Submissions from 2022
Machine Learning Based Dynamic Restoration of Next Generation Wireless Networks, Sukhdeep Singh, Navrati Saxena, Prasham Jain, Abhishek Roy, Harman Jit Singh, Divay Bhutani, Nawab Muhammad Faseeh Qureshi, and Ali Kashif Bashir
Introduction to Machine Learning with Applications in Information Security: Second Edition, Mark Stamp
Resource Management for Future Green Mobile Cloud Computing, Mariia Surmenok, Melody Moh, and Teng Sheng Moh
Predictive Closed-Loop Service Automation in O-RAN Based Network Slicing, Joseph Thaliath, Solmaz Niknam, Sukhdeep Singh, Rahul Banerji, Navrati Saxena, Harpreet S. Dhillon, Jeffrey H. Reed, Ali Kashif Bashir, Avinash Bhat, and Abhishek Roy
Investigating Classification Methods using Fixation Patterns to Predict Visual Tasks, Siddartha Thentu and Nada Attar
Robustness of Image-Based Malware Analysis, Katrina Tran, Fabio Di Troia, and Mark Stamp
Word Embeddings for Fake Malware Generation, Quang Duy Tran and Fabio Di Troia
Fake Malware Generation Using HMM and GAN, Harshit Trehan and Fabio Di Troia
Adversarial Attacks on Speech Separation Systems, Kendrick Trinh, Melody Moh, and Teng Sheng Moh
Machine Learning for Malware Evolution Detection, Lolitha Sresta Tupadha and Mark Stamp
Bisphenol a affects neurodevelopmental gene expression, cognitive function, and neuromuscular synaptic morphology in Drosophila melanogaster, Chloe Welch, Eden Johnson, Angelina Tupikova, Judith Anderson, Brendan Tinsley, Johnathan Newman, Erin Widman, Adam Alfareh, Alexandra Davis, Lucero Rodriguez, Clayton Visger, Justin P. Miller-Schulze, Wendy Lee, and Kimberly Mulligan
Exploration of privacy preserving deep learning framework for computer vision tasks, Amala Wilson, Mashhour Solh, and Melody Moh
Traffic Flow Prediction Using Deep Learning Models, China Seh Wu, Satya Pranavi Manthena, Saurabh Kale, and Maithili Vinayak Kulkarni
Reinforcement Learning-Based Network Slice Resource Allocation for Federated Learning Applications, Zhouxiang Wu, Genya Ishigaki, Riti Gour, Congzhou Li, and Jason P. Jue
Whole-File Chunk-Based Deduplication Using Reinforcement Learning for Cloud Storage, Xincheng Yuan, Melody Moh, and Teng Sheng Moh
Submissions from 2021
Prediction of higher-order links using global vectors and Hasse diagrams, Kalpnil Anjan, Willam Andreopoulos, and Katerina Potika
SpartanGold: A Blockchain for Education, Experimentation, and Rapid Prototyping, Thomas H. Austin
BioBlockchain: Useful Proof-of-Work with Multiple Sequence Alignment, Yan Chen, Thomas H. Austin, and Philip Heller
Improved algorithm to determine 3-colorability of graphs with minimum degree at least 7, Nicholas Crawford, Sogol Jahanbekam, and Katerina Potika
Malware classification using long short-term memory models, Dennis Dang, Fabio Di Troia, and Mark Stamp
The extracellular contractile injection system is enriched in environmental microbes and associates with numerous toxins, Alexander Martin Geller, Inbal Pollin, David Zlotkin, Aleks Danov, Nimrod Nachmias, William B. Andreopoulos, Keren Shemesh, and Asaf Levy
The data sensor hub (Dash): A physical computing system to support middle school inquiry science instruction, Alexandra Gendreau Chakarov, Quentin Biddy, Colin Hennessy Elliott, and Mimi Recker
Improving the Relevance of a Web Navigation Recommender System Using Categorization of Users' Experience, Ilan Yehuda Granot, Ching Seh Mike Wu, and Zvi Or-Bach
End-to-End Learning for Autonomous Driving in Secured Smart Cities, Dapeng Guo, Melody Moh, and Teng Sheng Moh
Vision-Based Autonomous Driving for Smart City: A Case for End-to-End Learning Utilizing Temporal Information, Dapeng Guo, Melody Moh, and Teng Sheng Moh
Fake News Analysis and Graph Classification on a COVID-19 Twitter Dataset, Kriti Gupta and Katerina Potika
A novel approach to teaching Hidden Markov Models to a diverse undergraduate population, Philip Heller and Pratyusha Pogaru
A new dataset for smartphone gesture-based authentication, Elliu Huang, Fabio Di Troia, Mark Stamp, and Preethi Sundaravaradhan
Malware classification with word embedding features, Aparna Sunil Kale, Fabio Di Troia, and Mark Stamp
Understanding How the Relative Abundance of Candida Species Impacts Transcriptional Regulation in Co-culture Biofilms, Diksha Kool, Katy Kao, and Wendy Lee
ShineOn: Illuminating Design Choices for Practical Video-based Virtual Clothing Try-on, Gaurav Kuppa, Andrew Jong, Xin Liu, Ziwei Liu, and Teng Sheng Moh
Improving Security and Performance of Distributed IPFS-Based Web Applications with Blockchain, Vu Le, Ramin Moazeni, and Melody Moh
Sentiment analysis on COVID tweets using COVID-Twitter-BERT with auxiliary sentence approach, Hung Yeh Lin and Teng Sheng Moh
Gun Violence News Information Retrieval using BERT as Sequence Tagging Task, Hung Yeh Lin, Teng Sheng Moh, and Bryce Westlake
Learning for Free: Object Detectors Trained on Synthetic Data, Charles Thane MacKay and Teng Sheng Moh
Multi-Agent Deep Reinforcement Learning for Walker Systems, Inhee Park and Teng Sheng Moh
Utilizing CNNs for Object Detection with LiDAR Data for Autonomous Driving, Vinay Ponnaganti, Melody Moh, and Teng Sheng Moh
Fast streaming translation using machine learning with transformer, Jiabao Qiu, Melody Moh, and Teng Sheng Moh
A novel safety message dissemination framework in LTE-V2X system, Eshita Rastogi, Mukesh Kumar Maheshwari, Abhishek Roy, Navrati Saxena, and Dong Ryeol Shin
Intrusion Detection and CAN Vehicle Networks, Ashraf Saber, Fabio Di Troia, and Mark Stamp
DRX in new radio unlicensed: A step beyond 5G wireless, Navrati Saxena, Abhishek Roy, Mukesh Kumar Maheswari, Eshita Rastogi, and Dong Ryeol Shin
Emulation Versus Instrumentation for Android Malware Detection, Anukriti Sinha, Fabio Di Troia, Philip Heller, and Mark Stamp
A Computational Approach to Identify Transcription Factor Binding Sites Containing Spacer Regions, Punithavathi Sundaramurthy, Brandon White, and Wendy Lee
Emotion-Based Music Recommender System for Tinnitus Patients (EMOTIN), Katarzyna A. Tarnowska
Explainable AI-based clinical decision support system for hearing disorders, Katarzyna A. Tarnowska, Brett C. Dispoto, and Jordan Conragan
NLP-Based customer loyalty improvement recommender system (CLIRS2), Katarzyna Anna Tarnowska and Zbigniew Ras
Eff-YNet: A Dual Task Network for DeepFake Detection and Segmentation, Eric Tjon, Melody Moh, and Teng Sheng Moh
Cyberbullying Classification based on Social Network Analysis, Anqi Wang and Katerina Potika
Computer-aided diagnosis of low grade endometrial stromal sarcoma (LGESS), Xinxin Yang and Mark Stamp
Detecting compromised social network accounts using deep learning for behavior and text analyses, Steven Yen, Melody Moh, and Teng Sheng Moh
Malware classification with GMM-HMM models, Jing Zhao, Samanvitha Basole, and Mark Stamp
Submissions from 2020
SharedWealth: Disincentivizing Mining Pools Through Burning and Minting, Thomas H. Austin, Paul Merrill, and Justin Rietz
Multifamily malware models, Samanvitha Basole, Fabio Di Troia, and Mark Stamp
Higher-order Link Prediction Using Triangle Embeddings, Neeraj Chavan and Katerina Potika
A Novel Approach to Music Genre Classification using Natural Language Processing and Spark, Sharan Duggirala and Teng Sheng Moh
Convolutional neural networks and extreme learning machines for malware classification, Mugdha Jain, William Andreopoulos, and Mark Stamp
Virtual Try-On With Generative Adversarial Networks: A Taxonomical Survey, Andrew Jong, Melody Moh, and Teng Sheng Moh
NexGen D-TCP: Next generation dynamic TCP congestion control algorithm, Madhan Raj Kanagarathinam, Sukhdeep Singh, Irlanki Sandeep, Hanseok Kim, Mukesh Kumar Maheshwari, Jaehyun Hwang, Abhishek Roy, and Navrati Saxena
Find me if You Can: Aligning Users in Different Social Networks, Priyanka Kasbekar, Katerina Potika, and Chris Pollett
Whole genome sequencing data of multiple individuals of Pakistani descent, Shahid Y. Khan, Muhammad Ali, Mei Chong W. Lee, Zhiwei Ma, Pooja Biswas, Asma A. Khan, Muhammad Asif Naeem, Saima Riazuddin, Sheikh Riazuddin, Radha Ayyagari, J. Fielding Hejtmancik, and S. Amer Riazuddin
Interdisciplinary minor in bioinformatics: First results and outlook, Natalia Khuri, Wendy Lee, K. Virginia Lehmkuhl-Dakhwe, Miri VanHoven, and Sami Khuri
Seamless Integration of NoSQL class into the Database Curriculum, Suneuy Kim
Machine Learning in Indian Crop Classification of Temporal Multi-Spectral Satellite Image, Ravali Koppaka and Teng Sheng Moh
GloVeNoR: GloVe for Node Representations with Second Order Random Walks, Shishir Kulkarni, Jay Ketan Katariya, and Katerina Potika
Ping-Pong Governance: Token Locking for Enabling Blockchain Self-governance, Paul Merrill, Thomas H. Austin, Justin Rietz, and Jon Pearce
A unified framework on node classification using graph convolutional networks, Saurabh Mithe and Katerina Potika
No "Love" Lost: Defending Hate Speech Detection Models Against Adversaries, Melody Moh, Teng Sheng Moh, and Brian Khieu
Blockchain for efficient public key infrastructure and fault-tolerant distributed consensus, Melody Moh, David Nguyen, Teng Sheng Moh, and Brian Khieu
Online local communities with motifs, Mrudula Murali, Katerina Potika, and Chris Pollett
Black box analysis of android malware detectors, Guruswamy Nellaivadivelu, Fabio Di Troia, and Mark Stamp
Overlapping Community Detection via Minimum Spanning Tree Computations, Aris Pagourtzis, Dora Souliou, Petros Potikas, and Katerina Potika
Stock market prediction using ensemble of graph theory, machine learning and deep learning models, Pratik Patil, Ching Seh M. Wu, Katerina Potika, and Marjan Orang
TontineCoin: Murder-Based Proof-of-Stake, Chris Pollett, Thomas H. Austin, Katerina Potika, and Justin Rietz
Teaching Hands-on Network Management, Benjamin Reed
Poriferal Vision: Classifying Benthic Sponge Spicules to Assess Historical Impacts of Marine Climate Change, Saketh Saxena, Philip Heller, Amanda S. Kahn, and Ivano Aiello
Graph Classification with Kernels, Embeddings and Convolutional Neural Networks, Monica Golahalli Seenappa, Katerina Potika, and Petros Potikas
Convolutional neural networks for image spam detection, Tazmina Sharmin, Fabio Di Troia, Katerina Potika, and Mark Stamp
Image Spam Classification with Deep Neural Networks, Ajay Pal Singh and Katerina Potika
Recommender System for Improving Customer Loyalty, Katarzyna Tarnowska, Zbigniew W. Ras, and Lynn Daniel
Edge Betweenness Centrality on Trees, Julian Vu and Katerina Potika
Detecting malware evolution using support vector machines, Mayuri Wadkar, Fabio Di Troia, and Mark Stamp
Using deep learning and steam user data for better video game recommendations, Dylan Wang, Melody Moh, and Teng Sheng Moh
Using Deep Learning to Solve Google reCAPTCHA v2's Image Challenges, Dylan Wang, Melody Moh, and Teng Sheng Moh
Detection of Hate Speech in Videos Using Machine Learning, Ching Seh Wu and Unnathi Bhandary
Submissions from 2019
BootBandit: A macOS bootloader attack, Armen Boursalian and Mark Stamp
Community Detection via Neighborhood Overlap and Spanning Tree Computations, Ketki Kulkarni, Aris Pagourtzis, Katerina Potika, Petros Potikas, and Dora Souliou
Draft Genome Sequences of Three Monokaryotic Isolates of the White-Rot Basidiomycete Fungus Dichomitus Squalens, Sara Casado López, Mao Peng, Paul Daly, Bill Andreopoulos, Jasmyn Pangilinan, Anna Lipzen, Robert Riley, Steven Ahrendt, Vivian Ng, Kerrie Barry, Chris Daum, Igor Grigoriev, Kristiina Hildén, Miia Mäkelä, and Ronald de Vries
Submissions from 2018
On the Effectiveness of Generic Malware Models, Naman Bagga, Fabio Di Troia, and Mark Stamp
Support Vector Machines for Image Spam Analysis, Aneri Chavda, Katerina Potika, Fabio Di Troia, and Mark Stamp
Submissions from 2017
Viral Marketing for Smart Cities: Influencers in Social Network Communities, Madhura Kaple, Ketki Kulkarni, and Katerina Potika
C. elegans avoids toxin-producing Streptomyces using a seven transmembrane domain chemosensory receptor, Alan Tran, Angelina Tang, Colleen O’Loughlin, Anthony Balistreri, Eric Chang, Doris Coto Villa, Joy Li, Aruna Varshney, Vanessa Jimenez, Jacqueline Pyle, Bryan Tsujimoto, Christopher Wellbrook, Christopher Vargas, Alex Duong, Nebat Ali, Sarah Matthews, Samantha Levinson, Sarah Woldemariam, Sami Khuri, Martina Bremer, Daryl Eggers, Noelle L’Etoile, Laura Miller Conrad, and Miri VanHoven
Submissions from 2016
Virtual values for taint and information flow analysis, Prakasam Kannan, Thomas Austin, Mark Stamp, Tim Disney, and Cormac Flanagan
Next Generation Sequencing Data of a Defined Microbial Mock Community, Esther Singer, Bill Andreopoulos, Robert Bowers, Janey Lee, Shweta Deshpande, Jennifer Chiniquy, Doina Ciobanu, Hans-Peter Klenk, Matthew Zane, Christopher Daum, Alicia Clum, Jan-Fang Cheng, Alex Copeland, and Tanja Woyke
Submissions from 2011
Efficient Unfolding Pattern Recognition in Single Molecule Force Spectroscopy Data, Bill Andreopoulos and Dirk Labudde
Submissions from 2009
Biomedical Word Sense Disambiguation With Ontologies And Metadata: Automation Meets Accuracy, Dimitra Alexopoulou, Bill Andreopoulos, Heiko Dietze, Andreas Doms, Fabien Gandon, Jörg Hakenberg, Khaled Khelif, Michael Schroeder, and Thomas Wächter
Triangle Network Motifs Predict Complexes By Complementing High-error Interactomes With Structural Information, Bill Andreopoulos, Christof Winter, Dirk Labudde, and Michael Schroeder
Submissions from 2008
Word Sense Disambiguation in Biomedical Ontologies With Term Co-occurrence Analysis and Document Clustering, Bill Andreopoulos, Dimitra Alexopoulou, and Michael Schroeder
Selfish Wavelength Assignment in Multifiber Optical Networks, Evangelos Bampas, Aris Pagourtzis, George Pierrakos, and Katerina Potika
Unraveling Protein Networks with Power Graph Analysis, Loïc Royer, Matthias Reimann, Bill Andreopoulos, and Michael Schroeder
Submissions from 2007
Finding Molecular Complexes Through Multiple Layer Clustering of Protein Interaction Networks, Bill Andreopoulos, Aijun An, Xiangji Huang, and Xiaogang Wang