Wiredja, D., Koyutürk, M., & Chance, M.(2017).The KSEA App: a web-based tool for kinase activity inference from quantitative phosphoproteomics.Bioinformatics.
Deznabi, I., Mobayen, M., Jafari, N., Tastan, O., & Ayday, E.(2017).An inference attack on genomic data using kinship, complex correlations, and phenotype information.IEEE/ACM transactions on computational biology and bioinformatics,15(4),1333--1343.
Zhao, H., Hong, M., Lin, W., & Loparo, K. A.(2017).Voltage and Frequency Regulation of Microgrid With Battery Energy Storage Systems.Smart Grid, IEEE Transactions on.
Nikoofard, A., Madanayake, A., Handagala, S., Belostotski, L., & Mandal, S.(2017).Low-complexity N-port ADCs using 2-D∆-$\Sigma$ Noise-Shaping in N-Element Array Receivers.submitted to ISCAS.
Huang, Y., Kandhari, A., Chiel, H., Quinn, R. D., & Daltorio, K. A.(2017).Mathematical Modeling to Improve Control of Mesh Body for Peristaltic Locomotion..
Ghose, S., Shiradkar, R., Rusu, M., Mitra, J., Thawani, R., Feldman, M., Gupta, A., Purysko, A., Ponsky, L., & Madabhushi, A.(2017).Field effect induced organ distension (FOrge) features predicting biochemical recurrence from pre-treatment prostate MRI.,10434 LNCS, 442-449.
Halimi, A., & Ayday, E.(2017).Profile matching across unstructured online social networks: threats and countermeasures.arXiv preprint arXiv:1711.01815.
Hou, S., Chen, L., Ye, F., & Chen, L.(2017).Deep Analysis and Utilization of Malware's Social Relation Network for Its Detection.SPRINGER INTERNATIONAL PUBLISHING AG,10612, 31-42.
Huang, Y., Kandhari, A., Chiel, H., Quinn, R. D., & Daltorio, K. A.(2017).Slip Reduction Controls of Mesh-Body Worm Robot Developed from a Mathematical Model..
Shalev, R., Nakamura, D., Nishino, S., Rollins, A. M., Bezerra, H. M., Wilson, D. L., & Ray, S. L.(2017).Automated Volumetric Intravascular Plaque Classification Using Optical Coherence Tomography.AI Magazine,38(1).
Hou, S., Ye, F., Song, Y., & Abdulhayoglu, M.(2017).HinDroid: An Intelligent Android Malware Detection System Based on Structured Heterogeneous Information Network.ASSOC COMPUTING MACHINERY.
Yang, R., Lee, J., Ghosh, S., Tang, H., Sankaran, R., & Zorman, C.(2017).Tuning Optical Signatures of Single- and Few-Layer MoS 2 by Blown-Bubble Bulge Straining up to Fracture.Nano Letters,17(8),4568-4575.
Liao, W., Salinas, S., Li, Z., Liu, P., & Loparo, K. A.(2017).Cascading Failure Attacks in the Power System: A Stochastic Game Perspective.IEEE Internet of Things Journal.
Fan, Y., Zhang, Y., Ye, F., Liu, X., & Zheng, W.(2017).Social Media for Opioid Addiction Epidemiology: Automatic Detection of Opioid Addicts from Twitter and Case Studies.ASSOC COMPUTING MACHINERY.
Zhao, S., & Loparo, K. A.(2017).Forward and Backward Extended Prony (FBEP) Method for Power System Small-Signal Stability Analysis.IEEE Transactions on Power Systems.
Strezoski, L., Strezoski, V., Prica, M., & Loparo, K. A.(2017).The need for advanced modeling and calculation of basic EMS and DMS applications for electronically coupled energy resources..
Shankar, E., Kanwal, R., Goel, A., Yang, X., Shukla, S., MacLennan, G., Fu, P., Madabhushi, A., Ramakrishnan, P., & Gupta, S.(2017).Abstract 1080: Targeting the PI3K-Akt and NF-?B pathways as a combination therapy in blocking prostate cancer progression.Cancer Research,77(13 Supplement),1080-1080.
Jackson, R., Yuan, R., Chow, D., Newman, W. S., & Cavusoglu, M. C.(2017).Real-Time Visual Tracking of Dynamic Surgical Suture Threads.IEEE Transactions on Automation Science and Engineering.
Tuna, G., Kogias, D., Gungor, V., Gezer, C., Ta\csk\in, Erhan, C., & Ayday, E.(2017).A survey on information security threats and solutions for Machine to Machine (M2M) communications.Journal of Parallel and Distributed Computing,109, 142--154.