cyber Threat Intelligence: From Data to Intelligence to Prediction. Inf. 9(12): 305 (2018) - 2017
- [j15]Hamidreza Alvari, Paulo Shakarian, J. E. Kelly Snyder:
Semi-supervised learning for detecting human trafficking. Secur. Informatics 6(1): 1 (2017) - [j14]Soumajyoti Sarkar, Ruocheng Guo, Paulo Shakarian:
Understanding and forecasting lifecycle events in information cascades. Soc. Netw. Anal. Min. 7(1): 55:1-55:22 (2017) - 2016
- [j13]Gerardo I. Simari, Paulo Shakarian, Marcelo A. Falappa:
A quantitative approach to belief revision in structured probabilistic argumentation. Ann. Math. Artif. Intell. 76(3-4): 375-408 (2016) - [j12]Paulo Shakarian, Gerardo I. Simari, Geoffrey Moores, Damon Paulo, Simon Parsons, Marcelo A. Falappa, Ashkan Aleali:
Belief revision in structured probabilistic argumentation - Model and application to cyber security. Ann. Math. Artif. Intell. 78(3-4): 259-301 (2016) - [j11]Ruocheng Guo, Elham Shaabani, Abhinav Bhatnagar, Paulo Shakarian:
Toward early and order-of-magnitude cascade prediction in social networks. Soc. Netw. Anal. Min. 6(1): 64:1-64:18 (2016) - 2015
- [j10]Paulo Shakarian:
A Multidisciplinary Survey of Social Network Diffusion Models. IEEE Intell. Informatics Bull. 16(1): 3-7 (2015) - 2013
- [j9]Paulo Shakarian, Patrick Roos, Geoffrey Moores:
A novel analytical method for evolutionary graph theory problems. Biosyst. 111(2): 136-144 (2013) - [j8]Paulo Shakarian, Sean Eyre, Damon Paulo:
A scalable heuristic for viral marketing under the tipping model. Soc. Netw. Anal. Min. 3(4): 1225-1248 (2013) - [j7]Paulo Shakarian, Matthias Broecheler, V. S. Subrahmanian, Cristian Molinaro:
Using Generalized Annotated Programs to Solve Social Network Diffusion Optimization Problems. ACM Trans. Comput. Log. 14(2): 10:1-10:40 (2013) - [j6]Paulo Shakarian, Gerardo I. Simari, Devon Callahan:
Reasoning about Complex Networks: A Logic Programming Approach. Theory Pract. Log. Program. 13(4-5-Online-Supplement) (2013) - 2012
- [j5]Paulo Shakarian, Patrick Roos, Anthony N. Johnson:
A review of evolutionary graph theory with applications to game theory. Biosyst. 107(2): 66-80 (2012) - [j4]Paulo Shakarian, John P. Dickerson, V. S. Subrahmanian:
Adversarial Geospatial Abduction Problems. ACM Trans. Intell. Syst. Technol. 3(2): 34:1-34:35 (2012) - [j3]Paulo Shakarian, Gerardo I. Simari, V. S. Subrahmanian:
Annotated Probabilistic Temporal Logic: Approximate Fixpoint Implementation. ACM Trans. Comput. Log. 13(2): 13:1-13:33 (2012) - 2011
- [j2]Paulo Shakarian, V. S. Subrahmanian, Maria Luisa Sapino:
GAPs: Geospatial Abduction Problems. ACM Trans. Intell. Syst. Technol. 3(1): 7:1-7:27 (2011) - [j1]Paulo Shakarian, Austin Parker, Gerardo I. Simari, V. S. Subrahmanian:
Annotated probabilistic temporal logic. ACM Trans. Comput. Log. 12(2): 14:1-14:44 (2011)
Conference and Workshop Papers
- 2024
- [c73]Hua Wei, Paulo Shakarian, Christian Lebiere, Bruce A. Draper, Nikhil Krishnaswamy, Sergei Nirenburg:
Metacognitive AI: Framework and the Case for a Neurosymbolic Approach. NeSy (2) 2024: 60-67 - [c72]Noel Ngu, Nathaniel Lee, Paulo Shakarian:
Diversity Measures: Domain-Independent Proxies for Failure in Language Model Queries. ICSC 2024: 176-182 - [c71]Kaustuv Mukherji, Devendra Parkar, Lahari Pokala, Dyuman Aditya, Paulo Shakarian, Clark Dorman:
Scalable Semantic Non-Markovian Simulation Proxy for Reinforcement Learning. ICSC 2024: 183-190 - 2023
- [c70]Dyuman Aditya, Kaustuv Mukherji, Srikar Balasubramanian, Abhiraj Chaudhary, Paulo Shakarian:
PyReason: Software for Open World Temporal Logic. AAAI Spring Symposium: MAKE 2023 - [c69]Paulo Shakarian, Abhinav Koyyalamudi, Noel Ngu, Lakshmivihari Mareedu:
An Independent Evaluation of ChatGPT on Mathematical Word Problems (MWP). AAAI Spring Symposium: MAKE 2023 - [c68]Damián Ariel Furman, Stephanie Anneris Malvicini, Maria Vanina Martinez, Paulo Shakarian, Gerardo Ignacio Simari, Yamil Osvaldo Soto:
A Neuro-symbolic Approach to Argument Comparison in Structured Argumentation. AI³@AI*IA 2023 - 2022
- [c67]Paulo Shakarian, Gerardo I. Simari:
Extensions to Generalized Annotated Logic and an Equivalent Neural Architecture. TransAI 2022: 63-70 - 2020
- [c66]Ericsson Marin, Mohammed Almukaynizi, Paulo Shakarian:
Inductive and Deductive Reasoning to Assist in Cyber-Attack Prediction. CCWC 2020: 262-268 - [c65]Hamidreza Alvari, Ghazaleh Beigi, Soumajyoti Sarkar, Scott W. Ruston, Steven R. Corman, Hasan Davulcu, Paulo Shakarian:
A Feature-Driven Approach for Identifying Pathogenic Social Media Accounts. ICDIS 2020: 26-33 - 2019
- [c64]Mario A. Leiva, Gerardo I. Simari, Guillermo Ricardo Simari, Paulo Shakarian:
Cyber Threat Analysis with Structured Probabilistic Argumentation. AI³@AI*IA 2019: 50-64 - [c63]Soumajyoti Sarkar, Ashkan Aleali, Paulo Shakarian, Mika Armenta, Danielle Sanchez, Kiran Lakkaraju:
Impact of social influence on adoption behavior: an online controlled experimental evaluation. ASONAM 2019: 226-233 - [c62]Soumajyoti Sarkar, Paulo Shakarian, Mika Armenta, Danielle Sanchez, Kiran Lakkaraju:
Can social influence be exploited to compromise security: an online experimental evaluation. ASONAM 2019: 593-596 - [c61]Vivin Paliath, Paulo Shakarian:
Reasoning about sequential cyberattacks. ASONAM 2019: 855-862 - [c60]Mohammed Almukaynizi, Malay Shah, Paulo Shakarian:
A hybrid KRR-ML approach to predict malicious email campaigns. ASONAM 2019: 895-898 - [c59]Hamidreza Alvari, Paulo Shakarian:
Hawkes Process for Understanding the Influence of Pathogenic Social Media Accounts. ICDIS 2019: 36-42 - [c58]Hamidreza Alvari, Soumajyoti Sarkar, Paulo Shakarian:
Detection of Violent Extremists in Social Media. ICDIS 2019: 43-47 - [c57]Elham Shaabani, Ashkan Sadeghi-Mobarakeh, Hamidreza Alvari, Paulo Shakarian:
An End-to-End Framework to Identify Pathogenic Social Media Accounts on Twitter. ICDIS 2019: 128-135 - [c56]Ericsson Marin, Mohammed Almukaynizi, Paulo Shakarian:
Reasoning About Future Cyber-Attacks Through Socio-Technical Hacking Information. ICTAI 2019: 157-164 - [c55]Hamidreza Alvari, Elham Shaabani, Soumajyoti Sarkar, Ghazaleh Beigi, Paulo Shakarian:
Less is More: Semi-Supervised Causal Inference for Detecting Pathogenic Users in Social Media. WWW (Companion Volume) 2019: 154-161 - [c54]Soumajyoti Sarkar, Hamidreza Alvari, Paulo Shakarian:
Leveraging Motifs to Model the Temporal Dynamics of Diffusion Networks. WWW (Companion Volume) 2019: 1079-1086 - 2018
- [c53]Nazgol Tavabi, Palash Goyal, Mohammed Almukaynizi, Paulo Shakarian, Kristina Lerman:
DarkEmbed: Exploit Prediction With Neural Language Models. AAAI 2018: 7849-7854 - [c52]Soumajyoti Sarkar, Mohammad Almukaynizi, Jana Shakarian, Paulo Shakarian:
Predicting enterprise cyber incidents using social network analysis on the darkweb hacker forums. CyCon U.S. 2018: 1-7 - [c51]Eric Nunes, Paulo Shakarian, Gerardo I. Simari:
At-risk system identification via analysis of discussions on the darkweb. eCrime 2018: 1-12 - [c50]Ashkan Aleali, Mahila Dadfarnia, Paulo Shakarian:
Finding Novel Event Relationships in Temporal Data. ICDIS 2018: 9-16 - [c49]Elham Shaabani, Ruocheng Guo, Paulo Shakarian:
Detecting Pathogenic Social Media Accounts without Content or Network Structure. ICDIS 2018: 57-64 - [c48]Ericsson Marin, Jana Shakarian, Paulo Shakarian:
Mining Key-Hackers on Darkweb Forums. ICDIS 2018: 73-80 - [c47]Ericsson Marin, Mohammed Almukaynizi, Eric Nunes, Paulo Shakarian:
Community Finding of Malware and Exploit Vendors on Darkweb Marketplaces. ICDIS 2018: 81-84 - [c46]Mohammed Almukaynizi, Ericsson Marin, Eric Nunes, Paulo Shakarian, Gerardo I. Simari, Dipsy Kapoor, Timothy Siedlecki:
DARKMENTION: A Deployed System to Predict Enterprise-Targeted External Cyberattacks. ISI 2018: 31-36 - [c45]Mohammed Almukaynizi, Vivin Paliath, Malay Shah, Malav Shah, Paulo Shakarian:
Finding Cryptocurrency Attack Indicators Using Temporal Logic and Darkweb Data. ISI 2018: 91-93 - [c44]Hamidreza Alvari, Elham Shaabani, Paulo Shakarian:
Early Identification of Pathogenic Social Media Accounts. ISI 2018: 169-174 - [c43]Ericsson Marin, Mohammed Almukaynizi, Eric Nunes, Jana Shakarian, Paulo Shakarian:
Predicting Hacker Adoption on Darkweb Forums Using Sequential Rule Mining. ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: 1183-1190 - [c42]Ruocheng Guo, Hamidreza Alvari, Paulo Shakarian:
Strongly Hierarchical Factorization Machines and ANOVA Kernel Regression. SDM 2018: 729-737 - 2017
- [c41]Mohammed Almukaynizi, Eric Nunes, Krishna Dharaiya, Manoj Senguttuvan, Jana Shakarian, Paulo Shakarian:
Proactive identification of exploits in the wild through vulnerability mentions online. CyCon U.S. 2017: 82-88 - [c40]Andrew Ruef, Eric Nunes, Paulo Shakarian, Gerardo I. Simari:
Measuring cyber attribution in games. eCrime 2017: 28-32 - [c39]Anna Sapienza, Alessandro Bessi, Saranya Damodaran, Paulo Shakarian, Kristina Lerman, Emilio Ferrara:
Early Warnings of Cyber Threats in Online Discussions. ICDM Workshops 2017: 667-674 - [c38]Ericsson Marin, Ruocheng Guo, Paulo Shakarian:
Temporal Analysis of Influence to Predict Users' Adoption in Online Social Networks. SBP-BRiMS 2017: 254-261 - [c37]Kyounghee Hazel Kwon, J. Hunter Priniski, Soumajyoti Sarkar, Jana Shakarian, Paulo Shakarian:
Crisis and Collective Problem Solving in Dark Web: An Exploration of a Black Hat Forum. SMSociety 2017: 45:1-45:5 - 2016
- [c36]Eric Nunes, Paulo Shakarian, Gerardo I. Simari:
Toward Argumentation-Based Cyber Attribution. AAAI Workshop: Artificial Intelligence for Cyber Security 2016 - [c35]John Robertson, Vivin Paliath, Jana Shakarian, Amanda Thart, Paulo Shakarian:
Data Driven Game Theoretic Cyber Threat Mitigation. AAAI 2016: 4041-4046 - [c34]Paulo Shakarian, Jana Shakarian:
Socio-Cultural Modeling for Cyber Threat Actors. AAAI Workshop: Artificial Intelligence for Cyber Security 2016 - [c33]Ruocheng Guo, Paulo Shakarian:
A comparison of methods for cascade prediction. ASONAM 2016: 591-598 - [c32]Eric Nunes, Paulo Shakarian, Gerardo I. Simari, Andrew Ruef:
Argumentation models for cyber attribution. ASONAM 2016: 837-844 - [c31]Nikhil Kumar, Ruocheng Guo, Ashkan Aleali, Paulo Shakarian:
An empirical evaluation of social influence metrics. ASONAM 2016: 1329-1336 - [c30]Elham Shaabani, Hamidreza Alvari, Paulo Shakarian, J. E. Kelly Snyder:
MIST: Missing Person Intelligence Synthesis Toolkit. CIKM 2016: 1843-1867 - [c29]Eric Nunes, Ahmad Diab, Andrew T. Gunn, Ericsson Marin, Vineet Mishra, Vivin Paliath, John Robertson, Jana Shakarian, Amanda Thart, Paulo Shakarian:
Darknet and deepnet mining for proactive cybersecurity threat intelligence. ISI 2016: 7-12 - [c28]Hamidreza Alvari, Paulo Shakarian, J. E. Kelly Snyder:
A non-parametric learning approach to identify online human trafficking. ISI 2016: 133-138 - [c27]Ericsson Marin, Ahmad Diab, Paulo Shakarian:
Product offerings in malicious hacker markets. ISI 2016: 187-189 - [c26]Vivin Paliath, Paulo Shakarian:
Modeling cyber-attacks on industrial control systems. ISI 2016: 316-318 - 2015
- [c25]Eric Nunes, Nimish Kulkarni, Paulo Shakarian, Andrew Ruef, Jay Little:
Cyber-Deception and Attribution in Capture-the-Flag Exercises. ASONAM 2015: 962-965 - [c24]Eric Nunes, Casey Buto, Paulo Shakarian, Christian Lebiere, Stefano Bennati, Robert Thomson, Holger Jaenisch:
Malware Task Identification: A Data Driven Approach. ASONAM 2015: 978-985 - [c23]Ruocheng Guo, Elham Shaabani, Abhinav Bhatnagar, Paulo Shakarian:
Toward Order-of-Magnitude Cascade Prediction. ASONAM 2015: 1610-1613 - [c22]Xilun Chen, K. Selçuk Candan, Maria Luisa Sapino, Paulo Shakarian:
KSGM: Keynode-driven Scalable Graph Matching. CIKM 2015: 1101-1110 - [c21]Elham Shaabani, Ashkan Aleali, Paulo Shakarian, John Bertetto:
Early Identification of Violent Criminal Gang Members. KDD 2015: 2079-2088 - [c20]Andrew Stanton, Amanda Thart, Ashish Jain, Priyank Vyas, Arpan Chatterjee, Paulo Shakarian:
Mining for Causal Relationships: A Data-Driven Study of the Islamic State. KDD 2015: 2137-2146 - 2014
- [c19]Joseph Hannigan, Suzanne J. Matthews, John K. Wickiser, Paulo Shakarian:
A Network-Based Approach for Identifying Cancer Causing Pathogens. ACM Southeast Regional Conference 2014: 56: 1-56: 5 - [c18]Paulo Shakarian, Hansheng Lei, Roy Lindelauf:
Power grid defense against malicious cascading failure. AAMAS 2014: 813-820 - [c17]Paulo Shakarian, Gerardo I. Simari, Marcelo A. Falappa:
Belief Revision in Structured Probabilistic Argumentation. FoIKS 2014: 324-343 - [c16]Paulo Shakarian, Nimish Kulkarni, Massimiliano Albanese, Sushil Jajodia:
Keeping Intruders at Bay: A Graph-theoretic Approach to Reducing the Probability of Successful Network Intrusions. ICETE (Selected Papers) 2014: 191-211 - [c15]Paulo Shakarian, Joseph Salmento, William R. Pulleyblank, John Bertetto:
Reducing gang violence through network influence based targeting of social programs. KDD 2014: 1829-1836 - [c14]Paulo Shakarian, Damon Paulo, Massimiliano Albanese, Sushil Jajodia:
Keeping Intruders at Large - A Graph-theoretic Approach to Reducing the Probability of Successful Network Intrusions. SECRYPT 2014: 19-30 - [c13]Radoslaw Michalski, Paulo Shakarian, Ingo Scholtes, Jaroslaw Jankowski:
Workshop on Social Influence - SI 2014 - Introduction. SocInfo Workshops 2014: 365-367 - 2013
- [c12]Joseph Hannigan, Guillermo Hernandez, Richard M. Medina, Patrick Roos, Paulo Shakarian:
Mining for Spatially-Near Communities in Geo-Located Social Networks. AAAI Fall Symposia 2013 - [c11]Damon Paulo, Bradley Fischl, Tanya Markow, Michael Martin, Paulo Shakarian:
Social network intelligence analysis to combat street gang violence. ASONAM 2013: 1042-1049 - [c10]Paulo Shakarian, Gerardo I. Simari, Robert Schroeder:
MANCaLog: a logic for multi-attribute network cascades. AAMAS 2013: 1175-1176 - [c9]Paulo Shakarian, Patrick Roos, Devon Callahan, Cory Kirk:
Mining for geographically disperse communities in social networks by leveraging distance modularity. KDD 2013: 1402-1409 - [c8]Paulo Shakarian, V. S. Subrahmanian:
Geospatial optimization problems. NSW 2013: 118-121 - 2012
- [c7]Paulo Shakarian, Damon Paulo:
Large Social Networks Can Be Targeted for Viral Marketing with Small Seed Sets. ASONAM 2012: 1-8 - [c6]Massimiliano Albanese, Alessandra De Benedictis, Sushil Jajodia, Paulo Shakarian:
A Probabilistic Framework for Localization of Attackers in MANETs. ESORICS 2012: 145-162 - [c5]Devon Callahan, Paulo Shakarian, Jeffrey Nielsen, Anthony N. Johnson:
Shaping Operations to Attack Robust Terror Networks. SocialInformatics 2012: 13-18 - 2011
- [c4]Paulo Shakarian, Mago Nagel, Brittany Schuetzle, V. S. Subrahmanian:
Abductive Inference for Combat: Using SCARE-S2 to Find High-Value Targets in Afghanistan. IAAI 2011: 1689-1694 - [c3]Gleneesha Johnson, Paulo Shakarian, Neha Gupta, Ashok K. Agrawala:
Towards Shrink-Wrapped Security: Practically Incorporating Context Into Security Services. ANT/MobiWIS 2011: 782-787 - 2010
- [c2]Paulo Shakarian, V. S. Subrahmanian, Maria Luisa Sapino:
Using Generalized Annotated Programs to Solve Social Network Optimization Problems. ICLP (Technical Communications) 2010: 182-191 - [c1]Matthias Broecheler, Paulo Shakarian, V. S. Subrahmanian:
A Scalable Framework for Modeling Competitive Diffusion in Social Networks. SocialCom/PASSAT 2010: 295-302
Parts in Books or Collections
- 2020
- [p6]Mohammed Almukaynizi, Ericsson Marin, Malay Shah, Eric Nunes, Gerardo I. Simari, Paulo Shakarian:
A Logic Programming Approach to Predict Enterprise-Targeted Cyberattacks. Data Science in Cybersecurity and Cyberthreat Intelligence 2020: 13-32 - 2018
- [p5]Vivin Paliath, Paulo Shakarian:
Defending Against Chained Cyber-Attacks by Adversarial Agents. Guide to Vulnerability Analysis for Computer Networks and Systems 2018: 183-209 - 2016
- [p4]Eric Nunes, Nimish Kulkarni, Paulo Shakarian, Andrew Ruef, Jay Little:
Cyber-Deception and Attribution in Capture-the-Flag Exercises. Cyber Deception 2016: 151-167 - [p3]Jana Shakarian, Andrew T. Gunn, Paulo Shakarian:
Exploring Malicious Hacker Forums. Cyber Deception 2016: 261-284 - 2015
- [p2]Paulo Shakarian, Gerardo I. Simari, Geoffrey Moores, Simon Parsons:
Cyber Attribution: An Argumentation-Based Approach. Cyber Warfare 2015: 151-171 - 2011
- [p1]Paulo Shakarian, V. S. Subrahmanian:
Region-Based Geospatial Abduction with Counter-IED Applications. Counterterrorism and Open Source Intelligence 2011: 105-142
Editorship
- 2015
- [e1]Sushil Jajodia, Paulo Shakarian, V. S. Subrahmanian, Vipin Swarup, Cliff Wang:
Cyber Warfare - Building the Scientific Foundation. Advances in Information Security 56, Springer 2015, ISBN 978-3-319-14038-4 [contents]
Informal and Other Publications
- 2024
- [i60]Divyagna Bavikadi, Ayushi Agarwal, Shashank Ganta, Yunro Chung, Lusheng Song, Ji Qiu, Paulo Shakarian:
Machine Learning Driven Biomarker Selection for Medical Diagnosis. CoRR abs/2405.10345 (2024) - [i59]Hua Wei, Paulo Shakarian, Christian Lebiere, Bruce A. Draper, Nikhil Krishnaswamy, Sergei Nirenburg:
Metacognitive AI: Framework and the Case for a Neurosymbolic Approach. CoRR abs/2406.12147 (2024) - [i58]Divyagna Bavikadi, Dyuman Aditya, Devendra Parkar, Paulo Shakarian, Graham Mueller, Chad Parvis, Gerardo I. Simari:
Geospatial Trajectory Generation via Efficient Abduction: Deployment for Independent Testing. CoRR abs/2407.06447 (2024) - [i57]Joshua Shay Kricheli, Khoa Vo, Aniruddha Datta, Spencer Ozgur, Paulo Shakarian:
Error Detection and Constraint Recovery in Hierarchical Multi-Label Classification without Prior Knowledge. CoRR abs/2407.15192 (2024) - 2023
- [i56]Paulo Shakarian, Gerardo I. Simari:
Extensions to Generalized Annotated Logic and an Equivalent Neural Architecture. CoRR abs/2302.12195 (2023) - [i55]Dyuman Aditya, Kaustuv Mukherji, Srikar Balasubramanian, Abhiraj Chaudhary, Paulo Shakarian:
PyReason: Software for Open World Temporal Logic. CoRR abs/2302.13482 (2023) - [i54]Paulo Shakarian, Abhinav Koyyalamudi, Noel Ngu, Lakshmivihari Mareedu:
An Independent Evaluation of ChatGPT on Mathematical Word Problems (MWP). CoRR abs/2302.13814 (2023) - [i53]Noel Ngu, Nathaniel Lee, Paulo Shakarian:
Diversity Measures: Domain-Independent Proxies for Failure in Language Model Queries. CoRR abs/2308.11189 (2023) - [i52]Bowen Xi, Kevin Scaria, Paulo Shakarian:
Rule-Based Error Detection and Correction to Operationalize Movement Trajectory Classification. CoRR abs/2308.14250 (2023) - [i51]Kaustuv Mukherji, Devendra Parkar, Lahari Pokala, Dyuman Aditya, Paulo Shakarian, Clark Dorman:
Scalable Semantic Non-Markovian Simulation Proxy for Reinforcement Learning. CoRR abs/2310.06835 (2023) - 2022
- [i50]Paulo Shakarian, Gerardo I. Simari, Devon Callahan:
Reasoning about Complex Networks: A Logic Programming Approach. CoRR abs/2209.15067 (2022) - 2020
- [i49]Hamidreza Alvari, Ghazaleh Beigi, Soumajyoti Sarkar, Scott W. Ruston, Steven R. Corman, Hasan Davulcu, Paulo Shakarian:
A Feature-Driven Approach for Identifying Pathogenic Social Media Accounts. CoRR abs/2001.04624 (2020) - 2019
- [i48]Hamidreza Alvari, Soumajyoti Sarkar, Paulo Shakarian:
Detection of Violent Extremists in Social Media. CoRR abs/1902.01577 (2019) - [i47]Hamidreza Alvari, Paulo Shakarian:
Hawkes Process for Understanding the Influence of Pathogenic Social Media Accounts. CoRR abs/1902.01970 (2019) - [i46]Soumajyoti Sarkar, Hamidreza Alvari, Paulo Shakarian:
Leveraging Motifs to Model the Temporal Dynamics of Diffusion Networks. CoRR abs/1902.10366 (2019) - [i45]Soumajyoti Sarkar, Ruocheng Guo, Paulo Shakarian:
Using network motifs to characterize temporal network evolution leading to diffusion inhibition. CoRR abs/1903.00862 (2019) - [i44]Hamidreza Alvari, Elham Shaabani, Soumajyoti Sarkar, Ghazaleh Beigi, Paulo Shakarian:
Less is More: Semi-Supervised Causal Inference for Detecting Pathogenic Users in Social Media. CoRR abs/1903.01693 (2019) - [i43]Soumajyoti Sarkar, Hamidreza Alvari, Paulo Shakarian:
Understanding Information Flow in Cascades Using Network Motifs. CoRR abs/1904.05161 (2019) - [i42]Elham Shaabani, Ashkan Sadeghi-Mobarakeh, Hamidreza Alvari, Paulo Shakarian:
An End-to-End Framework to Identify Pathogenic Social Media Accounts on Twitter. CoRR abs/1905.01553 (2019) - [i41]Elham Shaabani, Ruocheng Guo, Paulo Shakarian:
Detecting Pathogenic Social Media Accounts without Content or Network Structure. CoRR abs/1905.01556 (2019) - [i40]Soumajyoti Sarkar, Ashkan Aleali, Paulo Shakarian, Mika Armenta, Danielle Sanchez, Kiran Lakkaraju:
Impact of Social Influence on Adoption Behavior: An Online Controlled Experimental Evaluation. CoRR abs/1909.01409 (2019) - [i39]Soumajyoti Sarkar, Paulo Shakarian, Mika Armenta, Danielle Sanchez, Kiran Lakkaraju:
Can social influence be exploited to compromise security: An online experimental evaluation. CoRR abs/1909.02872 (2019) - [i38]Soumajyoti Sarkar, Mohammad Almukaynizi, Jana Shakarian, Paulo Shakarian:
Mining user interaction patterns in the darkweb to predict enterprise cyber incidents. CoRR abs/1909.11592 (2019) - 2018
- [i37]Anna Sapienza, Alessandro Bessi, Saranya Damodaran, Paulo Shakarian, Kristina Lerman, Emilio Ferrara:
Early Warnings of Cyber Threats in Online Discussions. CoRR abs/1801.09781 (2018) - [i36]Soumajyoti Sarkar, Ruocheng Guo, Paulo Shakarian:
Understanding and forecasting lifecycle events in information cascades. CoRR abs/1809.06050 (2018) - [i35]Hamidreza Alvari, Elham Shaabani, Paulo Shakarian:
Early Identification of Pathogenic Social Media Accounts. CoRR abs/1809.09331 (2018) - [i34]Mohammed Almukaynizi, Ericsson Marin, Eric Nunes, Paulo Shakarian, Gerardo I. Simari, Dipsy Kapoor, Timothy Siedlecki:
DARKMENTION: A Deployed System to Predict Enterprise-Targeted External Cyberattacks. CoRR abs/1810.12492 (2018) - [i33]Mohammed Almukaynizi, Vivin Paliath, Malay Shah, Malav Shah, Paulo Shakarian:
Finding Cryptocurrency Attack Indicators Using Temporal Logic and Darkweb Data. CoRR abs/1810.12906 (2018) - [i32]Soumajyoti Sarkar, Mohammad Almukaynizi, Jana Shakarian, Paulo Shakarian:
Predicting enterprise cyber incidents using social network analysis on the darkweb hacker forums. CoRR abs/1811.06537 (2018) - 2017
- [i31]Ericsson Marin, Ruocheng Guo, Paulo Shakarian:
Temporal Analysis of Influence to Predict Users' Adoption in Online Social Networks. CoRR abs/1705.02399 (2017) - [i30]Hamidreza Alvari, Paulo Shakarian, J. E. Kelly Snyder:
Semi-Supervised Learning for Detecting Human Trafficking. CoRR abs/1705.10786 (2017) - [i29]Ruocheng Guo, Hamidreza Alvari, Paulo Shakarian:
Strongly Hierarchical Factorization Machines and ANOVA Kernel Regression. CoRR abs/1712.09133 (2017) - 2016
- [i28]Ruocheng Guo, Paulo Shakarian:
A Comparison of Methods for Cascade Prediction. CoRR abs/1606.05730 (2016) - [i27]Nikhil Kumar, Ruocheng Guo, Ashkan Aleali, Paulo Shakarian:
An Empirical Evaluation Of Social Influence Metrics. CoRR abs/1607.00720 (2016) - [i26]Eric Nunes, Paulo Shakarian, Gerardo I. Simari, Andrew Ruef:
Argumentation Models for Cyber Attribution. CoRR abs/1607.02171 (2016) - [i25]Ericsson Marin, Ahmad Diab, Paulo Shakarian:
Product Offerings in Malicious Hacker Markets. CoRR abs/1607.07903 (2016) - [i24]Elham Shaabani, Hamidreza Alvari, Paulo Shakarian, J. E. Kelly Snyder:
MIST: Missing Person Intelligence Synthesis Toolkit. CoRR abs/1607.08580 (2016) - [i23]Eric Nunes, Ahmad Diab, Andrew Gunn, Ericsson Marin, Vineet Mishra, Vivin Paliath, John Robertson, Jana Shakarian, Amanda Thart, Paulo Shakarian:
Darknet and Deepnet Mining for Proactive Cybersecurity Threat Intelligence. CoRR abs/1607.08583 (2016) - [i22]Hamidreza Alvari, Paulo Shakarian, J. E. Kelly Snyder:
A Non-Parametric Learning Approach to Identify Online Human Trafficking. CoRR abs/1607.08691 (2016) - [i21]Ruocheng Guo, Elham Shaabani, Abhinav Bhatnagar, Paulo Shakarian:
Toward Early and Order-of-Magnitude Cascade Prediction in Social Networks. CoRR abs/1608.02646 (2016) - 2015
- [i20]Jana Shakarian, Paulo Shakarian, Andrew Ruef:
Cyber Attacks and Public Embarrassment: A Survey of Some Notable Hacks. CoRR abs/1501.05990 (2015) - [i19]Eric Nunes, Nimish Kulkarni, Paulo Shakarian, Andrew Ruef, Jay Little:
Cyber-Deception and Attribution in Capture-the-Flag Exercises. CoRR abs/1507.01922 (2015) - [i18]Eric Nunes, Casey Buto, Paulo Shakarian, Christian Lebiere, Stefano Bennati, Robert Thomson, Holger Jaenisch:
Malware Task Identification: A Data Driven Approach. CoRR abs/1507.01930 (2015) - [i17]Andrew Stanton, Amanda Thart, Ashish Jain, Priyank Vyas, Arpan Chatterjee, Paulo Shakarian:
Mining for Causal Relationships: A Data-Driven Study of the Islamic State. CoRR abs/1508.01192 (2015) - [i16]Ruocheng Guo, Elham Shaabani, Abhinav Bhatnagar, Paulo Shakarian:
Toward Order-of-Magnitude Cascade Prediction. CoRR abs/1508.03371 (2015) - [i15]Elham Shaabani, Ashkan Aleali, Paulo Shakarian, John Bertetto:
Early Identification of Violent Criminal Gang Members. CoRR abs/1508.03965 (2015) - 2014
- [i14]Paulo Shakarian, Hansheng Lei, Roy Lindelauf:
Power Grid Defense Against Malicious Cascading Failure. CoRR abs/1401.1086 (2014) - [i13]Paulo Shakarian, Gerardo I. Simari, Marcelo A. Falappa:
Belief Revision in Structured Probabilistic Argumentation. CoRR abs/1401.1475 (2014) - [i12]Paulo Shakarian, Gerardo I. Simari, Geoffrey Moores, Simon Parsons, Marcelo A. Falappa:
An Argumentation-Based Framework to Address the Attribution Problem in Cyber-Warfare. CoRR abs/1404.6699 (2014) - 2013
- [i11]Paulo Shakarian, Gerardo I. Simari, Robert Schroeder:
MANCaLog: A Logic for Multi-Attribute Network Cascades (Technical Report). CoRR abs/1301.0302 (2013) - [i10]Paulo Shakarian, Patrick Roos, Geoffrey Moores:
A Novel Analytical Method for Evolutionary Graph Theory Problems. CoRR abs/1301.2533 (2013) - [i9]Paulo Shakarian, V. S. Subrahmanian:
Geospatial Optimization Problems. CoRR abs/1303.4632 (2013) - [i8]Paulo Shakarian, Patrick Roos, Devon Callahan, Cory Kirk:
Mining for Geographically Disperse Communities in Social Networks by Leveraging Distance Modularity. CoRR abs/1305.3668 (2013) - [i7]Damon Paulo, Bradley Fischl, Tanya Markow, Michael Martin, Paulo Shakarian:
Social Network Intelligence Analysis to Combat Street Gang Violence. CoRR abs/1306.6834 (2013) - [i6]Joseph Hannigan, Guillermo Hernandez, Richard M. Medina, Patrick Roos, Paulo Shakarian:
Mining for Spatially-Near Communities in Geo-Located Social Networks. CoRR abs/1309.2900 (2013) - [i5]Paulo Shakarian, Sean Eyre, Damon Paulo:
A Scalable Heuristic for Viral Marketing Under the Tipping Model. CoRR abs/1309.2963 (2013) - [i4]Paulo Shakarian, Jana Shakarian, Andrew Ruef:
The Dragon and the Computer: Why Intellectual Property Theft is Compatible with Chinese Cyber-Warfare Doctrine. CoRR abs/1309.6450 (2013) - 2012
- [i3]Paulo Shakarian, Damon Paulo:
Large Social Networks can be Targeted for Viral Marketing with Small Seed Sets. CoRR abs/1205.4431 (2012) - [i2]Brian Macdonald, Paulo Shakarian, Nicholas Howard, Geoffrey Moores:
Spreaders in the Network SIR Model: An Empirical Study. CoRR abs/1208.4269 (2012) - [i1]Devon Callahan, Paulo Shakarian, Jeffrey Nielsen, Anthony N. Johnson:
Shaping Operations to Attack Robust Terror Networks. CoRR abs/1211.0709 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-20 00:41 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint