Skip to main content


Recent publications by BIIC researchers:

  1. Xiaoxia Sun, Nasser M. Nasrabadi and Trac D. Tran, "Supervised Deep Sparse Coding Networks for Image Classification,"accepted will appear in IEEE Trans. on Image Processing, 2019.
  2. Nasser M. Nasrabadi, “Deep Target: An Automatic Target Recognition using Deep Convolutional Neural Networks,” IEEE Transactions on Aerospace and Electronic Systems, 18 Jan. 2019. DOI: 10.1109/TAES.2019.2894050 
  3. Zhangming Ding, Nasser M. Nasrabadi, Yun Fu, “Semi-supervised Task-driven Deep Transfer Learning via Coupled Neural Networks,” IEEE Transaction on Image Processing, vol. 27, issue 11, pp. 5214-5224, June 2018.
  4. Amirsina Torfi, SM Iranmanesh, Nasser M. Nasrabadi, Jeremy Dawson, “3D Convolutional Neural Networks for Cross Audio-Visual Matching Recognition,” IEEE Access, vol. 5, pp. 22081-22091, 2017.
  5. Tianpei Xie, Nasser M. Nasrabadi, Alfred O. Hero III, “Learning to Classify with Possible Sensor Failures,” IEEE Transactions on Signal Processing, vol. 65, no.4, pp. 836-849, 2017.
  6. Minh Dao, Nam Nguyen, Nasser M. Nasrabadi, and Trac D. Tran, “Multi-sensor classification via joint sparse representation for discriminating between human and animal footsteps,” IEEE Trans. on Signal Processing, Vol. 64, No. 9, pp. 2400-2415, May 2016.
  7. Soheil Bahrampour, Nasser M. Nasrabadi, Asok Ray, and Kenneth W. Jenkins, “Multimodal task-driven dictionary learning,” IEEE Trans. on Image Processing, vol. 25, no. 1, pp. 24-38 Jan. 2016.
  8.  Benjamin S. Riggan, Christopher Reale, and Nasser M. Nasrabadi, “Coupled auto-associative neural networks for heterogeneous face recognition,” IEEE Access, vol. 3, pp. 1620-1632, Oct. 2015.
  9. Sumit Shekhar, Vishal M. Patel, Nasser M. Nasrabadi and Rama Chellappa, “Joint sparse representation for robust multimodal biometrics recognition,” IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 36, no. 1, pp. 113-126, Jan. 2014.
  10. D. Poster, B. S. Riggan, S. Hu, N. M. Nasrabadi, “An Examination of Deep-Learning Based Landmark Detection Methods on Thermal Face Imagery,” CVPRW’19, 15th IEEE Workshop on Perception Beyond the Visible Spectrum (PBVS’19), 2019.
  11. F. Taherkhani, J. Dawson, N. M. Nasrabadi, “Hyperspectral Band Selection for Face Recognition Based on a Structurally Sparsified Deep Convolutional Neural Networks,” in the 12th IAPR International Conference On Biometrics (ICB’19), 4-7 June 2019, Crete, Greece.
  12. S. Soleymani, A. Dabouei, J. Dawson, N. M. Nasrabadi, “Adversarial Examples to Fool Iris Recognition Systems” in the 12th IAPR International Conference On Biometrics (ICB’19), 4-7 June 2019, Crete, Greece.
  13.  A. Dabouei, S. Soleymani, J. Dawson, N. M. Nasrabadi, “Deep Contactless Fingerprint Unwarping,” in the 12th IAPR International Conference On Biometrics (ICB’19), 4-7 June 2019, Crete, Greece.
  14. S. M. Iranmanesh, N. M. Nasrabadi, “Attribute-Guided Deep Polarimetric Thermal-to-visible Face Recognition,” in the 12th IAPR International Conference On Biometrics (ICB’19), 4-7 June 2019, Crete, Greece.
  15. V. Talreja, M. Valenti, N. M. Nasrabadi, “Learning to Authenticate with Deep Multibiometric Hashing and Neural Network Decoding," IEEE International Conference on Communications (ICC’19), 20-24 May 2019, Shanghai, China.
  16. F. Taherkhani, H. Kazemi, N. M. Nasrabadi  “Matrix Completion for Graph-Based Deep Semi-Supervised Learning”, 33rd AAAI Conference on Artificial Intelligence (AAAI), Jan. 27-Feb. 1, 2019, Honolulu, Hawaii.
  17. A. Dabouei, S, Soleymani, J. Dawson, N. M.  Nasrabadi, “Fast Geometrically-Perturbed Adversarial Faces,” 2019 IEEE Winter Conference on Applications of Computer Vision ( WACV’19), Waikoloa, Hawaii,  January 8-10, 2019.
  18. H. Kazemi, S. M. Iranmanesh, N. M. Nasrabadi, “Style and Content Disentanglement in Generative Adversarial Networks,” 2019 IEEE Winter Conference on Applications of Computer Vision (WACV’19), Waikoloa, Hawaii,  January 8-10, 2019.
  19. Zhiguo Cao Chi Li, Yang Xiao and Xin Li . “Despeckling via deep residue learning: a hybrid approach,” submitted to IEEE Signal Processing Letter, 2018.
  20. Weisheng Dong, Huan Wang, Fangfang Wu, Guangming Shi and X. Li , “Deep Spatial-spectral representation learning for hyperspectral image denoising,” submitted to IEEE Trans. on Computational Imaging, 2018.
  21. X. Zhou, K. Jin, M. Xu, G. Guo, “Learning deep compact similarity metric for kinship verification from face images,” Information Fusion, 48, 84-94, 2018.
  22. Z. Tan, J. Wan, Z. Lei, R. Zhi, G. Guo, S. Z. Li, “Efficient group-n encoding and decoding for facial age estimation,” IEEE transactions on pattern analysis and machine intelligence, 40 (11), 2610, 2018.
  23. M. Al Jazaery, G. Guo, “Video-based depression level analysis by encoding deep spatiotemporal features,” IEEE Transactions on Affective Computing, 2018.
  24. M. Barr, G. Guo, S. Colby, M. Olfert, “Detecting body mass index from a facial photograph in lifestyle intervention,” Technologies 6 (3), 83, 2018.
  25. X. Zhou, K. Jin, Y. Shang, G. Guo, “Visually interpretable representation learning for depressionrecognition from facial images,” IEEE Transactions on Affective Computing, 2018.
  26. J. Wan, Z. Tan, Z. Lei, G. Guo, S. Z. Li, “Auxiliary demographic information assisted age estimation with cascaded structure,” IEEE Transactions on Cybernetics, 1-11, 2018.
  27. D. P. Chowdhury, S. Bakshi, G. Guo, P. K. Sa, “On applicability of tunable filter bank based feature for ear biometrics: a study from constrained to unconstrained,” Journal of Medical Systems 42 (1), 11, 2018.
  28. Junxiang Wang, Liang Zhao, Yanfang Ye, Yuji Zhang. “Adverse event detection by integrating twitter data and VAERS”, Journal of Biomedical Semantics , 9:19, 2018.
  29. Yanfang Ye, Lingwei Chen, Shifu Hou, William Hardy, Xin Li. “DeepAM: a heterogeneous deep learning framework for intelligent malware detection.” Knowledge and Information Systems, 54.2 (2018): 265-285. 
  30. Hara K., Adams A., Milland K., Savage S., Callison-Burch C., Bigham J., “A Data-Driven Analysis of Workers Earnings on Amazon Mechanical Turk.” CHI 2018: ACM Conference on Human Factors in Computing Systems, 25 percent acceptance rate and Honorable Mention (only 5 percent of all accepted papers).
  31. Saviaga C., Keegan B., Savage S., “Mobilizing the Trump Train: Understanding Collective Action in a Political Troll Community.” ICWSM 2018: International AAAI Conference on Web and Social Media 2018, 15 percent acceptance rate.
  32. Chun-Wei Chiang, Anna Kasunic, Saiph Savage, “Crowd Coach: Peer Coaching for Crowd Workers' Skill Growth,” CSCW: ACM Conference on Computer-Supported Cooperative Work, 2018.
  33. Juan Pablo Flores, Saiph Savage, Jessica Hammer, Joseph Seering, “The Social Roles of Bots: Evaluating Impact of Bots on Discussions in Online Communities,” CSCW: ACM Conference on Computer-Supported Cooperative Work, 2018.
  34. Yixin Du and Xin Li, “Recursive deep residue learning for single image dehazing,” IEEE Conference on CVPR Workshop, 2018. 
  35. G Guo, N Zhang, “What Is the Challenge for Deep Learning in Unconstrained Face Recognition?,”13th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2018), 2018.
  36. X. Liu, G Guo, “Attributes in Multiple Facial Images,” 13th IEEE International Conference on Automatic Face & Gesture Recognition , 2018.
  37. Yuyang Gao, Liang Zhao, Lingfei Wu, Yanfang Ye, Hui Xiong, Chaowei Yang. “Incomplete Label Multi-task Deep Learning for Spatio-temporal Event Subtype Forecasting”, 33rd AAAI Conference on Artificial Intelligence, 2019 (16.2 percent acceptance rate).
  38. Yanfang Ye, Lingwei Chen, Shifu Hou, Xin Li, Shouhuai Xu, Liang Zhao, Jiabin Wang, Qi Xiong. “ICSD: An Automatic System for Insecure Code Snippet Detection in Stack Overflow over Heterogeneous Information Network”, Annual Computer Security Applications Conference, 2018 (20.1 percent acceptance rate).
  39. Yujie Fan, Shifu Hou, Yiming Zhang, Yanfang Ye, Melih Abdulhayoglu. “Gotcha - Sly Malware! Scorpion: A Metagraph2vec Based Malware Detection System”, Proceedings of ACM International Conference on Knowledge Discovery and Data Mining , 2018 (22.5 percent acceptance rate).
  40. Yujie Fan, Yiming Zhang, Yanfang YeXin Li. “Automatic Opioid User Detection from Twitter: Transductive Ensemble Built on Different Meta-graph Based Similarities over Heterogeneous Information Network,”  27th International Joint Conference on Artificial Intelligence, 2018 (20.5 percent acceptance rate).
  41. Shifu Hou, Yanfang Ye, Yangqiu Song, Melih Abdulhayoglu. “Make Evasion Harder: An Intelligent Android Malware Detection System,” 27th International Joint Conference on Artificial Intelligence, 2018 (20.5 percent acceptance rate).
  42. Junxiang Wang, Liang Zhao, Yanfang Ye. “Semi-supervised Multi-instance Learning for Flu Shot Adverse Event Detection,”  IEEE international conference on Big Data , 2018 (18.9 percent acceptance rate).
  43. Yiming Zhang, Yujie Fan, Shifu Hou, Jian Liu*, Yanfang Ye, Thirimachos Bourlai. “iDetector: Automate Underground Forum Analysis Based on Heterogeneous Information Network,” Proceedings of International Conference on Advances in Social Network Analysis and Mining, 2018.
  44. Lingwei Chen, Shifu Hou, Yanfang Ye, Shouhuai Xu. “DroidEye: Fortifying Security of Learning-based Classifier against Adversarial Android Malware Attacks,”  Proceedings of International Conference on Advances in Social Network Analysis and Mining, 2018.
  45. Yiming Zhang, Yujie Fan, Yanfang Ye, Liang Zhao, Jiabin Wang, Qi Xiong, Fudong Shao. “KADetector: Automatic Identification of Key Actors in Online Hack Forums Based on Structured Heterogeneous Information Network,” IEEE International Conference on Big Knowledge, 2018.
  46. Yiming Zhang, Yujie Fan*, Yanfang YeXin LiErin L. Winstanley. “Utilizing Social Media to Combat Opioid Addiction Epidemic: Automatic Detection of Opioid Users from Twitter,” 32nd AAAI Conference on Artificial Intelligence Workshops , 2018.
  47. A.S. Bommagani, M.C. Valenti, and A. Ross, “A framework for secure cloud-empowered mobile biometrics,” in Proc. IEEE Military Commun. Conf. (MILCOM), Oct. 2014.
  48. M.C. Valenti, S. Talarico, and P. Rost, “The role of computational outage in dense cloud-based centralized radio access networks,” in Proc. IEEE Global Commun. Conf.(GLOBECOM), Dec. 2014.
  49. M. Fanaei, A. Tahmasbi-Sarvestani, Y.P. Fallah, G. Bansal, M.C. Valenti, and J. Kenny, “Adaptive content control for communication amongst cooperative automated vehicles,” in Proc. IEEE International Symposium on Wireless Vehicular Communications (WIVEC), Sept. 2014.
  50. M. Fanaei, M.C. Valenti, and N. Schmid, “Effects of spatial randomness on locating a point source with distributed sensors,” in Proc. IEEE Int. Conf. on Commun. (ICC) Workshop on Advances in Network Localization and Navigation (ANLN), June 2014, invited paper.
  51. S. Talarico, N.A. Schmid, M. Alkhweldi, and M.C. Valenti, “Distributed estimation of a parametric field: Algorithms and performance analysis,” IEEE Transactions on Signal Processing, vol. 62, no. 5, pp. 1041-1053, Mar 1, 2014.
  52. S. Motiian, M. Piccirilli, D.A. Adjeroh, G. Doretto, “Information bottleneck learning using privileged information for visual recognition,” in Proc., IEEE Conference on Computer Vision and Pattern Recognition (CVPR), June 2016.
  53. M. Piccirrilli, G. Doretto, A. Ross,  D.A. Adjero, “A mobile structured light system for 3D face acquisition,” IEEE Sensors Journal, Feb. 2016.
  54. S.A. Rahman, D.A. Adjeroh, “Surface based body shape index and its relationship with all-cause mortality,” PLoS ONE, 10(12): 2015, e0144639.
  55. D. Cao, C. Chen, D.A. Adjeroh, A. Ross, “Predicting gender and weight from human metrology using a copula model,” in Proc., The 5th IEEE Int’l Conf. on Biometrics: Theory, Applications & Systems (BTAS), Sep. 2012.
  56. D. Cao, C. Chen, M. Piccirilli, D. Adjeroh, T. Bourlai, A. Ross, “Can facial metrology predict gender?,” in Proc., International Joint Conference on Biometrics (IJCB), Washington DC, Oct 11-13, 2011.
  57. E. Moore and T. Bourlai, "Expectation Maximization of Frequent Patterns - A Specific and Local Biclustering Algorithm for Biological Datasets", IEEE/ACM Transactions in Computational Biology and Bioinformatics, (Accepted), 2016.
  58. N. Narang and T. Bourlai, “Face recognition in the SWIR band when using single sensor multi-wavelength imaging systems”, Elsevier - Image and Vision Computing, vol. 33, pp. 26-43, Jan 2015 [IF 2.095].
  59. C. Whitelam and T. Bourlai, “Accurate Eye Localization in the Short Waved Infrared Spectrum through Summation Range Filters”, Elsevier – CVIU, vol. 139, pp. 59-72, October 2015 [IF 2.293].
  60. N. Osia and T. Bourlai, “A Spectral Independent Approach for Physiological and Geometric Based Face Recognition in the Visible, Middle-Wave and Long-Wave Infrared Bands”, Image and Vision Computing, Journal - Elsevier, Nov. 2014.
  61. A. Abaza, M. A. Harrison, T. Bourlai and A. Ross, Design and Evaluation of Photometric Image Quality Measures for Effective Face Recognition, IET Biometrics, 2014.
  62. A.B. Holbert, H.P. Whitelam, L.J. Sooter, J.M. Dawson, and L.A. Hornak, “Hand Bacteria as an Identifier – A Biometric Evaluation,” Network Modeling Analysis in Health Informatics and Bioinformatics, vol. 4, no. 1, (2015).
  63. A. Kadiyala, K. Lee, L. E. Rodak, L.A. Hornak, D. Korakakis, and J.M. Dawson, “Improvement in the Light Extraction of Blue InGaN/GaN-Based LEDs Using Patterned Metal Contacts,” Electron Devices Society, IEEE Journal of the, vol. 2, no. 2, pp. 16-22,(2014).
  64. B. Hamza, M. Srungarapu, A. Kadiyala, J. M. Dawson, and L. Hornak, “Photonic Crystal Bioensors,” in Biosensors Based on Nanomaterials and Nanodevices (Chapter 8), CRC Press (2013).
  65. E. Marasco, A. Ross, J. Dawson, T. Moroose and T. Ambrose, “Detecting STR peaks in degraded DNA samples”, in Proc. 4th International Conference on Bioinformatics and Computational Biology (BICoB) 2012, p. 1 (2012).
  66. B. Hamza, An. Kadiyala, L.A. Hornak, Y. Liu, and J. M. Dawson, “Direct Fabrication of Two-dimensional Photonic Crystal Structures in Silicon Using Positive and Negative Hydrogen Silsesquioxane (HSQ) Patterns,” Microelectronic Engineering, 91, p. 70 (2012).
  67. S. Motiian, M. Piccirilli, D. Adjeroh and G. Doretto. Information bottleneck learning using privileged information for visual recognition. In Proc. of the IEEE Computer Society Conf. on Computer Vision and Pattern Recognition (CVPR), pages 1496-1505, 2016.
  68. M. Piccirilli, G. Doretto, A. Ross and D. Adjeroh. A mobile structured light system for 3D face acquisition. IEEE Sensors Journal, vol. 16, no. 7, 1854-1855, 2016.
  69. F. Siyahjani, R. Almohsen, S. Sabri, and G. Doretto. A Supervised Low-rank Method for Learning Invariant Subspaces. In Proc. of the IEEE International Conference on Computer Vision (ICCV), 2015.
  70. G. Doretto, T. Sebastian, P. Tu, and J. Rittscher. Appearance-based person reidentification in camera networks: problem overview and current approaches. Journal of Ambient Intelligence and Humanized Computing, 2:127–151, Springer Berlin / Heidelberg, 2011.
  71. X. Wang, G. Doretto, T. B. Sebastian, J. Rittscher, and P. H. Tu. Shape and appearance context modeling. In Proc. of the IEEE Int. Conference on Computer Vision (ICCV), pages 1–8, 2007.
  72. L. Wen, and G-D. Guo,  “A computational approach to body mass index prediction from face images,” Image and Vision Computing, vol. 31, no. 5, pages 392-400, 2013. (This work was reported by New Scientist and many other Scientific News)
  73. G-D. Guo, L. Wen, and S. Yan, “Face authentication with makeup changes,” IEEE Trans. Circuits and Systems for Video Technology, DOI:10.1109/TCSVT.2013.2280076.
  74. Y. Zhu, and G-D. Guo,  “A study on visible to infrared action recognition,” IEEE Signal Processing Letters, vol. 20, no. 9, pages 897-900, 2013.
  75. C. Zhang, and G-D. Guo, “Age estimation with expression changes using multiple aging subspaces,” In Proc. of the IEEE Sixth Int’l Conf. on Biometrics: Theory, Applications and Systems (BTAS), Washington DC, September 29, 2013.
  76. G-D. Guo and X. Wang, “A Study on Human Age Estimation under Facial Expression Changes,” IEEE Conf. on Computer Vision and Pattern Recognition (CVPR), 2547-2553, 2012.
  77. W. Dong, G. Shi, Y. Ma, X. Li, “Image Restoration via Simultaneous Sparse Coding: Where Structured Sparsity Meets Gaussian Scale Mixture,” International Journal of Computer Vision vol. 114, no. 2-3, pp. 217-232, 2015.

  78. W. Dong, G. Li, G. Shi, X. Li, Y. Ma, "Low-Rank Tensor Approximation with Laplacian Scale Mixture Modeling for Multiframe Image Denoising," Proceedings of the IEEE International Conference on Computer Vision, pp. 442-449, 2015.
  79. W. Dong, X. Li, Y. Ma, G. Shi, "Image restoration via Bayesian structured sparse coding," IEEE International Conference on Image Processing (ICIP), pp. 4018-4022, 2014.
  80. W. Hu, G. Cheung, X. Li, "Graph-based joint denoising and super-resolution of generalized piecewise smooth images," IEEE International Conference on Image Processing (ICIP), pp. 2056-2060, 2014.
  81. W. Dong, G. Shi, X. Li, Y. Ma, F. Huang, "Compressive sensing via nonlocal low-rank regularization," IEEE Transactions on Image Processing, vol. 23, no. 8, pp. 3618-3632, 2014.
  82. C. Torres, V. Fragoso, S.D. Hammond, J.C. Fried, B.S. Manjunath, "Eye-CU: Sleep pose classification for healthcare using multimodal multiview data,"  IEEE Winter Conference on Applications of Computer Vision (WACV), 1-9, 2016.
  83. M. Turk, V. Fragoso, "Computer Vision for Mobile Augmented Reality," Mobile Cloud Visual Media Computing, 3-42, 2015.
  84. C. Sweeney, V. Fragoso, T. Höllerer, M. Turk, "gdls: A scalable solution to the generalized pose and scale problem," European Conference on Computer Vision, 16-31, 2014.
  85. V. Fragoso, G. Srivastava, A. Nagar, Z. Li, K. Park, M. Turk, "Cascade of Box (CABOX) Filters for Optimal Scale Space Approximation,"  IEEE Conference on Computer Vision and Pattern Recognition (CVPR-Workshop),  2013 
  86. V. Fragoso, P. Sen, S. Rodriguez, M. Turk, "EVSAC: Accelerating Hypotheses Generation by Modeling Matching Scores with Extreme Value Theory,"  IEEE ICCV, 2013
  87. D. Yadav, N. Kohli, P. Pandey, R. Singh, M. Vatsa, A. Noore, "Effect of illicit drug abuse on face recognition," IEEE Winter Conference on Applications of Computer Vision (WACV), 1-7, 2016.
  88. S. Soleymani, A. Noore, "Dynamically reconfigurable evolutionary multi-context robust cellular array design,"  vol. 2, no. 1, pp. 1-12, 2016.
  89. S. Bharadwaj, H. S. Bhatt, R. Singh, M. Vatsa, A. Noore, "QFuse: Online learning framework for adaptive biometric system," Pattern Recognition, vol. 48, no. 11, pp. 3428-3439, 2015.
  90. N. Kohli, D. Yadav, A. Noore, "Multiple Projective Dictionary Learning to Detect Plastic Surgery for Face Verification," IEEE Access, vol. 3, pp. 2572-2580, 2015.
  91. A. Noore, R. Singh, M. Vasta, "Fusion, Sensor Level," Encyclopedia of Biometrics, pp. 772-778, 2015.
  92.  J. Zuo*, N. A. SchmidV. Dorairaj*, and L. Hornak, “Off-Angle Iris Recognition Utilizing Global ICA,” Open Transactions on Information Processing, .vol.1, no. 2, August 2014

  93.  S. Talarico, N. A. Schmid, M. Alkhweldi*, and M. C. Valenti, “Distributed Estimation of a Parametric Field: Algorithms and Performance Analysis,” IEEE Trans. on Signal Processing, vol. 62, no. 5, pp. 1041-1053, 2014.

  94.  M. Fanaei, M. C. Valenti, A. Jamalipour, and N. A. Schmid, “Optimal Power Allocation for Distributed Blue Estimation with Linear Spatial Collaboration,” in Proc. of 2014 International Conf. on Acoustic, Speech and Signal Processing, 2014.

  95. M. Fanaei, M. C. Valenti, and N. A. Schmid, “Effects of Spatial Randomness on Locating a Point Source with Distributed Sensors,” in Proc. of 2014 ICC Workshop, 2014.

  96.  Z. Cao* and N. A. Schmid, “Matching Heterogeneous Periocular Regions: Short and Long Standoff Distances,” in IEEE ICIP 2014, Paris, France, October, 2014.

  97. Xiaodong LiHaoran Xie, Yangqiu Song, Shanfeng ZhuQing LiFu Lee Wang, "Does Summarization Help Stock Prediction? A News Impact Analysis," IEEE Intelligent Systems, vol. 30, no 3, pp. 26-34, 2015.

  98. Shixia LiuXiting Wang, Yangqiu Song, Baining Guo, "Evolutionary Bayesian Rose Trees," IEEE Trans. Knowl. Data Eng.,  vol. 27, no. 6, pp. 1533-1546,  2015.

  99. Yangqiu Song, Shixia LiuXueqing LiuHaixun Wang, "Automatic Taxonomy Construction from Keywords via Scalable Bayesian Rose Trees," IEEE Trans. Knowl. Data Eng., vol. 27, no. 7, pp. 1861-1874, 2015. 

  100. Fangzhao WuYongfeng Huang, Yangqiu Song, Shixia Liu, "Towards building a high-quality microblog-specific Chinese sentiment lexicon," Decision Support Systems 87, pp. 39-49, 2016.

  101. Fangzhao WuYongfeng Huang, Yangqiu Song, "Structured microblog sentiment classification via social context regularization." Neurocomputing,  vol. 175, pp. 599-609, 2016.

  102. Lia R. EmanuelJoel FischerWendy Ju, Saiph Savage, "Innovations in autonomous systems: Challenges and opportunities for human-agent collaboration," CSCW Companion pp.193-196, 2016.

  103. Claudia Flores-Saviaga, Saiph Savage, Dario TaraborelliLeadWise: Using Online Bots to Recruite and Guide Expert Volunteers. CSCW Companion 2016: pp. 257-260, 2016.

  104. Carlos ToxtliClaudia Flores-SaviagaFlor AguilarAlejandra MonroyJuan FloresJeerel Herrejón,Norma Elva ChávezWilliam DaiNeeda AlmaniShloka Desai, Saiph Savage, "BotViz: Data Visualizations for Collaborations With Bots and Volunteers,"  CSCW Companion2016, pp. 421-424, 2016.

  105. Saiph Savage, Andrés Monroy-HernándezTobias HöllererBotivist: Calling Volunteers to Action using Online Bots. CSCW 2015, pp. 811-820, 2015.

  106. Nataly Moreno, Saiph Savage, Anamary LealJessica CornickMatthew TurkTobias Höllerer, "Motivating Crowds to Volunteer Neighborhood Data,"  CSCW Companion, pp. 235-238, 2015.

  107. Yujie Fan, Yanfang Ye, Lifei Chen. “Malicious Sequential Pattern Mining for Automatic Malware Detection”, Expert Systems with Applications, Vol. 52, pp. 16~25, 2016.

  108. Yanfang Ye, Tao Li, Haiyin Shen. “Soter: Smart Bracelets for Children's Safety”, ACM Transactions on Intelligent Systems and Technology, Vol.6, No. 4, Article 46, 2015.

  109. Lifei Chen, Yanfang Ye, Gongde Guo, Jianping Zhu. “Kernel-based linear classification on categorical data”, Soft Computing, pp. 1~13, 2015.

  110. Weiwei Zhuang, Yanfang Ye, Yong Chen, Tao Li. "Ensemble Clustering for Internet Security Applications", IEEE Transactions on Systems, Man and Cybernetics-Part C: Applications and Reviews, Vol 42, pp. 1784~1796, 2012.

  111. Weiwei Zhuang, Yanfang Ye, Tao Li, Qingshan Jiang. "Intelligent phishing website detection using classification ensemble", Systems Engineering - Theory & Practice, Vol. 31, issue (10): 2008-2020, 2011.