Publications
2011. Predicting author blog channels with high value future posts for monitoring. Proceedings of the Twenty-Fifth Conference on Artificial Intelligence (AAAI).
2009. ApproxRank: Estimating Rank for a Subgraph. IEEE 25th International Conference on Data Engineering, 2009. ICDE '09. :54-65.
2000. Video access control via multi-level data hiding. Multimedia and Expo, 2000. ICME 2000. 2000 IEEE International Conference on. 1:381-384vol.1-381-384vol.1.
2004. Distortion compensated lookup-table embedding: Joint security and robustness enhancement for quantization based data hiding. Electronic Imaging Symposium: Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, CA, Proc. of SPIE. 5306:610-621.
1998. An algorithm for wipe detection. Image Processing, 1998. ICIP 98. Proceedings. 1998 International Conference on. 1:893-897vol.1-893-897vol.1.
2003. Automating DAML-S Web Services Composition Using SHOP2. The Semantic Web - ISWC 2003. 2870:195-210.
2004. Collusion resistant multimedia fingerprinting: A unified framework. Electronic Imaging Symposium: Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, CA, Proc. of SPIE. 5306:748-759.
2001. Secure Health Information Sharing System: SHARE. Proceedings of the AMIA SymposiumProc AMIA Symp. :1060-1060.
2012. Making Recommendations in a Microblog to Improve the Impact of a Focal User. 6th ACM Conference on Recommender Systems (RecSys).
2007. Signal Processing Magazine E-Newsletter: Inside Out [From the Editor]. Signal Processing Magazine, IEEE. 24(6):2-8.
2007. In Situ Evaluation of Tracking Algorithms Using Time Reversed Chains. Computer Vision and Pattern Recognition, 2007. CVPR '07. IEEE Conference on. :1-8.
2003. Data hiding in image and video .II. Designs and applications. Image Processing, IEEE Transactions on. 12(6):696-705.
2005. Dynamic network resource allocation using multimedia content features and .... 09/795,952(6947378)
2004. Collusion-resistant fingerprinting for multimedia. Signal Processing Magazine, IEEE. 21(2):15-27.
2006. Analysis and comparison of geometric and algebraic multigrid for convection-diffusion equations. ANALYSIS. 28(6):2208-2228.
2010. Data hiding in compiled program binaries for supplementing computer functionality. 11/445,374(7840789)
2006. New DNS results of shockwave/turbulent boundary layer interaction. 3rd AIAA Flow Control Conference.
1999. Digital watermarking using shuffling. Image Processing, 1999. ICIP 99. Proceedings. 1999 International Conference on. 1:291-295vol.1-291-295vol.1.
1999. Attacks on digital watermarks. Signals, Systems, and Computers, 1999. Conference Record of the Thirty-Third Asilomar Conference on. 2:1508-1512vol.2-1508-1512vol.2.
2003. Multimedia Data Hiding.
2003. Data hiding in image and video .I. Fundamental issues and solutions. Image Processing, IEEE Transactions on. 12(6):685-695.