{"id":12,"date":"2018-06-12T20:44:17","date_gmt":"2018-06-12T20:44:17","guid":{"rendered":"http:\/\/sites.tntech.edu\/weberle\/?page_id=12"},"modified":"2025-07-21T18:05:50","modified_gmt":"2025-07-21T18:05:50","slug":"publications","status":"publish","type":"page","link":"https:\/\/sites.tntech.edu\/weberle\/publications\/","title":{"rendered":"Publications"},"content":{"rendered":"<p><b>2025<\/b><\/p>\n<ul>\n<li>F. L. Barsha W. Eberle (2025), &#8220;An in-depth review and analysis of mode collapse in generative adversarial networks,&#8221; Machine Learning, Volume 114, Article 141. https:\/\/doi.org\/10.1007\/s10994-025-06772-7 .<\/li>\n<li>O. A. Ekle, W. Eberle, and J. Christopher (2025), &#8220;Adaptive DecayRank: Real-Time Anomaly Detection in Dynamic Graphs with Bayesian PageRank Updates,&#8221; Applied Sciences, 15(6), 3360. https:\/\/doi.org\/10.3390\/app15063360<\/li>\n<li>F. L. Barsha and W. Eberle (2025), &#8220;Early Detection of Mode Collapse in GANs Through Loss Monitoring,&#8221; In: Computational Science and Computational Intelligence. CSCI 2024. Communications in Computer and Information Science, vol 2501. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-031-90341-0_20<\/li>\n<\/ul>\n<p><b>2024<\/b><\/p>\n<ul>\n<li>A. Elshazly, I. Elgarhy, A. Eltoukhy, M. Mahmoud, W. Eberle, M. Alsabaan, and T. Alshawi (2024), &#8220;False Data Injection Attacks on Reinforcement Learning-Based Charging Coordination in Smart Grids and a Countermeasure,&#8221; Applied Sciences, 14(23), 10874. https:\/\/doi.org\/10.3390\/app142310874<\/li>\n<li>O. Ekle and W. Eberle (2024), &#8220;Anomaly Detection in Dynamic Graphs: A Comprehensive Survey. ACM Transactions in Knowledge Discovery from Data,&#8221; https:\/\/doi.org\/10.1145\/3669906.<\/li>\n<li>A. Elshazly, M. Badr, M. Mahmoud, W. Eberle, M. Alsabaan, and M. Ibrahem (2024), &#8220;Reinforcement Learning for Fair and Efficient Charging Coordination for Smart Grid,&#8221; Energies, 17(18), 4557. https:\/\/doi.org\/10.3390\/en17184557.<\/li>\n<li>S. Islam, I. Russell, W. Eberle, D. Talbert, and M Hasan (2024), &#8220;Advances in Explainable, Fair, and Trustworthy AI. International Journal on Artificial Intelligence Tools.&#8221; Vol. 33, No. 3. https:\/\/doi.org\/10.1142\/S0218213024030015.<\/li>\n<li>P. Lamichhane and W. Eberle (2024), &#8220;Anomaly Detection in Graph Structured Data: A Survey,&#8221; arXiv, https:\/\/arxiv.org\/abs\/2405.06172.<\/li>\n<li>W. Eberle, G. Gannod, and E. Brown (2024, October), &#8220;Innovative Practice: Agile Training for Year-Long Capstone Project,&#8221; IEEE Frontiers in Education Conference (FIE).<\/li>\n<li>O. Ekle and W. Eberle (2024, May), &#8220;Dynamic PageRank with Decay: A Modified Approach for Node Anomaly Detection in Evolving Graph Streams,&#8221; In The International FLAIRS Conference Proceedings (Vol. 37).<\/li>\n<li>F. Barsha and W. Eberle (2024, May), &#8220;Mode Collapse Detection Strategies in Generative Adversarial Networks for Credit Card Fraud Detection,&#8221; In The International FLAIRS Conference Proceedings (Vol. 37).<\/li>\n<\/ul>\n<p><b>2022<\/b><\/p>\n<ul>\n<li>G. Stone, D. Talbert, and W. Eberle, \u201cA Survey of Scalable Reinforcement Learning,\u201d International Journal of Intelligent Computing Research (IJICR), Volume 13, Issue 1, 2022.<\/li>\n<li>Islam, S. R., Russell, I., Eberle, W., and Dicheva, D. (2022). \u201cInstilling conscience about bias and fairness in automated decisions,\u201d Journal of Computing Sciences in Colleges, 37(8), 22-31.<\/li>\n<li>G. Stone, D. Talbert, and W. Eberle, \u201cUtilizing Real-Time Strategy for Penetration Testing,\u201d International Journal of Chaotic Computing (IJCC), Volume 8, Issue 1, 2022.<\/li>\n<li>P. Lamichhane and W. Eberle, \u201cSelf-Organizing Map-Based Graph Clustering and Visualization on Streaming Graphs,\u201d 2022 IEEE International Conference on Data Mining Workshops (ICDMW), November 2022<\/li>\n<li>S.R. Islam and W. Eberle,\u00a0\u201cDomain Knowledge-Aided Explainable Artificial Intelligence\u201d. In: Ahmed, M., Islam, S.R., Anwar, A., Moustafa, N., Pathan, AS.K. (eds) <em>Explainable Artificial Intelligence for Cyber Security<\/em>. Studies in Computational, 2022 Intelligence, vol 1025. Springer, Cham. <a href=\"https:\/\/doi.org\/10.1007\/978-3-030-96630-0_4\">https:\/\/doi.org\/10.1007\/978-3-030-96630-0_4<\/a><\/li>\n<li>P. Lamichhane, H. Mannering, and W. Eberle, \u201cDiscovering Breach Patterns on the Internet of Health Things: A Graph and Machine Learning Anomaly Analysis\u201d, International Conference of the Florida Artificial Intelligence Research Society (FLAIRS), May 2022.<\/li>\n<li>S. R. Islam, I. Russell, W. Eberle, and D. Dicheva, \u201cIncorporating the Concepts of Fairness and Bias into an Undergraduate Computer Science Course to Promote Fair Automated Decision Systems,\u201d SIGCSE 2022: Proceedings of the 53rd ACM Technical Symposium on Computer Science Education, March 2022.<\/li>\n<\/ul>\n<p><b>2021<\/b><\/p>\n<ul>\n<li>P. Lamichhane and W. Eberle, \u201cAnomaly Detection in Edge Streams Using Term Frequency-Inverse Graph Frequency (TF-IGF) Concept,\u201d IEEE Big Data, December 2021.<\/li>\n<li>R. Paudel, L. Tharp, D. Kaiser, W. Eberle, and G. Gannod, &#8220;Visualization of Anomalies using Graph-Based Anomaly Detection,&#8221; International Conference of the Florida Artificial Intelligence Research Society (FLAIRS), May 2021.<\/li>\n<li>S. R. Islam and W. Eberle, \u201cImplications of Combining Domain Knowledge in Explainable Artificial Intelligence,&#8221; Proceedings of the AAAI 2021 Spring Symposium on Combining Machine Learning and Knowledge Engineering in Practice (AAAI-MAKE), March 2021.<\/li>\n<li>G. Stone, D. Talbert, and W. Eberle, \u201cUsing AI\/Machine Learning for Reconnaissance Activities During Network Penetration Testing,\u201d 16th International Conference of Cyber Warfare and Security (ICCWS), Feb 24-26, 2021.<\/li>\n<\/ul>\n<p><b>2020<\/b><\/p>\n<ul>\n<li>W. Eberle and L. Holder, \u201cGraph Filtering to Remove the \u201cMiddle Ground\u201d for Anomaly Detection\u201d, IEEE Big Data Conference, Workshop on High Performance Big Graph Data Management, Analysis, and Mining (BigGraphs 2020), December 2020.<\/li>\n<li>R. Paudel and W. Eberle. \u201cAn Approach For Concept Drift Detection in a Graph Stream Using Discriminative Subgraphs.\u201d ACM Transactions on Knowledge Discovery from Data. Article 70. September 2020. DOI:https:\/\/doi.org\/10.1145\/3406243.<\/li>\n<li>R. Paudel and W. Eberle, \u201cSNAPSKETCH: Graph Representation Approach for Intrusion Detection in a Streaming Graph,\u201d Conference on Knowledge Discovery and Data Mining (KDD) Mining and Learning with Graphs (MLG), August 2020.<\/li>\n<li>S. R. Islam, W. Eberle, and S. Ghafoor, &#8220;Towards Quantification of Explainability in Explainable Artificial Intelligence Methods,&#8221; International Conference of the Florida Artificial Intelligence Research Society (FLAIRS), May 2020.<\/li>\n<li>P. Kandel and W. Eberle, &#8220;Node Similarity For Anomaly Detection in Attributed Graphs,&#8221; International Conference of the Florida Artificial Intelligence Research Society (FLAIRS), May 2020.<\/li>\n<li>S. R. Islam, W. Eberle, S. Ghafoor, A. Siraj, and M. Rogers, \u201cDomain Knowledge Aided Explainable Artificial Intelligence for Intrusion Detection and Response,&#8221; Proceedings of the AAAI 2020 Spring Symposium on Combining Machine Learning and Knowledge Engineering in Practice (AAAI-MAKE), March 2020.<\/li>\n<\/ul>\n<p><b>2019<\/b><\/p>\n<ul>\n<li>Ramesh Paudel, Prajwal Kandel, and William Eberle, \u201cDetecting Spam Tweets in Trending Topics using Graph-Based Approach,\u201d <em>Proceedings of the Future Technologies Conference (FTC),<\/em> October 2019.<\/li>\n<li>Sheikh Rabiul Islam, William Eberle, Sid C. Bundy, and Sheikh Ghafoor, \u201cInfusing Domain Knowledge in AI-based \u201cblack box\u201d Models for Better Explainability with Application in Bankruptcy Prediction,\u201d Workshop on Anomaly Detection in Finance, <em>SIGKDD Conference on Knowledge Discovery and Data Mining (KDD),<\/em> August 2019.<\/li>\n<li>A. Bhuiyan, M. B. Sharif, P. J. Tinker, W. Eberle, D. A. Talbert, S. K. Ghafoor, and L. Frey, \u201cGene Selection and Clustering of Breast Cancer Data,\u201d <em>International Conference of the Florida AI Research Society (FLAIRS)<\/em>, May 2019.<\/li>\n<li>Sirisha Velampalli, Lenin Mookiah, and William Eberle, \u201cDiscovering Suspicious Patterns Using a Graph Based Approach,\u201d <em>International Conference of the Florida AI Research Society (FLAIRS)<\/em>, May 2019.<\/li>\n<li>Ramesh Paudel, Peter Harlan, and William Eberle, \u201cDetecting the Onset of a Network Layer DoS Attack with a Graph-Based Approach,\u201d <em>International Conference of the Florida AI Research Society (FLAIRS)<\/em>, May 2019.<\/li>\n<\/ul>\n<p><b>2018<\/b><\/p>\n<ul>\n<li>Lenin Mookiah, William Eberle, and M. Mondal, \u201cPersonalized News Recommendation using Graph-Based Approach\u201d, <em>Intelligent Data Analysis, an International Journal<\/em>, Volume 22 (2018) 881\u2013909.<\/li>\n<li>Ramesh Paudel, William Eberle, and Lawrence Holder, \u201cAnomaly Detection of Elderly Patient Activities in Smart Homes using a Graph-Based Approach,\u201d <em>International Conference on Data Science (ICDATA)<\/em>, July 2018.<\/li>\n<li>Sheikh Rabiul Islam, William Eberle, and Sheikh Ghafoor, \u201cCredit Default Mining Using Combined Machine Learning and Heuristic Approach,\u201d <em>International Conference on Data Science (ICDATA)<\/em>, July 2018.<\/li>\n<li>Rina Singh, Jeffrey Graves, Douglas Talbert, and William Eberle, \u201cPrefix and Suffix Sequential Pattern Mining\u201d, <em>Conference on Machine Learning and Data Mining (MLDM)<\/em>, July, 2018.<\/li>\n<li>Ramesh Paudel, Kimberlyn Dunn, William Eberle, and Danielle Chaung, \u201cCognitive Health Prediction on the Elderly Using Sensor Data in Smart Homes,\u201d <em>International Conference of the Florida AI Research Society (FLAIRS)<\/em>, May 2018.<\/li>\n<\/ul>\n<p><b>2017<\/b><\/p>\n<ul>\n<li>Sirisha Velampalli, Lenin Mookiah, and William Eberle, \u201cDetecting Vehicular Patterns Using a Graph-Based Approach,\u201d <em>IEEE Conference on Visual Analytics Science and Technology (VAST)<\/em>, October 2017.<\/li>\n<li>Deon Liang, Chih-Fong Tsai, An-Jie Dai, and William Eberle, \u201cA novel classifier ensemble approach for financial distress prediction,\u201d <em>Knowledge and Information Systems, An International Journal<\/em>, May 2017.<\/li>\n<li>Lenin Mookiah, Chris Dean, and William Eberle, \u201cGraph-Based Anomaly Detection on Smart Grid Data,\u201d <em>International Conference of the Florida AI Research Society (FLAIRS)<\/em>, May 2017.<\/li>\n<li>Ramesh Paudel, William Eberle, and Douglas Talbert \u201cDetection of Anomalous Activity in Diabetic Patients Using Graph-Based Approach,\u201d <em>International Conference of the Florida AI Research Society (FLAIRS)<\/em>, May 2017.<\/li>\n<li>Sirisha Velampalli and William Eberle, \u201cNovel Graph Based Anomaly Detection Using Background Knowledge,\u201d <em>International Conference of the Florida AI Research Society (FLAIRS)<\/em>, May 2017.<\/li>\n<li>Nishith Thakkar, Lenin Mookiah, Douglas Talbert, and William Eberle, \u201cAnomalies in Student Enrollment Using Visualization,\u201d <em>International Conference of the Florida AI Research Society (FLAIRS)<\/em>, May 2017.<\/li>\n<\/ul>\n<p><b>2016<\/b><\/p>\n<ul>\n<li>Zdravko Markov, Ingrid Russell, and William Eberle, \u201cReport on the 29th International Florida Artificial Intelligence Research Society Conference (FLAIRS-29),\u201d <em>AI Magazine<\/em>, Winter 2016.<\/li>\n<li>Lenin Mookiah and William Eberle, \u201cCo-Ranking Authors in Heterogeneous News Networks,\u201d <em>2016 International Conference on Computational Science and Computational Intelligence<\/em>, December 2016.<\/li>\n<li>Sirisha Velampalli and William Eberle, \u201cNovel Application of MapReduce and Conceptual Graphs,\u201d <em>2016 International Conference on Computational Science and Computational Intelligence,<\/em> December 2016.<\/li>\n<li>William Eberle and Lawrence Holder, <a href=\"http:\/\/sites.tntech.edu\/weberle\/wp-content\/uploads\/sites\/87\/2018\/06\/KDD_MLG_2016.pdf\">\u201cIdentifying Anomalies in Graph Streams Using Change Detection,\u201d<\/a> <em>Conference on Knowledge Discovery and Data Mining (KDD) Mining and Learning with Graphs (MLG)<\/em>, August 2016.<\/li>\n<li>Lenin Mookiah, William Eberle, and Maitrayi Mondal, <a href=\"http:\/\/sites.tntech.edu\/weberle\/wp-content\/uploads\/sites\/87\/2018\/06\/DMIN_2016.pdf\">\u201cDetecting Change in News Feeds Using a Context-Based Graph,\u201d<\/a> <em>International Conference on Data Mining (DMIN)<\/em>, 2016.<\/li>\n<li>Dario Cruz, Doug Talbert, William Eberle, and Joseph Biernacki, <a href=\"http:\/\/sites.tntech.edu\/weberle\/wp-content\/uploads\/sites\/87\/2018\/06\/ICAI_2016.pdf\">&#8220;A neural network approach for predicting microstructure development in cement,&#8221;<\/a> <em>Int&#8217;l Conf. Artificial Intelligence, ICAI&#8217;16<\/em>, pp. 328-334, 2016.<\/li>\n<li>M.-W. Huang, W.-C. Lin, L. Chih-Wen, C. Shih-en, C.-F. Tsai, and W. Eberle, <a href=\"http:\/\/sites.tntech.edu\/weberle\/wp-content\/uploads\/sites\/87\/2018\/06\/EXSY_2016.pdf\">\u201cData preprocessing issues for incomplete medical datasets,\u201d<\/a> <em>Expert Systems<\/em>, June 2016.<\/li>\n<\/ul>\n<p><b>2015<\/b><\/p>\n<ul>\n<li>Lenin Mookiah, William Eberle, and Lawrence Holder, <a href=\"http:\/\/sites.tntech.edu\/weberle\/wp-content\/uploads\/sites\/87\/2018\/06\/FLAIRS_2015_Mookiah.pdf\">\u201cDiscovering Suspicious Behavior Using Graph-Based Approach,\u201d<\/a>\u00a0<em>International Conference of the Florida AI Research Society (FLAIRS)<\/em>, May 2015. (Nominated for Best Student Paper)<\/li>\n<li>Cameron Chaparro and William Eberle, <a href=\"http:\/\/sites.tntech.edu\/weberle\/wp-content\/uploads\/sites\/87\/2018\/06\/FLAIRS_2015_Chaparro.pdf\">\u201cDetecting Anomalies in Mobile Telecommunication Networks Using a Graph Based Approach,\u201d<\/a>\u00a0<em>International Conference of the Florida AI Research Society (FLAIRS)<\/em>, May 2015.<\/li>\n<li>Lenin Mookiah, William Eberle, and Ambareen Siraj, <a href=\"http:\/\/sites.tntech.edu\/weberle\/wp-content\/uploads\/sites\/87\/2018\/06\/FLAIRS_2015_Siraj.pdf\">\u201cSurvey of Crime Analysis and Prediction,\u201d<\/a>\u00a0<em>International Conference of the Florida AI Research Society (FLAIRS)<\/em>, May 2015.<\/li>\n<li>William Eberle and Lawrence Holder, <a href=\"http:\/\/sites.tntech.edu\/weberle\/wp-content\/uploads\/sites\/87\/2018\/06\/HST_2015.pdf\">\u201cStreaming Data Analytics for Anomalies in Graphs,\u201d<\/a>\u00a0<em>IEEE International Symposium on Technologies for Homeland Security<\/em>, April 2015.<\/li>\n<li>William Eberle and Lawrence Holder. <a href=\"http:\/\/sites.tntech.edu\/weberle\/wp-content\/uploads\/sites\/87\/2018\/06\/IDA_2015.pdf\">\u201cScalable Anomaly Detection in Graphs,\u201d<\/a>\u00a0<em>Intelligent Data Analysis, an International Journal<\/em>, Volume 19(1), 2015.<\/li>\n<li>W.-C. Lin, C.-F. Tsai, S.-W. Ke, C.-W. Hung, and W. Eberle, <a href=\"http:\/\/sites.tntech.edu\/weberle\/wp-content\/uploads\/sites\/87\/2018\/06\/SW_SYSTEMS_2015.pdf\">\u201cLearning to Detect Representative Data for Large Scale Instance Selection,\u201d<\/a>\u00a0<em>Journal of Systems and Software<\/em>, 2015.<\/li>\n<\/ul>\n<p><b>2014<\/b><\/p>\n<ul>\n<li>Vitaly Ford, Ambareen Siraj, and William Eberle. <a href=\"http:\/\/sites.tntech.edu\/weberle\/wp-content\/uploads\/sites\/87\/2018\/06\/SSCI_2014.pdf\">\u201cSmart Energy Fraud Detection Using Artificial Neural Networks,\u201d<\/a>\u00a0<em>IEEE Symposium Series on Computational Intelligence (SSCI)<\/em>, December 2014.<\/li>\n<li>Lenin Mookiah, William Eberle, and Lawrence Holder. <a href=\"http:\/\/sites.tntech.edu\/weberle\/wp-content\/uploads\/sites\/87\/2018\/06\/VAST_2014.pdf\">\u201cDetecting Suspicious Behavior Using a Graph-Based Approach,\u201d<\/a>\u00a0<em>IEEE Symposium on Visual Analytics Science and Technology (VAST)<\/em>, November 2014.<\/li>\n<li>William Eberle and Lawrence Holder. <a href=\"http:\/\/sites.tntech.edu\/weberle\/wp-content\/uploads\/sites\/87\/2018\/06\/BigData_2014.pdf\">\u201cA Partitioning Approach to Scaling Anomaly Detection in Graph Streams,\u201d<\/a>\u00a0<em>First International Workshop on High Performance Big Graph Data Management, Analysis, and Mining (BigGraphs)<\/em>, IEEE BigData Conference, October 2014.<\/li>\n<li>Z.-Y. Chen, C.-F. Tsai, W. Eberle, W.-C. Lin, and S.-W. Ke. <a href=\"http:\/\/sites.tntech.edu\/weberle\/wp-content\/uploads\/sites\/87\/2018\/06\/SOCO_2014.pdf\">\u201cInstance Selection by Genetic-Based Biological Algorithm,\u201d<\/a>\u00a0<em>Soft Computing<\/em>, June 2014.<\/li>\n<\/ul>\n<p><b>2013<\/b><\/p>\n<ul>\n<li>William Eberle and Lawrence Holder. <a href=\"http:\/\/sites.tntech.edu\/weberle\/wp-content\/uploads\/sites\/87\/2018\/06\/ICDM_2013.pdf\">\u201cIncremental Anomaly Detection in Graphs,\u201d<\/a>\u00a0<em>Proceedings of the IEEE ICDM Workshop on Incremental Clustering, Concept Drift and Novelty Detection (IcIaNov)<\/em>, December 2013.<\/li>\n<li>William Eberle, Douglas Talbert, Eric Simpson, Larry Roberts, and Alexis Pope. <a href=\"http:\/\/sites.tntech.edu\/weberle\/wp-content\/uploads\/sites\/87\/2018\/06\/NSSR_2013-1.pdf\">\u201cUsing Machine Learning and Predictive Modeling to Assess Admission Policies and Standards,\u201d\u00a0<\/a><em>9th Annual National Symposium on Student Retention<\/em>, November 2013.<\/li>\n<li>William Eberle, John Karro, Neal Lerner, and Matthias Stallmann. <a href=\"http:\/\/sites.tntech.edu\/weberle\/wp-content\/uploads\/sites\/87\/2018\/06\/FIE_2013_2.pdf\">\u201cIntegrating Communication Skills in Data Structures and Algorithms Courses,\u201d<\/a>\u00a0<em>Frontiers in Education (FIE) Conference<\/em>, October 2013.<\/li>\n<li>Chris Morack and William Eberle. <a href=\"http:\/\/sites.tntech.edu\/weberle\/wp-content\/uploads\/sites\/87\/2018\/06\/FIE_2013.pdf\">\u201cComputer Science Widening the STEM Education Spectrum,\u201d<\/a>\u00a0<em>Frontiers in Education (FIE) Conference<\/em>, October 2013.<\/li>\n<li>Alan McCormick and William Eberle, <a href=\"http:\/\/sites.tntech.edu\/weberle\/wp-content\/uploads\/sites\/87\/2018\/06\/FLAIRS_2013.pdf\">\u201cDiscovering Fraud in Online Classified Ads,\u201d<\/a>\u00a0<em>International Conference of the Florida AI Research Society (FLAIRS)<\/em>, May 2013.<\/li>\n<\/ul>\n<p><b>2012<\/b><\/p>\n<ul>\n<li>Chih-Fong Tsai, William Eberle and Chi-Yuan Chu.\u00a0<a href=\"http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0950705112003140\">\u201cGenetic Algorithms in Feature and Instance Selection<\/a>,&#8221; <em>Knowledge-Based Systems<\/em>, Volume 39, pp. 240-247, 2012.<\/li>\n<li>William Eberle, Lawrence Holder and Beverly Massengill. <a href=\"http:\/\/sites.tntech.edu\/weberle\/wp-content\/uploads\/sites\/87\/2018\/06\/FLAIRS_2012.pdf\">&#8220;Graph-Based Anomaly Detection Applied to Homeland Security Cargo Screening,&#8221;<\/a>\u00a0<em>International Conference of the Florida AI Research Society (FLAIRS)<\/em>, May 2012.<\/li>\n<\/ul>\n<p><b>2011<\/b><\/p>\n<ul>\n<li>Brandon Sherrill, William Eberle and Douglas Talbert. <a href=\"http:\/\/sites.tntech.edu\/weberle\/wp-content\/uploads\/sites\/87\/2018\/06\/NSSR_2011.pdf\">&#8220;Analysis of Student Data for Retention Using Data Mining Techniques,&#8221;<\/a>\u00a0<em>National Symposium of Student Retention (NSSR)<\/em>, November 2011.<\/li>\n<li>William Eberle and Lawrence Holder. <a href=\"http:\/\/sites.tntech.edu\/weberle\/wp-content\/uploads\/sites\/87\/2018\/06\/KDD-MLG_2011.pdf\">&#8220;Compression versus Frequency for Mining Patterns and Anomalies in Graphs,&#8221;<\/a>\u00a0<em>Conference on Knowledge Discovery and Data Mining (KDD) Mining and Learning with Graphs (MLG)<\/em>, August 2011.<\/li>\n<li>William Eberle and Lawrence Holder. <a href=\"http:\/\/sites.tntech.edu\/weberle\/wp-content\/uploads\/sites\/87\/2018\/06\/FLAIRS_2011.pdf\">&#8220;Graph-Based Knowledge Discovery: Compression versus Frequency,\u201d<\/a>\u00a0<em>International Conference of the Florida AI Research Society (FLAIRS)<\/em>, May 2011.<\/li>\n<li>William Eberle, Lawrence Holder and Jeffrey Graves. <a href=\"http:\/\/sites.tntech.edu\/weberle\/wp-content\/uploads\/sites\/87\/2018\/06\/JASR_2011.pdf\">&#8220;Insider Threat Detection Using a Graph-based Approach,&#8221;<\/a>\u00a0<em>Journal of Applied Security Research<\/em>, Volume 6, Issue 1, January 2011.<\/li>\n<\/ul>\n<p><b>2010<\/b><\/p>\n<ul>\n<li>William Eberle, Lawrence Holder and Jeffrey Graves. <a href=\"http:\/\/sites.tntech.edu\/weberle\/wp-content\/uploads\/sites\/87\/2018\/06\/FLAIRS_2010.pdf\">\u201cUsing a Graph-Based Approach for Discovering Cybercrime,\u201d<\/a>\u00a0<em>International Conference of the Florida AI Research Society (FLAIRS)<\/em>, May 2010.<\/li>\n<\/ul>\n<p><b>2009<\/b><\/p>\n<ul>\n<li>William Eberle, Lawrence Holder and Jeffrey Graves. <a href=\"http:\/\/sites.tntech.edu\/weberle\/wp-content\/uploads\/sites\/87\/2018\/06\/VAST_2009.pdf\">\u201cDetecting Employee Leaks Using Badge and Network IP Traffic,\u201d<\/a>\u00a0<em>IEEE Symposium on Visual Analytics Science and Technology (VAST)<\/em>, October 2009.<\/li>\n<li>William Eberle and Lawrence Holder. <a href=\"http:\/\/sites.tntech.edu\/weberle\/wp-content\/uploads\/sites\/87\/2018\/06\/ISI_2009.pdf\">\u201cApplying Graph-based Anomaly Detection Approaches to the Discovery of Insider Threats,\u201d<\/a>\u00a0<em>IEEE International Conference on Intelligence and Security Informatics (ISI)<\/em>, June 2009.<\/li>\n<li>William Eberle and Lawrence Holder. <a href=\"http:\/\/sites.tntech.edu\/weberle\/wp-content\/uploads\/sites\/87\/2018\/06\/FLAIRS_2009.pdf\">\u201cDiscovering Anomalies to Multiple Normative Patterns in Structural and Numeric Data,\u201d<\/a>\u00a0<em>International Conference of the Florida AI Research Society (FLAIRS)<\/em>, May 2009.\u00a0<i>Best Paper Award<\/i>.<\/li>\n<li>William Eberle, Lawrence Holder and Diane Cook. \u201cIdentifying Threats Using Graph-Based Anomaly Detection\u201d <em>In\u00a0<a href=\"http:\/\/www.amazon.com\/Machine-Learning-Cyber-Trust-Reliability\/dp\/0387887342\/ref=sr_1_1?ie=UTF8&amp;s=books&amp;qid=1240850540&amp;sr=1-1\">Machine Learning in Cyber-Trust<\/a><\/em>, J. Tsai and P. Yu (eds.), May 2009.<\/li>\n<li>William Eberle and Lawrence Holder. &#8220;<a href=\"http:\/\/sites.tntech.edu\/weberle\/wp-content\/uploads\/sites\/87\/2019\/02\/eberle-abstract.pdf\">Graph-Based Approaches to Insider Threat Detection<\/a>,&#8221; <em>Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research (CSIIRW)<\/em>, April 13-15, 2009.<\/li>\n<li>William Eberle and Lawrence Holder. <a href=\"http:\/\/sites.tntech.edu\/weberle\/wp-content\/uploads\/sites\/87\/2018\/06\/CIDM2009.pdf\">\u201cMining for Insider Threats in Business Transactions and Processes,\u201d<\/a>\u00a0<em>Computational Intelligence in Data Mining (CIDM)<\/em>, IEEE Symposium Series on Computational Intelligence, March 30-April 2, 2009.<\/li>\n<li>William Eberle and Lawrence Holder. <a href=\"http:\/\/sites.tntech.edu\/weberle\/wp-content\/uploads\/sites\/87\/2018\/06\/CATCH_2009.pdf\">&#8220;Insider Threat Detection Using Graph-Based Approaches,&#8221;<\/a>\u00a0<em>Cybersecurity Applications and Technologies Conference for Homeland Security (CATCH)<\/em>, March 2009.<\/li>\n<\/ul>\n<p><b>2008<\/b><\/p>\n<ul>\n<li>William Eberle and Lawrence Holder. <a href=\"http:\/\/sites.tntech.edu\/weberle\/wp-content\/uploads\/sites\/87\/2018\/06\/VAST2008.pdf\">\u201cAnalyzing Catalano\/Vidro Social Structure Using GBAD,\u201d<\/a>\u00a0<em>VAST 2008 Challenge Track, VisWeek<\/em>, October 2008.<\/li>\n<\/ul>\n<p><b>2007<\/b><\/p>\n<ul>\n<li>William Eberle and Lawrence Holder. <a href=\"http:\/\/sites.tntech.edu\/weberle\/wp-content\/uploads\/sites\/87\/2018\/06\/EberleIDA07.pdf\">&#8220;Anomaly Detection in Data Represented as Graphs,&#8221;<\/a>\u00a0<em>Intelligent Data Analysis: An International Journal,<\/em>\u00a0Volume 11, Number 6, pp. 663-689. 2007.<\/li>\n<li>William Eberle and Lawrence Holder. <a href=\"http:\/\/sites.tntech.edu\/weberle\/wp-content\/uploads\/sites\/87\/2018\/06\/MGCS2007.pdf\">&#8220;Discovering Structural Anomalies in Graph-Based Data,&#8221;\u00a0<\/a>\u00a0<em>Mining Graphs and Complex Structures Workshop, IEEE International Conference on Data Mining (ICDM)<\/em>, October 2007.<\/li>\n<li>William Eberle and Lawrence Holder.\u00a0 &#8220;<a href=\"http:\/\/sites.tntech.edu\/weberle\/wp-content\/uploads\/sites\/87\/2018\/06\/DMIN2007.pdf\">Mining for Structural Anomalies in Graph-Based Data,&#8221;<\/a>\u00a0<em>International Conference on Data Mining (DMIN)<\/em>, June 2007.<\/li>\n<li>William Eberle.\u00a0<a href=\"https:\/\/uta-ir.tdl.org\/uta-ir\/handle\/10106\/499\">&#8220;Information Theoretic, Probabilistic, and Maximum Partial Substructure Algorithms for Discovering Graph-Based Anomalies,&#8221;<\/a>\u00a0Doctoral Dissertation. <em>University of Texas at Arlington<\/em>. May 2007.<\/li>\n<\/ul>\n<p><b>2006<\/b><\/p>\n<ul>\n<li>William Eberle and Lawrence Holder. <a href=\"http:\/\/sites.tntech.edu\/weberle\/wp-content\/uploads\/sites\/87\/2018\/06\/DetectingAnomaliesInCargo.pdf\">\u201cDetecting Anomalies in Cargo Using Graph Properties,\u201d <\/a>\u00a0<em>IEEE International Conference on Intelligence and Security Informatics<\/em>, May, 2006.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>2025 F. L. Barsha W. Eberle (2025), &#8220;An in-depth review and analysis of mode collapse in generative adversarial networks,&#8221; Machine Learning, Volume 114, Article 141. https:\/\/doi.org\/10.1007\/s10994-025-06772-7 . O. A. Ekle, W. Eberle, and J. Christopher (2025), &#8220;Adaptive DecayRank: Real-Time Anomaly &hellip; <a href=\"https:\/\/sites.tntech.edu\/weberle\/publications\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":95,"featured_media":0,"parent":0,"menu_order":3,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-12","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/sites.tntech.edu\/weberle\/wp-json\/wp\/v2\/pages\/12","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sites.tntech.edu\/weberle\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.tntech.edu\/weberle\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.tntech.edu\/weberle\/wp-json\/wp\/v2\/users\/95"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.tntech.edu\/weberle\/wp-json\/wp\/v2\/comments?post=12"}],"version-history":[{"count":30,"href":"https:\/\/sites.tntech.edu\/weberle\/wp-json\/wp\/v2\/pages\/12\/revisions"}],"predecessor-version":[{"id":254,"href":"https:\/\/sites.tntech.edu\/weberle\/wp-json\/wp\/v2\/pages\/12\/revisions\/254"}],"wp:attachment":[{"href":"https:\/\/sites.tntech.edu\/weberle\/wp-json\/wp\/v2\/media?parent=12"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}