Follow

Submissions from 2024

Link

MorteSense DIY Home Security, Shohin Abdulkhamidov, Diego Cruz, Diego Garcia-Carrasco, Spartak Gevorgyan, and Faramarz Mortezaie

PDF

Malware Classification Using Dynamically Extracted API Call Embeddings, Sahil Aggarwal and Fabio Di Troia

Link

Detecting Bias in Refugee Perception using Face Swapping: An Empirical Eye-Tracking Study, Reem Albaghli, Akshay Gurnaney, and Nada Attar

PDF

Oxygenation influences xylose fermentation and gene expression in the yeast genera Spathaspora and Scheffersomyces, Katharina O. Barros, Megan Mader, David J. Krause, Jasmyn Pangilinan, Bill Andreopoulos, Anna Lipzen, Stephen J. Mondo, Igor V. Grigoriev, Carlos A. Rosa, Trey K. Sato, and Chris Todd Hittinger

PDF

Evolutionary genomic analyses of canine E. coli infections identify a relic capsular locus associated with resistance to multiple classes of antimicrobials, Kristina Ceres, Jordan D. Zehr, Chloe Murrell, Jean K. Millet, Qi Sun, Holly C. McQueary, Alanna Horton, Casey Cazer, Kelly Sams, Guillaume Reboul, William B. Andreopoulos, Patrick K. Mitchell, Renee Anderson, Rebecca Franklin-Guild, Brittany D. Cronk, Bryce J. Stanhope, Claire R. Burbick, Rebecca Wolking, and Laura Peak

Link

Scaling Container Caching to Larger Networks with Multi-Agent Reinforcement Learning, Austin Chen and Genya Ishigaki

Link

Synthetic Malware Using Deep Variational Autoencoders and Generative Adversarial Networks, Aaron Choi, Albert Giang, Sajit Jumani, David Luong, and Fabio Di Troia

Link

Health Communication in an Era of Disinformation: Perceived Source Credibility Among Transgender and Gender Diverse Individuals, E. Ciszek, Gerold Dermid, Mansi Shah, Richard Mocarski, Debra Hope, and Nathan Woodruff

PDF

Bisphenol F affects neurodevelopmental gene expression, mushroom body development, and behavior in Drosophila melanogaster, Judith L.A. Fishburn, Heather L. Larson, An Nguyen, Chloe J. Welch, Taylor Moore, Aliyah Penn, Johnathan Newman, Anthony Mangino, Erin Widman, Rana Ghobashy, Jocelyn Witherspoon, Wendy Lee, and Kimberly A. Mulligan

Link

Fast Software-Based Real Time Panoramic Image Processing, Matthew Gerlits, Melody Moh, and Teng Sheng Moh

Link

The Performance of Sequential Deep Learning Models in Detecting Phishing Websites Using Contextual Features of URLs, Saroj Gopali, Akbar S. Namin, Faranak Abri, and Keith S. Jones

PDF

A Comparative Multivariate Analysis of VAR and Deep Learning-based Models for Forecasting Volatile Time Series Data, Saroj Gopali, Sima Siami-Namini, Faranak Abri, and Akbar Siami Namin

PDF

Classification and online clustering of zero-day malware, Olha Jurečková, Martin Jureček, Mark Stamp, Fabio Di Troia, and Róbert Lórencz

PDF

Creating valid adversarial examples of malware, Matouš Kozák, Martin Jureček, Mark Stamp, and Fabio Di Troia

Link

Advanced DDoS Attack Classification using Ensemble Model with Meta-Learner, Ankith Indra Kumar and Genya Ishigaki

Link

The Physiology of Sponge Behavior, Sally P. Leys, Emma J.K. Esposito, and Amanda S. Kahn

PDF

A comparison of adversarial malware generators, Pavla Louthánová, Matouš Kozák, Martin Jureček, Mark Stamp, and Fabio Di Troia

Link

A comparison of graph neural networks for malware classification, Vrinda Malhotra, Katerina Potika, and Mark Stamp

PDF

Enhancing Botnet Detection in Network Security Using Profile Hidden Markov Models, Rucha Mannikar and Fabio Di Troia

Link

A natural language processing approach to Malware classification, Ritik Mehta, Olha Jurečková, and Mark Stamp

Link

Neural Network-based Blocking Prediction for Dynamic Network Slicing, Nitin Datta Movva and Genya Ishigaki

Link

Deception and Lie Detection Using Reduced Linguistic Features, Deep Models and Large Language Models for Transcribed Data, Tien Nguyen, Faranak Abri, Akbar Siami Namin, and Keith S. Jones

Link

Kismet/CHD7/CHD8 affects gut microbiota, mechanics, and the gut-brain axis in Drosophila melanogaster, Angelo Niosi, Nguyên Henry Võ, Punithavathi Sundaramurthy, Chloe Welch, Aliyah Penn, Yelena Yuldasheva, Adam Alfareh, Kaitlyn Rausch, Takhmina Amin-Rahbar, Jeffery Cavanaugh, Prince Yadav, Stephanie Peterson, Raina Brown, Alain Hu, Any Ardon-Castro, Darren Nguyen, Robert Crawford, Wendy Lee, and Eliza J. Morris

Link

The Accuracy of Domain Specific and Descriptive Analysis Generated by Large Language Models, Denish Omondi Otieno, Faranak Abri, Sima Siami-Namini, and Akbar Siami Namin

Link

Smart City Wildfire Risk Analysis with Fuzzy Multi-Criteria Decision-Making, Rekha Rani and Katerina Potika

Link

Uncertainty-Aware and Explainable Human Error Detection in the Operation of Nuclear Power Plants, Bhavya Reddy, Ezgi Gursel, Katy Daniels, Anahita Khojandi, Jamie Baalis Coble, Vivek Agarwal, Ronald Boring, Vaibhav Yadav, and Mahboubeh Madadi

Link

Social media bot detection using Dropout-GAN, Anant Shukla, Martin Jureček, and Mark Stamp

Link

An Advanced Malware Detection System Based on NLP to Generate Genetic Markers, Quang Duy Tran, Jaehyun Lim, and Fabio Di Troia

Link

Controlling Popularity Bias in Sequential Recommendation Models, Brandon Weaver, Melody Moh, and Teng Sheng Moh

Submissions from 2023

PDF

CoDiS: Community Detection via Distributed Seed Set Expansion on Graph Streams, Austin Anderson, Petros Potikas, and Katerina Potika

Link

Autonomous Lending Organization on Ethereum with Credit Scoring, Thomas H. Austin, Katerina Potika, and Chris Pollett

Link

Graph deep learning hashtag recommender for reels, Sriya Balineni and William B. Andreopoulos

Link

Finding BERT Errors Using Activation Vectors, Vedashree P. Bhandare and William B. Andreopoulos

Link

Classifying Real and Bot Users Based on their News Spread for Combating Misinformation, Thi Bui, Anson Pham, Warada Kulkarni, Yutong Yao, and Katerina Potika

Link

Detecting Twitter Bots with Machine Learning and Propagation Graph Analysis, Thi Bui and Katerina Potika

Link

Efficient mmWave Beam Selection using ViTs and GVEC: GPS-based Virtual Environment Capture, Srajan Gupta, Navrati Saxena, Abhishek Roy, and Akshay Ravi

Link

Toward a debugging pedagogy: helping students learn to get unstuck with physical computing systems, Colin Hennessy Elliott, Alexandra Gendreau Chakarov, Jeffrey B. Bush, Jessie Nixon, and Mimi Recker

Link

Container Caching Optimization based on Explainable Deep Reinforcement Learning, Divyashree Jayaram, Saad Jeelani, and Genya Ishigaki

Link

Personalized Tweet Recommendation Using Users' Image Preferences, Shashwat Avinash Kadam and William B. Andreopoulos

Link

Malware classification with Word2Vec, HMM2Vec, BERT, and ELMo, Aparna Sunil Kale, Vinay Pandya, Fabio Di Troia, and Mark Stamp

Link

Job Tailored Resume Content Generation, Sumedh S. Kale and William B. Andreopoulos

PDF

GeoYCSB: A Benchmark Framework for the Performance and Scalability Evaluation of Geospatial NoSQL Databases, Suneuy Kim, Yvonne Hoang, Tsz Ting Yu, and Yuvraj Singh Kanwar

Link

Predicting pedestrian crosswalk behavior using Convolutional Neural Networks, Eric Liang and Mark Stamp

Link

Enhancing Malware Detection Using 'Genetic Markers' and Machine Learning, Jaehyun Lim, Quang Duy Tran, and Fabio Di Troia

Link

Siamese Neural Networks for Content-based Visual Art Recommendation, Ran Li, Melody Moh, and Teng Sheng Moh

PDF

Maximizing External Action with Information Provision over Multiple Rounds in Online Social Networks, Masaaki Miyashita, Norihiko Shinomiya, Daisuke Kasamatsu, and Genya Ishigaki

Link

Large-scale End-of-Life Prediction of Hard Disks in Distributed Datacenters, Rohan Mohapatra, Austin Coursey, and Saptarshi Sengupta

Link

Determining the temporal factors of survival associated with brain and nervous system cancer patients: A hybrid machine learning methodology, Gopal Nath, Austin Coursey, Joseph Ekong, Elham Rastegari, Saptarshi Sengupta, Asli Z. Dag, and Dursun Delen

PDF

An interactive web-based tool for predicting and exploring brain cancer survivability, Gopal Nath, Austin Coursey, Yang Li, Srikanth Prabhu, Harish Garg, Shaymal C. Halder, and Saptarshi Sengupta

Link

Generative adversarial networks and image-based malware classification, Huy Nguyen, Fabio Di Troia, Genya Ishigaki, and Mark Stamp

Link

Detecting Phishing URLs using the BERT Transformer Model, Denish Omondi Otieno, Faranak Abri, Akbar Siami Namin, and Keith S. Jones

Link

Malware Detection through Contextualized Vector Embeddings, Vinay Pandya and Fabio Di Troia

PDF

An empirical analysis of the shift and scale parameters in BatchNorm, Yashna Peerthum and Mark Stamp

Link

Reinforcement Learning with Neural Network-based Deterministic Game Tree Approximation, Kevin Prakash and Genya Ishigaki

Link

A Novel Efficient Deep Learning Framework for Facial Inpainting, Akshay Ravi, Navrati Saxena, Abhishek Roy, and Srajan Gupta

PDF

Darknet traffic classification and adversarial attacks using machine learning, Nhien Rust-Nguyen, Shruti Sharma, and Mark Stamp

Link

The Performance of Machine and Deep Learning Algorithms in Detecting Fake Reviews, Bharkavi Sachithanandam, Akbar Siami Namin, and Faranak Abri

Link

Biological research and self-driving labs in deep space supported by artificial intelligence, Lauren M. Sanders; Ryan T. Scott; Jason H. Yang; Amina Ann Qutub; Hector Garcia Martin; Daniel C. Berrios; Jaden J.A. Hastings; Jon Rask; Graham Mackintosh; Adrienne L. Hoarfrost; Stuart Chalk; John Kalantari; Kia Khezeli; Erik L. Antonsen; Joel Babdor; Richard Barker; Sergio E. Baranzini; Philip Heller; and For full author list, see comments below

PDF

2D-3D Facial Image Analysis for Identification of Facial Features Using Machine Learning Algorithms With Hyper-Parameter Optimization for Forensics Applications, Gangothri Sanil, Krishna Prakash, Srikanth Prabhu, Vinod C. Nayak, and Saptarshi Sengupta

Link

Exploring Social Credit for Fairness in Cloud Computing Networks, Navrati Saxena, Kaiyi Huang, and Abhishek Roy

Link

Biomonitoring and precision health in deep space supported by artificial intelligence, Ryan T. Scott; Lauren M. Sanders; Erik L. Antonsen; Jaden J.A. Hastings; Seung min Park; Graham Mackintosh; Robert J. Reynolds; Adrienne L. Hoarfrost; Aenor Sawyer; Casey S. Greene; Benjamin S. Glicksberg; Corey A. Theriot; Daniel C. Berrios; Jack Miller; Joel Babdor; Richard Barker; Sergio E. Baranzini; Philip Heller; and For full author list, see comments below

Link

De-SaTE: Denoising Self-attention Transformer Encoders for Li-ion Battery Health Prognostics, Gaurav Shinde, Rohan Mohapatra, Pooja Krishan, and Saptarshi Sengupta

Link

Exploiting Large Language Models (LLMs) through Deception Techniques and Persuasion Principles, Sonali Singh, Faranak Abri, and Akbar Siami Namin

Link

Gender Classification Accuracy via Two-Dimensional Body Joints using Convolutional Neural Networks, Cheng En Sung and Nada Attar

PDF

Using Graph Neural Networks for Social Recommendations, Dharahas Tallapally, John Wang, Katerina Potika, and Magdalini Eirinaki

Link

Towards Detecting and Quantifying Identity-Based Polarization in Online Content: A Deep-Learning Approach, Hima Thota, Melody Moh, and Teng Sheng Moh

Link

Real-Time Attention-Based Conversational Agent, Abhishek Vaid and William B. Andreopoulos

Link

A Heuristic Intrusion Detection Approach Using Deep Learning Model, Ching Seh Wu and Sam Chen

Link

Bird Species Identification from Audio Data, Ching Seh Wu, Sasanka Kosuru, and Samaikya Tippareddy

Link

Reinforcement Learning-Based Multi-Domain Network Slice Provisioning, Zhouxiang Wu, Genya Ishigaki, Riti Gour, Congzhou Li, Feng Mi, Subhash Talluri, and Jason P. Jue

Link

Knowledge Graphs for Textbooks: Extraction and Completion Techniques, Yutong Yao, Petros Potikas, and Katerina Potika

Link

An evolutionary algorithm with clustering-based selection strategies for multi-objective optimization, Shenghao Zhou, Xiaomei Mo, Zidong Wang, Qi Li, Tianxiang Chen, Yujun Zheng, and Weiguo Sheng

Submissions from 2022

PDF

Markov Decision Process for Modeling Social Engineering Attacks and Finding Optimal Attack Strategies, Faranak Abri, Jianjun Zheng, Akbar Siami Namin, and Keith S. Jones

Link

Untraining Ethnocentric Biases about Gender Roles: A Preliminary Empirical Study Presenting Art as Stimulus, Reem Albaghli, Chaz Chang, Sarah Almahmeed, and Nada Attar

PDF

Leveraging Initial Cognitive Load to Predict User Response to Complex Visual Tasks, Reem Albaghli, Yaman Jandali, Sarah Almahmid, and Nada Attar

Link

BERT for Malware Classification, Joel Alvares and Fabio Di Troia

PDF

Deeplasmid: Deep learning accurately separates plasmids from bacterial chromosomes, William B. Andreopoulos, Alexander M. Geller, Miriam Lucke, Jan Balewski, Alicia Clum, Natalia N. Ivanova, and Asaf Levy

PDF

A Blockchain-Based Tamper-Resistant Logging Framework, Thomas H. Austin and Fabio Di Troia

PDF

Crowdfunding Non-fungible Tokens on the Blockchain, Sean Basu, Kimaya Basu, and Thomas H. Austin

Link

Euclid after Computer Proof-Checking, Michael Beeson

Link

On the notion of equal figures in Euclid, Michael Beeson

Link

Larry Wos: Visions of Automated Reasoning, Michael Beeson, Maria Paola Bonacina, Michael Kinyon, and Geoff Sutcliffe

PDF

Twitter Bots’ Detection with Benford’s Law and Machine Learning, Sanmesh Bhosale and Fabio Di Troia

Link

Twitter Bot Detection using Social Network Analysis, Thi Bui and Katerina Potika

Link

Understanding the Collaborative Learning Implementation Cycle (CLIC) for a Teacher Learning to Promote Computationally Rich Communication in a Remote STEM Classroom, Jeffrey B. Bush, Quentin Biddy, Colin Hennessy Elliott, Alexandra Gendreau Chakarov, and Jessie Nixon

PDF

Predicting cervical cancer biopsy results using demographic and epidemiological parameters: a custom stacked ensemble machine learning approach, Krishnaraj Chadaga, Srikanth Prabhu, Niranjana Sampathila, Rajagopala Chadaga, S. Swathi, and Saptarshi Sengupta

Link

An Approach to Improving Anomaly Detection Using Multiple Detectors, Paaras Chand, Melody Moh, and Teng Sheng Moh

Link

A New Design and Analysis of Power Saving for IoT Gateway, Jisi Chandroth, Navrati Saxena, Abhishek Roy, and Eshita Rastogi

Link

Machine Learning-Based Analysis of Free-Text Keystroke Dynamics, Han Chih Chang, Jianwei Li, and Mark Stamp

Link

Machine Learning and Deep Learning for Fixed-Text Keystroke Dynamics, Han Chih Chang, Jianwei Li, Ching Seh Wu, and Mark Stamp

PDF

Visual Task Classification using Classic Machine Learning and CNNs, Devangi Vilas Chinchankarame, Noha Elfiky, and Nada Attar

Link

The Melampsora americana Population on Salix purpurea in the Great Lakes Region Is Highly Diverse with a Contributory Influence of Clonality, Chase R. Crowell, Dustin G. Wilkerson, Mariami Beckauri, Ali R. Cala, Patrick W. McMullen, Stephen Mondo, William Andreopoulos, Anna Lipzen, Kathleen Lail, Mi Yan, Vivian Ng, Igor V. Grigoriev, Lawrence B. Smart, and Christine D. Smart

Link

“Do I need to know what I am doing if I am the teacher?” Developing teachers' debugging pedagogies with physical computing, Colin Hennessy Elliott, Jessie Nixon, Jeffrey B. Bush, Alexandra Gendreau Chakarov, and Mimi Recker

Link

Clickbait Detection for YouTube Videos, Ruchira Gothankar, Fabio Di Troia, and Mark Stamp

Link

Traffic-Weighted Availability-Guaranteed Network Slice Composition with VNF Replications, Riti Gour, Varin Sikand, Joseph Chang, Zhouxiang Wu, Genya Ishigaki, and Jason P. Jue

Link

Vision-Based End-to-End Deep Learning for Autonomous Driving in Next-Generation IoT Systems, Dapeng Guo, Melody Moh, and Teng Sheng Moh

Link

Performance Centric Primary Storage Deduplication Systems Exploiting Caching and Block Similarity, Rakesh Gururaj, Melody Moh, Teng Sheng Moh, Philip Shilane, and Bhimsen Bhanjois

PDF

Diel gene expression improves software prediction of cyanobacterial operons, Philip Heller

Link

Evaluating Deep Learning Models and Adversarial Attacks on Accelerometer-Based Gesture Authentication, Elliu Huang, Fabio Di Troia, and Mark Stamp

Link

Using Transformers for Identification of Persuasion Principles in Phishing Emails, Bimal Karki, Faranak Abri, Akbar Siami Namin, and Keith S. Jones