Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Exact matches
- V. S. Subrahmanian
aka: Venkatramanan Siva Subrahmanian
Dartmouth College, Institute for Security, Technology, and Society, Hanover, NH, USA
Likely matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 417 matches
- 2024
- Chongyang Gao, Kezhen Chen, Jinmeng Rao, Baochen Sun, Ruibo Liu, Daiyi Peng, Yawen Zhang, Xiaoyuan Guo, Jie Yang, V. S. Subrahmanian:
Higher Layers Need More LoRA Experts. CoRR abs/2402.08562 (2024) - 2023
- Youdinghuan Chen, Chongyang Gao, Daveed Gartenstein-Ross, Kevin T. Greene, Karin Kalif, Sarit Kraus, Francesco Parisi, Chiara Pulice, Anja Subasic, V. S. Subrahmanian:
Linking Terrorist Network Structure to Lethality: Algorithms and Analysis of Al Qaeda and ISIS. IEEE Trans. Comput. Soc. Syst. 10(5): 2814-2826 (2023) - Giovanni Apruzzese, V. S. Subrahmanian:
Mitigating Adversarial Gray-Box Attacks Against Phishing Detectors. IEEE Trans. Dependable Secur. Comput. 20(5): 3753-3769 (2023) - Chongyang Bai, Haipeng Chen, Srijan Kumar, Jure Leskovec, V. S. Subrahmanian:
M2P2: Multimodal Persuasion Prediction Using Adaptive Fusion. IEEE Trans. Multim. 25: 942-952 (2023) - Chongyang Bai, Maksim Bolonkin, Viney Regunath, V. S. Subrahmanian:
DIPS: A Dyadic Impression Prediction System for Group Interaction Videos. ACM Trans. Multim. Comput. Commun. Appl. 19(1s): 43:1-43:24 (2023) - Luca Pajola, Dongkai Chen, Mauro Conti, V. S. Subrahmanian:
A Novel Review Helpfulness Measure Based on the User-Review-Item Paradigm. ACM Trans. Web 17(4): 27:1-27:31 (2023) - Tonmoay Deb, Jürgen Dix, Mingi Jeong, Cristian Molinaro, Andrea Pugliese, Alberto Quattrini Li, Eugene Santos Jr., V. S. Subrahmanian, Shanchieh Yang, Youzhi Zhang:
DUCK: A Drone-Urban Cyber-Defense Framework Based on Pareto-Optimal Deontic Logic Agents. AAAI 2023: 16425-16427 - Youzhi Zhang, Bo An, V. S. Subrahmanian:
Finding Optimal Nash Equilibria in Multiplayer Games via Correlation Plans. AAMAS 2023: 2712-2714 - Youzhi Zhang, Bo An, Venkatramanan Siva Subrahmanian:
Computing Optimal Nash Equilibria in Multiplayer Games. NeurIPS 2023 - Jacob Collard, Valeria de Paiva, Eswaran Subrahmanian:
Parmesan: mathematical concept extraction for education. CoRR abs/2307.06699 (2023) - 2022
- Qian Han, Cristian Molinaro, Antonio Picariello, Giancarlo Sperlì, V. S. Subrahmanian, Yanhai Xiong:
Generating Fake Documents Using Probabilistic Logic Graphs. IEEE Trans. Dependable Secur. Comput. 19(4): 2428-2441 (2022) - Yanhai Xiong, Giridhar Ramachandran, Rajesh Ganesan, Sushil Jajodia, V. S. Subrahmanian:
Generating Realistic Fake Equations in Order to Reduce Intellectual Property Theft. IEEE Trans. Dependable Secur. Comput. 19(3): 1434-1445 (2022) - Haipeng Chen, Andrew Duncklee, Sushil Jajodia, Rui Liu, Sean R. McNamara, V. S. Subrahmanian:
PCAM: A Data-driven Probabilistic Cyber-alert Management Framework. ACM Trans. Internet Techn. 22(3): 67:1-67:24 (2022) - Jacob Collard, Valeria de Paiva, Brendan Fong, Eswaran Subrahmanian:
Extracting Mathematical Concepts from Text. W-NUT@COLING 2022: 15-23 - Youzhi Zhang, Sayak Chakrabarty, Rui Liu, Andrea Pugliese, V. S. Subrahmanian:
A New Dynamically Changing Attack on Review Fraud Systems and a Dynamically Changing Ensemble Defense. DASC/PiCom/CBDCom/CyberSciTech 2022: 1-7 - Chongyang Bai, Maksim Bolonkin, Viney Regunath, V. S. Subrahmanian:
POLLY: A Multimodal Cross-Cultural Context-Sensitive Framework to Predict Political Lying from Videos. ICMI 2022: 520-530 - Youzhi Zhang, Bo An, V. S. Subrahmanian:
Correlation-Based Algorithm for Team-Maxmin Equilibrium in Multiplayer Extensive-Form Games. IJCAI 2022: 606-612 - Jacob Collard, Valeria de Paiva, Brendan Fong, Eswaran Subrahmanian:
Extracting Mathematical Concepts from Text. CoRR abs/2208.13830 (2022) - Giovanni Apruzzese, V. S. Subrahmanian:
Mitigating Adversarial Gray-Box Attacks Against Phishing Detectors. CoRR abs/2212.05380 (2022) - 2021
- V. S. Subrahmanian, Chiara Pulice, James F. Brown, Jacob Bonen-Clark:
A Machine Learning Based Model of Boko Haram. Springer 2021, ISBN 978-3-030-60613-8, pp. 1-116 - Hongzhao Shao, Stephen Boulton, Cristina Olivieri, Hebatallah Mohamed, Madoka Akimoto, Manu Veliparambil Subrahmanian, Gianluigi Veglia, John L. Markley, Giuseppe Melacini, Woonghee Lee:
CHESPA/CHESCA-SPARKY: automated NMR data analysis plugins for SPARKY to map protein allostery. Bioinform. 37(8): 1176-1177 (2021) - Cristian Molinaro, Chiara Pulice, Anja Subasic, Abigail Bartolome, V. S. Subrahmanian:
STAR: Summarizing Timed Association Rules. Trans. Data Sci. 2(1): 6:1-6:36 (2021) - Tanmoy Chakraborty, Sushil Jajodia, Jonathan Katz, Antonio Picariello, Giancarlo Sperlì, V. S. Subrahmanian:
A Fake Online Repository Generation Engine for Cyber Deception. IEEE Trans. Dependable Secur. Comput. 18(2): 518-533 (2021) - Chongyang Bai, Qian Han, Ghita Mezzour, Fabio Pierazzi, V. S. Subrahmanian:
$\sf {DBank}$DBank: Predictive Behavioral Analysis of Recent Android Banking Trojans. IEEE Trans. Dependable Secur. Comput. 18(3): 1378-1393 (2021) - Almas Abdibayev, Dongkai Chen, Haipeng Chen, Deepti Poluru, V. S. Subrahmanian:
Using Word Embeddings to Deter Intellectual Property Theft through Automated Generation of Fake Documents. ACM Trans. Manag. Inf. Syst. 12(2): 13:1-13:22 (2021) - Snow Kang, Cristian Molinaro, Andrea Pugliese, V. S. Subrahmanian:
Randomized Generation of Adversary-aware Fake Knowledge Graphs to Combat Intellectual Property Theft. AAAI 2021: 4155-4163 - Srijan Kumar, Chongyang Bai, V. S. Subrahmanian, Jure Leskovec:
Deception Detection in Group Video Conversations using Dynamic Interaction Networks. ICWSM 2021: 339-350 - V. S. Subrahmanian:
VEST: An Early Warning System for Future Cyber-Attacks. SECRYPT 2021: 7 - Srijan Kumar, Chongyang Bai, V. S. Subrahmanian, Jure Leskovec:
Deception Detection in Group Video Conversations using Dynamic Interaction Networks. CoRR abs/2106.06163 (2021) - 2020
- Noseong Park, Andrea Pugliese, Edoardo Serra, V. S. Subrahmanian:
Top-k user-specified preferred answers in massive graph databases. Data Knowl. Eng. 127: 101798 (2020)
skipping 387 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-25 02:03 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint