default search action
Leon Reznik
Person information
- affiliation: Rochester Institute of Technology, Department of Computer Science, NY, USA
- affiliation: University of Texas at El Paso, Department of Computer Science, TX, USA
- affiliation: Victoria University, School of Communications and Informatics, Melbourne, Australia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Sergei Chuprov, Raman Zatsarenko, Leon Reznik, Igor Khokhlov:
Data Quality Based Intelligent Instrument Selection with Security Integration. ACM J. Data Inf. Qual. 16(3): 15:1-15:24 (2024) - [c46]Sergei Chuprov, Raman Zatsarenko, Dmitrii Korobeinikov, Leon Reznik:
Robust Training on the Edge: Federated vs. Transfer Learning for Computer Vision in Intelligent Transportation Systems. AIIoT 2024: 172-178 - [c45]Raman Zatsarenko, Sergei Chuprov, Dmitrii Korobeinikov, Leon Reznik:
Trust-Based Anomaly Detection in Federated Edge Learning. AIIoT 2024: 273-279 - 2023
- [c44]Sergei Chuprov, Leon Reznik, Garegin Grigoryan:
Study on Network Importance for ML End Application Robustness. ICC 2023: 6627-6632 - 2022
- [c43]Sergei Chuprov, Leon Reznik, Igor Khokhlov, Karan Manghi:
Multi-Modal Sensor Selection with Genetic Algorithms. IEEE SENSORS 2022: 1-4 - [c42]Igor Khokhlov, Sergei Chuprov, Leon Reznik:
Integrating Security with Accuracy Evaluation in Sensors Fusion. IEEE SENSORS 2022: 1-4 - [c41]Sergei Chuprov, Igor Khokhlov, Leon Reznik, Srujan Shetty:
Influence of Transfer Learning on Machine Learning Systems Robustness to Data Quality Degradation. IJCNN 2022: 1-8 - [c40]Sergei Chuprov, Leon Reznik, Antoun Obeid, Srujan Shetty:
How Degrading Network Conditions Influence Machine Learning End Systems Performance? INFOCOM Workshops 2022: 1-6 - 2021
- [j11]Igor Khokhlov, Leon Reznik, Sergey Chuprov:
Framework for Integral Data Quality and Security Evaluation in Smartphones. IEEE Syst. J. 15(2): 2058-2065 (2021) - [c39]Sergey Chuprov, Ilya I. Viksnin, Iuliia Kim, Timofey Melnikov, Leon Reznik, Igor Khokhlov:
Improving Knowledge Based Detection of Soft Attacks Against Autonomous Vehicles with Reputation, Trust and Data Quality Service Models. SMDS 2021: 115-120 - 2020
- [j10]Hussein Alrubaye, Mohamed Wiem Mkaouer, Igor Khokhlov, Leon Reznik, Ali Ouni, Jason Mcgoff:
Learning to recommend third-party library migration opportunities at the API level. Appl. Soft Comput. 90: 106140 (2020) - [c38]Igor Khokhlov, Ninad Ligade, Leon Reznik:
Recurrent Neural Networks for Colluded Applications Attack Detection in Android OS Devices. IJCNN 2020: 1-8 - [c37]Sergey Chuprov, Egor Marinenkov, Ilya I. Viksnin, Leon Reznik, Igor Khokhlov:
Image Processing in Autonomous Vehicle Model Positioning and Movement Control. WF-IoT 2020: 1-6 - [c36]Igor Khokhlov, Leon Reznik:
Knowledge Graph in Data Quality Evaluation for IoT applications. WF-IoT 2020: 1-6
2010 – 2019
- 2019
- [c35]Igor Khokhlov, Leon Reznik, Rohit Bhaskar:
The Machine Learning Models for Activity Recognition Applications with Wearable Sensors. ICMLA 2019: 387-391 - [c34]Igor Khokhlov, Michael Perez, Leon Reznik:
Machine Learning in Anomaly Detection: Example of Colluded Applications Attack in Android Devices. ICMLA 2019: 1328-1333 - [c33]Igor Khokhlov, Akshay Pudage, Leon Reznik:
Sensor Selection Optimization with Genetic Algorithms. IEEE SENSORS 2019: 1-4 - [i1]Hussein Alrubaye, Mohamed Wiem Mkaouer, Igor Khokhlov, Leon Reznik, Ali Ouni, Jason Mcgoff:
Learning to Recommend Third-Party Library Migration Opportunities at the API Level. CoRR abs/1906.02882 (2019) - 2018
- [c32]Igor Khokhlov, Leon Reznik:
Android system security evaluation. CCNC 2018: 1-2 - [c31]Igor Khokhlov, Leon Reznik, Suresh Babu Jothilingam, Rohit Bhaskar:
What can data analysis recommend on design of wearable sensors? CCNC 2018: 1-2 - [c30]Igor Khokhlov, Chinmay Jain, Ben Miller-Jacobson, Andrew Heyman, Leonid K. Reznik, Robert St. Jacques:
MeetCI: A Computational Intelligence Software Design Automation Framework. FUZZ-IEEE 2018: 1-8 - [c29]Akhil Killawala, Igor Khokhlov, Leon Reznik:
Computational Intelligence Framework for Automatic Quiz Question Generation. FUZZ-IEEE 2018: 1-8 - [c28]Igor Khokhlov, Leon Reznik, Justin Cappos, Rohit Bhaskar:
Design of activity recognition systems with wearable sensors. SAS 2018: 1-6 - 2017
- [c27]Igor Khokhlov, Leon Reznik:
Colluded Applications Vulnerabilities in Android Devices. DASC/PiCom/DataCom/CyberSciTech 2017: 462-469 - [c26]Igor Khokhlov, Leon Reznik:
Data security evaluation for mobile android devices. FRUCT 2017: 154-160 - [c25]Igor Khokhlov, Leon Reznik, Ashish Kumar, Ankan Mookherjee, Rohan Dalvi:
Data security and quality evaluation framework: Implementation empirical study on android devices. FRUCT 2017: 161-168 - [c24]Michael Potter, Leon Reznik, Stanislaw P. Radziszowski:
Neural networks and the search for a quadratic residue detector. IJCNN 2017: 1887-1894 - 2015
- [j9]Andrew Heyman, Leon Reznik, Michael Negnevitsky, Andrew Hoffman:
Fuzzy System Design for Security and Environment Control Applications. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 23(Supplement-1): 43-56 (2015) - [j8]Konstantin K. Semenov, Leonid K. Reznik, Gennady N. Solopchenko:
Fuzzy Intervals Application for Software Metrological Certification in Measurement and Information Systems. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 23(Supplement-1): 95-104 (2015) - [c23]Richard S. Weiss, Leon Reznik, Yanyan Zhuang, Andrew Hoffman, Darrell Pollard, Albert Rafetseder, Tao Li, Justin Cappos:
Trust Evaluation in Mobile Devices: An Empirical Study. TrustCom/BigDataSE/ISPA (1) 2015: 25-32 - 2013
- [c22]Leon Reznik, Elisa Bertino:
Data quality evaluation: integrating security and accuracy. CCS 2013: 1367-1370 - [c21]Jeton Bacaj, Leon Reznik:
Signal anomaly based attack detection in wireless sensor networks. CCS 2013: 1391-1394 - 2012
- [c20]Dmitri Yudanov, Leon Reznik:
Scalable multi-precision simulation of spiking neural networks on GPU with OpenCL. IJCNN 2012: 1-8 - 2011
- [j7]Roman V. Yampolskiy, Leon Reznik, Mike Adams, Joshua Harlow, Dima Novikov:
Resource awareness in computational intelligence. Int. J. Adv. Intell. Paradigms 3(3/4): 305-322 (2011) - [j6]Greg P. Timms, Paulo A. de Souza, Leon Reznik, Daniel V. Smith:
Automated Data Quality Assessment of Marine Sensors. Sensors 11(10): 9589-9602 (2011) - 2010
- [j5]Leon Reznik, Michael J. Adams, Bryan Woodard:
Intelligent Intrusion Detection Based on Genetically Tuned Artificial Neural Networks. J. Adv. Comput. Intell. Intell. Informatics 14(6): 708-713 (2010) - [c19]Dmitri Yudanov, Muhammad Shaaban, Roy Melton, Leon Reznik:
GPU-based simulation of spiking neural networks with real-time performance & high accuracy. IJCNN 2010: 1-8
2000 – 2009
- 2008
- [j4]Dima Novikov, Roman V. Yampolskiy, Leon Reznik:
Traffic Analysis Based Identification of Attacks. Int. J. Comput. Sci. Appl. 5(2): 69-88 (2008) - [j3]Leon Reznik, Vladik Kreinovich:
Fuzzy Prediction Models in Measurement. IEEE Trans. Fuzzy Syst. 16(4): 851-862 (2008) - [c18]Leon Reznik, Gregory Von Pless:
Neural networks for cognitive sensor networks. IJCNN 2008: 1235-1241 - 2007
- [c17]Leon Reznik, Robert St. Jacques:
Fuzzy Expert System Shell Development with Computer Security Assessment Application. FUZZ-IEEE 2007: 1-6 - 2006
- [c16]James L. King, Leon Reznik:
Topology Selection for Signal Change Detection in Sensor Networks: RBF vs MLP. IJCNN 2006: 2529-2535 - [c15]Dima Novikov, Roman V. Yampolskiy, Leon Reznik:
Anomaly Detection Based Intrusion Detection. ITNG 2006: 420-425 - 2005
- [c14]Leon Reznik, Gregory Von Pless, Tayeb Al Karim:
Intelligent Protocols Based on Sensor Signal Change Detection. Systems Communications 2005: 443-448 - [c13]Leon Reznik, Gregory Von Pless, Tayeb Al Karim:
Embedding intelligent sensor signal change detection into sensor network protocols. SECON 2005: 207-217 - 2004
- [c12]Leon Reznik, Vladik Kreinovich:
Fuzzy and probabilistic models of association information in sensor networks. FUZZ-IEEE 2004: 185-189 - [c11]Gregory Von Pless, Tayeb Al Karim, Leon Reznik:
Time-based multi-layer perceptron for novelty detection in sensor networks. ICMLA 2004: 156-163 - 2003
- [c10]Leon Reznik, Vladik Kreinovich, Scott A. Starks:
Use of fuzzy expert's information in measurement and what we can gain from its application in geophysics. FUZZ-IEEE 2003: 1026-1031 - 2002
- [c9]Leonid K. Reznik:
Fuzzy system implementation through its approximation with simplified radial basis networks. FUZZ-IEEE 2002: 1186-1191 - [c8]Leon Reznik, Michael Negnevitsky:
A neuro-fuzzy method of power disturbances recognition and reduction. FUZZ-IEEE 2002: 1517-1522 - 2001
- [c7]Leon Reznik, Binh Pham:
Fuzzy Models in Evaluation of Information Uncertainty in Engineering and Technology Applications. FUZZ-IEEE 2001: 972-975 - [c6]Shane Spiteri, Leon Reznik, Paul Vilas-Boas:
Embedded Fuzzy Control for Reefer Refrigeration Systems. FUZZ-IEEE 2001: 1088-1091 - 2000
- [j2]Anthony Little, Leonid K. Reznik:
Improving the Approximation Smoothness of Radial Basis Neural Networks. J. Adv. Comput. Intell. Intell. Informatics 4(6): 417-420 (2000) - [c5]Anthony Little, Leonid K. Reznik:
Implementation of fuzzy controllers with radial basis neural networks. FUZZ-IEEE 2000: 581-586
1990 – 1999
- 1998
- [j1]Antony T. Popov, Hung T. Nguyen, Leonid K. Reznik:
An Application of Fuzzy Mathematical Morphology to Interval-Valued Knowledge Representation: A Remark. Reliab. Comput. 4(3): 283-290 (1998) - [c4]Leon Reznik:
Intelligent sensor: an attempt to define. KES (3) 1998: 603-608 - [c3]Leon Reznik:
Fuzzy controller design: recommendations to the user. KES (3) 1998: 609-616 - 1996
- [c2]Anthony Little, Leonid K. Reznik:
Speech detection method analysis and intelligent structure development. ANZIIS 1996: 203-206 - [c1]O. Ghanayem, Leonid K. Reznik:
A novel excitation control scheme: design and implementation. ANZIIS 1996: 212-215
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint