Follow
Kamal Taha
Title
Cited by
Cited by
Year
Efficient machine learning for big data: A review
OY Al-Jarrah, PD Yoo, S Muhaidat, GK Karagiannidis, K Taha
Big Data Research 2 (3), 87-93, 2015
6822015
Data randomization and cluster-based partitioning for botnet intrusion detection
OY Al-Jarrah, O Alhussein, PD Yoo, S Muhaidat, K Taha, K Kim
IEEE transactions on cybernetics 46 (8), 1796-1806, 2015
1522015
IMPACT: Impersonation attack detection via edge computing using deep autoencoder and feature abstraction
SJ Lee, PD Yoo, AT Asyhari, Y Jhi, L Chermak, CY Yeun, K Taha
IEEE Access 8, 65520-65529, 2020
932020
Simplified subspaced regression network for identification of defect patterns in semiconductor wafer maps
F Adly, O Alhussein, PD Yoo, Y Al-Hammadi, K Taha, S Muhaidat, ...
IEEE Transactions on Industrial Informatics 11 (6), 1267-1276, 2015
822015
SIIMCO: A forensic investigation tool for identifying the influential members of a criminal organization
K Taha, PD Yoo
IEEE Transactions on Information Forensics and Security 11 (4), 811-822, 2015
542015
Using the spanning tree of a criminal network for identifying its leaders
K Taha, PD Yoo
IEEE Transactions on Information Forensics and security 12 (2), 445-453, 2016
452016
Impacts and role of group purchasing organization in healthcare supply chain
R Jayaraman, K Taha, KS Park, J Lee
IIE Annual Conference. Proceedings, 3842, 2014
352014
Analyzing a co-occurrence gene-interaction network to identify disease-gene association
A Al-Aamri, K Taha, Y Al-Hammadi, M Maalouf, D Homouz
BMC bioinformatics 20, 1-15, 2019
342019
XCDSearch: An XML context-driven search engine
K Taha, R Elmasri
IEEE Transactions on Knowledge and Data Engineering 22 (12), 1781-1796, 2010
342010
DEMISe: Interpretable deep extraction and mutual information selection techniques for IoT intrusion detection
LR Parker, PD Yoo, TA Asyhari, L Chermak, Y Jhi, K Taha
Proceedings of the 14th international conference on availability …, 2019
332019
Automatic academic advisor
K Taha
8th International Conference on Collaborative Computing: Networking …, 2012
332012
Clustering the dominant defective patterns in semiconductor wafer maps
K Taha, K Salah, PD Yoo
IEEE Transactions on Semiconductor Manufacturing 31 (1), 156-165, 2017
312017
CISRI: A crime investigation system using the relative importance of information spreaders in networks depicting criminals communications
M Alzaabi, K Taha, TA Martin
IEEE Transactions on Information Forensics and Security 10 (10), 2196-2211, 2015
312015
CXLEngine: A comprehensive XML loosely structured search engine
K Taha, R Elmasri
Proceedings of the 2008 EDBT workshop on Database technologies for handling …, 2008
292008
Methods that optimize multi-objective problems: A survey and experimental evaluation
K Taha
IEEE Access 8, 80855-80878, 2020
272020
R2BN: An Adaptive Model for Keystroke-Dynamics-Based Educational Level Classification
I Tsimperidis, PD Yoo, K Taha, A Mylonas, V Katos
IEEE transactions on cybernetics 50 (2), 525-535, 2018
262018
Semi-supervised and un-supervised clustering: A review and experimental evaluation
K Taha
Information Systems 114, 102178, 2023
222023
Determining the semantic similarities among gene ontology terms
K Taha
IEEE journal of biomedical and health informatics 17 (3), 512-525, 2013
222013
BusSEngine: a business search engine
K Taha, R Elmasri
Knowledge and information systems 23, 153-197, 2010
222010
GRank: A middleware search engine for ranking genes by relevance to given genes
K Taha, D Homouz, H Al Muhairi, Z Al Mahmoud
BMC bioinformatics 14, 1-15, 2013
212013
The system can't perform the operation now. Try again later.
Articles 1–20