Search
Now showing items 1-10 of 508
AI based approach to identify compromised meters in data integrity attacks on smart grid
(IET, 2017-10-02)
False data injection attacks can pose serious threats to the operation and control of power grid. The smarter the power grid gets, the more vulnerable it becomes to cyber attacks. Various detection methods of cyber attacks ...
Cleaning Noisy Knowledge Graphs
(CEUR Workshop Proceedings, 2017-10-22)
My dissertation research is developing an approach to identify and explain errors in a knowledge graph constructed by extracting entities and relations from text. Information extraction systems can automatically construct ...
CADET: Computer Assisted Discovery Extraction and Translation
(2017-11-27)
Computer Assisted Discovery Extraction and Translation (CADET) is a workbench for helping knowledge workers find, label, and translate documents of interest. It combines a multitude of analytics together with a flexible ...
Advanced Large Scale Cross Domain Temporal Topic Modeling Algorithms to Infer the Influence of Recent Research on IPCC Assessment Reports
(American Geophysical Union, 2016-12-12)
One way of understanding the evolution of science within a particular scientific discipline is by studying the temporal influences that research publications had on that discipline. We provide a methodology for conducting ...
Event Nugget Detection using Thresholding and Classification Techniques
(National Institute of Standards and Technology, 2016-11-14)
This paper describes the Event Nugget Detection system that we submitted to the TAC KBP 2016 Event Track. We sent out two runs; UMBC1 and UMBC2. UMBC1 is a sentence-level classification system based on Convolution Neural ...
Participation in TAC KBP 2017: Cold Start TEDL and Low-resource EDL
The JHU HLTCOE participated in the Cold Start and the edl tasks of the 2017 Text Analysis Conference Knowledge Base Population evaluation. For our sixth year of participation in Cold Start we continued our research with ...
Deep Understanding of a Document's Structure
(ACM, 2017-12-05)
Current language understanding approaches focus on small documents, such as newswire articles, blog posts, product reviews and discussion forum discussions. Understanding and extracting information from large documents ...
Bi-level Modelling of False Data Injection Attacks on Security Constrained Optimal Power Flow
(IET, 2017-06-12)
Conventional power system was originally designed to provide efficient and reliable power. With the integration of information technology and advanced metering infrastructure, the power grid has become smart. The smart ...
Entropy-based electricity theft detection in AMI network
(IET, 2018-08-31)
Advanced metering infrastructure (AMI), one of the prime components of the smart grid, has many benefits like demand response and load management. Electricity theft, a key concern in AMI security since smart meters used ...
Discovering Scientific Influence using Cross-Domain Dynamic Topic Modeling
(IEEE, 2017-01-15)
We describe an approach using dynamic topic modeling to model influence and predict future trends in a scientific discipline. Our study focuses on climate change and uses assessment reports of the Intergovernmental Panel ...