Follow

Submissions from 2023

Link

Hydrogen sulfide donor activates AKT-eNOS signaling and promotes lymphatic vessel formation, Ravi Varma Aithabathula, Naveed Pervaiz, Ishita Kathuria, Mallory Swanson, Udai P. Singh, Santosh Kumar, Frank Park, and Bhupesh Singla

Link

Digital Personal Health Coaching Platform for Promoting Human Papillomavirus Infection Vaccinations and Cancer Prevention: Knowledge Graph-Based Recommendation System, Nariman Ammar, Olufunto A. Olusanya, Chad Melton, Lokesh Chinthala, Xiaolei Huang, Brianna M. White, and Arash Shaban-Nejad

Link

The 27th Scientific Conference of the Society on NeuroImmune Pharmacology: New Delhi, India, March 15-18, 2023, Sulie L. Chang, Pankaj Seth, Jun Zhu, Gurudutt Pendyala, Jean M. Bidlack, and Santosh Kumar

Link

Nanocarrier-mediated curcumin delivery: An adjuvant strategy for CNS disease treatment, Sandip Godse, Lina Zhou, Swarna Sakshi, Bhupesh Singla, Udai P. Singh, and Santosh Kumar

Link

Curcumin enhances elvitegravir concentration and alleviates oxidative stress and inflammatory response, Sandip Godse, Lina Zhou, Namita Sinha, Sunitha Kodidela, Asit Kumar, Udai P. Singh, and Santosh Kumar

Link

Resveratrol and its analogs suppress HIV replication, oxidative stress, and inflammation in macrophages, Santosh Kumar, Namita Sinha, Sunitha Kodidela, Sandip Godse, Bhupesh Singla, Udai P. Singh, and Hari K. Bhat

Link

Inhibition of microRNA-34c reduces detrusor ROCK2 expression and urinary bladder inflammation in experimental cystitis, Mousumi Mandal, Ahmed Rakib, Sonia Kiran, Md Abdullah Al Mamun, Somasundaram Raghavan, Santosh Kumar, Bhupesh Singla, Frank Park, M Dennis Leo, and Udai P. Singh

Link

Genetic and Pharmacological Modulation of P75 Neurotrophin Receptor Attenuate Brain Damage After Ischemic Stroke in Mice, Golnoush Mirzahosseini, Saifudeen Ismael, Mohd Salman, Santosh Kumar, and Tauheed Ishrat

Link

Natural language processing with machine learning methods to analyze unstructured patient-reported outcomes derived from electronic health records: A systematic review, Jin-Ah Sim, Xiaolei Huang, Madeline R. Horan, Christopher M. Stewart, Leslie L. Robison, Melissa M. Hudson, Justin N. Baker, and I-Chan Huang

Submissions from 2022

Link

Twitter and Facebook posts about COVID-19 are less likely to spread misinformation compared to other health topics, David A. Broniatowski, Daniel Kerchner, Fouzia Farooq, Xiaolei Huang, Amelia M. Jamison, and Mark Dredze

Link

Deep structure of DNA for genomic analysis, Max Garzon and Sambriddhi Mainali

Link

Social Engineering Attacks in Healthcare Systems: A Survey, Christopher Nguyen, Walt Williams, Brandon Didlake, Donte Mitchell, James McGinnis, and Dipankar Dasgupta

Link

A new RFID ultra-lightweight authentication protocol for medical privacy protection in smart living, Xingmiao Wang, Kai Fan, Kan Yang, Xiaochun Cheng, Qingkuan Dong, and Hui Li

Link

Amplification with One NP Oracle Query, Thomas Watson

Link

Delegating Authentication to Edge: A Decentralized Authentication Architecture for Vehicular Networks, Anjia Yang, Jian Weng, Kan Yang, Cheng Huang, and Xuemin Shen

Submissions from 2021

Link

Interpretable Explanations for Probabilistic Inference in Markov Logic, Khan Mohammad Al Farabi, Somdeb Sarkhel, Sanorita Dey, and Deepak Venugopal

Link

Classifying single nucleotide polymorphisms in humans, Shima Azizzadeh-Roodpish, Max H. Garzon, and Sambriddhi Mainali

Link

Ransomware detection using deep learning in the SCADA system of electric vehicle charging station, Manoj Basnet, Subash Poudyal, Mohd Hasan Ali, and Dipankar Dasgupta

Link

Frequent, Timed Coding Tests for Training and Assessment of Full-Stack Web Development Skills: An Experience Report, Kathryn Bridson and Scott D. Fleming

Link

A Narrative Systematic Literature Review: A Focus on Qualitative Studies on HIV and Medication-Assisted Therapy in the United States, Alina Cernasev, Sunitha Kodidela, Michael P. Veve, Theodore Cory, Hilary Jasmin, and Santosh Kumar

Link

DDoS Explainer using Interpretable Machine Learning, Saikat Das, Namita Agarwal, and Sajjan Shiva

Link

Network Intrusion Detection and Comparative Analysis using Ensemble Machine Learning and Feature Selection, Saikat Das, Sajal Saha, Annita Tahsin Priyoti, Etee Kawna Roy, Frederick T. Sheldon, and Anwar Haque

Link

Machine Learning application lifecycle augmented with explanation and security, Saikat Das and Sajjan Shiva

Link

Separated Red Blue Center Clustering, Marzieh Eskandari, Bhavika Khare, and Nirman Kumar

Link

Secure sharing of spatio-temporal data through name-based access control, Laqin Fan and Lan Wang

Link

Using Negative Detectors for Identifying Adversarial Data Manipulation in Machine Learning, Kishor Datta Gupta and Dipankar Dasgupta

The Nature of Achievement Goal Motivation Profiles: Exploring Situational Motivation in An Algebra-Focused Intelligent Tutoring System, Leigh Harrell-Williams, Christian Mueller, Stephen Fancsali, Steven Ritter, Xiaofei Zhang, and Deepak Venugopal

User factor adaptation for user embedding via multitask learning, Xiaolei Huang, Michael J. Paul, Robin Burke, Franck Dernoncourt, and Mark Dredze

Link

Supporting Equity and Inclusion of Deaf and Hard-of-Hearing Individuals in Professional Organizations, Julia Jones Huyck, Kelsey L. Anbuhl, Brad N. Buran, Henry J. Adler, Samuel R. Atcherson, Ozan Cakmak, Robert T. Dwyer, Morgan Eddolls, Fadhel El May, Juergen-Theodor Fraenzer, Rebekah Funkhouser, Mathilde Gagliardini, Frederick J. Gallun, Raymond L. Goldsworthy, Samir Gouin, Joseph Heng, Ariel Edward Hight, Zina Jawadi, Damir Kovacic, Rachit Kumar, Santosh Kumar, Stacey R. Lim, Chengeng Mo, Lisa S. Nolan, Alexandra Parbery-Clark, Dominic V. Pisano, Valluri R. Rao, and Robert M. Raphael

Link

BBR-Inspired Congestion Control for Data Fetching over NDN, Yi Hu, Constantin Serban, Lan Wang, Alex Afanasyev, and Lixia Zhang

Link

PLI-Sync: Prefetch Loss-Insensitive Sync for NDN Group Streaming, Yi Hu, Constantin Serban, Lan Wang, Alex Afanasyev, and Lixia Zhang

Link

Reducing Operation Cost of LPWAN Roadside Sensors Using Cross Technology Communication, Navid Mohammad Imran and Myounggyu Won

Link

Contrastive Learning in Neural Tensor Networks using Asymmetric Examples, Mohammad Maminur Islam, Somdeb Sarkhel, and Deepak Venugopal

On the mappings of optimization problems to neural networks, Arun Jagota and Max Garzon

Link

Vehicle Trajectory Prediction Using LSTMs with Spatial-Temporal Attention Mechanisms, Lei Lin, Weizi Li, Huikun Bi, and Lingqiao Qin

Link

Assessing inequality, irregularity, and severity regarding road traffic safety during COVID-19, Lei Lin, Feng Shi, and Weizi Li

Link

Foretelling the Phenotype of a Genomic Sequence, Sambriddhi Mainali, Fredy A. Colorado, and Max H. Garzon

Link

An Information-theoretic approach to dimensionality reduction in data science, Sambriddhi Mainali, Max Garzon, Deepak Venugopal, Kalidas Jana, Ching Chi Yang, and Nirman Kumar

Link

Double-Stateoral Difference Learning for Resource Provisioning in Uncertain Fog Computing Environment, Bhargavi Krishna Murthy and Sajjan G. Shiva

JupyterLab Extensions for Blocks Programming, Self-Explanations, and HTML Injection, Andrew M. Olney and Scott D. Fleming

Link

A Name-Based Secure Communications Architecture for Vehicular Networks, Christos Papadopoulos, Alexander Afanasyev, and Susmit Shannigrahi

Link

In-vehicle networking with NDN, Christos Papadopoulos, Susmit Shannigrahi, and Alex Afanaseyv

Link

Nondeterministic and Randomized Boolean Hierarchies in Communication Complexity, Toniann Pitassi, Morgan Shirley, and Thomas Watson

Link

Black-box Adversarial Attacks on Network-wide Multi-step Traffic State Prediction Models, Bibek Poudel and Weizi Li

Link

Analysis of Crypto-Ransomware Using ML-Based Multi-Level Profiling, Subash Poudyal and DIpankar Dasgupta

Link

6-Uniform maker-breaker game is PSPACE-complete, Md Lutfar Rahman and Thomas Watson

Link

Machine Learning and Feature Selection Based Ransomware Detection Using Hexacodes, Bheemidi Vikram Reddy, Gutha Jaya Krishna, Vadlamani Ravi, and Dipankar Dasgupta

Prompting for Free Self-Explanations Promotes Better Code Comprehension, Vasile Rus, Kamil Akhuseyinoglu, Jeevan Chapagain, Lasang Tamang, and Peter Brusilovsky

Proceedings of the 2nd Workshop of the Learner Data Institute: Big Data, Research Challenges, & Science Convergence in Educational Data Science, Vasile Rus and Stephen E. Fancsali

The Learner Data Institute-Conceptualization: A Progress Report, Vasile Rus, Stephen E. Fancsali, Philip Pavlik, Deepak Venugopal, Arthur C. Graesser, and Steve Ritter

Link

WristPrint: Characterizing User Re-identification Risks from Wrist-worn Accelerometry Data, Nazir Saleheen, Md Azim Ullah, Supriyo Chakraborty, Deniz S. Ones, Mani Srivastava, and Santosh Kumar

Link

Morphological characterization of hepatic steatosis and Monte Carlo modeling of MRI signal for accurate quantification of fat fraction and relaxivity, Utsav Shrestha, Marie van der Merwe, Nirman Kumar, Eddie Jacobs, Sanjaya K. Satapathy, and Cara Morin

Link

Privacy-Preserving Task Recommendation Services for Crowdsourcing, Jiangang Shu, Xiaohua Jia, Kan Yang, and Hua Wang

Link

Proxy-Free Privacy-Preserving Task Matching with Efficient Revocation in Crowdsourcing, Jiangang Shu, Kan Yang, Xiaohua Jia, Ximeng Liu, Cong Wang, and Robert H. Deng

Link

Self-healing turing-universal computation in morphogenetic systems, Petr Sosík, Max Garzon, and Jan Drastík

Link

Morphogenetic systems for resource bounded computation and modeling, Petr Sosík, Max Garzon, Vladimír Smolka, and Jan Drastík

Link

Mapping design spaces for audience participation in game live streaming, Alina Striner, Andrew M. Webb, Jessica Hammer, and Amy Shannon Cook

Link

A Comparative Study of Free Self-Explanations and Socratic Tutoring Explanations for Source Code Comprehension, Lasang Jimba Tamang, Zeyad Alshaikh, Nisrine Ait Khayi, Priti Oli, and Vasile Rus

Neuro-Symbolic Models: A Scalable, Explainable Framework for Strategy Discovery from Big Edu-Data, Deepak Venugopal, Vasile Rus, and Anup Shakya

A Spatial-Temporal Analysis of COVID-19's Impact on Human Mobility: The Case of the United States, Songhe Wang, Kangda Wei, Lei Lin, and Weizi Li

Link

L-Platooning: A Protocol for Managing a Long Platoon With DSRC, Myounggyu Won

Link

PMAB: A Public Mutual Audit Blockchain for Outsourced Data in Cloud Storage, Hanzhe Yang, Ruidan Su, Pei Huang, Yuhan Bai, Kai Fan, and Kan Yang

Link

Secure and Efficient Task Matching with Multi-keyword in Multi-requester and Multi-worker Crowdsourcing, Kan Yang and Senjuti Dutta

Link

Reputation-based Truth Discovery with Long-term Quality of Source in Internet of Things, Lei Yan, Kan Yang, and Shouyi Yang

Link

PROTECT: Efficient Password-Based Threshold Single-Sign-On Authentication for Mobile Users against Perpetual Leakage, Yuan Zhang, Chunxiang Xu, Hongwei Li, Kan Yang, Nan Cheng, and Xuemin Shen

Link

Anonymous and Privacy-Preserving Federated Learning with Industrial Big Data, Bin Zhao, Kai Fan, Kan Yang, Zilong Wang, Hui Li, and Yintang Yang

Submissions from 2020

Link

Weighted quasi-arithmetic mean based score level fusion for multi-biometric systems, Herbadji Abderrahmane, Guermat Noubeil, Ziet Lahcene, Zahid Akhtar, and Dipankar Dasgupta

Link

Graph convolutional networks for student answers assessment, Nisrine Ait Khayi and Vasile Rus

Link

Utility of Deep Learning Features for Facial Attributes Manipulation Detection, Zahid Akhtar, Murshida Rahman Mouree, and Dipankar Dasgupta

Link

Fine-Grained Explanations Using Markov Logic, Khan Mohammad Al Farabi, Somdeb Sarkhel, Sanorita Dey, and Deepak Venugopal

Link

Ads-Guard: Detecting Scammers in Online Classified Ads, Suhaib Al-Rousan, Abdullah Abuhussein, Faisal Alsubaei, Lynn Collen, and Sajjan Shiva

Link

Social-Guard: Detecting Scammers in Online Dating, Suhaib Al-Rousan, Abdullah Abuhussein, Faisal Alsubaei, Ozkan Kahveci, Hazem Farra, and Sajjan Shiva

Link

A Socratic Tutor for Source Code Comprehension, Zeyad Alshaikh, Lasagn Tamang, and Vasile Rus

Experiments with a socratic intelligent tutoring system for source code understanding, Zeyad Alshaikh, Lasang Tamang, and Vasile Rus

Link

Detecting stealthy false data injection attacks in the smart grid using ensemble-based machine learning, Mohammad Ashrafuzzaman, Saikat Das, Yacine Chakhchoukh, Sajjan Shiva, and Frederick T. Sheldon

Link

When is amplification necessary for composition in randomized query complexity?, Shalev Ben-David, Mika Göös, Robin Kothari, and Thomas Watson

Link

Transforming Healthcare Cybersecurity from Reactive to Proactive: Current Status and Future Recommendations, Soumitra Sudip Bhuyan, Umar Y. Kabir, Jessica M. Escareno, Kenya Ector, Sandeep Palakodeti, and David Wyant

Link

Opioid Use Disorders in People Living with HIV/AIDS: A Review of Implications for Patient Outcomes, Drug Interactions, and Neurocognitive Disorders, Alina Cernasev, Michael P. Veve, Theodore J. Cory, Nathan A. Summers, Madison Miller, Sunitha Kodidela, and Santosh Kumar

Link

Leveraging Content Connectivity and Location Awareness for Adaptive Forwarding in NDN-based Mobile Ad Hoc Networks, Muktadir Chowdhury, Junaid Ahmed Khan, and Lan Wang

Link

Designing interactive scaffolds to encourage reflection on peer feedback, Amy Cook, Steven Dow, and Jessica Hammer

Link

Machine learning in cybersecurity: a comprehensive survey, Dipankar Dasgupta, Zahid Akhtar, and Sajib Sen

Link

Taxonomy and Survey of Interpretable Machine Learning Method, Saikat Das, Namita Agarwal, Deepak Venugopal, Frederick T. Sheldon, and Sajjan Shiva

Link

Network Intrusion Detection using Natural Language Processing and Ensemble Machine Learning, Saikat Das, Mohammad Ashrafuzzaman, Frederick T. Sheldon, and Sajjan Shiva

Link

A Stealth Migration Approach to Moving Target Defense in Cloud Computing, Saikat Das, Ahmed M. Mahfouz, and Sajjan Shiva

Link

A Holistic Approach for Detecting DDoS Attacks by Using Ensemble Unsupervised Machine Learning, Saikat Das, Deepak Venugopal, and Sajjan Shiva

Link

Empirical Evaluation of the Ensemble Framework for Feature Selection in DDoS Attack, Saikat Das, Deepak Venugopal, Sajjan Shiva, and Frederick T. Sheldon

Link

A model for self-assembling circuits with voltage-controlled growth, Russell Deaton, Max Garzon, Rojoba Yasmin, and Tyler Moore

Link

Discovering in-network Caching Policies in NDN Networks from a Measurement Perspective, Chengyu Fan, Susmit Shannigrahi, Christos Papadopoulos, and Craig Partridge

Link

Using neural tensor networks for open ended short answer assessment, Dipesh Gautam and Vasile Rus

Link

Query-to-communication lifting for BPP, Mika Goos, Toniann Pitassi, and Thomas Watson

Link

A Lower Bound for Sampling Disjoint Sets, Mika Göös and Thomas Watson

Link

Adversarial Input Detection Using Image Processing Techniques (IPT), Kishor Datta Gupta, Dipankar Dasgupta, and Zahid Akhtar

Link

Applicability issues of Evasion-Based Adversarial Attacks and Mitigation Techniques, Kishor Datta Gupta, Dipankar Dasgupta, and Zahid Akhtar

Link

Shamir's Secret Sharing for Authentication without Reconstructing Password, Kishor Datta Gupta, Md Lutfar Rahman, DIpankar Dasgupta, and Subash Poudyal

Link

Active Learning: The Almost Silver Bullet, Eric Hicks, Quang Tran, Kriangsiri Malasri, Nam Sy Vo, and Vinhthuy Phan

Modeling temporality of human intentions by domain adaptation, Xiaolei Huang, Lixing Liu, Kate B. Carey, Joshua Woolley, Stefan Scherer, and Brian Borsari

What matters for neural cross-lingual named entity recognition: An empirical analysis, Xiaolei Huang, Jonathan May, and Nanyun Peng

Neural temporality adaptation for document classification: Diachronic word embeddings and domain adaptation models, Xiaolei Huang and Michael J. Paul

Multilingual twitter corpus and baselines for evaluating demographic bias in hate speech recognition, Xiaolei Huang, Linzi Xing, Franck Dernoncourt, and Michael J. Paul

Link

Augmenting Deep Learning with Relational Knowledge from Markov Logic Networks, Mohammad Maminur Islam, Somdeb Sarkhel, and Deepak Venugopal