Wendt, J.D., Field, R.V., Phillips, C.A., Prasadan, A., Wilson, T., Soundarajan, S., Bhowmick, S., & Bhowmick, S. (2023). Partitioning Communication Streams Into Graph Snapshots [Conference Presenation]. IEEE Transactions on Network Science and Engineering. https://doi.org/10.2172/1842249
Publications
Search results
Jump to search filtersWendt, J.D. (2022). Position Paper: Counter-Adversarial Machine Learning is a Critical Concern [Conference Paper]. https://www.osti.gov/biblio/2001902
Laishram, R., Wendt, J.D., Soundarajan, S., & Soundarajan, S. (2021). MCS+: An Efficient Algorithm for Crawling the Community Structure in Multiplex Networks. ACM Transactions on Knowledge Discovery from Data, 16(1), pp. 1-32. https://doi.org/10.1145/3451527
Laishram, R., Hozhabrierdi, P., Wendt, J.D., Soundarajan, S., & Soundarajan, S. (2021). NetProtect: Network Perturbations to Protect Nodes against Entry-Point Attack [Conference Paper]. ACM International Conference Proceeding Series. https://doi.org/10.1145/3447535.3462500
Wendt, J.D., Field, R.V., Phillips, C.A., Prasadan, A., & Prasadan, A. (2020). Quantifying Graph Uncertainty from Communication Data. https://doi.org/10.2172/1669730
Field, R.V., Wendt, J.D., Phillips, C.A., Wilson, T., Soundarajan, S., Bhowmick, S., & Bhowmick, S. (2020). Partitioning Communication Streams into Graph Snapshots [Presentation]. https://www.osti.gov/biblio/1782498
Wendt, J.D., Kegelmeyer, W.P., Pinar, A., Shead, T.M., Saavedra, G., Safta, C., Bertino, J., & Bertino, J. (2019). Data Analytics are Powerful -- Handle with Care [Conference Poster]. https://www.osti.gov/biblio/1642746
Wilson, T.E., Wendt, J.D., & Wendt, J.D. (2019). Modeling Temporal Graph Data:Breaking the Stationary Assumption [Presentation]. https://www.osti.gov/biblio/1807079
Kegelmeyer, W.P., Wendt, J.D., Safta, C., & Safta, C. (2019). An Overview of Training Data Security Vulnerabilities: Machine Learning is a Leaky Black Box [Presentation]. https://www.osti.gov/biblio/1645394
Kegelmeyer, W.P., Wendt, J.D., Safta, C., & Safta, C. (2019). An Overview of Training Data Security Vulnerabilities: Machine Learning is a Leaky Black Box [Conference Poster]. https://www.osti.gov/biblio/1601093
Laishram, R., Wendt, J.D., Soundarajan, S., & Soundarajan, S. (2019). Crawling the Community Structure of Multiplex Networks [Conference Poster]. https://doi.org/10.1609/aaai.v33i01.3301168
Laishram, R., Wendt, J.D., Soundarajan, S., & Soundarajan, S. (2019). Crawling the community structure of multiplex networks [Conference Poster]. 33rd AAAI Conference on Artificial Intelligence, AAAI 2019, 31st Innovative Applications of Artificial Intelligence Conference, IAAI 2019 and the 9th AAAI Symposium on Educational Advances in Artificial Intelligence, EAAI 2019. https://doi.org/10.1609/aaai.v33i01.3301168
Bachman, W.B., Goldflam, M., Ruiz, I., Howell, S., Wendt, J.D., Anderson, E.R., Coon, W., Fortune, T., Hawkins, S.D., Finnegan, P.S., Kadlec, C.N., Webster, P., Shaner, E.A., Klem, J.F., Kim, J.K., Peters, D., & Peters, D. (2018). Low-Voltage LWIR Tunable Transmission Filters Leveraging Graphene Plasmons [Conference Poster]. https://www.osti.gov/biblio/1576889
Laishram, R., Wendt, J.D., Soundarajan, S., & Soundarajan, S. (2018). Crawling the Community Structure of Multiplex Networks [Conference Poster]. https://doi.org/10.1609/aaai.v33i01.3301168
Laishram, R., Wendt, J.D., Soundarajan, S., & Soundarajan, S. (2018). Crawling the Community Structure of Multiplex Networks [Conference Poster]. https://doi.org/10.1609/aaai.v33i01.3301168
Kegelmeyer, W.P., Wendt, J.D., Pinar, A., & Pinar, A. (2018). An Example of Counter-Adversarial Community Detection Analysis. https://doi.org/10.2172/1481570
Field, R.V., Link, H.E., Skryzalin, J., Wendt, J.D., & Wendt, J.D. (2018). A dynamic model for social networks. https://doi.org/10.2172/1472229
Skryzalin, J., Link, H.E., Field, R.V., Wendt, J.D., & Wendt, J.D. (2018). Efficient transfer learning for neural network language models [Conference Poster]. https://doi.org/10.1109/ASONAM.2018.8508304
Skryzalin, J., Link, H.E., Wendt, J.D., Field, R.V., Richter, S.N., & Richter, S.N. (2018). Efficient transfer learning for neural network language models [Conference Poster]. https://doi.org/10.1109/ASONAM.2018.8508304
Kegelmeyer, W.P., Wendt, J.D., Pinar, A., Anderson-Bergman, C.I., & Anderson-Bergman, C.I. (2018). Counter-Adversarial Node Labeling [Conference Poster]. https://www.osti.gov/biblio/1498446
Kegelmeyer, W.P., Wendt, J.D., Pinar, A., Altenburger, K., & Altenburger, K. (2017). Counter Adversarial Graph Analytics [Conference Poster]. https://www.osti.gov/biblio/1480222
Anderson-Bergman, C.I., Kegelmeyer, W.P., Pinar, A., Wendt, J.D., & Wendt, J.D. (2017). Generating Network Graphs for CAGA [Conference Poster]. https://www.osti.gov/biblio/1464726
Link, H.E., Wendt, J.D., Field, R.V., Keil, J.M., & Keil, J.M. (2017). Estimating users’ mode transition functions and activity levels from social media [Conference Poster]. Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2017. https://doi.org/10.1145/3110025.3116195
Field, R.V., Cruz, G.J., Quach, T.T., Wendt, J.D., & Wendt, J.D. (2017). Modeling Information Spread Through Large Networks [Presentation]. https://www.osti.gov/biblio/1460272
Altenburger, K.M., Kegelmeyer, W.P., Pinar, A., Wendt, J.D., & Wendt, J.D. (2017). A Community and Node Attribute-Corrected Stochastic Blockmodel [Conference Poster]. https://www.osti.gov/biblio/1648676