Follow

Submissions from 2022

Link

Machine Learning-Based Analysis of Free-Text Keystroke Dynamics, Han Chih Chang, Jianwei Li, and Mark Stamp

Link

Machine Learning and Deep Learning for Fixed-Text Keystroke Dynamics, Han Chih Chang, Jianwei Li, Ching Seh Wu, and Mark Stamp

PDF

Visual Task Classification using Classic Machine Learning and CNNs, Devangi Vilas Chinchankarame, Noha Elfiky, and Nada Attar

Link

The Melampsora americana Population on Salix purpurea in the Great Lakes Region Is Highly Diverse with a Contributory Influence of Clonality, Chase R. Crowell, Dustin G. Wilkerson, Mariami Beckauri, Ali R. Cala, Patrick W. McMullen, Stephen Mondo, William Andreopoulos, Anna Lipzen, Kathleen Lail, Mi Yan, Vivian Ng, Igor V. Grigoriev, Lawrence B. Smart, and Christine D. Smart

Link

“Do I need to know what I am doing if I am the teacher?” Developing teachers' debugging pedagogies with physical computing, Colin Hennessy Elliott, Jessie Nixon, Jeffrey B. Bush, Alexandra Gendreau Chakarov, and Mimi Recker

Link

Clickbait Detection for YouTube Videos, Ruchira Gothankar, Fabio Di Troia, and Mark Stamp

Link

Traffic-Weighted Availability-Guaranteed Network Slice Composition with VNF Replications, Riti Gour, Varin Sikand, Joseph Chang, Zhouxiang Wu, Genya Ishigaki, and Jason P. Jue

Link

Vision-Based End-to-End Deep Learning for Autonomous Driving in Next-Generation IoT Systems, Dapeng Guo, Melody Moh, and Teng Sheng Moh

Link

Performance Centric Primary Storage Deduplication Systems Exploiting Caching and Block Similarity, Rakesh Gururaj, Melody Moh, Teng Sheng Moh, Philip Shilane, and Bhimsen Bhanjois

PDF

Diel gene expression improves software prediction of cyanobacterial operons, Philip Heller

Link

Evaluating Deep Learning Models and Adversarial Attacks on Accelerometer-Based Gesture Authentication, Elliu Huang, Fabio Di Troia, and Mark Stamp

Link

Using Transformers for Identification of Persuasion Principles in Phishing Emails, Bimal Karki, Faranak Abri, Akbar Siami Namin, and Keith S. Jones

PDF

Cloud-centric blockchain public key infrastructure for big data applications, Brian Tuan Khieu and Melody Moh

Link

Classifying Perceived Emotions based on Polarity of Arousal and Valence from Sound Events, Pooja Krishan and Faranak Abri

Link

Detecting Botnets Through Deep Learning and Network Flow Analysis, Ji An Lee and Fabio Di Troia

Link

Free-Text Keystroke Dynamics for User Authentication, Jianwei Li, Han Chih Chang, and Mark Stamp

Link

DRX in NR Unlicensed for B5G Wireless: Modeling and Analysis, Mukesh Kumar Maheshwari, Eshita Rastogi, Abhishek Roy, Navrati Saxena, and Dong Ryeol Shin

Link

Dynamic Resource Management of Green Fog Computing for IoT Support, Melody Moh, Teng Sheng Moh, and Mariia Surmenok

Link

Auxiliary-Classifier GAN for Malware Analysis, Rakesh Nagaraju and Mark Stamp

PDF

Incorporating a Machine Learning Model into a Web-Based Administrative Decision Support Tool for Predicting Workplace Absenteeism, Gopal Nath, Yawei Wang, Austin Coursey, Krishna K. Saha, Srikanth Prabhu, and Saptarshi Sengupta

PDF

MalView: Interactive Visual Analytics for Comprehending Malware Behavior, Huyen N. Nguyen, Faranak Abri, Vung Pham, Moitrayee Chatterjee, Akbar Siami Namin, and Tommy Dang

Link

Intelligent O-RAN for Beyond 5G and 6G Wireless Networks, Solmaz Niknam, Abhishek Roy, Harpreet S. Dhillon, Sukhdeep Singh, Rahul Banerji, Jeffery H. Reed, Navrati Saxena, and Seungil Yoon

Link

3D Facial Biometric Verification Using a DNA Sample for Law Enforcement Applications, Niraj Pandkar, Teng Sheng Moh, and Mark Barash

Link

TontineCoin: Survivor-based Proof-of-Stake, Chris Pollett, Thomas H. Austin, Katerina Potika, Justin Rietz, and Prashant Pardeshi

Link

A parallel community detection algorithm based on spanning trees, Petros Potikas, Dora Souliou, Aris Pagourtzis, and Katerina Potika

PDF

Use of Machine Learning for Early Detection of Knee Osteoarthritis and Quantifying Effectiveness of Treatment Using Force Platform, Ashish John Prabhakar, Srikanth Prabhu, Aayush Agrawal, Siddhisa Banerjee, Abraham M. Joshua, Yogeesh Dattakumar Kamat, Gopal Nath, and Saptarshi Sengupta

PDF

Supervised Learning Models for the Preliminary Detection of COVID-19 in Patients Using Demographic and Epidemiological Parameters, Aditya Pradhan, Srikanth Prabhu, Krishnaraj Chadaga, Saptarshi Sengupta, and Gopal Nath

Link

Investigating User Information and Social Media Features in Cyberbullying Detection, Jiabao Qiu, Nihar Hegde, Melody Moh, and Teng Sheng Moh

Link

Multi-modal detection of cyberbullying on Twitter, Jiabao Qiu, Melody Moh, and Teng Sheng Moh

Link

Advancement on Security Applications of Private Intersection Sum Protocol, Y. Athur Raghuvir, S. Govindarajan, S. Vijayakumar, P. Yadlapalli, and F. Di Troia

Link

Smart home device security: A survey of smart home authentication methods with a focus on mutual authentication and key management practices, Robinson Raju and Melody Moh

Link

Energy efficiency analysis of narrowband Internet of Things with auxiliary active cycles for small data transmission, Eshita Rastogi, Mukesh Kumar Maheshwari, Abhishek Roy, Navrati Saxena, and Dong Ryeol Shin

Link

Machine Learning-Based DRX Mechanism in NR-Unlicensed, Eshita Rastogi, Mukesh Kumar Maheshwari, Abhishek Roy, Navrati Saxena, and Dong Ryeol Shin

Link

Machine Learning Based Dynamic Restoration of Next Generation Wireless Networks, Sukhdeep Singh, Navrati Saxena, Prasham Jain, Abhishek Roy, Harman Jit Singh, Divay Bhutani, Nawab Muhammad Faseeh Qureshi, and Ali Kashif Bashir

Link

Introduction to Machine Learning with Applications in Information Security: Second Edition, Mark Stamp

Link

Resource Management for Future Green Mobile Cloud Computing, Mariia Surmenok, Melody Moh, and Teng Sheng Moh

Link

Predictive Closed-Loop Service Automation in O-RAN Based Network Slicing, Joseph Thaliath, Solmaz Niknam, Sukhdeep Singh, Rahul Banerji, Navrati Saxena, Harpreet S. Dhillon, Jeffrey H. Reed, Ali Kashif Bashir, Avinash Bhat, and Abhishek Roy

Link

Investigating Classification Methods using Fixation Patterns to Predict Visual Tasks, Siddartha Thentu and Nada Attar

PDF

Robustness of Image-Based Malware Analysis, Katrina Tran, Fabio Di Troia, and Mark Stamp

PDF

Word Embeddings for Fake Malware Generation, Quang Duy Tran and Fabio Di Troia

PDF

Fake Malware Generation Using HMM and GAN, Harshit Trehan and Fabio Di Troia

Link

Adversarial Attacks on Speech Separation Systems, Kendrick Trinh, Melody Moh, and Teng Sheng Moh

Link

Machine Learning for Malware Evolution Detection, Lolitha Sresta Tupadha and Mark Stamp

PDF

Bisphenol a affects neurodevelopmental gene expression, cognitive function, and neuromuscular synaptic morphology in Drosophila melanogaster, Chloe Welch, Eden Johnson, Angelina Tupikova, Judith Anderson, Brendan Tinsley, Johnathan Newman, Erin Widman, Adam Alfareh, Alexandra Davis, Lucero Rodriguez, Clayton Visger, Justin P. Miller-Schulze, Wendy Lee, and Kimberly Mulligan

Link

Exploration of privacy preserving deep learning framework for computer vision tasks, Amala Wilson, Mashhour Solh, and Melody Moh

Link

Traffic Flow Prediction Using Deep Learning Models, China Seh Wu, Satya Pranavi Manthena, Saurabh Kale, and Maithili Vinayak Kulkarni

Link

Reinforcement Learning-Based Network Slice Resource Allocation for Federated Learning Applications, Zhouxiang Wu, Genya Ishigaki, Riti Gour, Congzhou Li, and Jason P. Jue

Link

Whole-File Chunk-Based Deduplication Using Reinforcement Learning for Cloud Storage, Xincheng Yuan, Melody Moh, and Teng Sheng Moh

Submissions from 2021

Link

Prediction of higher-order links using global vectors and Hasse diagrams, Kalpnil Anjan, Willam Andreopoulos, and Katerina Potika

Link

SpartanGold: A Blockchain for Education, Experimentation, and Rapid Prototyping, Thomas H. Austin

Link

BioBlockchain: Useful Proof-of-Work with Multiple Sequence Alignment, Yan Chen, Thomas H. Austin, and Philip Heller

Link

Improved algorithm to determine 3-colorability of graphs with minimum degree at least 7, Nicholas Crawford, Sogol Jahanbekam, and Katerina Potika

PDF

Malware classification using long short-term memory models, Dennis Dang, Fabio Di Troia, and Mark Stamp

PDF

The extracellular contractile injection system is enriched in environmental microbes and associates with numerous toxins, Alexander Martin Geller, Inbal Pollin, David Zlotkin, Aleks Danov, Nimrod Nachmias, William B. Andreopoulos, Keren Shemesh, and Asaf Levy

PDF

The data sensor hub (Dash): A physical computing system to support middle school inquiry science instruction, Alexandra Gendreau Chakarov, Quentin Biddy, Colin Hennessy Elliott, and Mimi Recker

Link

Improving the Relevance of a Web Navigation Recommender System Using Categorization of Users' Experience, Ilan Yehuda Granot, Ching Seh Mike Wu, and Zvi Or-Bach

Link

End-to-End Learning for Autonomous Driving in Secured Smart Cities, Dapeng Guo, Melody Moh, and Teng Sheng Moh

Link

Vision-Based Autonomous Driving for Smart City: A Case for End-to-End Learning Utilizing Temporal Information, Dapeng Guo, Melody Moh, and Teng Sheng Moh

Link

Fake News Analysis and Graph Classification on a COVID-19 Twitter Dataset, Kriti Gupta and Katerina Potika

PDF

A novel approach to teaching Hidden Markov Models to a diverse undergraduate population, Philip Heller and Pratyusha Pogaru

PDF

A new dataset for smartphone gesture-based authentication, Elliu Huang, Fabio Di Troia, Mark Stamp, and Preethi Sundaravaradhan

PDF

Malware classification with word embedding features, Aparna Sunil Kale, Fabio Di Troia, and Mark Stamp

Link

Understanding How the Relative Abundance of Candida Species Impacts Transcriptional Regulation in Co-culture Biofilms, Diksha Kool, Katy Kao, and Wendy Lee

Link

ShineOn: Illuminating Design Choices for Practical Video-based Virtual Clothing Try-on, Gaurav Kuppa, Andrew Jong, Xin Liu, Ziwei Liu, and Teng Sheng Moh

Link

Improving Security and Performance of Distributed IPFS-Based Web Applications with Blockchain, Vu Le, Ramin Moazeni, and Melody Moh

Link

Sentiment analysis on COVID tweets using COVID-Twitter-BERT with auxiliary sentence approach, Hung Yeh Lin and Teng Sheng Moh

Link

Gun Violence News Information Retrieval using BERT as Sequence Tagging Task, Hung Yeh Lin, Teng Sheng Moh, and Bryce Westlake

Link

Learning for Free: Object Detectors Trained on Synthetic Data, Charles Thane MacKay and Teng Sheng Moh

Link

Multi-Agent Deep Reinforcement Learning for Walker Systems, Inhee Park and Teng Sheng Moh

Link

Utilizing CNNs for Object Detection with LiDAR Data for Autonomous Driving, Vinay Ponnaganti, Melody Moh, and Teng Sheng Moh

Link

Fast streaming translation using machine learning with transformer, Jiabao Qiu, Melody Moh, and Teng Sheng Moh

Link

A novel safety message dissemination framework in LTE-V2X system, Eshita Rastogi, Mukesh Kumar Maheshwari, Abhishek Roy, Navrati Saxena, and Dong Ryeol Shin

Link

Intrusion Detection and CAN Vehicle Networks, Ashraf Saber, Fabio Di Troia, and Mark Stamp

Link

DRX in new radio unlicensed: A step beyond 5G wireless, Navrati Saxena, Abhishek Roy, Mukesh Kumar Maheswari, Eshita Rastogi, and Dong Ryeol Shin

Link

Emulation Versus Instrumentation for Android Malware Detection, Anukriti Sinha, Fabio Di Troia, Philip Heller, and Mark Stamp

Link

A Computational Approach to Identify Transcription Factor Binding Sites Containing Spacer Regions, Punithavathi Sundaramurthy, Brandon White, and Wendy Lee

Link

Emotion-Based Music Recommender System for Tinnitus Patients (EMOTIN), Katarzyna A. Tarnowska

Link

Explainable AI-based clinical decision support system for hearing disorders, Katarzyna A. Tarnowska, Brett C. Dispoto, and Jordan Conragan

PDF

NLP-Based customer loyalty improvement recommender system (CLIRS2), Katarzyna Anna Tarnowska and Zbigniew Ras

Link

Eff-YNet: A Dual Task Network for DeepFake Detection and Segmentation, Eric Tjon, Melody Moh, and Teng Sheng Moh

Link

Cyberbullying Classification based on Social Network Analysis, Anqi Wang and Katerina Potika

PDF

Computer-aided diagnosis of low grade endometrial stromal sarcoma (LGESS), Xinxin Yang and Mark Stamp

Link

Detecting compromised social network accounts using deep learning for behavior and text analyses, Steven Yen, Melody Moh, and Teng Sheng Moh

PDF

Malware classification with GMM-HMM models, Jing Zhao, Samanvitha Basole, and Mark Stamp

Submissions from 2020

Link

SharedWealth: Disincentivizing Mining Pools Through Burning and Minting, Thomas H. Austin, Paul Merrill, and Justin Rietz

Link

Multifamily malware models, Samanvitha Basole, Fabio Di Troia, and Mark Stamp

Link

Higher-order Link Prediction Using Triangle Embeddings, Neeraj Chavan and Katerina Potika

Link

A Novel Approach to Music Genre Classification using Natural Language Processing and Spark, Sharan Duggirala and Teng Sheng Moh

Link

Convolutional neural networks and extreme learning machines for malware classification, Mugdha Jain, William Andreopoulos, and Mark Stamp

PDF

Virtual Try-On With Generative Adversarial Networks: A Taxonomical Survey, Andrew Jong, Melody Moh, and Teng Sheng Moh

PDF

NexGen D-TCP: Next generation dynamic TCP congestion control algorithm, Madhan Raj Kanagarathinam, Sukhdeep Singh, Irlanki Sandeep, Hanseok Kim, Mukesh Kumar Maheshwari, Jaehyun Hwang, Abhishek Roy, and Navrati Saxena

PDF

Find me if You Can: Aligning Users in Different Social Networks, Priyanka Kasbekar, Katerina Potika, and Chris Pollett

PDF

Whole genome sequencing data of multiple individuals of Pakistani descent, Shahid Y. Khan, Muhammad Ali, Mei Chong W. Lee, Zhiwei Ma, Pooja Biswas, Asma A. Khan, Muhammad Asif Naeem, Saima Riazuddin, Sheikh Riazuddin, Radha Ayyagari, J. Fielding Hejtmancik, and S. Amer Riazuddin

Link

Interdisciplinary minor in bioinformatics: First results and outlook, Natalia Khuri, Wendy Lee, K. Virginia Lehmkuhl-Dakhwe, Miri VanHoven, and Sami Khuri

Link

Seamless Integration of NoSQL class into the Database Curriculum, Suneuy Kim

Link

Machine Learning in Indian Crop Classification of Temporal Multi-Spectral Satellite Image, Ravali Koppaka and Teng Sheng Moh

Link

GloVeNoR: GloVe for Node Representations with Second Order Random Walks, Shishir Kulkarni, Jay Ketan Katariya, and Katerina Potika

Link

Ping-Pong Governance: Token Locking for Enabling Blockchain Self-governance, Paul Merrill, Thomas H. Austin, Justin Rietz, and Jon Pearce

Link

A unified framework on node classification using graph convolutional networks, Saurabh Mithe and Katerina Potika

Link

No "Love" Lost: Defending Hate Speech Detection Models Against Adversaries, Melody Moh, Teng Sheng Moh, and Brian Khieu