Submissions from 2023
Toward a debugging pedagogy: helping students learn to get unstuck with physical computing systems, Colin Hennessy Elliott, Alexandra Gendreau Chakarov, Jeffrey B. Bush, Jessie Nixon, and Mimi Recker
Malware classification with Word2Vec, HMM2Vec, BERT, and ELMo, Aparna Sunil Kale, Vinay Pandya, Fabio Di Troia, and Mark Stamp
GeoYCSB: A Benchmark Framework for the Performance and Scalability Evaluation of Geospatial NoSQL Databases, Suneuy Kim, Yvonne Hoang, Tsz Ting Yu, and Yuvraj Singh Kanwar
Predicting pedestrian crosswalk behavior using Convolutional Neural Networks, Eric Liang and Mark Stamp
Siamese Neural Networks for Content-based Visual Art Recommendation, Ran Li, Melody Moh, and Teng Sheng Moh
Maximizing External Action with Information Provision over Multiple Rounds in Online Social Networks, Masaaki Miyashita, Norihiko Shinomiya, Daisuke Kasamatsu, and Genya Ishigaki
Determining the temporal factors of survival associated with brain and nervous system cancer patients: A hybrid machine learning methodology, Gopal Nath, Austin Coursey, Joseph Ekong, Elham Rastegari, Saptarshi Sengupta, Asli Z. Dag, and Dursun Delen
An interactive web-based tool for predicting and exploring brain cancer survivability, Gopal Nath, Austin Coursey, Yang Li, Srikanth Prabhu, Harish Garg, Shaymal C. Halder, and Saptarshi Sengupta
Generative adversarial networks and image-based malware classification, Huy Nguyen, Fabio Di Troia, Genya Ishigaki, and Mark Stamp
An empirical analysis of the shift and scale parameters in BatchNorm, Yashna Peerthum and Mark Stamp
Darknet traffic classification and adversarial attacks using machine learning, Nhien Rust-Nguyen, Shruti Sharma, and Mark Stamp
Biological research and self-driving labs in deep space supported by artificial intelligence, Lauren M. Sanders; Ryan T. Scott; Jason H. Yang; Amina Ann Qutub; Hector Garcia Martin; Daniel C. Berrios; Jaden J.A. Hastings; Jon Rask; Graham Mackintosh; Adrienne L. Hoarfrost; Stuart Chalk; John Kalantari; Kia Khezeli; Erik L. Antonsen; Joel Babdor; Richard Barker; Sergio E. Baranzini; Philip Heller; and For full author list, see comments below
Biomonitoring and precision health in deep space supported by artificial intelligence, Ryan T. Scott; Lauren M. Sanders; Erik L. Antonsen; Jaden J.A. Hastings; Seung min Park; Graham Mackintosh; Robert J. Reynolds; Adrienne L. Hoarfrost; Aenor Sawyer; Casey S. Greene; Benjamin S. Glicksberg; Corey A. Theriot; Daniel C. Berrios; Jack Miller; Joel Babdor; Richard Barker; Sergio E. Baranzini; Philip Heller; and For full author list, see comments below
A Heuristic Intrusion Detection Approach Using Deep Learning Model, Ching Seh Wu and Sam Chen
Submissions from 2022
Markov Decision Process for Modeling Social Engineering Attacks and Finding Optimal Attack Strategies, Faranak Abri, Jianjun Zheng, Akbar Siami Namin, and Keith S. Jones
Untraining Ethnocentric Biases about Gender Roles: A Preliminary Empirical Study Presenting Art as Stimulus, Reem Albaghli, Chaz Chang, Sarah Almahmeed, and Nada Attar
Leveraging Initial Cognitive Load to Predict User Response to Complex Visual Tasks, Reem Albaghli, Yaman Jandali, Sarah Almahmid, and Nada Attar
BERT for Malware Classification, Joel Alvares and Fabio Di Troia
Deeplasmid: Deep learning accurately separates plasmids from bacterial chromosomes, William B. Andreopoulos, Alexander M. Geller, Miriam Lucke, Jan Balewski, Alicia Clum, Natalia N. Ivanova, and Asaf Levy
A Blockchain-Based Tamper-Resistant Logging Framework, Thomas H. Austin and Fabio Di Troia
Crowdfunding Non-fungible Tokens on the Blockchain, Sean Basu, Kimaya Basu, and Thomas H. Austin
Euclid after Computer Proof-Checking, Michael Beeson
On the notion of equal figures in Euclid, Michael Beeson
Larry Wos: Visions of Automated Reasoning, Michael Beeson, Maria Paola Bonacina, Michael Kinyon, and Geoff Sutcliffe
Twitter Bots’ Detection with Benford’s Law and Machine Learning, Sanmesh Bhosale and Fabio Di Troia
Twitter Bot Detection using Social Network Analysis, Thi Bui and Katerina Potika
Understanding the Collaborative Learning Implementation Cycle (CLIC) for a Teacher Learning to Promote Computationally Rich Communication in a Remote STEM Classroom, Jeffrey B. Bush, Quentin Biddy, Colin Hennessy Elliott, Alexandra Gendreau Chakarov, and Jessie Nixon
Predicting cervical cancer biopsy results using demographic and epidemiological parameters: a custom stacked ensemble machine learning approach, Krishnaraj Chadaga, Srikanth Prabhu, Niranjana Sampathila, Rajagopala Chadaga, S. Swathi, and Saptarshi Sengupta
An Approach to Improving Anomaly Detection Using Multiple Detectors, Paaras Chand, Melody Moh, and Teng Sheng Moh
A New Design and Analysis of Power Saving for IoT Gateway, Jisi Chandroth, Navrati Saxena, Abhishek Roy, and Eshita Rastogi
Machine Learning-Based Analysis of Free-Text Keystroke Dynamics, Han Chih Chang, Jianwei Li, and Mark Stamp
Machine Learning and Deep Learning for Fixed-Text Keystroke Dynamics, Han Chih Chang, Jianwei Li, Ching Seh Wu, and Mark Stamp
Visual Task Classification using Classic Machine Learning and CNNs, Devangi Vilas Chinchankarame, Noha Elfiky, and Nada Attar
The Melampsora americana Population on Salix purpurea in the Great Lakes Region Is Highly Diverse with a Contributory Influence of Clonality, Chase R. Crowell, Dustin G. Wilkerson, Mariami Beckauri, Ali R. Cala, Patrick W. McMullen, Stephen Mondo, William Andreopoulos, Anna Lipzen, Kathleen Lail, Mi Yan, Vivian Ng, Igor V. Grigoriev, Lawrence B. Smart, and Christine D. Smart
“Do I need to know what I am doing if I am the teacher?” Developing teachers' debugging pedagogies with physical computing, Colin Hennessy Elliott, Jessie Nixon, Jeffrey B. Bush, Alexandra Gendreau Chakarov, and Mimi Recker
Clickbait Detection for YouTube Videos, Ruchira Gothankar, Fabio Di Troia, and Mark Stamp
Traffic-Weighted Availability-Guaranteed Network Slice Composition with VNF Replications, Riti Gour, Varin Sikand, Joseph Chang, Zhouxiang Wu, Genya Ishigaki, and Jason P. Jue
Vision-Based End-to-End Deep Learning for Autonomous Driving in Next-Generation IoT Systems, Dapeng Guo, Melody Moh, and Teng Sheng Moh
Performance Centric Primary Storage Deduplication Systems Exploiting Caching and Block Similarity, Rakesh Gururaj, Melody Moh, Teng Sheng Moh, Philip Shilane, and Bhimsen Bhanjois
Diel gene expression improves software prediction of cyanobacterial operons, Philip Heller
Evaluating Deep Learning Models and Adversarial Attacks on Accelerometer-Based Gesture Authentication, Elliu Huang, Fabio Di Troia, and Mark Stamp
Using Transformers for Identification of Persuasion Principles in Phishing Emails, Bimal Karki, Faranak Abri, Akbar Siami Namin, and Keith S. Jones
Cloud-centric blockchain public key infrastructure for big data applications, Brian Tuan Khieu and Melody Moh
Classifying Perceived Emotions based on Polarity of Arousal and Valence from Sound Events, Pooja Krishan and Faranak Abri
Detecting Botnets Through Deep Learning and Network Flow Analysis, Ji An Lee and Fabio Di Troia
Free-Text Keystroke Dynamics for User Authentication, Jianwei Li, Han Chih Chang, and Mark Stamp
DRX in NR Unlicensed for B5G Wireless: Modeling and Analysis, Mukesh Kumar Maheshwari, Eshita Rastogi, Abhishek Roy, Navrati Saxena, and Dong Ryeol Shin
Dynamic Resource Management of Green Fog Computing for IoT Support, Melody Moh, Teng Sheng Moh, and Mariia Surmenok
Auxiliary-Classifier GAN for Malware Analysis, Rakesh Nagaraju and Mark Stamp
Incorporating a Machine Learning Model into a Web-Based Administrative Decision Support Tool for Predicting Workplace Absenteeism, Gopal Nath, Yawei Wang, Austin Coursey, Krishna K. Saha, Srikanth Prabhu, and Saptarshi Sengupta
MalView: Interactive Visual Analytics for Comprehending Malware Behavior, Huyen N. Nguyen, Faranak Abri, Vung Pham, Moitrayee Chatterjee, Akbar Siami Namin, and Tommy Dang
Intelligent O-RAN for Beyond 5G and 6G Wireless Networks, Solmaz Niknam, Abhishek Roy, Harpreet S. Dhillon, Sukhdeep Singh, Rahul Banerji, Jeffery H. Reed, Navrati Saxena, and Seungil Yoon
3D Facial Biometric Verification Using a DNA Sample for Law Enforcement Applications, Niraj Pandkar, Teng Sheng Moh, and Mark Barash
TontineCoin: Survivor-based Proof-of-Stake, Chris Pollett, Thomas H. Austin, Katerina Potika, Justin Rietz, and Prashant Pardeshi
A parallel community detection algorithm based on spanning trees, Petros Potikas, Dora Souliou, Aris Pagourtzis, and Katerina Potika
Use of Machine Learning for Early Detection of Knee Osteoarthritis and Quantifying Effectiveness of Treatment Using Force Platform, Ashish John Prabhakar, Srikanth Prabhu, Aayush Agrawal, Siddhisa Banerjee, Abraham M. Joshua, Yogeesh Dattakumar Kamat, Gopal Nath, and Saptarshi Sengupta
Supervised Learning Models for the Preliminary Detection of COVID-19 in Patients Using Demographic and Epidemiological Parameters, Aditya Pradhan, Srikanth Prabhu, Krishnaraj Chadaga, Saptarshi Sengupta, and Gopal Nath
Investigating User Information and Social Media Features in Cyberbullying Detection, Jiabao Qiu, Nihar Hegde, Melody Moh, and Teng Sheng Moh
Multi-modal detection of cyberbullying on Twitter, Jiabao Qiu, Melody Moh, and Teng Sheng Moh
Advancement on Security Applications of Private Intersection Sum Protocol, Y. Athur Raghuvir, S. Govindarajan, S. Vijayakumar, P. Yadlapalli, and F. Di Troia
Smart home device security: A survey of smart home authentication methods with a focus on mutual authentication and key management practices, Robinson Raju and Melody Moh
Energy efficiency analysis of narrowband Internet of Things with auxiliary active cycles for small data transmission, Eshita Rastogi, Mukesh Kumar Maheshwari, Abhishek Roy, Navrati Saxena, and Dong Ryeol Shin
Machine Learning-Based DRX Mechanism in NR-Unlicensed, Eshita Rastogi, Mukesh Kumar Maheshwari, Abhishek Roy, Navrati Saxena, and Dong Ryeol Shin
Machine Learning Based Dynamic Restoration of Next Generation Wireless Networks, Sukhdeep Singh, Navrati Saxena, Prasham Jain, Abhishek Roy, Harman Jit Singh, Divay Bhutani, Nawab Muhammad Faseeh Qureshi, and Ali Kashif Bashir
Introduction to Machine Learning with Applications in Information Security: Second Edition, Mark Stamp
Resource Management for Future Green Mobile Cloud Computing, Mariia Surmenok, Melody Moh, and Teng Sheng Moh
Predictive Closed-Loop Service Automation in O-RAN Based Network Slicing, Joseph Thaliath, Solmaz Niknam, Sukhdeep Singh, Rahul Banerji, Navrati Saxena, Harpreet S. Dhillon, Jeffrey H. Reed, Ali Kashif Bashir, Avinash Bhat, and Abhishek Roy
Investigating Classification Methods using Fixation Patterns to Predict Visual Tasks, Siddartha Thentu and Nada Attar
Robustness of Image-Based Malware Analysis, Katrina Tran, Fabio Di Troia, and Mark Stamp
Word Embeddings for Fake Malware Generation, Quang Duy Tran and Fabio Di Troia
Fake Malware Generation Using HMM and GAN, Harshit Trehan and Fabio Di Troia
Adversarial Attacks on Speech Separation Systems, Kendrick Trinh, Melody Moh, and Teng Sheng Moh
Machine Learning for Malware Evolution Detection, Lolitha Sresta Tupadha and Mark Stamp
Bisphenol a affects neurodevelopmental gene expression, cognitive function, and neuromuscular synaptic morphology in Drosophila melanogaster, Chloe Welch, Eden Johnson, Angelina Tupikova, Judith Anderson, Brendan Tinsley, Johnathan Newman, Erin Widman, Adam Alfareh, Alexandra Davis, Lucero Rodriguez, Clayton Visger, Justin P. Miller-Schulze, Wendy Lee, and Kimberly Mulligan
Exploration of privacy preserving deep learning framework for computer vision tasks, Amala Wilson, Mashhour Solh, and Melody Moh
Traffic Flow Prediction Using Deep Learning Models, China Seh Wu, Satya Pranavi Manthena, Saurabh Kale, and Maithili Vinayak Kulkarni
Reinforcement Learning-Based Network Slice Resource Allocation for Federated Learning Applications, Zhouxiang Wu, Genya Ishigaki, Riti Gour, Congzhou Li, and Jason P. Jue
Whole-File Chunk-Based Deduplication Using Reinforcement Learning for Cloud Storage, Xincheng Yuan, Melody Moh, and Teng Sheng Moh
Submissions from 2021
Prediction of higher-order links using global vectors and Hasse diagrams, Kalpnil Anjan, Willam Andreopoulos, and Katerina Potika
SpartanGold: A Blockchain for Education, Experimentation, and Rapid Prototyping, Thomas H. Austin
BioBlockchain: Useful Proof-of-Work with Multiple Sequence Alignment, Yan Chen, Thomas H. Austin, and Philip Heller
Improved algorithm to determine 3-colorability of graphs with minimum degree at least 7, Nicholas Crawford, Sogol Jahanbekam, and Katerina Potika
Malware classification using long short-term memory models, Dennis Dang, Fabio Di Troia, and Mark Stamp
The extracellular contractile injection system is enriched in environmental microbes and associates with numerous toxins, Alexander Martin Geller, Inbal Pollin, David Zlotkin, Aleks Danov, Nimrod Nachmias, William B. Andreopoulos, Keren Shemesh, and Asaf Levy
The data sensor hub (Dash): A physical computing system to support middle school inquiry science instruction, Alexandra Gendreau Chakarov, Quentin Biddy, Colin Hennessy Elliott, and Mimi Recker
Improving the Relevance of a Web Navigation Recommender System Using Categorization of Users' Experience, Ilan Yehuda Granot, Ching Seh Mike Wu, and Zvi Or-Bach
End-to-End Learning for Autonomous Driving in Secured Smart Cities, Dapeng Guo, Melody Moh, and Teng Sheng Moh
Vision-Based Autonomous Driving for Smart City: A Case for End-to-End Learning Utilizing Temporal Information, Dapeng Guo, Melody Moh, and Teng Sheng Moh
Fake News Analysis and Graph Classification on a COVID-19 Twitter Dataset, Kriti Gupta and Katerina Potika
A novel approach to teaching Hidden Markov Models to a diverse undergraduate population, Philip Heller and Pratyusha Pogaru
A new dataset for smartphone gesture-based authentication, Elliu Huang, Fabio Di Troia, Mark Stamp, and Preethi Sundaravaradhan
Malware classification with word embedding features, Aparna Sunil Kale, Fabio Di Troia, and Mark Stamp
Understanding How the Relative Abundance of Candida Species Impacts Transcriptional Regulation in Co-culture Biofilms, Diksha Kool, Katy Kao, and Wendy Lee
ShineOn: Illuminating Design Choices for Practical Video-based Virtual Clothing Try-on, Gaurav Kuppa, Andrew Jong, Xin Liu, Ziwei Liu, and Teng Sheng Moh
Improving Security and Performance of Distributed IPFS-Based Web Applications with Blockchain, Vu Le, Ramin Moazeni, and Melody Moh
Sentiment analysis on COVID tweets using COVID-Twitter-BERT with auxiliary sentence approach, Hung Yeh Lin and Teng Sheng Moh
Gun Violence News Information Retrieval using BERT as Sequence Tagging Task, Hung Yeh Lin, Teng Sheng Moh, and Bryce Westlake
Learning for Free: Object Detectors Trained on Synthetic Data, Charles Thane MacKay and Teng Sheng Moh
Multi-Agent Deep Reinforcement Learning for Walker Systems, Inhee Park and Teng Sheng Moh
Utilizing CNNs for Object Detection with LiDAR Data for Autonomous Driving, Vinay Ponnaganti, Melody Moh, and Teng Sheng Moh