George Cybenko
#5,556
Most Influential Person Now
Professor
George Cybenko's AcademicInfluence.com Rankings
George Cybenkocomputer-science Degrees
Computer Science
#337
World Rank
#350
Historical Rank
#192
USA Rank
Algorithms
#29
World Rank
#29
Historical Rank
#12
USA Rank
Machine Learning
#85
World Rank
#85
Historical Rank
#32
USA Rank
Artificial Intelligence
#273
World Rank
#278
Historical Rank
#112
USA Rank
George Cybenkoengineering Degrees
Engineering
#821
World Rank
#1291
Historical Rank
#346
USA Rank
Electrical Engineering
#375
World Rank
#421
Historical Rank
#138
USA Rank
Download Badge
Computer Science Engineering
George Cybenko's Degrees
- PhD Computer Science Stanford University
- Masters Computer Science Stanford University
- Bachelors Electrical Engineering Stanford University
Similar Degrees You Can Earn
Why Is George Cybenko Influential?
(Suggest an Edit or Addition)According to Wikipedia, George V. Cybenko is the Dorothy and Walter Gramm Professor of Engineering at Dartmouth and a fellow of the IEEE and SIAM. Education Cybenko obtained his BA in mathematics from the University of Toronto in 1974 and received his PhD from Princeton in applied mathematics of electrical and computer engineering in 1978 under Bede Liu.
George Cybenko's Published Works
Published Works
- Approximation by superpositions of a sigmoidal function (1989) (7609)
- Approximation by superpositions of a sigmoidal function (1992) (3821)
- Dynamic Load Balancing for Distributed Memory Multiprocessors (1989) (1084)
- TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2005) (655)
- Tracking a moving object with a binary sensor network (2003) (445)
- How dynamic is the Web? (2000) (353)
- D'Agents: Security in a Multiple-Language, Mobile-Agent System (1998) (220)
- AGENT TCL: Targeting the Needs of Mobile Computers (1997) (211)
- The Numerical Stability of the Levinson-Durbin Algorithm for Toeplitz Systems of Equations (1980) (201)
- Mobile agents: Motivations and state of the art (2000) (194)
- Detection of Covert Channel Encoding in Network Packet Delays (2005) (193)
- Mobile agents in distributed information retrieval (1999) (190)
- D'Agents: Applications and performance of a mobile‐agent system (2002) (179)
- Keeping up with the changing Web (2000) (173)
- Ill-Conditioning in Neural Network Training Problems (1993) (168)
- Mobile agents for mobile computing (1996) (153)
- Gossiping in Minimal Time (1992) (145)
- Supercomputer performance evaluation and the Perfect Benchmarks (1990) (139)
- PARALLEL AND DISTRIBUTED SYSTEMS (2010) (129)
- Analysis of distributed intrusion detection systems using Bayesian methods (2002) (95)
- Cognitive Hacking: A Battle for the Mind (2002) (92)
- Just-in-Time Learning and Estimation (1996) (90)
- Reducing quantum computations to elementary unitary operations (2001) (84)
- Network awareness and mobile agent systems (1998) (81)
- Cybersecurity Strategies: The QuERIES Methodology (2008) (75)
- Mobile agents: the next generation in distributed computing (1997) (70)
- Computing thr minimum eigenvalue of a symmetric positive definite Toeplitz matrix (1984) (67)
- Data exfiltration and covert channels (2006) (63)
- A general orthogonalization technique with applications to time series analysis and signal processing (1983) (63)
- Efficient computation of the hidden Markov model entropy for a given observation sequence (2005) (61)
- Temporal and spatial distributed event correlation for network security (2004) (60)
- Pattern Recognition of 3D CAD Objects: Towards an Electronic Yellow Pages of Mechanical Parts (1996) (55)
- Discovering Influence in Communication Networks Using Dynamic Graph Analysis (2010) (45)
- Implementing Large-Scale Autonomic Server Monitoring Using Process Query Systems (2005) (43)
- Hyperbolic Householder algorithms for factoring structured matrices (1990) (43)
- The Traveling Agent Problem (2001) (42)
- Performance Analysis of Mobile Agents for Filtering Data Streams on Wireless Networks (2000) (41)
- Fast toeplitz orthogonalization using inner decompositions (1987) (41)
- An overview of process query systems (2004) (40)
- Complexity Theory of Neural Networks and Classification Problems (1990) (40)
- Semantic agent technologies for tactical sensor networks (2003) (38)
- VULCON: A System for Vulnerability Prioritization, Mitigation, and Management (2018) (38)
- Mobile agents in adaptive hierarchical Bayesian networks for global awareness (1998) (38)
- A Moving Target Defense Approach to Disrupting Stealthy Botnets (2016) (37)
- The foundations of information push and pull (1999) (36)
- The theory of trackability with applications to sensor networks (2008) (36)
- Quantitative Metrics and Risk Assessment: The Three Tenets Model of Cybersecurity (2013) (35)
- Neural networks in computational science and engineering (1996) (35)
- Inaugural Issue Editorial (2014) (34)
- On the eigenstructure of Toeplitz matrices (1984) (33)
- Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Building the Scientific Foundation (2014) (32)
- Scientific benchmark characterizations (1991) (32)
- Process query systems (2007) (31)
- Moment problems and low rank Toeplitz approximations (1982) (30)
- Run-time visualization of program data (1991) (30)
- Learning Hidden Markov Models Using Nonnegative Matrix Factorization (2008) (29)
- Covert Channel Detection Using Process Query Systems (2005) (28)
- Fixed Hypercube Embedding (1987) (27)
- The mathematics of information coding, extraction, and distribution (1999) (26)
- Security Analytics and Measurements (2012) (26)
- Three tenets for secure cyber-physical system design and assessment (2014) (25)
- Hypergame theory applied to cyber attack and defense (2010) (24)
- Mobile agent planning problems (1999) (24)
- Decentralized control for coordinated flow of multi-agent systems (2002) (23)
- Fast Approximation of Dominant Harmonics (1984) (23)
- TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2005) (22)
- Q-learning: a tutorial and extensions (1997) (21)
- Distributed chemical plume process detection: MILCOM 2005 #1644 (2005) (20)
- Quantitative risk analysis of computer networks (2003) (20)
- Restrictions of Normal Operators, Padé Approximation and Autoregressive Time Series (1984) (19)
- Detection of complex cyber attacks (2006) (19)
- Why Johnny Can't Evaluate Security Risk (2006) (19)
- Practical parallel Union-Find algorithms for transitive closure and clustering (1989) (17)
- The numerical stability of the lattice algorithm for least squares linear prediction problems (1984) (16)
- Parallel Computing for Machine Learning in Social Network Analysis (2017) (16)
- Performance Analysis of Mobile Agents for Filtering Data Streams on Wireless Networks (2002) (16)
- AI and Fake News (2018) (16)
- No free lunch in cyber security (2014) (16)
- Managing Malicious Insider Risk through BANDIT (2012) (15)
- Tracking with text-based messages (1999) (15)
- Locations of zeros of predictor Polynomials (1982) (15)
- Observation of changing information sources (2000) (15)
- Quantification of moving target cyber defenses (2015) (15)
- Engineering Statistical Behaviors for Attacking and Defending Covert Channels (2013) (14)
- A fuzzy MHT algorithm applied to text-based information tracking (2002) (14)
- The Travelling Agent Problem (1998) (14)
- Detection of attacks on cognitive channels (2008) (13)
- An explicit formula for Lanczos polynomials (1987) (12)
- Round-off error propagation in Durbin's, Levinson's, and Trench's algorithms (1979) (12)
- Practical Autonomic Computing (2006) (12)
- Quantitative Evaluation of Risk for Investment Ecient Strategies in Cybersecurity: The QuERIES Methodology (2007) (12)
- Distance measures for nonparametric weak process models (2005) (12)
- Boiling Frogs? (2003) (11)
- HBML: A Language for Quantitative Behavioral Modeling in the Human Terrain (2009) (11)
- Cognitive Hacking and the Value of Information (2004) (11)
- Parallel Algorithms For Classification And Clustering (1988) (11)
- Linear algebra for signal processing (1995) (11)
- Supercomputer workload decomposition and analysis (1991) (10)
- Knowledge as Commodity (1998) (10)
- Stochastic Distributed Algorithms for Target Surveillance (2003) (10)
- Developing a distributed system for infrastructure protection (2000) (10)
- Identifying and tracking dynamic processes in social networks (2006) (10)
- Query routing optimization in sensor communication networks (2002) (10)
- SENSOR COMMUNICATION NETWORKS (1999) (9)
- VULCON (2018) (9)
- Supercomputers-revolution or evolution? (1992) (9)
- The Impact of Diversity on Online Ensemble Learning in the Presence of Concept Drift (2010) (9)
- Online Behavioral Analysis and Modeling Methodology (OBAMM) (2008) (9)
- Distributed sensing and UAV scheduling for surveillance and tracking of unidentifiable targets (2005) (9)
- Decentralized algorithms for sensor registration (2003) (8)
- Cognitive Hacking (2004) (8)
- Cybersecurity The QuERIES Methodology (2008) (8)
- Agent-Based Systems Engineering (2005) (8)
- Guest Editors' Introduction: Security & Privacy (2007) (8)
- Control flow graph modifications for improved RF-based processor tracking performance (2018) (8)
- Horizons in scientific and distributed computing (1999) (7)
- A joint publication of the (2008) (7)
- Semantic Interoperability and Information Fluidity (2006) (7)
- Matching Conflicts: Functional Validation of Agents (1999) (7)
- Trackability analysis of multiple processes using multi-distributed agents (2005) (7)
- Overview of Control and Game Theory in Adaptive Cyber Defenses (2019) (7)
- Functional Validation in Grid Computing (2004) (6)
- A Cyber-based Behavioral Model (2012) (6)
- Moving Target Defense Quantification (2019) (6)
- Simultaneous Broadcasting in Multiprocessor Networks (1986) (6)
- Mining for Social Processes in Intelligence Data Streams (2008) (6)
- Infrastructure web: distributed monitoring and managing critical infrastructures (2001) (6)
- Exploiting Adversary's Risk Profiles in Imperfect Information Security Games (2011) (5)
- Target tracking and localization using infrared video imagery (2006) (5)
- Observability Properties of Colored Graphs (2018) (5)
- Agent-Based Systems Engineering and Intelligent Vehicles and Road Systems (2001) (5)
- Adaptive Cyber Defenses for Botnet Detection and Mitigation (2019) (5)
- Minimax-based reinforcement learning with state aggregation (1998) (5)
- Adversarial Dynamics: The Conficker Case Study (2013) (5)
- Airborne plume tracking with sensor networks (2006) (5)
- Attribution and Aggregation of Network Flows for Security Analysis (2006) (5)
- Analysis and Design of Neural Networks (1992) (5)
- Large-scale Analogue Measurements and Analysis for Cyber-Security (2018) (5)
- What is trackable? (2006) (4)
- Learning Hidden Markov Models using (2008) (4)
- Understanding Quantum Computing [Book Review] (2002) (4)
- An analytic approach to cyber adversarial dynamics (2012) (4)
- Information Architecture and Agents (1994) (4)
- Multidimensional binary partitions : distributed data structures for spatial partitioning (1991) (4)
- Don't bring a knife to a gunfight (2004) (4)
- COGNITIVE HACKING : TECHNOLOGICAL AND LEGAL ISSUES (2004) (4)
- A Survey of Neural Networks and Formal Languages (2020) (4)
- Process detection in homeland security and defense applications (2006) (4)
- Homeland Security (2005) (4)
- The theory of trackability and robustness for process detection (2008) (4)
- Analytics for directed contact networks (2019) (4)
- Identifying and Exploiting the Cyber High Ground for Botnets (2015) (4)
- Semantic depth and markup complexity (2003) (4)
- A preliminary analysis of quantifying computer security vulnerability data in "the wild" (2016) (4)
- Vista: A System for Remote Data Visualization (1991) (4)
- Quantifying and measuring cyber resiliency (2016) (4)
- Metrics Based on the System Performance Perspective (2018) (4)
- TIM Lecture Series Cybersecurity Metrics and Simulation (2014) (3)
- Machine Learning Applications in Grid Computing (1999) (3)
- Deep Learning of Behaviors for Security (2015) (3)
- Dynamic social network analysis (2006) (3)
- Recursive Binary Partitions-Abstract (1987) (3)
- Attacking and Defending Covert Channels and Behavioral Models (2011) (3)
- Dynamic Programming: A Discrete Calculus of Variations (1997) (3)
- Neuro-Dynamic Programming [Book News & Reviews] (1998) (3)
- Machine learning [Book Review] (2001) (3)
- A Language of Life: Characterizing People Using Cell Phone Tracks (2009) (3)
- The Advanced Software Development and Commercialization Project (1990) (3)
- Resilient Distributed Adaptive Cyber‐Defense Using Blockchain (2021) (3)
- Approximating centrality in evolving graphs: toward sublinearity (2017) (3)
- Convergence Analysis of Discretization Procedure in Q-Learning (1999) (3)
- Approximate k-nearest neighbor method (1993) (2)
- Exploratory community sensing in social networks (2010) (2)
- MTD 2015: Second ACM Workshop on Moving Target Defense (2015) (2)
- Privacy is the issue (2003) (2)
- Eddy-current-based material loss imaging system prototype (1996) (2)
- Process learning of network interactions in market microstructures (2009) (2)
- Exploiting exploration strategies in repeated normal form security games (2012) (2)
- Understanding Quantum Computing: Quantum Computation and Quantum Information (2002) (2)
- Large-Scope Computing: A Challenge for the 21st Century (1996) (2)
- Early Detection of Active Internet Worms (2005) (2)
- Analytic Properties of Trackable Weak Models (2020) (2)
- As Eniac turns 50: perspectives on computer science support for science and engineering (1996) (2)
- Dynamic integration of distributed semantic services (2003) (2)
- Load balancing and partitioning for parallel signal processing and control algorithms (1988) (2)
- Adaptive Autonomous Secure Cyber Systems (2020) (2)
- Computational Culture Shock (1999) (2)
- A Critical Need, An Ambitious Mission, A New Magazine (2003) (2)
- An experimental comparison of hypothesis management approaches for process query systems (2005) (2)
- Quantifying Covertness in Deceptive Cyber Operations (2016) (2)
- A Crowd Sourced Pharmacovigilance Approach Using SMS-based Asymmetric Encryption (2010) (1)
- Weak Links, Strong Ties (2006) (1)
- Number 24 (2019) (1)
- The Infrastructure Web: a System for Distributed Monitoring and Management 1 (2000) (1)
- From the Editor: Sapphire/Slammer Redux (2003) (1)
- Online and Scalable Adaptive Cyber Defense (2019) (1)
- High Performance Wireless Computing (1997) (1)
- Dynamic social network analysis using conversational dynamics in social networking and microblogging environments (2010) (1)
- Neural and synergetic computers: Hermann Haken, editor, Proceedings of the International Symposium at Schloss Elmau, Bavaria, 13–17 June 1988, Springer Verlag, Berlin, 263 pages. DM 88 (hard cover). ISBN 3-540-50339-0 (1990) (1)
- Cyber Adversary Dynamics (2013) (1)
- Synchronization properties of cyber behaviors (2010) (1)
- Hardly The End Of Science (1997) (1)
- From the Co-Editors-In-Chief. (2016) (1)
- CSE for signal and image processing (1994) (1)
- Panel: Essential Data Analytics Knowledge forCyber-security Professionals and Students (2015) (1)
- AGENT TCL: Targeting the Needs of Mobile (2008) (1)
- Behavioral analysis of loosely coupled systems (2010) (1)
- Metrics for situational awareness using sensor networks (2005) (1)
- Asymptotic Behavior of Attack Graph Games (2018) (1)
- An SVD analysis of resolution limits for harmonic retrieval problems (1989) (1)
- Formal Languages, Deep Learning, Topology and AlgebraicWord Problems (2021) (1)
- Application of the replicator equation to decision-making processes in border security (2012) (1)
- Inverse game theory: learning the nature of a game through play (2012) (1)
- Guest Editors’ Introduction: Tomorrow’s Hardest Problems (2001) (1)
- Trackability in complex situations and environments (2006) (1)
- Tomorrow's hardest problems (2001) (1)
- The One-Eyed Man Is King (2005) (1)
- Computation & Cognition (C. William Gear) (1993) (0)
- Multimedia in CSE Education (1997) (0)
- HAPTICS A joint publication of the IEEE Computer Society (2008) (0)
- ActComm Project on Transportable Agents and Wireless Networks (2001) (0)
- Perfect-reconstruction filtering with unitary operators and projections☆ (1994) (0)
- Resource Control in Large-Scale Mobile-Agents Systems (2005) (0)
- Who Wants More (2000) (0)
- Large-scope computing: the industrial challenges (1996) (0)
- Efficient inference of hidden Markov models from large observation sequences (2016) (0)
- How Is CSE Doing (1997) (0)
- A Novel Information Management Architecture for Maintaining Long-Duration Space Crews Phase I Advanced Aeronautical / Space Concept Studies Final Report Prime Offeror : Principal Investigator : Trustees of Dartmouth College (2001) (0)
- Adaptation and Deception in Adversarial Cyber Operations (2020) (0)
- SPECIAL ISSUE ON AMBIENT HAPTIC SYSTEMS (2009) (0)
- MACHINE INTELLIGENCE A publication of the IEEE Computer Society (2009) (0)
- The Data Deconflation Problem: Moving from Classical to Emerging Solutions (2021) (0)
- Infrastructure Immunology (1999) (0)
- HAPTICS A joint publication of the (2008) (0)
- Learning Hidden Markov Models Using Nonnegative (2011) (0)
- John C. Toole: High Performance, High Confidence, High Capability (1995) (0)
- Cooper Named 2005 Computer Society President-Elect (2004) (0)
- The Intellectual Property Lottery (1999) (0)
- An Automated Framework for Accelerating Numerical Algorithms on Reconfigurable Platforms Using Algorithmic/Architectural Optimization (2009) (0)
- Encrypted Execution of Encrypted Programs (0)
- IEEE TRANSACTIONS O N KNOWLEDGE AND (2008) (0)
- IEEE Security & Privacy: The Early Years (2014) (0)
- From the Editors: Infrastructure Immunology (2000) (0)
- Approximation by superpositions of a sigmodiai function (1989) (0)
- knowledge and data engineering A publication of the IEEE Computer Society (2005) (0)
- Security Alchemy (2004) (0)
- Uncertainty in Intelligent and Transportable Agent Systems (1997) (0)
- ParSocial 2016 Keynote (2016) (0)
- From the Co-Editors-In-Chief. (2016) (0)
- Q U a N T U M C O M P U T a T I O N (0)
- Computation in Communication (1999) (0)
- Generative Deep Learning for Solutions to Data Deconflation Problems in Information and Operational Technology Networks (2023) (0)
- Adaptive Modeling in Operational Environment Infrastructure Sensor Webs Infrastructure Information Sharing Mode Infrastructure Interdependency Assessment , Planning and Decision Layer 1 Layer 2 Layer 3 Layer 4 Layer 5 (2002) (0)
- SPECIAL SECTION on Rule Representation Guest Editors' Introduction: Rule Representation, Interchange, and Reasoning in Distributed, (2010) (0)
- Book and Web Reviews (2002) (0)
- Proceedings of the Second ACM Workshop on Moving Target Defense (2015) (0)
- Security & Privacy in Pervasive Computing (2007) (0)
- The Pillars of Information Sharing: Anonymity and Analysis. (2007) (0)
- Linear Algebra and Learning From Data [Bookshelf] (2020) (0)
- Analytics for directed contact networks (2019) (0)
- On the Eeectiveness of Memory-based Methods in Machine Learning 5 (1997) (0)
- Large-memory-based learning systems (1992) (0)
- ACM MTD'15 workshop chairs' welcome (2015) (0)
- Graph Models in Tracking Behaviors for Cyber-Security (2019) (0)
- Trends & Controversies Using Social Science Technology to Understand and Counter the 21st-century Strategic Threat Ieee Intelligent Systems Challenges of 21st-century Warfare How Social Science Technology Can Help Population Resources Technology Master Variables Violent Conflict Lateral Pressure Int (2005) (0)
- The Future of Information Technology (1995) (0)
- Instrumentation for Wireless Agent Networks and Sensor Webs (2001) (0)
- Online Behavioral Analysis and Modeling Methodology ( OBAMM ) 1 (2007) (0)
- 5th International Workshop on Graphical Models for Security, held in conjunction with the Federated Logic Conference (FLoC) 2018, GraMSec@FLoC 2018, Oxford, UK, July 8, 2018, Revised Selected Papers (2019) (0)
- Session details: MTD Keynote I (2015) (0)
- Vulnerability survival analysis: a novel approach to vulnerability management (2017) (0)
- Merger Mania in CSE (1998) (0)
- The Sensor Data Processing Challenge Process Query Systems (2006) (0)
- Transactions on Computational Social Systems Editor George Cybenko Meet Our Volunteers (2015) (0)
- Cedar Project---Original goals and progress to date (1990) (0)
- The CSE Challenge in Knowledge and Distributed Intelligence (1998) (0)
- The new millennium challenge (2000) (0)
- DEPENDABLE AND SECURE COMPUTING A publication of the IEEE Computer Society (2011) (0)
- Detecting precursors of rare events from massive and disparate data for national security and intelligence applications (2005) (0)
- Theory and Algorithms for Memory Based Inference (1997) (0)
- New Magazine Expands AIP's Computers in Physics and IEEE Computational Science & Engineering (1998) (0)
- Semantic Depth and arku up ~omp~exity* (2003) (0)
- The Linear Algebra of Perfect Reconstruction Filtering (1993) (0)
- Critical Infrastructure Protection and Information Assurance Fellowship Program (2004) (0)
- Instrumentation for distributed computing systems (1987) (0)
- Attritable multi-agent learning (2021) (0)
- Estimating point spectra using the Lanczos algorithm (1982) (0)
This paper list is powered by the following services:
Other Resources About George Cybenko
What Schools Are Affiliated With George Cybenko?
George Cybenko is affiliated with the following schools: