Adam Dalton
Cited by
Cited by
Automatic metaphor detection using large-scale lexical resources and conventional metaphor extraction
Y Wilks, A Dalton, J Allen, L Galescu
Proceedings of the First Workshop on Metaphor in NLP, 36-44, 2013
A new dataset and evaluation for belief/factuality
V Prabhakaran, J Hirschberg, O Rambow, S Shaikh, T Strzalkowski, ...
Proceedings of the Fourth Joint Conference on Lexical and Computational …, 2015
A distributed simulation approach for modeling and analyzing systems of systems
A Sharawi, SN Sala-Diakanda, A Dalton, S Quijada, N Yousef, L Rabelo, ...
Proceedings of the 2006 Winter Simulation Conference, 1028-1035, 2006
Email threat detection using distinct neural network approaches
E Castillo, S Dhaduvai, P Liu, KS Thakur, A Dalton, T Strzalkowski
Proceedings for the first international workshop on social threats in online …, 2020
Mtc2: A command and control framework for moving target defense and cyber resilience
M Carvalho, TC Eskridge, L Bunch, A Dalton, R Hoffman, JM Bradshaw, ...
2013 6th International Symposium on Resilient Control Systems (ISRCS), 175-180, 2013
Active defense against social engineering: The case for human language technology
A Dalton, E Aghaei, E Al-Shaer, A Bhatia, E Castillo, Z Cheng, ...
Proceedings for the First International Workshop on Social Threats in Online …, 2020
Improving cyber-attack predictions through information foraging
A Dalton, B Dorr, L Liang, K Hollingshead
2017 IEEE International Conference on Big Data (Big Data), 4642-4647, 2017
A human-agent teamwork command and control framework for moving target defense (mtc2)
MM Carvalho, TC Eskridge, L Bunch, JM Bradshaw, A Dalton, P Feltovich, ...
Proceedings of the Eighth Annual Cyber Security and Information Intelligence …, 2013
The Columbia-GWU System at the 2016 TAC KBP BeSt Evaluation.
O Rambow, T Yu, A Radeva, AR Fabbri, C Hidey, T Peng, KR McKeown, ...
TAC, 2016
Detecting asks in social engineering attacks: Impact of linguistic and structural knowledge
B Dorr, A Bhatia, A Dalton, B Mather, B Hebenstreit, S Santhanam, ...
Proceedings of the AAAI Conference on Artificial Intelligence 34 (05), 7675-7682, 2020
Learning to plan and realize separately for open-ended dialogue systems
S Santhanam, Z Cheng, B Mather, B Dorr, A Bhatia, B Hebenstreit, ...
arXiv preprint arXiv:2009.12506, 2020
The panacea threat intelligence and active defense platform
A Dalton, E Aghaei, E Al-Shaer, A Bhatia, E Castillo, Z Cheng, ...
arXiv preprint arXiv:2004.09662, 2020
From stance to concern: Adaptation of propositional analysis to new tasks and domains
B Mather, BJ Dorr, A Dalton, W de Beaumont, O Rambow, ...
arXiv preprint arXiv:2203.10659, 2022
Mining online social media to drive psychologically valid agent models of regional COVID-19 mask wearing
P Pirolli, KM Carley, A Dalton, BJ Dorr, C Lebiere, MK Martin, B Mather, ...
International Conference on Social Computing, Behavioral-Cultural Modeling …, 2021
Modeling social engineering risk using attitudes, actions, and intentions reflected in language use
A Dalton, A Zemel, A Masoumzadeh, A Bhatia, B Dorr, B Mather, ...
Proc. Thirty-Second International Florida Artificial Intelligence Research …, 2019
Best: The belief and sentiment corpus
J Tracey, O Rambow, C Cardie, A Dalton, HT Dang, M Diab, B Dorr, ...
Proceedings of the Thirteenth Language Resources and Evaluation Conference …, 2022
Detecting asks in se attacks: Impact of linguistic and structural knowledge
BJ Dorr, A Bhatia, A Dalton, B Mather, B Hebenstreit, S Santhanam, ...
arXiv preprint arXiv:2002.10931, 2020
Improving DISCERN with Deep Learning.
G Dubbin, A Bhatia, BJ Dorr, A Dalton, K Hollingshead, S Kandaswamy, ...
TAC, 2016
Earliest memories of pets predict adult attitudes: Phenomenological, structural, and textual analyses
PH Marshall, ME Ireland, AA Dalton
Human-Animal Interaction Bulletin, 2015
A Survey of Mission Opportunities to Trans-Neptunian Objects, Part VI: A Search For Multi-Target Missions
D Johnson, Z Crum, G Mitchell, S Walters, A Dalton, B Davis, B Dolmovich, ...
AAS, 2020
The system can't perform the operation now. Try again later.
Articles 1–20