Progress in supervised neural networks DR Hush, BG Horne IEEE signal processing magazine 10 (1), 8-39, 1993 | 2106 | 1993 |
Learning long-term dependencies in NARX recurrent neural networks T Lin, BG Horne, P Tino, CL Giles IEEE transactions on neural networks 7 (6), 1329-1338, 1996 | 992 | 1996 |
Computational capabilities of recurrent NARX neural networks HT Siegelmann, BG Horne, CL Giles IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 27
, 1997 | 609 | 1997 |
Software self-defense systems and methods JJ Horning, WO Sibert, RE Tarjan, U Maheshwari, WG Horne, AK Wright, ... US Patent 7,430,670, 2008 | 330 | 2008 |
Fast exact and heuristic methods for role minimization problems A Ene, W Horne, N Milosavljevic, P Rao, R Schreiber, RE Tarjan Proceedings of the 13th ACM symposium on Access control models and
, 2008 | 312 | 2008 |
Software self-defense systems and methods JJ Horning, WO Sibert, RE Tarjan, U Maheshwari, WG Horne, AK Wright, ... US Patent 7,823,135, 2010 | 278 | 2010 |
Software self-checking systems and methods WG Home, LR Matheson, C Sheehan, RE Tarjan US Patent 7,581,103, 2009 | 258* | 2009 |
Dynamic self-checking techniques for improved tamper resistance B Horne, L Matheson, C Sheehan, RE Tarjan ACM Workshop on Digital Rights Management, 141-159, 2001 | 258 | 2001 |
Systems and methods for conducting transactions and communications using a trusted third party B Pinkas, T Sander, WG Horne US Patent 7,136,840, 2006 | 243* | 2006 |
Audit-log integrity using redactable signatures W Horne, S Haber, T Sander US Patent 8,943,332, 2015 | 240 | 2015 |
An analysis of noise in recurrent neural networks: convergence and generalization KC Jim, CL Giles, BG Horne IEEE Transactions on neural networks 7 (6), 1424-1438, 1996 | 195 | 1996 |
An experimental comparison of recurrent neural networks B Horne, C Giles Advances in neural information processing systems 7, 1994 | 178 | 1994 |
Software self-defense systems and methods J Horning, W Sibert, R Tarjan, U Maheshwari, W Horne, A Wright, ... US Patent App. 11/506,321, 2007 | 171 | 2007 |
Policy based, delegated limited network access management IE Band, WG Howe, PV Rao, PAP Huang US Patent 8,453,198, 2013 | 167 | 2013 |
A delay damage model selection algorithm for NARX neural networks TN Lin, CL Giles, BG Horne, SY Kung IEEE Transactions on Signal Processing 45 (11), 2719-2730, 1997 | 163 | 1997 |
Certified email with a light on-line trusted third party: Design and implementation M Abadi, N Glew, B Horne, B Pinkas Proceedings of the 11th international conference on World Wide Web, 387-395, 2002 | 162 | 2002 |
Error surfaces for multilayer perceptrons DR Hush, B Horne, JM Salas IEEE Transactions on systems, man, and cybernetics 22 (5), 1152-1161, 1992 | 144 | 1992 |
How embedded memory in recurrent neural network architectures helps learning long-term temporal dependencies T Lin, BG Horne, CL Giles Neural Networks 11 (5), 861-868, 1998 | 137 | 1998 |
Detecting malicious domains via graph inference P Manadhata, S Yadav, P Rao, W Horne Proceedings of the 2014 Workshop on Artificial Intelligent and Security
, 2014 | 135 | 2014 |
Silent shredder: Zero-cost shredding for secure non-volatile main memory controllers A Awad, P Manadhata, S Haber, Y Solihin, W Horne ACM SIGPLAN Notices 51 (4), 263-276, 2016 | 121 | 2016 |