Submissions from 2023
Hydrogen sulfide donor activates AKT-eNOS signaling and promotes lymphatic vessel formation, Ravi Varma Aithabathula, Naveed Pervaiz, Ishita Kathuria, Mallory Swanson, Udai P. Singh, Santosh Kumar, Frank Park, and Bhupesh Singla
Digital Personal Health Coaching Platform for Promoting Human Papillomavirus Infection Vaccinations and Cancer Prevention: Knowledge Graph-Based Recommendation System, Nariman Ammar, Olufunto A. Olusanya, Chad Melton, Lokesh Chinthala, Xiaolei Huang, Brianna M. White, and Arash Shaban-Nejad
The 27th Scientific Conference of the Society on NeuroImmune Pharmacology: New Delhi, India, March 15-18, 2023, Sulie L. Chang, Pankaj Seth, Jun Zhu, Gurudutt Pendyala, Jean M. Bidlack, and Santosh Kumar
Nanocarrier-mediated curcumin delivery: An adjuvant strategy for CNS disease treatment, Sandip Godse, Lina Zhou, Swarna Sakshi, Bhupesh Singla, Udai P. Singh, and Santosh Kumar
Curcumin enhances elvitegravir concentration and alleviates oxidative stress and inflammatory response, Sandip Godse, Lina Zhou, Namita Sinha, Sunitha Kodidela, Asit Kumar, Udai P. Singh, and Santosh Kumar
Resveratrol and its analogs suppress HIV replication, oxidative stress, and inflammation in macrophages, Santosh Kumar, Namita Sinha, Sunitha Kodidela, Sandip Godse, Bhupesh Singla, Udai P. Singh, and Hari K. Bhat
Inhibition of microRNA-34c reduces detrusor ROCK2 expression and urinary bladder inflammation in experimental cystitis, Mousumi Mandal, Ahmed Rakib, Sonia Kiran, Md Abdullah Al Mamun, Somasundaram Raghavan, Santosh Kumar, Bhupesh Singla, Frank Park, M Dennis Leo, and Udai P. Singh
Genetic and Pharmacological Modulation of P75 Neurotrophin Receptor Attenuate Brain Damage After Ischemic Stroke in Mice, Golnoush Mirzahosseini, Saifudeen Ismael, Mohd Salman, Santosh Kumar, and Tauheed Ishrat
Natural language processing with machine learning methods to analyze unstructured patient-reported outcomes derived from electronic health records: A systematic review, Jin-Ah Sim, Xiaolei Huang, Madeline R. Horan, Christopher M. Stewart, Leslie L. Robison, Melissa M. Hudson, Justin N. Baker, and I-Chan Huang
Submissions from 2022
Twitter and Facebook posts about COVID-19 are less likely to spread misinformation compared to other health topics, David A. Broniatowski, Daniel Kerchner, Fouzia Farooq, Xiaolei Huang, Amelia M. Jamison, and Mark Dredze
Deep structure of DNA for genomic analysis, Max Garzon and Sambriddhi Mainali
Social Engineering Attacks in Healthcare Systems: A Survey, Christopher Nguyen, Walt Williams, Brandon Didlake, Donte Mitchell, James McGinnis, and Dipankar Dasgupta
A new RFID ultra-lightweight authentication protocol for medical privacy protection in smart living, Xingmiao Wang, Kai Fan, Kan Yang, Xiaochun Cheng, Qingkuan Dong, and Hui Li
Amplification with One NP Oracle Query, Thomas Watson
Delegating Authentication to Edge: A Decentralized Authentication Architecture for Vehicular Networks, Anjia Yang, Jian Weng, Kan Yang, Cheng Huang, and Xuemin Shen
Submissions from 2021
Interpretable Explanations for Probabilistic Inference in Markov Logic, Khan Mohammad Al Farabi, Somdeb Sarkhel, Sanorita Dey, and Deepak Venugopal
Classifying single nucleotide polymorphisms in humans, Shima Azizzadeh-Roodpish, Max H. Garzon, and Sambriddhi Mainali
Ransomware detection using deep learning in the SCADA system of electric vehicle charging station, Manoj Basnet, Subash Poudyal, Mohd Hasan Ali, and Dipankar Dasgupta
Frequent, Timed Coding Tests for Training and Assessment of Full-Stack Web Development Skills: An Experience Report, Kathryn Bridson and Scott D. Fleming
A Narrative Systematic Literature Review: A Focus on Qualitative Studies on HIV and Medication-Assisted Therapy in the United States, Alina Cernasev, Sunitha Kodidela, Michael P. Veve, Theodore Cory, Hilary Jasmin, and Santosh Kumar
DDoS Explainer using Interpretable Machine Learning, Saikat Das, Namita Agarwal, and Sajjan Shiva
Network Intrusion Detection and Comparative Analysis using Ensemble Machine Learning and Feature Selection, Saikat Das, Sajal Saha, Annita Tahsin Priyoti, Etee Kawna Roy, Frederick T. Sheldon, and Anwar Haque
Machine Learning application lifecycle augmented with explanation and security, Saikat Das and Sajjan Shiva
Separated Red Blue Center Clustering, Marzieh Eskandari, Bhavika Khare, and Nirman Kumar
Secure sharing of spatio-temporal data through name-based access control, Laqin Fan and Lan Wang
Using Negative Detectors for Identifying Adversarial Data Manipulation in Machine Learning, Kishor Datta Gupta and Dipankar Dasgupta
The Nature of Achievement Goal Motivation Profiles: Exploring Situational Motivation in An Algebra-Focused Intelligent Tutoring System, Leigh Harrell-Williams, Christian Mueller, Stephen Fancsali, Steven Ritter, Xiaofei Zhang, and Deepak Venugopal
User factor adaptation for user embedding via multitask learning, Xiaolei Huang, Michael J. Paul, Robin Burke, Franck Dernoncourt, and Mark Dredze
Supporting Equity and Inclusion of Deaf and Hard-of-Hearing Individuals in Professional Organizations, Julia Jones Huyck, Kelsey L. Anbuhl, Brad N. Buran, Henry J. Adler, Samuel R. Atcherson, Ozan Cakmak, Robert T. Dwyer, Morgan Eddolls, Fadhel El May, Juergen-Theodor Fraenzer, Rebekah Funkhouser, Mathilde Gagliardini, Frederick J. Gallun, Raymond L. Goldsworthy, Samir Gouin, Joseph Heng, Ariel Edward Hight, Zina Jawadi, Damir Kovacic, Rachit Kumar, Santosh Kumar, Stacey R. Lim, Chengeng Mo, Lisa S. Nolan, Alexandra Parbery-Clark, Dominic V. Pisano, Valluri R. Rao, and Robert M. Raphael
BBR-Inspired Congestion Control for Data Fetching over NDN, Yi Hu, Constantin Serban, Lan Wang, Alex Afanasyev, and Lixia Zhang
PLI-Sync: Prefetch Loss-Insensitive Sync for NDN Group Streaming, Yi Hu, Constantin Serban, Lan Wang, Alex Afanasyev, and Lixia Zhang
Reducing Operation Cost of LPWAN Roadside Sensors Using Cross Technology Communication, Navid Mohammad Imran and Myounggyu Won
Contrastive Learning in Neural Tensor Networks using Asymmetric Examples, Mohammad Maminur Islam, Somdeb Sarkhel, and Deepak Venugopal
On the mappings of optimization problems to neural networks, Arun Jagota and Max Garzon
Vehicle Trajectory Prediction Using LSTMs with Spatial-Temporal Attention Mechanisms, Lei Lin, Weizi Li, Huikun Bi, and Lingqiao Qin
Assessing inequality, irregularity, and severity regarding road traffic safety during COVID-19, Lei Lin, Feng Shi, and Weizi Li
Foretelling the Phenotype of a Genomic Sequence, Sambriddhi Mainali, Fredy A. Colorado, and Max H. Garzon
An Information-theoretic approach to dimensionality reduction in data science, Sambriddhi Mainali, Max Garzon, Deepak Venugopal, Kalidas Jana, Ching Chi Yang, and Nirman Kumar
Double-Stateoral Difference Learning for Resource Provisioning in Uncertain Fog Computing Environment, Bhargavi Krishna Murthy and Sajjan G. Shiva
JupyterLab Extensions for Blocks Programming, Self-Explanations, and HTML Injection, Andrew M. Olney and Scott D. Fleming
A Name-Based Secure Communications Architecture for Vehicular Networks, Christos Papadopoulos, Alexander Afanasyev, and Susmit Shannigrahi
In-vehicle networking with NDN, Christos Papadopoulos, Susmit Shannigrahi, and Alex Afanaseyv
Nondeterministic and Randomized Boolean Hierarchies in Communication Complexity, Toniann Pitassi, Morgan Shirley, and Thomas Watson
Black-box Adversarial Attacks on Network-wide Multi-step Traffic State Prediction Models, Bibek Poudel and Weizi Li
Analysis of Crypto-Ransomware Using ML-Based Multi-Level Profiling, Subash Poudyal and DIpankar Dasgupta
6-Uniform maker-breaker game is PSPACE-complete, Md Lutfar Rahman and Thomas Watson
Machine Learning and Feature Selection Based Ransomware Detection Using Hexacodes, Bheemidi Vikram Reddy, Gutha Jaya Krishna, Vadlamani Ravi, and Dipankar Dasgupta
Prompting for Free Self-Explanations Promotes Better Code Comprehension, Vasile Rus, Kamil Akhuseyinoglu, Jeevan Chapagain, Lasang Tamang, and Peter Brusilovsky
Proceedings of the 2nd Workshop of the Learner Data Institute: Big Data, Research Challenges, & Science Convergence in Educational Data Science, Vasile Rus and Stephen E. Fancsali
The Learner Data Institute-Conceptualization: A Progress Report, Vasile Rus, Stephen E. Fancsali, Philip Pavlik, Deepak Venugopal, Arthur C. Graesser, and Steve Ritter
WristPrint: Characterizing User Re-identification Risks from Wrist-worn Accelerometry Data, Nazir Saleheen, Md Azim Ullah, Supriyo Chakraborty, Deniz S. Ones, Mani Srivastava, and Santosh Kumar
Morphological characterization of hepatic steatosis and Monte Carlo modeling of MRI signal for accurate quantification of fat fraction and relaxivity, Utsav Shrestha, Marie van der Merwe, Nirman Kumar, Eddie Jacobs, Sanjaya K. Satapathy, and Cara Morin
Privacy-Preserving Task Recommendation Services for Crowdsourcing, Jiangang Shu, Xiaohua Jia, Kan Yang, and Hua Wang
Proxy-Free Privacy-Preserving Task Matching with Efficient Revocation in Crowdsourcing, Jiangang Shu, Kan Yang, Xiaohua Jia, Ximeng Liu, Cong Wang, and Robert H. Deng
Self-healing turing-universal computation in morphogenetic systems, Petr Sosík, Max Garzon, and Jan Drastík
Morphogenetic systems for resource bounded computation and modeling, Petr Sosík, Max Garzon, Vladimír Smolka, and Jan Drastík
Mapping design spaces for audience participation in game live streaming, Alina Striner, Andrew M. Webb, Jessica Hammer, and Amy Shannon Cook
A Comparative Study of Free Self-Explanations and Socratic Tutoring Explanations for Source Code Comprehension, Lasang Jimba Tamang, Zeyad Alshaikh, Nisrine Ait Khayi, Priti Oli, and Vasile Rus
Neuro-Symbolic Models: A Scalable, Explainable Framework for Strategy Discovery from Big Edu-Data, Deepak Venugopal, Vasile Rus, and Anup Shakya
A Spatial-Temporal Analysis of COVID-19's Impact on Human Mobility: The Case of the United States, Songhe Wang, Kangda Wei, Lei Lin, and Weizi Li
L-Platooning: A Protocol for Managing a Long Platoon With DSRC, Myounggyu Won
PMAB: A Public Mutual Audit Blockchain for Outsourced Data in Cloud Storage, Hanzhe Yang, Ruidan Su, Pei Huang, Yuhan Bai, Kai Fan, and Kan Yang
Secure and Efficient Task Matching with Multi-keyword in Multi-requester and Multi-worker Crowdsourcing, Kan Yang and Senjuti Dutta
Reputation-based Truth Discovery with Long-term Quality of Source in Internet of Things, Lei Yan, Kan Yang, and Shouyi Yang
PROTECT: Efficient Password-Based Threshold Single-Sign-On Authentication for Mobile Users against Perpetual Leakage, Yuan Zhang, Chunxiang Xu, Hongwei Li, Kan Yang, Nan Cheng, and Xuemin Shen
Anonymous and Privacy-Preserving Federated Learning with Industrial Big Data, Bin Zhao, Kai Fan, Kan Yang, Zilong Wang, Hui Li, and Yintang Yang
Submissions from 2020
Weighted quasi-arithmetic mean based score level fusion for multi-biometric systems, Herbadji Abderrahmane, Guermat Noubeil, Ziet Lahcene, Zahid Akhtar, and Dipankar Dasgupta
Graph convolutional networks for student answers assessment, Nisrine Ait Khayi and Vasile Rus
Utility of Deep Learning Features for Facial Attributes Manipulation Detection, Zahid Akhtar, Murshida Rahman Mouree, and Dipankar Dasgupta
Fine-Grained Explanations Using Markov Logic, Khan Mohammad Al Farabi, Somdeb Sarkhel, Sanorita Dey, and Deepak Venugopal
Ads-Guard: Detecting Scammers in Online Classified Ads, Suhaib Al-Rousan, Abdullah Abuhussein, Faisal Alsubaei, Lynn Collen, and Sajjan Shiva
Social-Guard: Detecting Scammers in Online Dating, Suhaib Al-Rousan, Abdullah Abuhussein, Faisal Alsubaei, Ozkan Kahveci, Hazem Farra, and Sajjan Shiva
A Socratic Tutor for Source Code Comprehension, Zeyad Alshaikh, Lasagn Tamang, and Vasile Rus
Experiments with a socratic intelligent tutoring system for source code understanding, Zeyad Alshaikh, Lasang Tamang, and Vasile Rus
Detecting stealthy false data injection attacks in the smart grid using ensemble-based machine learning, Mohammad Ashrafuzzaman, Saikat Das, Yacine Chakhchoukh, Sajjan Shiva, and Frederick T. Sheldon
When is amplification necessary for composition in randomized query complexity?, Shalev Ben-David, Mika Göös, Robin Kothari, and Thomas Watson
Transforming Healthcare Cybersecurity from Reactive to Proactive: Current Status and Future Recommendations, Soumitra Sudip Bhuyan, Umar Y. Kabir, Jessica M. Escareno, Kenya Ector, Sandeep Palakodeti, and David Wyant
Opioid Use Disorders in People Living with HIV/AIDS: A Review of Implications for Patient Outcomes, Drug Interactions, and Neurocognitive Disorders, Alina Cernasev, Michael P. Veve, Theodore J. Cory, Nathan A. Summers, Madison Miller, Sunitha Kodidela, and Santosh Kumar
Leveraging Content Connectivity and Location Awareness for Adaptive Forwarding in NDN-based Mobile Ad Hoc Networks, Muktadir Chowdhury, Junaid Ahmed Khan, and Lan Wang
Designing interactive scaffolds to encourage reflection on peer feedback, Amy Cook, Steven Dow, and Jessica Hammer
Machine learning in cybersecurity: a comprehensive survey, Dipankar Dasgupta, Zahid Akhtar, and Sajib Sen
Taxonomy and Survey of Interpretable Machine Learning Method, Saikat Das, Namita Agarwal, Deepak Venugopal, Frederick T. Sheldon, and Sajjan Shiva
Network Intrusion Detection using Natural Language Processing and Ensemble Machine Learning, Saikat Das, Mohammad Ashrafuzzaman, Frederick T. Sheldon, and Sajjan Shiva
A Stealth Migration Approach to Moving Target Defense in Cloud Computing, Saikat Das, Ahmed M. Mahfouz, and Sajjan Shiva
A Holistic Approach for Detecting DDoS Attacks by Using Ensemble Unsupervised Machine Learning, Saikat Das, Deepak Venugopal, and Sajjan Shiva
Empirical Evaluation of the Ensemble Framework for Feature Selection in DDoS Attack, Saikat Das, Deepak Venugopal, Sajjan Shiva, and Frederick T. Sheldon
A model for self-assembling circuits with voltage-controlled growth, Russell Deaton, Max Garzon, Rojoba Yasmin, and Tyler Moore
Discovering in-network Caching Policies in NDN Networks from a Measurement Perspective, Chengyu Fan, Susmit Shannigrahi, Christos Papadopoulos, and Craig Partridge
Using neural tensor networks for open ended short answer assessment, Dipesh Gautam and Vasile Rus
Query-to-communication lifting for BPP, Mika Goos, Toniann Pitassi, and Thomas Watson
A Lower Bound for Sampling Disjoint Sets, Mika Göös and Thomas Watson
Adversarial Input Detection Using Image Processing Techniques (IPT), Kishor Datta Gupta, Dipankar Dasgupta, and Zahid Akhtar
Applicability issues of Evasion-Based Adversarial Attacks and Mitigation Techniques, Kishor Datta Gupta, Dipankar Dasgupta, and Zahid Akhtar
Shamir's Secret Sharing for Authentication without Reconstructing Password, Kishor Datta Gupta, Md Lutfar Rahman, DIpankar Dasgupta, and Subash Poudyal
Active Learning: The Almost Silver Bullet, Eric Hicks, Quang Tran, Kriangsiri Malasri, Nam Sy Vo, and Vinhthuy Phan
Modeling temporality of human intentions by domain adaptation, Xiaolei Huang, Lixing Liu, Kate B. Carey, Joshua Woolley, Stefan Scherer, and Brian Borsari
What matters for neural cross-lingual named entity recognition: An empirical analysis, Xiaolei Huang, Jonathan May, and Nanyun Peng
Neural temporality adaptation for document classification: Diachronic word embeddings and domain adaptation models, Xiaolei Huang and Michael J. Paul
Multilingual twitter corpus and baselines for evaluating demographic bias in hate speech recognition, Xiaolei Huang, Linzi Xing, Franck Dernoncourt, and Michael J. Paul
Augmenting Deep Learning with Relational Knowledge from Markov Logic Networks, Mohammad Maminur Islam, Somdeb Sarkhel, and Deepak Venugopal