Agharazi, H., Kolacinski, R. M., Theeranaew, W., & Loparo, K. A.(2019).A swarm intelligence-based approach to anomaly detection of dynamic systems. Swarm and Evolutionary Computation, 44(), 806--827.
Zhu, X., Ayday, E., & Vitenberg, R.(2019).A privacy-preserving framework for outsourcing location-based services to the cloud. IEEE Transactions on Dependable and Secure Computing,().
Xue, Z., Gong, L., Wang, G., Lu, C., Gilmore, H., Zhang, S., ... Madabhushi, A.(2019).Convolutional neural network initialized active contour model with adaptive ellipse fitting for nuclear segmentation on breast histopathological images. Journal of Medical Imaging, 6(1), 017501.
Kandhari, A., Mehringer, A., Chiel, H., Quinn, R. D., & Daltorio, K. A.(2019).Design and Actuation of a Fabric-Based Worm-Like Robot. Biomimetics, 4(1), 13.
Sajadi, A., Kolacinski, R. M., Clark, K., & Loparo, K. A.(2019).Transient Stability Analysis for Offshore Wind Power Plant Integration Planning Studies—Part I: Short-Term Faults. IEEE Transactions on Industry Applications, 55(1), 182--192.
Ariando, D., Chen, C., Greer, M., & Mandal, S.(2019).An autonomous, highly portable NMR spectrometer based on a low-cost System-on-Chip (SoC). Journal of Magnetic Resonance, 299(), 74--92.
Zhang, Y., Fan, Y., Song, W., Hou, S., Ye, F., Liu, X., ... Xiong, Q.(2019).Your Style Your Identity: Leveraging Writing and Photography Styles for Drug Trafficker Identification in Darknet Markets over Attributed Heterogeneous Information Network. ASSOC COMPUTING MACHINERY,(), 3448-3454.
Menden, M., Wang, D., Mason, M., Szalai, B., Bulusu, K., Guan, Y., ... Saez-Rodriguez, J.(2019).Community assessment to advance computational prediction of cancer drug combinations in a pharmacogenomic screen. Nature Communications,().
Tang, X., & Mandal, S.(2019).Indoor Occupancy Awareness and Localization Using Passive Electric Field Sensing. IEEE Transactions on Instrumentation and Measurement,().
Gao, P., Xiao, X., Li, Z., Jee, K., Xu, F., Kulkarni, S., ... Mittal, P.(2019).A Query System for Efficiently Investigating Complex Attack Behaviors for Enterprise Security. International Conference on Very Large Data Bases (VLDB), Demo, 12(12), 1802--1805.