Stealthy domain generation algorithms Y Fu, L Yu, O Hambolu, I Ozcelik, B Husain, J Sun, K Sapra, D Du, ... IEEE Transactions on Information Forensics and Security 12 (6), 1430-1443, 2017 | 81 | 2017 |
Circumventing keyloggers and screendumps K Sapra, B Husain, R Brooks, M Smith 2013 8th International Conference on Malicious and Unwanted Software:" The …, 2013 | 15 | 2013 |
Analysis of botnet counter-counter-measures Y Fu, B Husain, RR Brooks Proceedings of the 10th annual cyber and information security research …, 2015 | 14 | 2015 |
Cellular state transformations using deep learning for precision medicine applications C Targonski, MR Bender, BT Shealy, B Husain, B Paseman, MC Smith, ... Patterns 1 (6), 2020 | 11 | 2020 |
Exploration into biomarker potential of region-specific brain gene co-expression networks Y Hang, M Aburidi, B Husain, AR Hickman, WL Poehlman, FA Feltus Scientific Reports 10 (1), 17089, 2020 | 5 | 2020 |
Relating memory performance data to application domain data using an integration API B Husain, A Giménez, JA Levine, T Gamblin, PT Bremer Proceedings of the 2nd Workshop on Visual Performance Analysis, 1-8, 2015 | 5 | 2015 |
Netextractor: extracting a cerebellar tissue gene regulatory network using differentially expressed high mutual information binary RNA profiles B Husain, AR Hickman, Y Hang, BT Shealy, K Sapra, FA Feltus G3: Genes, Genomes, Genetics 10 (9), 2953-2963, 2020 | 4 | 2020 |
Discovery of eQTL alleles associated with autism spectrum disorder: a case–control study AR Hickman, B Selee, R Pauly, B Husain, Y Hang, FA Feltus Journal of Autism and Developmental Disorders 53 (9), 3595-3612, 2023 | 3 | 2023 |
Mitos: A Simple Interface for Complex Hardware Sampling and Attribution A Giménez, B Husain, D Böhme, T Gamblin, M Schulz SC, 2015 | 3 | 2015 |
Face Detection and lip localization BN Husain California Polytechnic State University, 2011 | 3 | 2011 |
EdgeScaping: Mapping the spatial distribution of pairwise gene expression intensities B Husain, FA Feltus Plos one 14 (8), e0220279, 2019 | 2 | 2019 |
Security and performance evaluation of security protocols R Brooks, B Husain, SB Yun, J Deng Proceedings of the Eighth Annual Cyber Security and Information Intelligence …, 2013 | 2 | 2013 |
Mode pattern analysis of gallium nitride-based laser diodes X Jin, S Jobe, S Trieu, B Husain, J Flickinger, B Zhang, T Dai, XN Kang, ... International Symposium on Photoelectronic Detection and Imaging 2009: Laser …, 2009 | 2 | 2009 |
EdgeCrafting: mining embedded, latent, nonlinear patterns to construct gene relationship networks B Husain, M Reed Bender, F Alex Feltus G3 12 (4), jkac042, 2022 | | 2022 |