
Youngja Park
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c36]Wenjie Wang, Youngja Park, Taesung Lee, Ian Molloy, Pengfei Tang, Li Xiong:
Utilizing Multimodal Feature Consistency to Detect Adversarial Examples on Clinical Summaries. ClinicalNLP@EMNLP 2020: 259-268 - [i4]Kathrin Grosse, Taesung Lee, Youngja Park, Michael Backes, Ian Molloy:
A new measure for overfitting and its implications for backdooring of deep learning. CoRR abs/2006.06721 (2020)
2010 – 2019
- 2019
- [j13]Youngja Park, Taewoon Kong, James R. Roede, Dean P. Jones, Kichun Lee
:
A biplot correlation range for group-wise metabolite selection in mass spectrometry. BioData Min. 12(1): 4:1-4:24 (2019) - [c35]Arpita Roy, Youngja Park, Taesung Lee, Shimei Pan:
Supervising Unsupervised Open Information Extraction Models. EMNLP/IJCNLP (1) 2019: 728-737 - [c34]Arpita Roy, Youngja Park, Shimei Pan:
Incorporating Domain Knowledge in Learning Word Embedding. ICTAI 2019: 1568-1573 - [c33]Arpita Roy, Youngja Park, Shimei Pan:
Predicting Malware Attributes from Cybersecurity Texts. NAACL-HLT (1) 2019: 2857-2861 - [c32]Taesung Lee, Youngja Park:
Unsupervised Sentence Embedding Using Document Structure-Based Context. ECML/PKDD (2) 2019: 633-647 - 2018
- [c31]Ankur Padia, Arpita Roy, Taneeya Satyapanich, Francis Ferraro, Shimei Pan, Youngja Park, Anupam Joshi, Tim Finin:
UMBC at SemEval-2018 Task 8: Understanding Text about Malware. SemEval@NAACL-HLT 2018: 878-884 - 2017
- [i3]Arpita Roy, Youngja Park, Shimei Pan:
Learning Domain-Specific Word Embeddings from Sparse Cybersecurity Texts. CoRR abs/1709.07470 (2017) - 2016
- [j12]Youngja Park, Sangwook Kim:
Chung-Feller Property of Schröder Objects. Electron. J. Comb. 23(2): P2.34 (2016) - [j11]Youngja Park, SeungKyung Park
:
Enumeration of generalized lattice paths by string types, peaks, and ascents. Discret. Math. 339(11): 2652-2659 (2016) - [j10]Youngja Park, Wilfried Teiken, Josyula R. Rao, Suresh Chari:
Data classification and sensitivity estimation for critical asset discovery. IBM J. Res. Dev. 60(4): 2 (2016) - [j9]Suresh Chari, Ted Habeck, Ian Molloy, Youngja Park, Josyula R. Rao, Wilfried Teiken:
A platform and analytics for usage and entitlement analytics. IBM J. Res. Dev. 60(4): 7 (2016) - [c30]Shandian Zhe, Yuan Qi, Youngja Park, Zenglin Xu, Ian Molloy, Suresh Chari:
DinTucker: Scaling Up Gaussian Process Models on Large Multidimensional Arrays. AAAI 2016: 2386-2392 - [c29]Weining Yang, Ninghui Li, Ian M. Molloy, Youngja Park, Suresh N. Chari:
Comparing Password Ranking Algorithms on Real-World Password Datasets. ESORICS (1) 2016: 69-90 - [c28]Ian Molloy, Suresh Chari, Ulrich Finkler, Mark Wiggerman, Coen Jonker, Ted Habeck, Youngja Park, Frank Jordens, Ron van Schaik:
Graph Analytics for Real-Time Scoring of Cross-Channel Transactional Fraud. Financial Cryptography 2016: 22-40 - [c27]Haining Chen, Omar Chowdhury, Ninghui Li, Warut Khern-am-nuai, Suresh Chari, Ian Molloy, Youngja Park:
Tri-Modularization of Firewall Policies. SACMAT 2016: 37-48 - [i2]Shandian Zhe, Pengyuan Wang, Kuang-chih Lee, Zenglin Xu, Jian Yang, Youngja Park, Yuan Qi:
Distributed Flexible Nonlinear Tensor Factorization. CoRR abs/1604.07928 (2016) - 2015
- [c26]Shandian Zhe, Zenglin Xu, Xinqi Chu, Yuan (Alan) Qi, Youngja Park:
Scalable Nonparametric Multiway Data Analysis. AISTATS 2015 - [c25]Youngja Park, Ian M. Molloy, Suresh N. Chari, Zenglin Xu, Christopher S. Gates, Ninghui Li:
Learning from Others: User Anomaly Detection Using Anomalous Samples from Other Users. ESORICS (2) 2015: 396-414 - 2014
- [j8]Youngja Park, Zijie Qi, Suresh N. Chari, Ian Molloy:
PAKDD'12 best paper: generating balanced classifier-independent training samples from unlabeled data. Knowl. Inf. Syst. 41(3): 871-892 (2014) - [c24]Christopher S. Gates, Ninghui Li, Zenglin Xu, Suresh N. Chari, Ian Molloy, Youngja Park:
Detecting Insider Information Theft Using Features from File Access Logs. ESORICS (2) 2014: 383-400 - [c23]Dongyeop Kang, Youngja Park, Suresh Chari:
Hetero-Labeled LDA: A Partially Supervised Topic Model with Heterogeneous Labels. ECML/PKDD (1) 2014: 640-655 - 2013
- [j7]Shuzhao Li, Youngja Park
, Sai Duraisingham, Frederick H. Strobel, Nooruddin Khan, Quinlyn A. Soltow, Dean P. Jones, Bali Pulendran:
Predicting Network Activity from High Throughput Metabolomics. PLoS Comput. Biol. 9(7) (2013) - [c22]Youngja Park, Christopher S. Gates, Stephen C. Gates:
Estimating Asset Sensitivity by Profiling Users. ESORICS 2013: 94-110 - [c21]Suresh Chari, Ian Molloy, Youngja Park, Wilfried Teiken:
Ensuring continuous compliance through reconciling policy with usage. SACMAT 2013: 49-60 - [c20]Suresh Chari, Ted Habeck, Ian Molloy, Youngja Park, Wilfried Teiken:
A bigData platform for analytics on access control policies and logs. SACMAT 2013: 185-188 - [i1]Shandian Zhe, Yuan Qi, Youngja Park, Ian Molloy, Suresh Chari:
DinTucker: Scaling up Gaussian process models on multidimensional arrays with billions of elements. CoRR abs/1311.2663 (2013) - 2012
- [c19]Min Li, Youngja Park, Rui Ma, He Yuan Huang:
Business email classification using incremental subspace learning. ICPR 2012: 625-628 - [c18]Youngja Park, Zijie Qi, Suresh Chari, Ian Molloy:
Generating Balanced Classifier-Independent Training Samples from Unlabeled Data. PAKDD (1) 2012: 266-281 - [c17]Ian Molloy, Youngja Park, Suresh Chari:
Generative models for access control policies: applications to role mining over logs with attribution. SACMAT 2012: 45-56 - 2011
- [j6]Anna J. Blackstock, Amita K. Manatunga, Youngja Park
, Dean P. Jones, Tianwei Yu:
Clustering based on periodicity in high-throughput time course data. Stat. Anal. Data Min. 4(6): 579-589 (2011) - [c16]Youngja Park, Stephen C. Gates, Wilfried Teiken, Pau-Chen Cheng:
An experimental study on the measurement of data sensitivity. BADGERS@EuroSys 2011: 70-77 - [c15]Youngja Park:
Automatic Call Quality Monitoring Using Cost-Sensitive Classification. INTERSPEECH 2011: 3085-3088 - [c14]Youngja Park, Stephen C. Gates, Wilfried Teiken, Suresh Chari:
System for automatic estimation of data sensitivity with applications to access control and other applications. SACMAT 2011: 145-146
2000 – 2009
- 2009
- [j5]Tianwei Yu, Youngja Park, Jennifer M. Johnson, Dean P. Jones:
apLCMS - adaptive processing of high-resolution LC/MS data. Bioinform. 25(15): 1930-1936 (2009) - [c13]Youngja Park, Stephen C. Gates:
Towards real-time measurement of customer satisfaction using automatically generated call transcripts. CIKM 2009: 1387-1396 - [c12]Youngja Park, Wilfried Teiken, Stephen C. Gates:
Low-cost call type classification for contact center calls using partial transcripts. INTERSPEECH 2009: 2739-2742 - 2008
- [j4]Hyun-Woo Cho, Seoung Bum Kim, Myong Kee Jeong, Youngja Park
, Thomas R. Ziegler, Dean P. Jones:
Genetic algorithm-based feature selection in high-resolution NMR spectra. Expert Syst. Appl. 35(3): 967-975 (2008) - [j3]Hyun-Woo Cho, Seoung Bum Kim, Myong Kee Jeong, Youngja Park
, Nana Gletsu Miller, Thomas R. Ziegler, Dean P. Jones:
Discovery of metabolite features for the modelling and analysis of high-resolution NMR spectra. Int. J. Data Min. Bioinform. 2(2): 176-192 (2008) - [j2]Seoung Bum Kim, Victoria C. P. Chen, Youngja Park
, Thomas R. Ziegler, Dean P. Jones:
Controlling the False Discovery Rate for Feature Selection in High-resolution NMR Spectra. Stat. Anal. Data Min. 1(2): 57-66 (2008) - [c11]Roy J. Byrd, Mary S. Neff, Wilfried Teiken, Youngja Park, Keh-Shin F. Cheng, Stephen C. Gates, Karthik Visweswariah:
Semi-automated logging of contact center telephone calls. CIKM 2008: 133-142 - [c10]Ying Li, Youngja Park:
Automatically constructing blue pages for characters in instructional videos. ICME 2008: 1409-1412 - [c9]Youngja Park, Siddharth Patwardhan, Karthik Visweswariah, Stephen C. Gates:
An empirical analysis of word error rate and keyword error rate. INTERSPEECH 2008: 2070-2073 - 2007
- [c8]Youngja Park:
Automatic call section segmentation for contact-center calls. CIKM 2007: 117-126 - [c7]Youngja Park, Ying Li:
Semantic Analysis for Topical Segmentation of Videos. ICSC 2007: 161-168 - 2006
- [c6]Ying Li, Youngja Park, Chitra Dorai:
Atomic topical segments detection for instructional videos. ACM Multimedia 2006: 53-56 - [c5]Chitra Dorai, Robert G. Farrell, Amy Katriel, Galina Kofman, Ying Li, Youngja Park:
MAGICAL demonstration: system for automated metadata generation for instructional content. ACM Multimedia 2006: 491-492 - [c4]Youngja Park, Ying Li:
Extracting Salient Keywords from Instructional Videos Using Joint Text, Audio and Visual Cues. HLT-NAACL 2006 - 2004
- [j1]Lev Kozakov, Youngja Park, Tong-Haing Fin, Youssef Drissi, Yurdaer N. Doganata, Thomas Cofino:
Glossary extraction and utilization in the information search and delivery system for IBM Technical Support. IBM Syst. J. 43(3): 546-563 (2004) - [c3]Youngja Park:
GlossOnt: A Concept-focused Ontology Building Tool. KR 2004: 498-506 - 2002
- [c2]Youngja Park, Roy J. Byrd, Branimir Boguraev:
Automatic Glossary Extraction: Beyond Terminology Identification. COLING 2002 - 2001
- [c1]Youngja Park, Roy J. Byrd:
Hybrid Text Mining for Finding Abbreviations and their Definitions. EMNLP 2001
Coauthor Index
aka: Suresh N. Chari
aka: Ian M. Molloy

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2020-12-22 21:36 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint