var bibbase_data = {"data":"\"Loading..\"\n\n
\n\n \n\n \n\n \n \n\n \n\n \n \n\n \n\n \n
\n generated by\n \n \"bibbase.org\"\n\n \n
\n \n\n
\n\n \n\n\n
\n\n Excellent! Next you can\n create a new website with this list, or\n embed it in an existing web page by copying & pasting\n any of the following snippets.\n\n
\n JavaScript\n (easiest)\n
\n \n <script src=\"https://bibbase.org/show?bib=http%3A%2F%2Fpeople.cs.georgetown.edu%2F~singh%2Fmypubs.bib&jsonp=1&jsonp=1\"></script>\n \n
\n\n PHP\n
\n \n <?php\n $contents = file_get_contents(\"https://bibbase.org/show?bib=http%3A%2F%2Fpeople.cs.georgetown.edu%2F~singh%2Fmypubs.bib&jsonp=1\");\n print_r($contents);\n ?>\n \n
\n\n iFrame\n (not recommended)\n
\n \n <iframe src=\"https://bibbase.org/show?bib=http%3A%2F%2Fpeople.cs.georgetown.edu%2F~singh%2Fmypubs.bib&jsonp=1\"></iframe>\n \n
\n\n

\n For more details see the documention.\n

\n
\n
\n\n
\n\n This is a preview! To use this list on your own web site\n or create a new web site from it,\n create a free account. The file will be added\n and you will be able to edit it in the File Manager.\n We will show you instructions once you've created your account.\n
\n\n
\n\n

To the site owner:

\n\n

Action required! Mendeley is changing its\n API. In order to keep using Mendeley with BibBase past April\n 14th, you need to:\n

    \n
  1. renew the authorization for BibBase on Mendeley, and
  2. \n
  3. update the BibBase URL\n in your page the same way you did when you initially set up\n this page.\n
  4. \n
\n

\n\n

\n \n \n Fix it now\n

\n
\n\n
\n\n\n
\n \n \n
\n
\n  \n 2019\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n #Diversity: Conversations on Twitter about Women and Black Men in Medicine.\n \n \n \n \n\n\n \n Mishori, R.; Singh, L.; Lin, K. W.; and Wei, Y.\n\n\n \n\n\n\n Journal of the American Board of Family Medicine, 31. January 2019.\n \n\n\n\n
\n\n\n\n \n \n \"#Diversity:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 15 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{LS:journal/jabfm/Mishori19,\n  author    = {Ranit Mishori and Lisa Singh and Kenneth W. Lin and Yifang Wei},\n  title     = {#Diversity: Conversations on Twitter about Women and Black Men in Medicine},\n  journal   = {Journal of the American Board of Family Medicine},\n  month     = {January},\n  year      = {2019},\n  volume    = {31},\n  issue     = {1},\n  url       = {https://www.jabfm.org/content/32/1/28},\n  doi       = {10.3122/jabfm.2019.01.180175}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2018\n \n \n (4)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n A Temporal Topic Model for Noisy Mediums.\n \n \n \n \n\n\n \n Churchill, R.; Singh, L.; and Kirov, C.\n\n\n \n\n\n\n In Advances in Knowledge Discovery and Data Mining – Pacific-Asia Conference, PAKDD, pages 42–53, Melbourne, VIC, Australia, June 2018. \n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 8 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/pakdd/ChurchillSK18,\n  author    = {Rob Churchill and\n               Lisa Singh and\n               Christo Kirov},\n  title     = {A Temporal Topic Model for Noisy Mediums},\n  booktitle = {Advances in Knowledge Discovery and Data Mining -- Pacific-Asia\n               Conference, {PAKDD}},\n  address   = {Melbourne, VIC, Australia},\n  pages     = {42--53},\n  month     = {June},\n  year      = {2018},\n  crossref  = {DBLP:conf/pakdd/2018-2},\n  url       = {https://doi.org/10.1007/978-3-319-93037-4\\_4},\n  doi       = {10.1007/978-3-319-93037-4\\_4},\n  timestamp = {Wed, 20 Jun 2018 12:24:57 +0200},\n  biburl    = {https://dblp.org/rec/bib/conf/pakdd/ChurchillSK18},\n  bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Data analytics and displacement: Using big data to forecast mass movement of people.\n \n \n \n\n\n \n Martin, S.; and Singh, L.\n\n\n \n\n\n\n In Maitland, C., editor(s), Digital Lifeline?: ICTs for Refugees and Displaced Persons. MIT Press, 2018.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@incollection{LS:collection/mit/Martin18,\n  author    = {Susan Martin and Lisa Singh},\n  year      = {2018},\n  title     = {Data analytics and displacement: Using big data to forecast mass movement of people},\n  editor    = {C. Maitland},\n  booktitle = {Digital Lifeline?: ICTs for Refugees and Displaced Persons},\n  publisher = {MIT Press}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Detecting Users Who Share Extremist Content on Twitter.\n \n \n \n \n\n\n \n Wei, Y.; and Singh, L.\n\n\n \n\n\n\n In Karampelas, P.; and Bourlai, T., editor(s), Surveillance in Action, pages 351–368. Springer, 2018.\n \n\n\n\n
\n\n\n\n \n \n \"DetectingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 9 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@incollection{LS:collection/sa/Wei18,\n  author    = {Yifang Wei and Lisa Singh},\n  title     = {Detecting Users Who Share Extremist Content on Twitter},\n  booktitle = {Surveillance in Action},\n  year      = {2018},\n  editor    = {Panagiotis Karampelas and Thirimachos Bourlai},\n  publisher = {Springer},\n  pages     = {351--368},\n  url       = {https://link.springer.com/chapter/10.1007/978-3-319-68533-5_17},\n  doi       = {10.1007/978-3-319-68533-5_17}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Using Semantic Graphs to Detect Overlapping Target Events and Story Lines from Newspaper Articles.\n \n \n \n \n\n\n \n Wei, Y.; Singh, L.; Buttler, D.; and Gallagher, B.\n\n\n \n\n\n\n International Journal of Data Science and Analytics, 5(1): 41–60. 2018.\n \n\n\n\n
\n\n\n\n \n \n \"UsingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/ijdsa/WeiSBG18,\n  author    = {Yifang Wei and\n               Lisa Singh and\n               David Buttler and\n               Brian Gallagher},\n  title     = {Using Semantic Graphs to Detect Overlapping Target Events and Story Lines from Newspaper Articles},\n  journal   = {International Journal of Data Science and Analytics},\n  volume    = {5},\n  number    = {1},\n  year      = {2018},\n  pages     = {41--60},\n  url       = {https://doi.org/10.1007/s41060-017-0066-x},\n  doi       = {10.1007/s41060-017-0066-x},\n  biburl    = {https://dblp.org/rec/bib/journals/ijdsa/WeiSBG18},\n  bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2017\n \n \n (4)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n EOS: A Multilingual Text Archive of International Newspaper & Blog Articles [POSTER].\n \n \n \n \n\n\n \n Singh, L.; and Pemmaraju, R.\n\n\n \n\n\n\n In IEEE International Conference on Big Data (BigData), pages 4835–4837, Boston, MA, USA, December 2017. \n \n\n\n\n
\n\n\n\n \n \n \"EOS:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/bigdataconf/SinghP17,\n  author    = {Lisa Singh and\n               Raghu Pemmaraju},\n  title     = {{EOS:} {A} Multilingual Text Archive of International Newspaper {\\&amp;}\n               Blog Articles [POSTER]},\n  booktitle = {{IEEE} International Conference on Big Data (BigData)},\n  address   = {Boston, MA, USA},\n  month     = {December},\n  year      = {2017},\n  pages     = {4835--4837},\n  crossref  = {DBLP:conf/bigdataconf/2017},\n  url       = {https://doi.org/10.1109/BigData.2017.8258559},\n  doi       = {10.1109/BigData.2017.8258559},\n  biburl    = {https://dblp.org/rec/bib/conf/bigdataconf/SinghP17},\n  bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Understanding the Impact of Sampling and Noise on Detecting Events Using Twitter [POSTER].\n \n \n \n \n\n\n \n Wei, Y.; and Singh, L.\n\n\n \n\n\n\n In IEEE International Conference on Big Data (BigData), pages 4855–4857, Boston, MA, USA, December 2017. \n \n\n\n\n
\n\n\n\n \n \n \"UnderstandingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/bigdataconf/WeiS17,\n  author    = {Yifang Wei and\n               Lisa Singh},\n  title     = {Understanding the Impact of Sampling and Noise on Detecting Events\n               Using Twitter [POSTER]},\n  booktitle = {{IEEE} International Conference on Big Data (BigData)},\n  address   = {Boston, MA, USA},\n  month     = {December},\n  year      = {2017},\n  pages     = {4855--4857},\n  crossref  = {DBLP:conf/bigdataconf/2017},\n  url       = {https://doi.org/10.1109/BigData.2017.8258566},\n  doi       = {10.1109/BigData.2017.8258566},\n  biburl    = {https://dblp.org/rec/bib/conf/bigdataconf/WeiS17},\n  bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Location-based Event Detection Using Geotagged Semantic Graphs.\n \n \n \n \n\n\n \n Wei, Y.; and Singh, L.\n\n\n \n\n\n\n In ACM International Workshop on Mining and Learning with Graphs (MLG) at KDD, Nova Scotia, Canada, August 2017. \n \n\n\n\n
\n\n\n\n \n \n \"Location-basedPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 4 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{mlg2017_24,\n  title     = {Location-based Event Detection Using Geotagged Semantic Graphs},\n  author    = {Yifang Wei and Lisa Singh},\n  booktitle = {ACM International Workshop on Mining and Learning with Graphs (MLG) at KDD},\n  address   = {Nova Scotia, Canada},\n  month     = {August},\n  year      = {2017},\n  url       = {http://www.mlgworkshop.org/2017/paper/MLG2017_paper_24.pdf}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Using Network Flows to Identify Users Sharing Extremist Content on Social Media.\n \n \n \n \n\n\n \n Wei, Y.; and Singh, L.\n\n\n \n\n\n\n In Advances in Knowledge Discovery and Data Mining - Pacific-Asia Conference (PAKDD), pages 330–342, Jeju, South Korea, May 2017. \n \n\n\n\n
\n\n\n\n \n \n \"UsingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/pakdd/WeiS17,\n  author    = {Yifang Wei and\n               Lisa Singh},\n  title     = {Using Network Flows to Identify Users Sharing Extremist Content on\n               Social Media},\n  booktitle = {Advances in Knowledge Discovery and Data Mining - Pacific-Asia\n               Conference (PAKDD)},\n  pages     = {330--342},\n  address   = {Jeju, South Korea},\n  month     = {May},\n  year      = {2017},\n  crossref  = {DBLP:conf/pakdd/2017-1},\n  url       = {https://doi.org/10.1007/978-3-319-57454-7_26},\n  doi       = {10.1007/978-3-319-57454-7_26},\n  biburl    = {https://dblp.org/rec/bib/conf/pakdd/WeiS17},\n  bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2016\n \n \n (9)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Overlapping Target Event and Story Line Detection of Online Newspaper Articles.\n \n \n \n \n\n\n \n Wei, Y.; Singh, L.; Gallagher, B.; and Buttler, D.\n\n\n \n\n\n\n In IEEE International Conference on Data Science and Advanced Analytics (DSAA), pages 222–232, Montreal, QC, Canada, October 2016. \n \n\n\n\n
\n\n\n\n \n \n \"OverlappingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/dsaa/WeiSGB16,\n  author    = {Yifang Wei and\n               Lisa Singh and\n               Brian Gallagher and\n               David Buttler},\n  title     = {Overlapping Target Event and Story Line Detection of Online Newspaper\n               Articles},\n  booktitle = {{IEEE} International Conference on Data Science and Advanced\n               Analytics (DSAA)},\n  pages     = {222--232},\n  address   = {Montreal, QC, Canada},\n  month     = {October},\n  year      = {2016},\n  crossref  = {DBLP:conf/dsaa/2016},\n  url       = {https://doi.org/10.1109/DSAA.2016.30},\n  doi       = {10.1109/DSAA.2016.30},\n  biburl    = {https://dblp.org/rec/bib/conf/dsaa/WeiSGB16},\n  bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Using Visual Storytelling to Give Insight Into Inconsistent US Flu Policies [POSTER].\n \n \n \n \n\n\n \n Hockett, J.; Singh, L.; and Bansal, S.\n\n\n \n\n\n\n In IEEE Conference on Visual Analytics Science and Technology (VAST), Baltimore, Maryland, USA, October 2016. \n \n\n\n\n
\n\n\n\n \n \n \"UsingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{LS:poster/vast/Hockett2016,\n  author    = {Julia Hockett and Lisa Singh and Shweta Bansal},\n  title     = {Using Visual Storytelling to Give Insight Into Inconsistent US Flu Policies [POSTER]},\n  booktitle = {IEEE Conference on Visual Analytics Science and Technology (VAST)}, \n  address   = {Baltimore, Maryland, USA},\n  month     = {October},\n  year      = {2016},\n  url       = {}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Integrating Visual Exploration Into Traditional Scientific Research Methodology [POSTER].\n \n \n \n \n\n\n \n Barba, E.; Wei, Y.; Singh, L.; and Mann, J.\n\n\n \n\n\n\n In IEEE Conference on Visual Analytics Science and Technology (VAST), Baltimore, Maryland, USA, October 2016. \n \n\n\n\n
\n\n\n\n \n \n \"IntegratingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{LS:poster/vast/Barba2016,\n  author    = {Evan Barba and Yifang Wei and Lisa Singh and Janet Mann},\n  title     = {Integrating Visual Exploration Into Traditional Scientific Research Methodology [POSTER]},\n  booktitle = {IEEE Conference on Visual Analytics Science and Technology (VAST)}, \n  address   = {Baltimore, Maryland, USA},\n  month     = {October},\n  year      = {2016},\n  url       = {}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Safelog: Supporting Web Search and Mining by Differentially-Private Query Logs.\n \n \n \n \n\n\n \n Zhang, S.; Yang, G. H.; Singh, L.; and Xiong, L.\n\n\n \n\n\n\n In AAAI Fall Symposium on Privacy and Language Technologies, Washington, DC, USA, September 2016. \n \n\n\n\n
\n\n\n\n \n \n \"Safelog:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{LS:conf/ss/Zhang16,\n  author    = {Sicong Zhang and Grace Hui Yang and Lisa Singh and Li Xiong},\n  title     = {Safelog: Supporting Web Search and Mining by Differentially-Private Query Logs},\n  booktitle = {AAAI Fall Symposium on Privacy and Language Technologies},\n  month     = {September},\n  year      = {2016},\n  address   = {Washington, DC, USA},\n  url       = {https://www.aaai.org/ocs/index.php/FSS/FSS16/paper/view/14133/13703},\n  biburl    = {https://www.aaai.org/ocs/index.php/FSS/FSS16/paper/viewPaper/14133}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Generating Risk Reduction Recommendations to Decrease Vulnerability of Public Online Profiles.\n \n \n \n \n\n\n \n Zhu, J.; Zhang, S.; Singh, L.; Yang, G. H.; and Sherr, M.\n\n\n \n\n\n\n In IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pages 411–416, San Francisco, CA, USA, August 2016. \n \n\n\n\n
\n\n\n\n \n \n \"GeneratingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/asunam/ZhuZSYS16,\n  author    = {Janet Zhu and\n               Sicong Zhang and\n               Lisa Singh and\n               Grace Hui Yang and\n               Micah Sherr},\n  title     = {Generating Risk Reduction Recommendations to Decrease Vulnerability\n               of Public Online Profiles},\n  booktitle = {{IEEE/ACM} International Conference on Advances in Social Networks\n               Analysis and Mining (ASONAM)},\n  month = {August},\n  year      = {2016},\n  address = {San Francisco, CA, USA},\n  pages     = {411--416},\n  crossref  = {DBLP:conf/asunam/2016},\n  url       = {https://doi.org/10.1109/ASONAM.2016.7752267},\n  doi       = {10.1109/ASONAM.2016.7752267},\n  biburl    = {https://dblp.org/rec/bib/conf/asunam/ZhuZSYS16},\n  bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Identification of Extremism on Twitter.\n \n \n \n \n\n\n \n Wei, Y.; Singh, L.; and Martin, S.\n\n\n \n\n\n\n In Workshop on Social Network Analysis Surveillance Technologies (SNAT) at ASONAM , pages 1251–1255, San Francisco, CA, USA, August 2016. \n \n\n\n\n
\n\n\n\n \n \n \"IdentificationPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/asunam/WeiSM16,\n  author    = {Yifang Wei and\n               Lisa Singh and\n               Susan Martin},\n  title     = {Identification of Extremism on Twitter},\n  booktitle = {Workshop on Social Network Analysis Surveillance Technologies (SNAT) at ASONAM },\n  month = {August},\n  year      = {2016},\n  address = {San Francisco, CA, USA},\n  pages     = {1251--1255},\n  crossref  = {DBLP:conf/asunam/2016},\n  url       = {https://doi.org/10.1109/ASONAM.2016.7752398},\n  doi       = {10.1109/ASONAM.2016.7752398},\n  biburl    = {https://dblp.org/rec/bib/conf/asunam/WeiSM16},\n  bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Anonymizing Query Logs by Differential Privacy.\n \n \n \n \n\n\n \n Zhang, S.; Yang, G. H.; and Singh, L.\n\n\n \n\n\n\n In ACM International Conference on Research and Development in Information Retrieval (SIGIR), pages 753–756, Pisa, Italy, July 2016. \n \n\n\n\n
\n\n\n\n \n \n \"AnonymizingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/sigir/ZhangYS16,\n  author    = {Sicong Zhang and\n               Grace Hui Yang and\n               Lisa Singh},\n  title     = {Anonymizing Query Logs by Differential Privacy},\n  booktitle = {{ACM} International Conference on\n               Research and Development in Information Retrieval (SIGIR)},\n  pages     = {753--756},\n  address = {Pisa, Italy},\n  month = {July},\n  year      = {2016},\n  crossref  = {DBLP:conf/sigir/2016},\n  url       = {http://doi.acm.org/10.1145/2911451.2914732},\n  doi       = {10.1145/2911451.2914732},\n  biburl    = {https://dblp.org/rec/bib/conf/sigir/ZhangYS16},\n  bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Data Ethics - Attaining Personal Privacy on the Web.\n \n \n \n \n\n\n \n Singh, L.\n\n\n \n\n\n\n In Collmann, J.; and Matei, S., editor(s), Ethical Reasoning in Big Data - An Exploratory Analysis, pages 81–90. Springer, 2016.\n \n\n\n\n
\n\n\n\n \n \n \"DataPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@incollection{DBLP:books/sp/16/Singh16,\n  author    = {Lisa Singh},\n  title     = {Data Ethics - Attaining Personal Privacy on the Web},\n  booktitle = {Ethical Reasoning in Big Data - An Exploratory Analysis},\n  pages     = {81--90},\n  year      = {2016},\n  editor = {Jeff Collmann and Sorin Matei},\n  publisher = {Springer},\n  crossref  = {DBLP:books/sp/CM2016},\n  url       = {https://doi.org/10.1007/978-3-319-28422-4_7},\n  doi       = {10.1007/978-3-319-28422-4_7},\n  biburl    = {https://dblp.org/rec/bib/books/sp/16/Singh16},\n  bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n The Role of Weighted and Topological Network Information to Understand Animal Social Networks: A Null Model Approach.\n \n \n \n \n\n\n \n Rankin, R. W.; Mann, J.; Singh, L.; Patterson, E. M.; Krzyszczyk, E.; and Bejder, L.\n\n\n \n\n\n\n Animal Behaviour, 113: 215 - 228. March 2016.\n \n\n\n\n
\n\n\n\n \n \n \"ThePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{LS:journal/ab/RANKIN2016215,\n  title     = "The Role of Weighted and Topological Network Information to Understand Animal Social Networks: A Null Model Approach",\n  journal   = "Animal Behaviour",\n  volume    = "113",\n  pages     = "215 - 228",\n  month     = "March",\n  year      = "2016",\n  issn      = "0003-3472",\n  doi       = "https://doi.org/10.1016/j.anbehav.2015.12.015",\n  url       = "http://www.sciencedirect.com/science/article/pii/S000334721500456X",\n  author    = "Robert W. Rankin and Janet Mann and Lisa Singh and Eric M. Patterson and Ewa Krzyszczyk and Lars Bejder",\n  keywords  = "bias, bottlenose dolphin, community structure, maximum entropy, network topology, social network"\n}\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2015\n \n \n (7)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Query Operators for Comparing Uncertain Graphs.\n \n \n \n \n\n\n \n Dimitrov, D.; Singh, L.; and Mann, J.\n\n\n \n\n\n\n Transactions on Large-Scale Data- and Knowledge-Centered Systems, 18: 115–152. 2015.\n \n\n\n\n
\n\n\n\n \n \n \"QueryPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/tlsdkcs/DimitrovSM15,\n  author    = {Denis Dimitrov and\n               Lisa Singh and\n               Janet Mann},\n  title     = {Query Operators for Comparing Uncertain Graphs},\n  journal   = {Transactions on Large-Scale Data- and Knowledge-Centered Systems},\n  volume    = {18},\n  pages     = {115--152},\n  year      = {2015},\n  publisher = {Springer},\n  crossref  = {DBLP:journals/tlsdkcs/2015-18},\n  url       = {https://doi.org/10.1007/978-3-662-46485-4_5},\n  doi       = {10.1007/978-3-662-46485-4_5},\n  biburl    = {https://dblp.org/rec/bib/journals/tlsdkcs/DimitrovSM15},\n  bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Public Information Exposure Detection: Helping Users Understand Their Web Footprints.\n \n \n \n \n\n\n \n Singh, L.; Yang, G. H.; Sherr, M.; Hian-Cheong, A.; Tian, K.; Zhu, J.; and Zhang, S.\n\n\n \n\n\n\n In IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pages 153–161, Paris, France, August 2015. \n \n\n\n\n
\n\n\n\n \n \n \"PublicPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/asunam/SinghYSHTZZ15,\n  author    = {Lisa Singh and\n               Grace Hui Yang and\n               Micah Sherr and\n               Andrew Hian{-}Cheong and\n               Kevin Tian and\n               Janet Zhu and\n               Sicong Zhang},\n  title     = {Public Information Exposure Detection: Helping Users Understand Their\n               Web Footprints},\n  booktitle = {{IEEE/ACM} International Conference on Advances\n               in Social Networks Analysis and Mining (ASONAM)},\n  pages     = {153--161},\n  address = {Paris, France},\n  month = {August},\n  year      = {2015},\n  crossref  = {DBLP:conf/asunam/2015},\n  url       = {http://doi.acm.org/10.1145/2808797.2809280},\n  doi       = {10.1145/2808797.2809280},\n  biburl    = {https://dblp.org/rec/bib/conf/asunam/SinghYSHTZZ15},\n  bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Combining Pure Anomalies to Explain Unusual Behavior in Real World Data Sets.\n \n \n \n \n\n\n \n King, J.; Fineman, J.; Palermo, V.; and Singh, L.\n\n\n \n\n\n\n In Workshop on Outlier Definitions, Detection and Description (ODDx3) at KDD, Sydney, Australia, August 2015. \n \n\n\n\n
\n\n\n\n \n \n \"CombiningPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{LS:workshop/odd3/King2015,\n  author    = {Jordan King and Jeremy Fineman and Valerie Palermo and Lisa Singh},\n  title     = {Combining Pure Anomalies to Explain Unusual Behavior in Real World Data Sets},\n  booktitle = {Workshop on Outlier Definitions, Detection and Description (ODDx3) at KDD},\n  address   = {Sydney, Australia},\n  month     = {August},\n  year      = {2015},\n  url       = {http://people.cs.georgetown.edu/~singh/papers/ODD2015.pdf}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Helping Users Understand Their Web Footprints [POSTER].\n \n \n \n \n\n\n \n Singh, L.; Yang, G. H.; Sherr, M.; Wei, Y.; Hian-Cheong, A.; Tian, K.; Zhu, J.; Zhang, S.; Vaidya, T.; and Asgarli, E.\n\n\n \n\n\n\n In International Conference on World Wide Web Companion (WWW), pages 117–118, May 2015. \n \n\n\n\n
\n\n\n\n \n \n \"HelpingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/www/SinghYSWHTZZVA15,\n  author    = {Lisa Singh and\n               Grace Hui Yang and\n               Micah Sherr and\n               Yifang Wei and\n               Andrew Hian{-}Cheong and\n               Kevin Tian and\n               Janet Zhu and\n               Sicong Zhang and\n               Tavish Vaidya and\n               Elchin Asgarli},\n  title     = {Helping Users Understand Their Web Footprints [POSTER]},\n  booktitle = {International Conference on World Wide Web\n               Companion (WWW)},\n  pages     = {117--118},\n  month     = {May},\n  location  = {Florence, Italy},\n  year      = {2015},\n  crossref  = {DBLP:conf/www/2015c},\n  url       = {http://doi.acm.org/10.1145/2740908.2742763},\n  doi       = {10.1145/2740908.2742763},\n  biburl    = {https://dblp.org/rec/bib/conf/www/SinghYSWHTZZVA15},\n  bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Digital Ethnography of Medical Students who Use Twitter for Professional Development.\n \n \n \n \n\n\n \n Chretien, K. C.; Tuck, M. G.; Simon, M.; Singh, L. O.; and Kind, T.\n\n\n \n\n\n\n Journal of General Internal Medicine (JGIM), 30: 1673–1680. November 2015.\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{LS:journal/jgim/Chretien15,\n  author    = {Katherine C. Chretien and Matthew G. Tuck and Michael Simon and Lisa O. Singh and Terry Kind},\n  title     = {A Digital Ethnography of Medical Students who Use Twitter for Professional Development},\n  journal = {Journal of General Internal Medicine (JGIM)},\n  pages     = {1673--1680},\n  month     = {November},\n  volume    = {30},\n  issue     = {11},\n  year      = {2015},\n  publisher = {Springer},\n  doi       = {10.1007/s11606-015-3345-z},\n  url       = {https://doi.org/10.1007/s11606-015-3345-z}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Applying Epsilon-Differential Private Query Log Releasing Scheme to Document Retrieval.\n \n \n \n \n\n\n \n Zhang, S.; Yang, H.; and Singh, L.\n\n\n \n\n\n\n In ACM International Workshop on Privacy-Preserving IR: When Information Retrieval Meets Privacy and Security (PIR) at SIGIR, Santiago, Chile, July 2015. \n \n\n\n\n
\n\n\n\n \n \n \"ApplyingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{LS:workshop/pir/zhang2015,\n  author    = {Sicong Zhang and\n               Hui Yang and\n               Lisa Singh},\n  title     = {Applying Epsilon-Differential Private Query Log Releasing Scheme to Document Retrieval},\n  booktitle = {ACM International Workshop on Privacy-Preserving\n               {IR:} When Information Retrieval Meets Privacy and Security (PIR) at SIGIR},\n  month     = {July},\n  year      = {2015},\n  address   = {Santiago, Chile},\n  url       = {http://webfootprint.cs.georgetown.edu/papers/PIR2015.pdf}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Culture, Diffusion, and Networks in Social Animals.\n \n \n \n \n\n\n \n Mann, J.; and Singh, L.\n\n\n \n\n\n\n In Scott, R. A.; and Kosslyn, S. M., editor(s), Emerging Trends in Social and Behavioral Science. John Wiley and Sons, May 2015.\n \n\n\n\n
\n\n\n\n \n \n \"Culture,Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@incollection{emt/Mann15,\n  author    = {Janet Mann and Lisa Singh},\n  title     = {Culture, Diffusion, and Networks in Social Animals},\n  booktitle = {Emerging Trends in Social and Behavioral Science},\n  month     = {May},\n  year      = {2015},\n  editor    = {Robert A. Scott and Stephan M. Kosslyn},\n  publisher = {John Wiley and Sons},\n  url       = {https://doi.org/10.1002/9781118900772.etrds0068},\n  doi       = {10.1002/9781118900772}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2014\n \n \n (6)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Using Large-Scale Open Source Data to Identify Potential Forced Migration.\n \n \n \n \n\n\n \n Wei, Y.; Taylor, A.; Yossinger, N.; Swingewood, E.; Quinn, D. R.; Singh, L.; Martin, S. F.; Berkowitz, S.; Collmann, J.; and McGrath, S.\n\n\n \n\n\n\n In Workshop on Data Science for the Social Good at KDD, New York, NY, USA, August 2014. \n \n\n\n\n
\n\n\n\n \n \n \"UsingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{LS:workshop/dssg/wei2014,\n  author    = {Yifang Wei and Abbie Taylor and Nili Yossinger and Eleanor Swingewood and Dennis R. Quinn and Lisa Singh and Susan F. Martin and Sidney Berkowitz and Jeff Collmann and Susan McGrath },\n  title     = {Using Large-Scale Open Source Data to Identify Potential Forced Migration},\n  booktitle = {Workshop on Data Science for the Social Good at KDD},\n  address   = {New York, NY, USA},\n  month     = {August},\n  year      = {2014},\n  url       = {http://people.cs.georgetown.edu/~singh/papers/DSSG2014.pdf}\n}\n\n  \n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Membership Detection Using Cooperative Data Mining Algorithms.\n \n \n \n \n\n\n \n Newport, C.; Singh, L.; and Ren, Y.\n\n\n \n\n\n\n In SIAM International Conference on Data Mining (SDM) , pages 758–766, Philadelphia, Pennsylvania, USA, April 2014. \n \n\n\n\n
\n\n\n\n \n \n \"MembershipPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/sdm/NewportSR14,\n  author    = {Calvin Newport and\n               Lisa Singh and\n               Yiqing Ren},\n  title     = {Membership Detection Using Cooperative Data Mining Algorithms},\n  booktitle = {{SIAM} International Conference on Data Mining (SDM)  },\n  address   = {Philadelphia, Pennsylvania, USA},\n  pages     = {758--766},\n  month     = {April},\n  year      = {2014},\n  crossref  = {DBLP:conf/sdm/2014},\n  url       = {https://doi.org/10.1137/1.9781611973440.87},\n  doi       = {10.1137/1.9781611973440.87},\n  biburl    = {https://dblp.org/rec/bib/conf/sdm/NewportSR14},\n  bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Increased Information Leakage from Text.\n \n \n \n \n\n\n \n Zhang, S.; Yang, H.; and Singh, L.\n\n\n \n\n\n\n In ACM International Workshop on Privacy-Preserving IR: When Information Retrieval Meets Privacy and Security (PIR) at SIGIR , pages 41–42, Gold Coast, Australia, July 2014. \n \n\n\n\n
\n\n\n\n \n \n \"IncreasedPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/sigir/ZhangYS14,\n  author    = {Sicong Zhang and\n               Hui Yang and\n               Lisa Singh},\n  title     = {Increased Information Leakage from Text},\n  booktitle = {ACM International Workshop on Privacy-Preserving\n               {IR:} When Information Retrieval Meets Privacy and Security (PIR) at SIGIR },\n  pages     = {41--42},\n  address = {Gold Coast, Australia},\n  month = {July},\n  year      = {2014},\n  crossref  = {DBLP:conf/sigir/2014pir},\n  url       = {http://ceur-ws.org/Vol-1225/pir2014_submission_15.pdf},\n  biburl    = {https://dblp.org/rec/bib/conf/sigir/ZhangYS14},\n  bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Modeling Social Preferences Based on Social Interactions.\n \n \n \n \n\n\n \n Singh, L.; and Mann, J.\n\n\n \n\n\n\n In Alhajj, R.; and Rokne, J., editor(s), Encyclopedia of Social Network Analysis and Mining, pages 963–969. Springer, 2014.\n \n\n\n\n
\n\n\n\n \n \n \"ModelingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@incollection{DBLP:reference/snam/SinghM14,\n  author    = {Lisa Singh and\n               Janet Mann},\n  title     = {Modeling Social Preferences Based on Social Interactions},\n  booktitle = {Encyclopedia of Social Network Analysis and Mining},\n  pages     = {963--969},\n  year      = {2014},\n  publisher = {Springer},\n  editor = {Reda Alhajj and Jon Rokne},\n  url       = {https://doi.org/10.1007/978-1-4614-6170-8_16},\n  doi       = {10.1007/978-1-4614-6170-8_16},\n  biburl    = {https://dblp.org/rec/bib/reference/snam/SinghM14},\n  bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Exploring Community Structure in Biological Networks with Random Graphs.\n \n \n \n \n\n\n \n Sah, P.; Singh, L. O.; Clauset, A.; and Bansal, S.\n\n\n \n\n\n\n BMC Bioinformatics, 15(1). June 2014.\n \n\n\n\n
\n\n\n\n \n \n \"ExploringPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@Article{LS:journal/bmcm/Sah2014,\n  author    = "Sah, Pratha and Singh, Lisa O.  and Clauset, Aaron and Bansal, Shweta",\n  title     = "Exploring Community Structure in Biological Networks with Random Graphs",\n  journal   = "BMC Bioinformatics",\n  year      = "2014",\n  month     = "June",\n  volume    = "15",\n  number    = "1",\n  issn      = "1471-2105",\n  doi       = "10.1186/1471-2105-15-220",\n  url       = "https://doi.org/10.1186/1471-2105-15-220"\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Mapping Physician Twitter Networks: Describing How They Work as a First Step in Understanding Connectivity, Information Flow, and Message Diffusion.\n \n \n \n \n\n\n \n Mishori, R.; Singh, L. O.; Levy, B.; and Newport, C.\n\n\n \n\n\n\n Journal of Medical Internet Research (JMIR), 16. April 2014.\n \n\n\n\n
\n\n\n\n \n \n \"MappingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{LS:journal/jmip/Mishori,\n  author    = {Ranit Mishori and Lisa O. Singh and Brendan Levy and Calvin Newport},\n  title     = {Mapping Physician Twitter Networks: Describing How They Work as a First Step in Understanding Connectivity, Information Flow, and Message Diffusion},\n  journal   = {Journal of Medical Internet Research (JMIR)},\n  month     = {April},\n  year      = {2014},\n  volume    = {16},\n  issue     = {4},\n  url       = {http://www.jmir.org/2014/4/e107/},\n  doi       = {doi:10.2196/jmir.3006}\n}\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2013\n \n \n (6)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Understanding Evolving Group Structures in Time-varying Networks.\n \n \n \n \n\n\n \n Caravelli, P.; Wei, Y.; Subak, D.; Singh, L.; and Mann, J.\n\n\n \n\n\n\n In IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pages 142–148, Niagara, ON, Canada, August 2013. \n \n\n\n\n
\n\n\n\n \n \n \"UnderstandingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/asunam/CaravelliWSSM13,\n  author    = {Paul Caravelli and\n               Yifang Wei and\n               Daniel Subak and\n               Lisa Singh and\n               Janet Mann},\n  title     = {Understanding Evolving Group Structures in Time-varying Networks},\n  booktitle = {{IEEE/ACM} International Conference on Advances in Social Networks Analysis and Mining (ASONAM)},\n  pages     = {142--148},\n  month = {August},\n  year      = {2013},\n  address = {Niagara, ON, Canada},\n  crossref  = {DBLP:conf/asunam/2013},\n  url       = {http://doi.acm.org/10.1145/2492517.2492615},\n  doi       = {10.1145/2492517.2492615},\n  biburl    = {https://dblp.org/rec/bib/conf/asunam/CaravelliWSSM13},\n  bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Comparison Queries for Uncertain Graphs.\n \n \n \n \n\n\n \n Dimitrov, D.; Singh, L.; and Mann, J.\n\n\n \n\n\n\n In International Conference on Database and Expert Systems Applications (DEXA) , pages 124–140, Prague, Czech Republic, August 2013. \n \n\n\n\n
\n\n\n\n \n \n \"ComparisonPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/dexa/DimitrovSM13,\n  author    = {Denis Dimitrov and\n               Lisa Singh and\n               Janet Mann},\n  title     = {Comparison Queries for Uncertain Graphs},\n  booktitle = {International Conference on Database and Expert Systems Applications (DEXA) },\n  pages     = {124--140},\n  address = {Prague, Czech Republic},\n  month = {August},\n  year      = {2013},\n  crossref  = {DBLP:conf/dexa/2013-2},\n  url       = {https://doi.org/10.1007/978-3-642-40173-2_13},\n  doi       = {10.1007/978-3-642-40173-2_13},\n  biburl    = {https://dblp.org/rec/bib/conf/dexa/DimitrovSM13},\n  bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Process-Centric Data Mining and Visual Analytic Tool for Exploring Complex Social Networks.\n \n \n \n \n\n\n \n Dimitrov, D.; Singh, L.; and Mann, J.\n\n\n \n\n\n\n In ACM Workshop on Interactive Data Exploration and Analytics (IDEA) at KDD, pages 45–53, Chicago, Illinois, USA, August 2013. \n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/kdd/DimitrovSM13,\n  author    = {Denis Dimitrov and\n               Lisa Singh and\n               Janet Mann},\n  title     = {A Process-Centric Data Mining and Visual Analytic Tool for Exploring\n               Complex Social Networks},\n  booktitle = {{ACM} Workshop on Interactive Data Exploration\n               and Analytics (IDEA) at KDD},\n  pages     = {45--53},\n  address = {Chicago, Illinois, USA},\n  month = {August},\n  year      = {2013},\n  crossref  = {DBLP:conf/kdd/2013idea},\n  url       = {http://doi.acm.org/10.1145/2501511.2501519},\n  doi       = {10.1145/2501511.2501519},\n  biburl    = {https://dblp.org/rec/bib/conf/kdd/DimitrovSM13},\n  bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Identifying Individual Vulnerability Based on Public Data.\n \n \n \n \n\n\n \n Ferro, J.; Singh, L.; and Sherr, M.\n\n\n \n\n\n\n In International Conference on Privacy, Security and Trust (PST) , pages 119–126, Tarragona, Catalonia, Spain, July 2013. \n \n\n\n\n
\n\n\n\n \n \n \"IdentifyingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/pst/FerroSS13,\n  author    = {John Ferro and\n               Lisa Singh and\n               Micah Sherr},\n  title     = {Identifying Individual Vulnerability Based on Public Data},\n  booktitle = {International Conference on Privacy, Security and\n               Trust (PST) },\n  pages     = {119--126},\n  month = {July},\n  year      = {2013},\n  address = {Tarragona, Catalonia, Spain},\n  crossref  = {DBLP:conf/pst/2013},\n  url       = {https://doi.org/10.1109/PST.2013.6596045},\n  doi       = {10.1109/PST.2013.6596045},\n  biburl    = {https://dblp.org/rec/bib/conf/pst/FerroSS13},\n  bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Using Substructure Mining to Identify Misbehavior in Network Provenance Graphs.\n \n \n \n \n\n\n \n DeBoer, D.; Zhou, W.; and Singh, L.\n\n\n \n\n\n\n In International Workshop on Graph Data Management Experiences and Systems (GRADES) at SIGMOD/PODS, pages 6, New York, NY, USA, June 2013. \n \n\n\n\n
\n\n\n\n \n \n \"UsingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/sigmod/DeBoerZS13,\n  author    = {David DeBoer and\n               Wenchao Zhou and\n               Lisa Singh},\n  title     = {Using Substructure Mining to Identify Misbehavior in Network Provenance\n               Graphs},\n  booktitle = {International Workshop on Graph Data Management Experiences\n               and Systems (GRADES) at SIGMOD/PODS},\n  pages     = {6},\n  address = {New York, NY, USA},\n  month = {June},\n  year      = {2013},\n  crossref  = {DBLP:conf/sigmod/2013grades},\n  url       = {http://event.cwi.nl/grades2013/06-deboer.pdf},\n  doi       = {10.1145/2484425.2484431},\n  biburl    = {https://dblp.org/rec/bib/conf/sigmod/DeBoerZS13},\n  bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Understanding Site-Based Inference Potential for Identifying Hidden Attributes.\n \n \n \n \n\n\n \n Moore, W. B.; Wei, Y.; Orshefsky, A.; Sherr, M.; Singh, L.; and Yang, H.\n\n\n \n\n\n\n In International Conference on Social Computing (SocialCom) , pages 570–577, Washington, DC, USA, September 2013. \n \n\n\n\n
\n\n\n\n \n \n Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/socialcom/MooreWOSSY13,\n  author    = {W. Brad Moore and\n               Yifang Wei and\n               Adam Orshefsky and\n               Micah Sherr and\n               Lisa Singh and\n               Hui Yang},\n  title     = {Understanding Site-Based Inference Potential for Identifying Hidden\n               Attributes},\n  booktitle = {International Conference on Social Computing (SocialCom) },\n  pages     = {570--577},\n  month = {September},\n  year      = {2013},\n  address = {Washington, DC, USA},\n  crossref  = {DBLP:conf/socialcom/2013},\n  url       = {https://doi.org/10.1109/SocialCom.2013.86},\n  doi       = {10.1109/SocialCom.2013.86},\n  biburl    = {https://dblp.org/rec/bib/conf/socialcom/MooreWOSSY13},\n  bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2012\n \n \n (5)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Social Networks Reveal Cultural Behaviour in Tool-Using Dolphins .\n \n \n \n \n\n\n \n Mann, J.; Stanton, M. A.; Patterson, E. M.; Bienenstock, E. J.; and Singh, L. O.\n\n\n \n\n\n\n Nature Communications, 980. July 2012.\n \n\n\n\n
\n\n\n\n \n \n \"SocialPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{LS:journal/nature/Mann2012,\n title     = { Social Networks Reveal Cultural Behaviour in Tool-Using Dolphins },\n author    = { Janet Mann and Margaret A. Stanton and Eric M. Patterson and Elisa J. Bienenstock and Lisa O. Singh },\n journal   = {Nature Communications},\n volume    = {980},\n issue     = {3},\n month     = {July},\n year      = {2012},\n url       = {https://www.nature.com/articles/ncomms1983},\n doi       = {10.1038/ncomms1983 }\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n SHARD: A Framework for Sequential, Hierarchical Anomaly Ranking and Detection.\n \n \n \n \n\n\n \n Robinson, J.; Lonergan, M.; Singh, L.; Candido, A.; and Sayal, M.\n\n\n \n\n\n\n In Advances in Knowledge Discovery and Data Mining - Pacific-Asia Conference (PAKDD), pages 243–255, Kuala Lumpur, Malaysia, May 2012. \n \n\n\n\n
\n\n\n\n \n \n \"SHARD:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/pakdd/RobinsonLSCS12,\n  author    = {Jason Robinson and\n               Margaret Lonergan and\n               Lisa Singh and\n               Allison Candido and\n               Mehmet Sayal},\n  title     = {{SHARD:} {A} Framework for Sequential, Hierarchical Anomaly Ranking\n               and Detection},\n  booktitle = {Advances in Knowledge Discovery and Data Mining - Pacific-Asia\n               Conference (PAKDD)},\n  pages     = {243--255},\n  address = {Kuala Lumpur, Malaysia},\n  month = {May},\n  year      = {2012},\n  crossref  = {DBLP:conf/pakdd/2012-2},\n  url       = {https://doi.org/10.1007/978-3-642-30220-6_21},\n  doi       = {10.1007/978-3-642-30220-6_21},\n  biburl    = {https://dblp.org/rec/bib/conf/pakdd/RobinsonLSCS12},\n  bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n EWNI: Efficient Anonymization of Vulnerable Individuals in Social Networks.\n \n \n \n \n\n\n \n Nagle, F.; Singh, L.; and Gkoulalas-Divanis, A.\n\n\n \n\n\n\n In Advances in Knowledge Discovery and Data Mining - Pacific-Asia Conference (PAKDD), pages 359–370, Kuala Lumpur, Malaysia, May 2012. \n \n\n\n\n
\n\n\n\n \n \n \"EWNI:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/pakdd/NagleSG12,\n  author    = {Frank Nagle and\n               Lisa Singh and\n               Aris Gkoulalas{-}Divanis},\n  title     = {{EWNI:} Efficient Anonymization of Vulnerable Individuals in Social\n               Networks},\n  booktitle = {Advances in Knowledge Discovery and Data Mining - Pacific-Asia\n               Conference (PAKDD)},\n  pages     = {359--370},\n  address = {Kuala Lumpur, Malaysia},\n  month = {May},\n  year      = {2012},\n  crossref  = {DBLP:conf/pakdd/2012-2},\n  url       = {https://doi.org/10.1007/978-3-642-30220-6_30},\n  doi       = {10.1007/978-3-642-30220-6_30},\n  biburl    = {https://dblp.org/rec/bib/conf/pakdd/NagleSG12},\n  bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Exploring Re-Identification Risks in Public Domains.\n \n \n \n \n\n\n \n Ramachandran, A.; Singh, L.; Porter, E.; and Nagle, F.\n\n\n \n\n\n\n In International Conference on Privacy, Security and Trust (PST) , pages 35–42, Paris, France, July 2012. \n \n\n\n\n
\n\n\n\n \n \n \"ExploringPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/pst/RamachandranSPN12,\n  author    = {Aditi Ramachandran and Lisa Singh and Edward Porter and Frank Nagle},\n  title     = {Exploring Re-Identification Risks in Public Domains},\n  booktitle = {International Conference on Privacy, Security and Trust (PST) },\n  pages     = {35--42},\n  address = {Paris, France},\n  month = {July},\n  year      = {2012},\n  crossref  = {DBLP:conf/pst/2012},\n  url       = {https://doi.org/10.1109/PST.2012.6297917},\n  doi       = {10.1109/PST.2012.6297917},\n  biburl    = {https://dblp.org/rec/bib/conf/pst/RamachandranSPN12},\n  bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Stability vs. Diversity: Understanding the Dynamics of Actors in Time-Varying Affiliation Networks.\n \n \n \n \n\n\n \n Sharara, H.; Singh, L.; Getoor, L.; and Mann, J.\n\n\n \n\n\n\n In International Conference on Social Informatics (SocialInformatics), pages 1–6, Washington, DC, USA, December 2012. \n \n\n\n\n
\n\n\n\n \n \n \"StabilityPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/socialinformatics/ShararaSGM12,\n  author    = {Hossam Sharara and\n               Lisa Singh and\n               Lise Getoor and\n               Janet Mann},\n  title     = {Stability vs. Diversity: Understanding the Dynamics of Actors in Time-Varying\n               Affiliation Networks},\n  booktitle = {International Conference on Social Informatics (SocialInformatics)},\n  pages     = {1--6},\n  address = {Washington, DC, USA},\n  month = {December},\n  year      = {2012},\n  crossref  = {DBLP:conf/socialinformatics/2012},\n  url       = {https://doi.org/10.1109/SocialInformatics.2012.75},\n  doi       = {10.1109/SocialInformatics.2012.75},\n  biburl    = {https://dblp.org/rec/bib/conf/socialinformatics/ShararaSGM12},\n  bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2011\n \n \n (5)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Understanding Actor Loyalty to Event-Based Groups in Affiliation Networks.\n \n \n \n \n\n\n \n Sharara, H.; Singh, L.; Getoor, L.; and Mann, J.\n\n\n \n\n\n\n Social Network Analysis and Mining, 1(2): 115–126. 2011.\n \n\n\n\n
\n\n\n\n \n \n \"UnderstandingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/snam/ShararaSGM11,\n  author    = {Hossam Sharara and\n               Lisa Singh and\n               Lise Getoor and\n               Janet Mann},\n  title     = {Understanding Actor Loyalty to Event-Based Groups in Affiliation Networks},\n  journal   = {Social Network Analysis and Mining},\n  volume    = {1},\n  number    = {2},\n  pages     = {115--126},\n  year      = {2011},\n  publisher = {Springer},\n  url       = {https://doi.org/10.1007/s13278-010-0005-5},\n  doi       = {10.1007/s13278-010-0005-5},\n  biburl    = {https://dblp.org/rec/bib/journals/snam/ShararaSGM11},\n  bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n G-PARE: A visual analytic tool for comparative analysis of uncertain graphs.\n \n \n \n \n\n\n \n Sharara, H.; Sopan, A.; Namata, G.; Getoor, L.; and Singh, L.\n\n\n \n\n\n\n In IEEE Conference on Visual Analytics Science and Technology (VAST) , pages 61–70, Providence, Rhode Island, USA, October 2011. \n \n\n\n\n
\n\n\n\n \n \n \"G-PARE:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/ieeevast/ShararaSNGS11,\n  author    = {Hossam Sharara and\n               Awalin Sopan and\n               Galileo Namata and\n               Lise Getoor and\n               Lisa Singh},\n  title     = {{G-PARE:} {A} visual analytic tool for comparative analysis of uncertain\n               graphs},\n  booktitle = {{IEEE} Conference on Visual Analytics Science and Technology\n               (VAST) }, \n  address = {Providence, Rhode Island, USA},\n  pages     = {61--70},\n  month = {October},\n  year      = {2011},\n  crossref  = {DBLP:conf/ieeevast/2011},\n  url       = {https://doi.org/10.1109/VAST.2011.6102442},\n  doi       = {10.1109/VAST.2011.6102442},\n  biburl    = {https://dblp.org/rec/bib/conf/ieeevast/ShararaSNGS11},\n  bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Privately Detecting Pairwise Correlations in Distributed Time Series.\n \n \n \n \n\n\n \n Sayal, M.; and Singh, L.\n\n\n \n\n\n\n In IEEE Privacy, Security, Risk and Trust (PASSAT), pages 981–987, Boston, MA, USA, October 2011. \n \n\n\n\n
\n\n\n\n \n \n \"PrivatelyPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/socialcom/SayalS11,\n  author    = {Mehmet Sayal and\n               Lisa Singh},\n  title     = {Privately Detecting Pairwise Correlations in Distributed Time Series},\n  booktitle = { {IEEE} Privacy, Security, Risk and Trust (PASSAT)},\n  pages     = {981--987},\n  address = {Boston, MA, USA},\n  month = {October},\n  year      = {2011},\n  crossref  = {DBLP:conf/socialcom/2011},\n  url       = {https://doi.org/10.1109/PASSAT/SocialCom.2011.99},\n  doi       = {10.1109/PASSAT/SocialCom.2011.99},\n  biburl    = {https://dblp.org/rec/bib/conf/socialcom/SayalS11},\n  bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n The Current Stage of the Microdata Analysis System at the US Census Bureau.\n \n \n \n \n\n\n \n \n\n\n \n\n\n\n In Proceedings of the International Statistical Institute (ISI), pages 3115–3133, Dublin, Ireland, August 2011. \n \n\n\n\n
\n\n\n\n \n \n \"ThePaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Visualizing node attribute uncertainty in graphs.\n \n \n \n \n\n\n \n Cesario, N.; Pang, A.; and Singh, L.\n\n\n \n\n\n\n In Visualization and Data Analysis (VDA) , pages 78680H, San Francisco, CA, USA, January 2011. \n \n\n\n\n
\n\n\n\n \n \n \"VisualizingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/vda/CesarioPS11,\n  author    = {Nathaniel Cesario and\n               Alex Pang and\n               Lisa Singh},\n  title     = {Visualizing node attribute uncertainty in graphs},\n  booktitle = {Visualization and Data Analysis (VDA) },\n  pages     = {78680H},\n  month = {January},\n  year      = {2011},\n  address = {San Francisco, CA, USA},\n  crossref  = {DBLP:conf/vda/2011},\n  url       = {https://doi.org/10.1117/12.872677},\n  doi       = {10.1117/12.872677},\n  biburl    = {https://dblp.org/rec/bib/conf/vda/CesarioPS11},\n  bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2010\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Identifying Similar Neighborhood Structures in Private Social Networks.\n \n \n \n \n\n\n \n Singh, L.; and Schramm, C.\n\n\n \n\n\n\n In IEEE Workshop on Private Aspects of Data Mining (PADM) at ICDM , pages 507–516, Sydney, Australia, 2010. \n \n\n\n\n
\n\n\n\n \n \n \"IdentifyingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icdm/SinghS10,\n  author    = {Lisa Singh and\n               Clare Schramm},\n  title     = {Identifying Similar Neighborhood Structures in Private Social Networks},\n  booktitle = {{IEEE} Workshop on Private Aspects of Data Mining (PADM) at ICDM },\n  pages     = {507--516},\n  address = {Sydney, Australia},\n  monthh = {December},\n  year      = {2010},\n  crossref  = {DBLP:conf/icdm/2010w},\n  url       = {https://doi.org/10.1109/ICDMW.2010.165},\n  doi       = {10.1109/ICDMW.2010.165},\n  biburl    = {https://dblp.org/rec/bib/conf/icdm/SinghS10},\n  bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n What Are We Missing? Perspectives on Social Network Analysis for Observational Scientific Data.\n \n \n \n\n\n \n Singh, L.; Bienenstock, E. J.; and Mann, J.\n\n\n \n\n\n\n In Furht, B., editor(s), Handbook of Social Network Technologies and Applications. Springer, 2010.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@incollection{DBLP:reference/social/2010,\n  author = {Lisa Singh and Elisa J. Bienenstock and Janet Mann},\n  title = {What Are We Missing? Perspectives on Social Network Analysis for Observational Scientific Data},\n  editor    = {Borko Furht},\n  booktitle     = {Handbook of Social Network Technologies and Applications},\n  publisher = {Springer},\n  year      = {2010},\n  isbn      = {978-1-4419-7141-8},\n  biburl    = {https://dblp.org/rec/bib/reference/social/2010},\n  bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2009\n \n \n (4)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Privately detecting bursts in streaming, distributed time series data.\n \n \n \n \n\n\n \n Singh, L.; and Sayal, M.\n\n\n \n\n\n\n Data and Knowledge Engineering (DKE), 68(6): 509–530. 2009.\n \n\n\n\n
\n\n\n\n \n \n \"PrivatelyPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/dke/SinghS09,\n  author    = {Lisa Singh and\n               Mehmet Sayal},\n  title     = {Privately detecting bursts in streaming, distributed time series data},\n  journal   = {Data and Knowledge Engineering (DKE)},\n  volume    = {68},\n  number    = {6},\n  pages     = {509--530},\n  year      = {2009},\n  publisher = {Elsevier},\n  url       = {https://doi.org/10.1016/j.datak.2008.12.003},\n  doi       = {10.1016/j.datak.2008.12.003},\n  biburl    = {https://dblp.org/rec/bib/journals/dke/SinghS09},\n  bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Visual Graph Comparisons with Bulleyes [POSTER].\n \n \n \n \n\n\n \n Cesario, N.; Pang, A.; Getoor, L.; and Singh, L.\n\n\n \n\n\n\n In IEEE Information Visualization Conference (InfoVis), Atlantic City, New Jersey, USA, October 2009. \n \n\n\n\n
\n\n\n\n \n \n \"VisualPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{LS:conf/iv/Cesario2009,\n  author    = {Nathaniel Cesario and Alex Pang and Lise Getoor and Lisa Singh},\n  title     = {Visual Graph Comparisons with Bulleyes [POSTER]},\n  booktitle = {IEEE Information Visualization Conference (InfoVis)},\n  month     = {October},\n  year      = {2009},\n  address   = {Atlantic City, New Jersey, USA},\n  url       = {}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n The Dynamics of Actor Loyalty to Groups in Affiliation Networks.\n \n \n \n \n\n\n \n Sharara, H.; Singh, L.; Getoor, L.; and Mann, J.\n\n\n \n\n\n\n In ACM/IEEE International Conference on Advances in Social Network Analysis and Mining (ASONAM) , pages 101–106, Athens, Greece, July 2009. \n \n\n\n\n
\n\n\n\n \n \n \"ThePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/asunam/ShararaSGM09,\n  author    = {Hossam Sharara and\n               Lisa Singh and\n               Lise Getoor and\n               Janet Mann},\n  title     = {The Dynamics of Actor Loyalty to Groups in Affiliation Networks},\n  booktitle = {{ACM/IEEE} International Conference on Advances in Social Network Analysis\n               and Mining (ASONAM) },\n  pages     = {101--106},\n  address = {Athens, Greece},\n  month = {July},\n  year      = {2009},\n  crossref  = {DBLP:conf/asunam/2009},\n  url       = {https://doi.org/10.1109/ASONAM.2009.27},\n  doi       = {10.1109/ASONAM.2009.27},\n  biburl    = {https://dblp.org/rec/bib/conf/asunam/ShararaSGM09},\n  bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Generating Abstract Networks Using Multi-relational Biological Data.\n \n \n \n \n\n\n \n Caravelli, P.; Beard, M.; Gopalan, B.; Singh, L.; and Hu, Z.\n\n\n \n\n\n\n In International Conference on Information Visualisation (IV), pages 331–336, Barcelona, Spain, July 2009. \n \n\n\n\n
\n\n\n\n \n \n \"GeneratingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/iv/CaravelliBGSH09,\n  author    = {Paul Caravelli and\n               Mitchell Beard and\n               Brian Gopalan and\n               Lisa Singh and\n               Zhang{-}Zhi Hu},\n  title     = {Generating Abstract Networks Using Multi-relational Biological Data},\n  booktitle = {International Conference on Information Visualisation (IV)},\n  pages     = {331--336},\n  address = {Barcelona, Spain},\n  month = {July},\n  year      = {2009},\n  crossref  = {DBLP:conf/iv/2009},\n  url       = {https://doi.org/10.1109/IV.2009.73},\n  doi       = {10.1109/IV.2009.73},\n  biburl    = {https://dblp.org/rec/bib/conf/iv/CaravelliBGSH09},\n  bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2008\n \n \n (5)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Challenges for Dynamic, Heterogeneous Networks in Observational Sciences.\n \n \n \n \n\n\n \n Singh, L.\n\n\n \n\n\n\n In Kargupta, H.; Kumar, V.; Han, J.; Yu, P. S.; and Motwani, R., editor(s), Next Generation of Data Mining, pages 395–414. Chapman and Hall, December 2008.\n \n\n\n\n
\n\n\n\n \n \n \"ChallengesPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@incollection{LS:book/ngdm/Singh2008,\n  author    = {Lisa Singh},\n  title     = {Challenges for Dynamic, Heterogeneous Networks in Observational Sciences},\n  booktitle = {Next Generation of Data Mining},\n  editor    = {Hillol Kargupta and Vipin Kumar and Jiawei Han and Philip S. Yu and Rajeev Motwani},\n  month     = {December},\n  year      = {2008},\n  pages     = {395–414},\n  publisher = {Chapman and Hall},\n  url       = {https://www.taylorfrancis.com/books/e/9781420085877/chapters/10.1201%2F9781420085877-20}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Software Engineering for Web Services Workflow Systems.\n \n \n \n \n\n\n \n Blake, M. B.; and Singh, L.\n\n\n \n\n\n\n International Journal of Software Engineering and Knowledge Engineering, 18(2): 157–178. 2008.\n \n\n\n\n
\n\n\n\n \n \n \"SoftwarePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/ijseke/BlakeS08,\n  author    = {M. Brian Blake and\n               Lisa Singh},\n  title     = {Software Engineering for Web Services Workflow Systems},\n  journal   = {International Journal of Software Engineering and Knowledge Engineering},\n  volume    = {18},\n  number    = {2},\n  pages     = {157--178},\n  year      = {2008},\n  url       = {https://doi.org/10.1142/S0218194008003593},\n  doi       = {10.1142/S0218194008003593},\n  biburl    = {https://dblp.org/rec/bib/journals/ijseke/BlakeS08},\n  bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Blogs: Emerging Knowledge Management Tools For Entrepreneurs to Enhance Marketing Efforts.\n \n \n \n \n\n\n \n Singh, R. P.; and Singh, L. O.\n\n\n \n\n\n\n Journal of Internet Commerce, 7(4): 470-484. 2008.\n \n\n\n\n
\n\n\n\n \n \n \"Blogs:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{doi:10.1080/15332860802507305,\n  author = { Robert P.   Singh  and  Lisa O.   Singh },\n  title = {Blogs: Emerging Knowledge Management Tools For Entrepreneurs to Enhance Marketing Efforts},\n  journal = {Journal of Internet Commerce},\n  volume = {7},\n  number = {4},\n  pages = {470-484},\n  year  = {2008},\n  publisher = {Routledge},\n  doi = {10.1080/15332860802507305},\n  URL = { https://doi.org/10.1080/15332860802507305 },\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Privacy-Preserving Collaborative Social Networks.\n \n \n \n \n\n\n \n Zhan, J.; Blosser, G.; Yang, C. C.; and Singh, L.\n\n\n \n\n\n\n In Pacific Asia Workshop on Intelligence and Security Informatics (PAISI) at ISI , pages 114–125, Taipei, Taiwan, June 2008. \n \n\n\n\n
\n\n\n\n \n \n \"Privacy-PreservingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/isi/ZhanBYS08,\n  author    = {Justin Zhan and\n               Gary Blosser and\n               Christopher C. Yang and\n               Lisa Singh},\n  title     = {Privacy-Preserving Collaborative Social Networks},\n  booktitle = {Pacific Asia Workshop on Intelligence and Security Informatics (PAISI) at ISI }, \n  pages     = {114--125},\n  month = {June},\n  year      = {2008},\n  address = {Taipei, Taiwan},\n  crossref  = {DBLP:conf/isi/2008w},\n  url       = {https://doi.org/10.1007/978-3-540-69304-8_13},\n  doi       = {10.1007/978-3-540-69304-8_13},\n  biburl    = {https://dblp.org/rec/bib/conf/isi/ZhanBYS08},\n  bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Structure-Based Hierarchical Transformations for Interactive Visual Exploration of Social Networks.\n \n \n \n \n\n\n \n Singh, L.; Beard, M.; Gopalan, B.; and Nelson, G.\n\n\n \n\n\n\n In Advances in Knowledge Discovery and Data Mining - Pacific-Asia Conference (PAKDD) , pages 1015–1021, Osaka, Japan, May 2008. \n \n\n\n\n
\n\n\n\n \n \n \"Structure-BasedPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/pakdd/SinghBGN08,\n  author    = {Lisa Singh and\n               Mitchell Beard and\n               Brian Gopalan and\n               Gregory Nelson},\n  title     = {Structure-Based Hierarchical Transformations for Interactive Visual\n               Exploration of Social Networks},\n  booktitle = {Advances in Knowledge Discovery and Data Mining - Pacific-Asia Conference (PAKDD) },\n  address = {Osaka, Japan},\n  month = {May},\n  pages     = {1015--1021},\n  year      = {2008},\n  crossref  = {DBLP:conf/pakdd/2008},\n  url       = {https://doi.org/10.1007/978-3-540-68125-0_107},\n  doi       = {10.1007/978-3-540-68125-0_107},\n  biburl    = {https://dblp.org/rec/bib/conf/pakdd/SinghBGN08},\n  bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2007\n \n \n (7)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Increasing the Predictive Power of Affiliation Networks.\n \n \n \n \n\n\n \n Singh, L.; and Getoor, L.\n\n\n \n\n\n\n IEEE Data Engineering Bulletin, 30(2): 41–50. 2007.\n \n\n\n\n
\n\n\n\n \n \n \"IncreasingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/debu/SinghG07,\n  author    = {Lisa Singh and\n               Lise Getoor},\n  title     = {Increasing the Predictive Power of Affiliation Networks},\n  journal   = {{IEEE} Data Engineering Bulletin},\n  volume    = {30},\n  number    = {2},\n  pages     = {41--50},\n  year      = {2007},\n  url       = {http://sites.computer.org/debull/A07june/singh.pdf},\n  biburl    = {https://dblp.org/rec/bib/journals/debu/SinghG07},\n  bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Visual Analysis of Dynamic Group Membership in Temporal Social Networks.\n \n \n \n \n\n\n \n Kang, H.; Getoor, L.; and Singh, L.\n\n\n \n\n\n\n ACM SIGKDD Explorations, 9(2): 13–21. 2007.\n \n\n\n\n
\n\n\n\n \n \n \"VisualPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/sigkdd/KangGS07,\n  author    = {Hyunmo Kang and\n               Lise Getoor and\n               Lisa Singh},\n  title     = {Visual Analysis of Dynamic Group Membership in Temporal Social Networks},\n  journal   = {ACM {SIGKDD} Explorations},\n  volume    = {9},\n  number    = {2},\n  pages     = {13--21},\n  year      = {2007},\n  url       = {http://doi.acm.org/10.1145/1345448.1345452},\n  doi       = {10.1145/1345448.1345452},\n  biburl    = {https://dblp.org/rec/bib/journals/sigkdd/KangGS07},\n  bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Privacy Preserving Burst Detection of Distributed Time Series Data Using Linear Transforms.\n \n \n \n \n\n\n \n Singh, L.; and Sayal, M.\n\n\n \n\n\n\n In IEEE Symposium on Computational Intelligence and Data Mining (CIDM) , pages 646–653, Honolulu, Hawaii, USA, April 2007. \n \n\n\n\n
\n\n\n\n \n \n \"PrivacyPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/cidm/SinghS07,\n  author    = {Lisa Singh and\n               Mehmet Sayal},\n  title     = {Privacy Preserving Burst Detection of Distributed Time Series Data\n               Using Linear Transforms},\n  booktitle = {{IEEE} Symposium on Computational Intelligence\n               and Data Mining (CIDM) },\n  pages     = {646--653},\n  month = {April},\n  address = {Honolulu, Hawaii, USA},\n  year      = {2007},\n  crossref  = {DBLP:conf/cidm/2007},\n  url       = {https://doi.org/10.1109/CIDM.2007.368937},\n  doi       = {10.1109/CIDM.2007.368937},\n  biburl    = {https://dblp.org/rec/bib/conf/cidm/SinghS07},\n  bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Measuring Topological Anonymity in Social Networks.\n \n \n \n \n\n\n \n Singh, L.; and Zhan, J.\n\n\n \n\n\n\n In IEEE International Conference on Granular Computing (GrC) , pages 770–774, San Jose, California, USA, November 2007. \n \n\n\n\n
\n\n\n\n \n \n \"MeasuringPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/grc/SinghZ07,\n  author    = {Lisa Singh and\n               Justin Zhan},\n  title     = {Measuring Topological Anonymity in Social Networks},\n  booktitle = {{IEEE} International Conference on Granular Computing (GrC) },\n  pages     = {770--774},\n  month = {November},\n  address = {San Jose, California, USA},\n  year      = {2007},\n  crossref  = {DBLP:conf/grc/2007},\n  url       = {https://doi.org/10.1109/GrC.2007.31},\n  doi       = {10.1109/GrC.2007.31},\n  biburl    = {https://dblp.org/rec/bib/conf/grc/SinghZ07},\n  bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Detecting Aggregate Bursts from Scaled Bins within the Context of Privacy.\n \n \n \n \n\n\n \n Sayal, M.; and Singh, L.\n\n\n \n\n\n\n In Workshop on Privacy Data Management (PDM) at ICDE, pages 172–179, Istanbul, Turkey, April 2007. \n \n\n\n\n
\n\n\n\n \n \n \"DetectingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icde/SayalS07,\n  author    = {Mehmet Sayal and\n               Lisa Singh},\n  title     = {Detecting Aggregate Bursts from Scaled Bins within the Context of\n               Privacy},\n  booktitle = {Workshop on Privacy Data Management (PDM) at ICDE},\n  pages     = {172--179},\n  address = {Istanbul, Turkey},\n  month = {April},\n  year      = {2007},\n  crossref  = {DBLP:conf/icde/2007w},\n  url       = {https://doi.org/10.1109/ICDEW.2007.4400988},\n  doi       = {10.1109/ICDEW.2007.4400988},\n  biburl    = {https://dblp.org/rec/bib/conf/icde/SayalS07},\n  bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n C-GROUP: A Visual Analytic Tool for Pairwise Analysis of Dynamic Group Membership [POSTER].\n \n \n \n \n\n\n \n Kang, H.; Getoor, L.; and Singh, L.\n\n\n \n\n\n\n In IEEE Symposium on Visual Analytics Science and Technology (VAST), pages 211–212, Sacramento, California, USA, November 2007. \n \n\n\n\n
\n\n\n\n \n \n \"C-GROUP:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/ieeevast/KangGS07,\n  author    = {Hyunmo Kang and\n               Lise Getoor and\n               Lisa Singh},\n  title     = {{C-GROUP:} {A} Visual Analytic Tool for Pairwise Analysis of Dynamic\n               Group Membership [POSTER]},\n  booktitle = {{IEEE} Symposium on Visual Analytics Science and Technology (VAST)},\n  pages     = {211--212},\n  month = {November},\n  address = {Sacramento, California, USA},\n  year      = {2007},\n  crossref  = {DBLP:conf/ieeevast/2007},\n  url       = {https://doi.org/10.1109/VAST.2007.4389022},\n  doi       = {10.1109/VAST.2007.4389022},\n  biburl    = {https://dblp.org/rec/bib/conf/ieeevast/KangGS07},\n  bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Visual Mining of Multi-Modal Social Networks at Different Abstraction Levels.\n \n \n \n \n\n\n \n Singh, L.; Beard, M.; Getoor, L.; and Blake, M. B.\n\n\n \n\n\n\n In International Conference on Information Visualisation (IV), pages 672–679, Zürich, Switzerland, July 2007. \n \n\n\n\n
\n\n\n\n \n \n \"VisualPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/iv/SinghBGB07,\n  author    = {Lisa Singh and\n               Mitchell Beard and\n               Lise Getoor and\n               M. Brian Blake},\n  title     = {Visual Mining of Multi-Modal Social Networks at Different Abstraction\n               Levels},\n  booktitle = {International Conference on Information Visualisation (IV)}, \n  pages     = {672--679},\n  address = {Z{\\"{u}}rich, Switzerland},\n  month = {July},\n  year      = {2007},\n  crossref  = {DBLP:conf/iv/2007},\n  url       = {https://doi.org/10.1109/IV.2007.126},\n  doi       = {10.1109/IV.2007.126},\n  biburl    = {https://dblp.org/rec/bib/conf/iv/SinghBGB07},\n  bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2006\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n A Component-Based Data Management and Knowledge Discovery Framework for Aviation Studies.\n \n \n \n \n\n\n \n Blake, M. B.; Singh, L.; Williams, A. B.; Norman, W.; and Silva, A. L.\n\n\n \n\n\n\n International Journal of Information Technology and Web Engineering (IJITWE), 1(1): 76–90. 2006.\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/ijitwe/BlakeSWNS06,\n  author    = {M. Brian Blake and\n               Lisa Singh and\n               Andrew B. Williams and\n               Wendell Norman and\n               Amy L. Silva},\n  title     = {{A} Component-Based Data Management and Knowledge\n               Discovery Framework for Aviation Studies},\n  journal   = {International Journal of Information Technology and Web Engineering (IJITWE)},\n  volume    = {1},\n  number    = {1},\n  pages     = {76--90},\n  year      = {2006},\n  url       = {https://doi.org/10.4018/jitwe.2006010104},\n  doi       = {10.4018/jitwe.2006010104},\n  biburl    = {https://dblp.org/rec/bib/journals/ijitwe/BlakeSWNS06},\n  bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Data Cleansing and Transformation of Observational Scientific Data: A Case Study.\n \n \n \n \n\n\n \n Singh, L.; Nelson, G.; Mann, J.; Coakes, A.; Krzyszczyk, E.; and Herman, E.\n\n\n \n\n\n\n In Workshop on Information Quality in Information Systems (IQIS) at SIGMOD, Chicago, IL, USA, June 2006. \n \n\n\n\n
\n\n\n\n \n \n \"DataPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{LS:workshop/iqis/Singh2006,\n  author    = {Lisa Singh and Gregory Nelson and Janet Mann and Amanda Coakes and Ewa Krzyszczyk and Elia Herman},\n  title     = {Data Cleansing and Transformation of Observational Scientific Data: A Case Study},\n  booktitle = {Workshop on Information Quality in Information Systems (IQIS) at SIGMOD},\n  address   = {Chicago, IL, USA},\n  month     = {June},\n  year      = {2006},\n  url       = {http://people.cs.georgetown.edu/~singh/papers/IQIS2006-SinghMann.pdf}\n}\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2005\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Pruning Social Networks Using Structural Properties and Descriptive Attributes.\n \n \n \n \n\n\n \n Singh, L.; Getoor, L.; and Licamele, L.\n\n\n \n\n\n\n In IEEE International Conference on Data Mining (ICDM) , pages 773–776, Houston, Texas, USA, November 2005. \n \n\n\n\n
\n\n\n\n \n \n \"PruningPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icdm/SinghGL05,\n  author    = {Lisa Singh and\n               Lise Getoor and\n               Louis Licamele},\n  title     = {Pruning Social Networks Using Structural Properties and Descriptive\n               Attributes},\n  booktitle = { {IEEE} International Conference on Data Mining (ICDM) },\n  address = {Houston, Texas, USA},\n  pages     = {773--776},\n  month = {November},\n  year      = {2005},\n  crossref  = {DBLP:conf/icdm/2005},\n  url       = {https://doi.org/10.1109/ICDM.2005.125},\n  doi       = {10.1109/ICDM.2005.125},\n  biburl    = {https://dblp.org/rec/bib/conf/icdm/SinghGL05},\n  bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 1999\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n IRIS: our prototype rule generation system.\n \n \n \n \n\n\n \n Singh, L.; Scheuermann, P.; and Chen, B.\n\n\n \n\n\n\n In Data Mining and Knowledge Discovery: Theory, Tools, and Technology , pages 75–82, Orlando, FL, USA, April 1999. \n \n\n\n\n
\n\n\n\n \n \n \"IRIS:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/dmkdttt/SinghSC99,\n  author    = {Lisa Singh and\n               Peter Scheuermann and\n               Bin Chen},\n  title     = {{IRIS:} our prototype rule generation system},\n  booktitle = {Data Mining and Knowledge Discovery: Theory, Tools, and Technology },\n  pages     = {75--82},\n  month = {April},\n  year      = {1999},\n  address = {Orlando, FL, USA},\n  crossref  = {DBLP:conf/dmkdttt/1999},\n  url       = {https://doi.org/10.1117/12.339992},\n  doi       = {10.1117/12.339992},\n  biburl    = {https://dblp.org/rec/bib/conf/dmkdttt/SinghSC99},\n  bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n An Algorithm for Constrained Association Rule Mining in Semi-structured Data.\n \n \n \n \n\n\n \n Singh, L.; Chen, B.; Haight, R.; and Scheuermann, P.\n\n\n \n\n\n\n In Methodologies for Knowledge Discovery and Data Mining - Pacific-Asia Conference (PAKDD) , pages 148–158, Beijing, China, April 1999. \n \n\n\n\n
\n\n\n\n \n \n \"AnPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/pakdd/SinghCHS99,\n  author    = {Lisa Singh and\n               Bin Chen and\n               Rebecca Haight and\n               Peter Scheuermann},\n  title     = {An Algorithm for Constrained Association Rule Mining in Semi-structured\n               Data},\n  booktitle = {Methodologies for Knowledge Discovery and Data Mining - Pacific-Asia\n               Conference (PAKDD) },\n  pages     = {148--158},\n  month = {April},\n  year      = {1999},\n  address = {Beijing, China},\n  crossref  = {DBLP:conf/pakdd/1999},\n  url       = {https://doi.org/10.1007/3-540-48912-6_21},\n  doi       = {10.1007/3-540-48912-6_21},\n  biburl    = {https://dblp.org/rec/bib/conf/pakdd/SinghCHS99},\n  bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 1998\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n A Robust System Architecture for Mining Semi-Structured Data.\n \n \n \n \n\n\n \n Singh, L.; Chen, B.; Haight, R.; Scheuermann, P.; and Aoki, K.\n\n\n \n\n\n\n In ACM International Conference on Knowledge Discovery and Data Mining (KDD) , pages 329–333, New York City, New York, USA, August 1998. \n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/kdd/SinghCHSA98,\n  author    = {Lisa Singh and\n               Bin Chen and\n               Rebecca Haight and\n               Peter Scheuermann and\n               Kiyoko Aoki},\n  title     = {A Robust System Architecture for Mining Semi-Structured Data},\n  booktitle = {ACM International Conference on Knowledge Discovery\n               and Data Mining (KDD) },\n  pages     = {329--333},\n  address = {New York City, New York, USA},\n  month = {August},\n  year      = {1998},\n  crossref  = {DBLP:conf/kdd/1998},\n  url       = {http://www.aaai.org/Library/KDD/1998/kdd98-059.php},\n  biburl    = {https://dblp.org/rec/bib/conf/kdd/SinghCHSA98},\n  bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 1997\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Generating Association Rules from Semi-Structured Documents Using an Extended Concept Hierarchy.\n \n \n \n \n\n\n \n Singh, L.; Scheuermann, P.; and Chen, B.\n\n\n \n\n\n\n In International Conference on Information and Knowledge Management (CIKM) , pages 193–200, Las Vegas, Nevada, USA, November 1997. \n \n\n\n\n
\n\n\n\n \n \n \"GeneratingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/cikm/SinghSC97,\n  author    = {Lisa Singh and\n               Peter Scheuermann and\n               Bin Chen},\n  title     = {Generating Association Rules from Semi-Structured Documents Using\n               an Extended Concept Hierarchy},\n  booktitle = {International Conference on Information and Knowledge Management (CIKM) },\n  pages     = {193--200},\n  address = {Las Vegas, Nevada, USA},\n  month = {November},\n  year      = {1997},\n  crossref  = {DBLP:conf/cikm/97},\n  url       = {http://doi.acm.org/10.1145/266714.266895},\n  doi       = {10.1145/266714.266895},\n  biburl    = {https://dblp.org/rec/bib/conf/cikm/SinghSC97},\n  bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n\n\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n\n\n \n\n \n \n \n \n\n
\n"}; document.write(bibbase_data.data);