The evolution of political memes: Detecting and characterizing internet memes with multi-modal deep learning DM Beskow, S Kumar, KM Carley Information Processing & Management 57 (2), 102170, 2020 | 141 | 2020 |
Tree lstms with convolution units to predict stance and rumor veracity in social media conversations S Kumar, KM Carley Proceedings of the 57th annual meeting of the association for computational …, 2019 | 121 | 2019 |
Sensor data as a service--a federated platform for mobile data-centric service development and sharing J Zhang, B Iannucci, M Hennessy, K Gopal, S Xiao, S Kumar, D Pfeffer, ... 2013 IEEE International Conference on Services Computing, 446-453, 2013 | 53 | 2013 |
Diffusion of pro-and anti-false information tweets: the Black Panther movie case M Babcock, RAV Cox, S Kumar Computational and Mathematical Organization Theory 25, 72-84, 2019 | 42 | 2019 |
Approaches to understanding the motivations behind cyber attacks S Kumar, KM Carley 2016 IEEE Conference on Intelligence and Security Informatics (ISI), 307-309, 2016 | 34 | 2016 |
The impact of US cyber policies on cyber-attacks trend S Kumar, M Benigni, KM Carley 2016 IEEE conference on intelligence and security informatics (ISI), 181-186, 2016 | 24 | 2016 |
Understanding DDoS cyber-attacks using social media analytics S Kumar, KM Carley 2016 IEEE Conference on Intelligence and Security Informatics (ISI), 231-236, 2016 | 23 | 2016 |
From alerting to awareness MG Bob Iannucci, João Diogo Falcão, Sumeet Kumar, Hakan Erdogmus 2016 IEEE Symposium on Technologies for Homeland Security (HST), 2016 | 22* | 2016 |
Air filter particulate loading detection using smartphone audio and optimized ensemble classification JE Siegel, R Bhattacharyya, S Kumar, SE Sarma Engineering Applications of Artificial Intelligence 66, 104-112, 2017 | 21 | 2017 |
Sound shredding: Privacy preserved audio sensing S Kumar, LT Nguyen, M Zeng, K Liu, J Zhang Proceedings of the 16th international workshop on mobile computing systems …, 2015 | 20 | 2015 |
Social Media Analytics for Stance Mining A Multi-Modal Approach with Weak Supervision. S Kumar Carnegie Mellon University, USA, 2020 | 19 | 2020 |
Stance in replies and quotes (srq): A new dataset for learning stance in twitter conversations R Villa-Cox, S Kumar, M Babcock, KM Carley arXiv preprint arXiv:2006.00691, 2020 | 17 | 2020 |
An anatomical comparison of fake-news and trusted-news sharing pattern on Twitter S Kumar, B Huang, RAV Cox, KM Carley Computational and Mathematical Organization Theory 27, 109-133, 2021 | 16 | 2021 |
In Vitro Effects of Acellular Milk on the Bactericidal Components of Caprine Polymorphonuclear Neutrophils S Kumar, T More, A Kumar Veterinary research communications 27, 625-631, 2003 | 14 | 2003 |
Floral diversity of Koira & Barsuan ranges of Bonai Forest Division, Odisha S Kumar, S Mishra, AK Mishra, SN Kumar Bonai Forest Division & Ambika Prasad Research Foundation, Odisha, 1-480, 2022 | 11 | 2022 |
Rethinking the future of wireless emergency alerts: A comprehensive study of technical and conceptual improvements S Kumar, H Erdogmus, B Iannucci, M Griss, JD Falcão Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2018 | 10 | 2018 |
OpenAlerts: A software system to evaluate smart emergency alerts and notifications JD Falcão, J Krebs, S Kumar, H Erdogmus Proceedings of the 2018 ACM International Joint Conference and 2018 …, 2018 | 9 | 2018 |
Mainstreaming thermal comfort for all and resource efficiency in affordable housing S Kumar, M Singh, S Chandiwala, S Sneha, G George Alliance Energy Efficient Econ (AEEE) New Delhi, 2018 | 9 | 2018 |
SIMULATING DDOS ATTACKS ON THE US FIBER-OPTICS INTERNET INFRASTRUCTURE KMC Sumeet Kumar Winter Simulation Conference, 2017 | 8* | 2017 |
DDoS cyber-attacks network: Who's attacking whom S Kumar, KM Carley 2016 IEEE Conference on Intelligence and Security Informatics (ISI), 218-218, 2016 | 8 | 2016 |