


default search action
Benjamin A. Miller
Person information
- affiliation: MIT Lincoln Laboratory, Lexington, MA, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Benjamin A. Miller, Kevin S. Chan, Tina Eliassi-Rad:
Complex network effects on the robustness of graph convolutional networks. Appl. Netw. Sci. 9(1): 5 (2024) - [j7]Benjamin A. Miller
, Kevin S. Chan, Tina Eliassi-Rad:
Using overlapping methods to counter adversaries in community detection. J. Complex Networks 12(4) (2024) - [j6]William Shiao
, Benjamin A. Miller, Kevin Chan, Paul L. Yu, Tina Eliassi-Rad, Evangelos E. Papalexakis:
TenGAN: adversarially generating multiplex tensor graphs. Data Min. Knowl. Discov. 38(1): 1-21 (2024) - [j5]Benjamin A. Miller
, Zohair Shafi
, Wheeler Ruml
, Yevgeniy Vorobeychik
, Tina Eliassi-Rad
, Scott Alfeld
:
Attacking Shortest Paths by Cutting Edges. ACM Trans. Knowl. Discov. Data 18(2): 35:1-35:42 (2024) - [c37]Varun R. Bharadwaj, Benjamin A. Miller, Vesna D. Novak, Chao Jiang:
Learning Skill Training Schedules from Domain Experts in a Rehabilitation Gym Using Inverse Reinforcement Learning. BioRob 2024: 1815-1821 - [i15]Erica Cai, Olga Simek, Benjamin A. Miller, Danielle Sullivan-Pao, Evan Young, Christopher L. Smith:
From low resource information extraction to identifying influential nodes in knowledge graphs. CoRR abs/2401.04915 (2024) - 2023
- [c36]Benjamin A. Miller, Bikranta Adhikari, Chao Jiang
, Vesna D. Novak:
Automated Patient-Robot Task Assignment in a Simulated Stochastic Rehabilitation Gym. ICORR 2023: 1-6 - [i14]Benjamin A. Miller, Zohair Shafi, Wheeler Ruml, Yevgeniy Vorobeychik, Tina Eliassi-Rad, Scott Alfeld:
Defense Against Shortest Path Attacks. CoRR abs/2305.19083 (2023) - [i13]Benjamin A. Miller, Kevin S. Chan, Tina Eliassi-Rad:
Using Overlapping Methods to Counter Adversaries in Community Detection. CoRR abs/2308.03081 (2023) - [i12]Benjamin A. Miller, Kevin S. Chan, Tina Eliassi-Rad:
Complex Network Effects on the Robustness of Graph Convolutional Networks. CoRR abs/2308.05498 (2023) - [i11]Zohair Shafi, Benjamin A. Miller, Tina Eliassi-Rad, Rajmonda Sulo Caceres:
Graph-SCP: Accelerating Set Cover Problems with Graph Neural Networks. CoRR abs/2310.07979 (2023) - [i10]Zohair Shafi, Benjamin A. Miller, Ayan Chatterjee, Tina Eliassi-Rad, Rajmonda Sulo Caceres:
GRASP: Accelerating Shortest Path Attacks via Graph Attention. CoRR abs/2310.07980 (2023) - 2022
- [c35]Bikranta Adhikari, Shivanjali Ranashing, Benjamin A. Miller, Vesna D. Novak, Chao Jiang
:
Learning Dynamic Patient-Robot Task Assignment and Scheduling for A Robotic Rehabilitation Gym. ICORR 2022: 1-6 - [p1]Lauren Milechin, Shana Hutchison, Hayden Jananthan, Jeremy Kepner, Benjamin A. Miller, Andrew Prout, Siddharth Samsi, Charles Yee, Vijay Gadepally:
Graphulo: Linear Algebra Graph Kernels. Massive Graph Analytics 2022: 525-548 - [i9]Benjamin A. Miller, Zohair Shafi, Wheeler Ruml
, Yevgeniy Vorobeychik, Tina Eliassi-Rad, Scott Alfeld:
Attacking Shortest Paths by Cutting Edges. CoRR abs/2211.11141 (2022) - 2021
- [c34]Talha Ongun, Oliver Spohngellert, Benjamin A. Miller, Simona Boboila, Alina Oprea, Tina Eliassi-Rad, Jason Hiser, Alastair Nottingham, Jack W. Davidson, Malathi Veeraraghavan:
PORTFILER: Port-Level Network Profiling for Self-Propagating Malware Detection. CNS 2021: 182-190 - [c33]Dalton Hass, Benjamin A. Miller, Boyi Dai, Domen Novak, Maja Gorsic:
Design and Pilot Evaluation of a Prototype Sensorized Trunk Exoskeleton. EMBC 2021: 4537-4541 - [c32]Benjamin A. Miller, Domen Novak:
Toward Real-Time Detection of Object Lifting Using Wearable Inertial Measurement Units. EMBC 2021: 6831-6834 - [c31]Benjamin A. Miller
, Zohair Shafi
, Wheeler Ruml
, Yevgeniy Vorobeychik
, Tina Eliassi-Rad
, Scott Alfeld
:
PATHATTACK: Attacking Shortest Paths in Complex Networks. ECML/PKDD (2) 2021: 532-547 - [i8]Benjamin A. Miller, Zohair Shafi, Wheeler Ruml, Yevgeniy Vorobeychik, Tina Eliassi-Rad, Scott Alfeld:
PATHATTACK: Attacking Shortest Paths in Complex Networks. CoRR abs/2104.03761 (2021) - [i7]Benjamin A. Miller, Zohair Shafi, Wheeler Ruml, Yevgeniy Vorobeychik, Tina Eliassi-Rad, Scott Alfeld:
Optimal Edge Weight Perturbations to Attack Shortest Paths. CoRR abs/2107.03347 (2021) - [i6]Talha Ongun, Oliver Spohngellert, Benjamin A. Miller, Simona Boboila, Alina Oprea, Tina Eliassi-Rad, Jason Hiser, Alastair Nottingham, Jack W. Davidson, Malathi Veeraraghavan:
PORTFILER: Port-Level Network Profiling for Self-Propagating Malware Detection. CoRR abs/2112.13798 (2021) - 2020
- [i5]Benjamin A. Miller, Mustafa Çamurcu, Alexander J. Gomez, Kevin S. Chan, Tina Eliassi-Rad:
Topological Effects on Attacks Against Vertex Classification. CoRR abs/2003.05822 (2020)
2010 – 2019
- 2018
- [c30]Benjamin A. Miller, Jeremy Vila, Malina Kirn, Joseph R. Zipkin:
Classifier Performance Estimation with Unbalanced, Partially Labeled Data. COST@SDM 2018: 4-16 - 2016
- [c29]Benjamin A. Miller, Rajmonda Sulo Caceres, Steven Thomas Smith:
Intersection and convex combination in multi-source spectral planted cluster detection. GlobalSIP 2016: 365-369 - [i4]Rajmonda Sulo Caceres, Leah Weiner, Matthew C. Schmidt, Benjamin A. Miller, William M. Campbell:
Model Selection Framework for Graph-based data. CoRR abs/1609.04859 (2016) - 2015
- [j4]Benjamin A. Miller, Michelle S. Beard, Patrick J. Wolfe, Nadya T. Bliss:
A Spectral Framework for Anomalous Subgraph Detection. IEEE Trans. Signal Process. 63(16): 4191-4206 (2015) - [c28]Vijay Gadepally, Taylor Herr, Luke Johnson, Lauren Milechin, Maja Milosavljevic, Benjamin A. Miller:
Sampling operations on big data. ACSSC 2015: 1515-1519 - [c27]Himanshu Nayar, Benjamin A. Miller, Kelly Geyer, Rajmonda Sulo Caceres
, Steven Thomas Smith, Raj Rao Nadakuditi
:
Improved hidden clique detection by optimal linear fusion of multiple adjacency matrices. ACSSC 2015: 1520-1524 - [c26]Benjamin A. Miller, Stephen Kelley, Rajmonda Sulo Caceres
, Steven Thomas Smith:
Residuals-based subgraph detection with cue vertices. ACSSC 2015: 1530-1534 - [c25]Benjamin A. Miller, Michelle S. Beard, Manfred D. Laubichler, Nadya T. Bliss:
Temporal and multi-source fusion for detection of innovation in collaboration networks. FUSION 2015: 659-665 - [c24]Lauren Edwards, Luke Johnson, Maja Milosavljevic, Vijay Gadepally, Benjamin A. Miller:
Sampling large graphs for anticipatory analytics. HPEC 2015: 1-6 - [c23]Michael M. Wolf, Benjamin A. Miller:
Improving the performance of graph analysis through partitioning with sampling. HPEC 2015: 1-6 - [c22]Alexis B. Cook, Benjamin A. Miller:
Planted clique detection below the noise floor using low-rank sparse PCA. ICASSP 2015: 3726-3730 - [c21]Vijay Gadepally, Jake Bolewski, Dan Hook, Dylan Hutchison, Benjamin A. Miller, Jeremy Kepner:
Graphulo: Linear Algebra Graph Kernels for NoSQL Databases. IPDPS Workshops 2015: 822-830 - [i3]Vijay Gadepally, Jake Bolewski, Dan Hook, Dylan Hutchison, Benjamin A. Miller, Jeremy Kepner:
Graphulo: Linear Algebra Graph Kernels for NoSQL Databases. CoRR abs/1508.07372 (2015) - 2014
- [c20]Michael M. Wolf, Benjamin A. Miller:
Sparse matrix partitioning for parallel eigenanalysis of large static and dynamic graphs. HPEC 2014: 1-6 - [c19]Benjamin A. Miller, Nicholas Arcolano:
Spectral subgraph detection with corrupt observations. ICASSP 2014: 3425-3429 - [i2]Benjamin A. Miller, Nadya T. Bliss, Patrick J. Wolfe, Michelle S. Beard:
A Spectral Framework for Anomalous Subgraph Detection. CoRR abs/1401.7702 (2014) - [i1]Benjamin A. Miller, Nicholas Arcolano, Michael M. Wolf, Nadya T. Bliss:
Spectral Anomaly Detection in Very Large Graphs: Models, Noise, and Computational Complexity. CoRR abs/1412.4411 (2014) - 2013
- [c18]Andrew K. Bolstad, Benjamin A. Miller:
Sparse volterra systems: Theory and practice. ICASSP 2013: 5740-5744 - [c17]Benjamin A. Miller, Nicholas Arcolano, Nadya T. Bliss:
Efficient anomaly detection in dynamic, attributed graphs: Emerging phenomena and big data. ISI 2013: 179-184 - 2012
- [j3]Benjamin A. Miller, Nadya T. Bliss:
A Stochastic System for Large Network Growth. IEEE Signal Process. Lett. 19(6): 356-359 (2012) - [c16]Andrew K. Bolstad, Benjamin A. Miller, Karen Gettings, Mike Ericson, Helen Kim, Merlin Green, Dan Santiago:
Sparse polynomial equalization of an RF receiver via algorithm, analog, and digital codesign. ACSCC 2012: 1102-1106 - [c15]Vineet Mehta, Feanil Patel, Yan Glina, Matthew C. Schmidt, Benjamin A. Miller, Nadya Travinin Bliss:
Characterization of traffic and structure in the U.S. airport network. CIDU 2012: 124-129 - [c14]Edward Rutledge, Benjamin A. Miller, Michelle S. Beard:
Benchmarking parallel eigen decomposition for residuals analysis of very large graphs. HPEC 2012: 1-5 - [c13]Benjamin A. Miller, Lauren H. Stephens, Nadya T. Bliss:
Goodness-of-fit statistics for anomaly detection in Chung-Lu random graphs. ICASSP 2012: 3265-3268 - [c12]Nicholas Arcolano, Karl S. Ni, Benjamin A. Miller, Nadya T. Bliss, Patrick J. Wolfe:
Moments of parameter estimates for Chung-Lu random graph models. ICASSP 2012: 3961-3964 - [c11]Benjamin A. Miller, Nicholas Arcolano, Michelle S. Beard, Jeremy Kepner, Matthew C. Schmidt, Nadya T. Bliss, Patrick J. Wolfe:
A scalable signal processing architecture for massive graph analysis. ICASSP 2012: 5329-5332 - [c10]Karen Gettings, Andrew K. Bolstad, Show-Yah Stuart Chen, Michael N. Ericson, Benjamin A. Miller, Michael Vai:
Low Power Sparse Polynomial Equalizer (SPEQ) for Nonlinear Digital Compensation of an Active Anti-Alias Filter. SiPS 2012: 249-253 - [c9]Benjamin A. Miller, Nadya T. Bliss:
Toward matched filter optimization for subgraph detection in dynamic networks. SSP 2012: 113-116 - 2011
- [c8]Benjamin A. Miller, Michelle S. Beard, Nadya T. Bliss:
Eigenspace analysis for threat detection in social networks. FUSION 2011: 1-7 - [c7]Andrew K. Bolstad, Benjamin A. Miller, Joel Goodman
, James E. Vian, Janani Kalyanam:
Identification and compensation of Wiener-Hammerstein systems with feedback. ICASSP 2011: 4056-4059 - 2010
- [c6]Benjamin A. Miller, Nadya T. Bliss, Patrick J. Wolfe:
Toward signal processing theory for graphs and non-Euclidean data. ICASSP 2010: 5414-5417 - [c5]Benjamin A. Miller, Nadya T. Bliss, Patrick J. Wolfe:
Subgraph Detection Using Eigenvector L1 Norms. NIPS 2010: 1633-1641
2000 – 2009
- 2009
- [j2]Joel Goodman
, Benjamin A. Miller, Matthew Herman, Gil Raz, Jeffrey H. Jackson:
Polyphase Nonlinear Equalization of Time-Interleaved Analog-to-Digital Converters. IEEE J. Sel. Top. Signal Process. 3(3): 362-373 (2009) - [j1]Joel Goodman
, Matthew Herman, Bradley N. Bond, Benjamin A. Miller:
A Log-Frequency Approach to the Identification of the Wiener-Hammerstein Model. IEEE Signal Process. Lett. 16(10): 889-892 (2009) - 2008
- [c4]Benjamin A. Miller, Joel Goodman
, Matthew Herman:
A Polyphase nonlinear equalization architecture and semi-blind identification method. ACSCC 2008: 593-597 - 2005
- [c3]Michael Janssen, Benjamin A. Miller, Andrew Drenner, Nikolaos Papanikolopoulos:
A GUI Framework for GPS-Enabled Robotic Guidance. ISIC 2005: 89-94 - [c2]Hossein Sedarat, Benjamin A. Miller, Kevin Fisher:
Multicarrier bit-loading in presence of biased Gaussian noise sources. CCNC 2005: 411-415 - [c1]Hossein Sedarat, Benjamin A. Miller, Kevin Fisher:
Impulse noise protection for multicarrier communication systems. ICASSP (3) 2005: 853-856
Coauthor Index
aka: Nadya Travinin Bliss

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint