Kamal Taha
Title
Cited by
Cited by
Year
Efficient machine learning for big data: A review
OY Al-Jarrah, PD Yoo, S Muhaidat, GK Karagiannidis, K Taha
Big Data Research 2 (3), 87-93, 2015
4242015
Data randomization and cluster-based partitioning for botnet intrusion detection
OY Al-Jarrah, O Alhussein, PD Yoo, S Muhaidat, K Taha, K Kim
IEEE transactions on cybernetics 46 (8), 1796-1806, 2015
942015
Simplified subspaced regression network for identification of defect patterns in semiconductor wafer maps
F Adly, O Alhussein, PD Yoo, Y Al-Hammadi, K Taha, S Muhaidat, ...
IEEE Transactions on Industrial Informatics 11 (6), 1267-1276, 2015
442015
SIIMCO: A forensic investigation tool for identifying the influential members of a criminal organization
K Taha, PD Yoo
IEEE Transactions on Information Forensics and Security 11 (4), 811-822, 2015
412015
XCDSearch: An XML context-driven search engine
K Taha, R Elmasri
IEEE Transactions on Knowledge and Data Engineering 22 (12), 1781-1796, 2010
312010
CXLEngine: A comprehensive XML loosely structured search engine
K Taha, R Elmasri
Proceedings of the 2008 EDBT workshop on Database technologies for handling …, 2008
272008
Using the spanning tree of a criminal network for identifying its leaders
K Taha, PD Yoo
IEEE Transactions on Information Forensics and security 12 (2), 445-453, 2016
252016
Determining the semantic similarities among gene ontology terms
K Taha
IEEE journal of biomedical and health informatics 17 (3), 512-525, 2013
222013
Automatic academic advisor
K Taha
8th International Conference on Collaborative Computing: Networking …, 2012
222012
BusSEngine: a business search engine
K Taha, R Elmasri
Knowledge and information systems 23 (2), 153-197, 2010
222010
GRank: A middleware search engine for ranking genes by relevance to given genes
K Taha, D Homouz, H Al Muhairi, Z Al Mahmoud
BMC bioinformatics 14 (1), 1-15, 2013
202013
CISRI: A crime investigation system using the relative importance of information spreaders in networks depicting criminals communications
M Alzaabi, K Taha, TA Martin
IEEE Transactions on Information Forensics and Security 10 (10), 2196-2211, 2015
172015
Demise: Interpretable deep extraction and mutual information selection techniques for IoT intrusion detection
LR Parker, PD Yoo, TA Asyhari, L Chermak, Y Jhi, K Taha
Proceedings of the 14th international conference on availability …, 2019
162019
Impacts and role of group purchasing organization in healthcare supply chain
R Jayaraman, K Taha, KS Park, J Lee
IIE Annual Conference. Proceedings, 3842, 2014
162014
Analyzing a co-occurrence gene-interaction network to identify disease-gene association
A Al-Aamri, K Taha, Y Al-Hammadi, M Maalouf, D Homouz
BMC bioinformatics 20 (1), 1-15, 2019
152019
Clustering the dominant defective patterns in semiconductor wafer maps
K Taha, K Salah, PD Yoo
IEEE Transactions on Semiconductor Manufacturing 31 (1), 156-165, 2017
142017
Determining semantically related significant genes
K Taha
IEEE/ACM transactions on computational biology and bioinformatics 11 (6 …, 2014
142014
GRtoGR: A system for mapping GO relations to gene relations
K Taha
IEEE Transactions on NanoBioscience 12 (4), 289-297, 2013
142013
SPGProfile: Speak group profile
K Taha, R Elmasri
Information Systems 35 (7), 774-790, 2010
142010
IMPACT: Impersonation attack detection via edge computing using deep autoencoder and feature abstraction
SJ Lee, PD Yoo, AT Asyhari, Y Jhi, L Chermak, CY Yeun, K Taha
IEEE Access 8, 65520-65529, 2020
132020
The system can't perform the operation now. Try again later.
Articles 1–20