Wendt, J. (2022). Position Paper: Counter-Adversarial Machine Learning is a Critical Concern [Conference Paper]. https://www.osti.gov/biblio/2001902
Publications
Search results
Jump to search filtersLaishram, R., Wendt, J., Soundarajan, S., & Soundarajan, S. (2021). MCS+: An Efficient Algorithm for Crawling the Community Structure in Multiplex Networks. ACM Transactions on Knowledge Discovery from Data, 16(1). 10.1145/3451527
Laishram, R., Hozhabrierdi, P., Wendt, J., Soundarajan, S., & Soundarajan, S. (2021). NetProtect: Network Perturbations to Protect Nodes against Entry-Point Attack [Conference Paper]. ACM International Conference Proceeding Series. 10.1145/3447535.3462500
Wendt, J., Field, R.V., Phillips, C.A., Prasadan, A., Wilson, T., Soundarajan, S., Bhowmick, S., & Bhowmick, S. (2020). Partitioning Communication Streams into Graph Snapshots [Conference Presentation]. 10.2172/1842249
Wendt, J., Field, R.V., Phillips, C.A., Prasadan, A., & Prasadan, A. (2020). Quantifying Graph Uncertainty from Communication Data. 10.2172/1669730
Field, R.V., Wendt, J., Phillips, C.A., Wilson, T., Soundarajan, S., Bhowmick, S., & Bhowmick, S. (2020). Partitioning Communication Streams into Graph Snapshots [Presentation]. https://www.osti.gov/biblio/1782498
Wendt, J., Kegelmeyer, W.P., Pinar, A., Shead, T.M., Saavedra, G., Safta, C., Bertino, J., & Bertino, J. (2019). Data Analytics are Powerful -- Handle with Care [Conference Poster]. https://www.osti.gov/biblio/1642746
Wilson, T.E., Wendt, J., & Wendt, J. (2019). Modeling Temporal Graph Data:Breaking the Stationary Assumption [Presentation]. https://www.osti.gov/biblio/1807079
Kegelmeyer, W.P., Wendt, J., Safta, C., & Safta, C. (2019). An Overview of Training Data Security Vulnerabilities: Machine Learning is a Leaky Black Box [Presentation]. https://www.osti.gov/biblio/1645394
Kegelmeyer, W.P., Wendt, J., Safta, C., & Safta, C. (2019). An Overview of Training Data Security Vulnerabilities: Machine Learning is a Leaky Black Box [Conference Poster]. https://www.osti.gov/biblio/1601093
Laishram, R., Wendt, J., Soundarajan, S., & Soundarajan, S. (2019). Crawling the Community Structure of Multiplex Networks [Conference Poster]. https://doi.org/10.1609/aaai.v33i01.3301168
Laishram, R., Wendt, J., Soundarajan, S., & Soundarajan, S. (2019). Crawling the community structure of multiplex networks [Conference Poster]. 33rd AAAI Conference on Artificial Intelligence, AAAI 2019, 31st Innovative Applications of Artificial Intelligence Conference, IAAI 2019 and the 9th AAAI Symposium on Educational Advances in Artificial Intelligence, EAAI 2019. 10.1609/aaai.v33i01.3301168
Foulk, J.W., Goldflam, M., Ruiz, I., Howell, S., Wendt, J., Anderson, E.R., Coon, W., Fortune, T., Hawkins, S.D., Finnegan, P.S., Kadlec, C.N., Webster, P., Shaner, E.A., Klem, J.F., Kim, J.K., Peters, D., & Peters, D. (2018). Low-Voltage LWIR Tunable Transmission Filters Leveraging Graphene Plasmons [Conference Poster]. https://www.osti.gov/biblio/1576889
Laishram, R., Wendt, J., Soundarajan, S., & Soundarajan, S. (2018). Crawling the Community Structure of Multiplex Networks [Conference Poster]. 10.1609/aaai.v33i01.3301168
Laishram, R., Wendt, J., Soundarajan, S., & Soundarajan, S. (2018). Crawling the Community Structure of Multiplex Networks [Conference Poster]. https://doi.org/10.1609/aaai.v33i01.3301168
Kegelmeyer, W.P., Wendt, J., Pinar, A., & Pinar, A. (2018). An Example of Counter-Adversarial Community Detection Analysis. 10.2172/1481570
Field, R.V., Link, H.E., Skryzalin, J., Wendt, J., & Wendt, J. (2018). A dynamic model for social networks. 10.2172/1472229
Skryzalin, J., Link, H.E., Field, R.V., Wendt, J., & Wendt, J. (2018). Efficient transfer learning for neural network language models [Conference Poster]. 10.1109/ASONAM.2018.8508304
Skryzalin, J., Link, H.E., Wendt, J., Field, R.V., Richter, S.N., & Richter, S.N. (2018). Efficient transfer learning for neural network language models [Conference Poster]. 10.1109/ASONAM.2018.8508304
Kegelmeyer, W.P., Wendt, J., Pinar, A., Anderson-Bergman, C.I., & Anderson-Bergman, C.I. (2018). Counter-Adversarial Node Labeling [Conference Poster]. https://www.osti.gov/biblio/1498446
Kegelmeyer, W.P., Wendt, J., Pinar, A., Altenburger, K., & Altenburger, K. (2017). Counter Adversarial Graph Analytics [Conference Poster]. https://www.osti.gov/biblio/1480222
Anderson-Bergman, C.I., Kegelmeyer, W.P., Pinar, A., Wendt, J., & Wendt, J. (2017). Generating Network Graphs for CAGA [Conference Poster]. https://www.osti.gov/biblio/1464726
Field, R.V., Cruz, G.J., Quach, T.T., Wendt, J., & Wendt, J. (2017). Modeling Information Spread Through Large Networks [Presentation]. https://www.osti.gov/biblio/1460272
Link, H.E., Wendt, J., Field, R.V., Keil, J.M., & Keil, J.M. (2017). Estimating users? mode transition functions and activity levels from social media [Conference Poster]. 10.1145/3110025.3116195
Altenburger, K.M., Kegelmeyer, W.P., Pinar, A., Wendt, J., & Wendt, J. (2017). A Community and Node Attribute-Corrected Stochastic Blockmodel [Conference Poster]. https://www.osti.gov/biblio/1648676
Link, H.E., Wendt, J., Field, R.V., Keil, J.M., & Keil, J.M. (2017). Estimating users' mode transition functions and activity levels from social media [Conference Poster]. 10.1145/3110025.3116195
Kegelmeyer, W.P., Wendt, J., Pinar, A., Altenburger, K.M., & Altenburger, K.M. (2017). Counter-Adversarial Community Detection [Conference Poster]. https://www.osti.gov/biblio/1457841
Kegelmeyer, W.P., Wendt, J., Pinar, A., Altenburger, K.M., & Altenburger, K.M. (2017). Counter Adversarial Community Detection [Conference Poster]. https://www.osti.gov/biblio/1525078
Johnson, C.M., Bauer, T.L., Wendt, J., & Wendt, J. (2016). Intro to Text Analytics [Presentation]. https://www.osti.gov/biblio/1429482
Johnson, C.M., Wendt, J., & Wendt, J. (2016). Game Theory Basics and Applications [Presentation]. https://www.osti.gov/biblio/1429470
Wendt, J., Quach, T.T., Zage, D.J., Field, R.V., Wells, R., Soundarajan, S., Cruz, G.J., & Cruz, G.J. (2016). Data Inferencing on Semantic Graphs (DISeG) (Final Report). 10.2172/1562648
Wendt, J., Wells, R., Field, R.V., Soundarajan, S., & Soundarajan, S. (2016). On data collection graph construction and sampling in Twitter [Conference Poster]. 10.1109/ASONAM.2016.7752360
Wendt, J., Field, R.V., Wells, R., Soundarajan, S., & Soundarajan, S. (2016). On data collection graph construction and sampling in Twitter [Conference Poster]. 10.1109/ASONAM.2016.7752360
Soundarajan, S., Wendt, J., & Wendt, J. (2016). Workshop on Incomplete Network Data Held at Sandia National Labs – Livermore. 10.2172/1259543
Parekh, O.D., Wendt, J., Shulenburger, L., Landahl, A.J., Moussa, J.E., Aidun, J.B., & Aidun, J.B. (2016). Benchmarking Near-‐term Adiabatic Quantum Computation [Presentation]. https://www.osti.gov/biblio/1368864
Wendt, J., Field, R.V., Garcia, D., Quach, T.T., Wells, R., Zage, D.J., Phillips, C.A., Pinar, A., Soundarajan, S., & Soundarajan, S. (2016). Social-Media Network Collection Problems [Conference Poster]. https://www.osti.gov/biblio/1364805
Kegelmeyer, W.P., Wendt, J., Pinar, A., & Pinar, A. (2016). Counter-Adversarial Community Detection: Initial Investigations [Conference Poster]. https://www.osti.gov/biblio/1345107
Quach, T.T., Wendt, J., & Wendt, J. (2016). A diffusion model for maximizing influence spread in large networks [Conference Poster]. Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics. 10.1007/978-3-319-47880-7_7
Quach, T.T., Wendt, J., & Wendt, J. (2016). A diffusion model for maximizing influence spread in large networks [Conference Poster]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 10.1007/978-3-319-47880-7_7
Parekh, O.D., Wendt, J., Shulenburger, L., Landahl, A.J., Moussa, J.E., Aidun, J.B., & Aidun, J.B. (2015). Benchmarking Adiabatic Quantum Optimization for Complex Network Analysis. 10.2172/1459086
Davis, W.L., Dixon, K.R., Martin, N., Wendt, J., & Wendt, J. (2013). Incremental learning for automated knowledge capture. 10.2172/1121921
Parekh, O.D., Aidun, J.B., Dubicka, I., Landahl, A.J., Shulenburger, L., Tigges, C.P., Wendt, J., & Wendt, J. (2013). Evaluating Near-Term Adiabatic Quantum Computing. 10.2172/1465512
Wendt, J. (2013). Omen: identifying potential spear-phishing targets before the email is sent. 10.2172/1093687
Wendt, J., Whitton, M.C., Adalsteinsson, D., Brooks, F.P., & Brooks, F.P. (2012). Reliable forward walking parameters from head-track data alone [Conference]. Proceedings - IEEE Virtual Reality. https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=84860761404&origin=inward
Wendt, J. (2012). Identifying Dynamic Patterns in Network Traffic to Predict and Mitigate Cyberattacks [Conference]. https://www.osti.gov/biblio/1067616
Wendt, J. (2011). Reliable Forward Walking Parameters from Head-Track Data Alone [Conference]. https://www.osti.gov/biblio/1143443
Wendt, J., Guise, M.J., & Guise, M.J. (2010). Trusted Computing Technologies, Intel Trusted Execution Technology. 10.2172/1011228