Submissions from 2020
Characterizing Power Consumption of Dual-Frequency GNSS of Smartphone, Bikram Karki and Myounggyu Won
Adaptive rao-blackwellisation in Gibbs sampling for probabilistic graphical models, Craig Kelly, Somdeb Sarkhel, and Deepak Venugopal
CIDMP: Completely Interpretable Detection of Malaria Parasite in Red Blood Cells using Lower-dimensional Feature Space, Anik Khan, Kishor Datta Gupta, Deepak Venugopal, and Nirman Kumar
Attention based transformer for student answers assessment, Nisrine Ait Khayi and Vasile Rus
Ensemble classifiers for network intrusion detection using a novel network attack dataset, Ahmed Mahfouz, Abdullah Abuhussein, Deepak Venugopal, and Sajjan Shiva
Comparative Analysis of ML Classifiers for Network Intrusion Detection, Ahmed M. Mahfouz, Deepak Venugopal, and Sajjan G. Shiva
New Genomic Information Systems (GenISs): Species Delimitation and IDentification, Sambriddhi Mainali, Max H. Garzon, and Fredy A. Colorado
Profiling Environmental Conditions from DNA, Sambriddhi Mainali, Max H. Garzon, and Fredy A. Colorado
Using novel mobile sensors to assess stress and smoking lapse, Motohiro Nakajima, Andrine M. Lemieux, Mark Fiecas, Soujanya Chatterjee, Hillol Sarker, Nazir Saleheen, Emre Ertin, Santosh Kumar, and Mustafa al'Absi
Nondeterministic and randomized Boolean Hierarchies in communication complexity, Toniann Pitassi, Morgan Shirley, and Thomas Watson
AI-Powered Ransomware Detection Framework, Subash Poudyal and Dipankar Dasgupta
Security Benchmarks for Wearable Medical Things: Stakeholders-Centric Approach, Swapnika Reddy Putta, Abdullah Abuhussein, Faisal Alsubaei, Sajjan Shiva, and Saleh Atiewi
Complexity of Unordered CNF Games, Md Lutfar Rahman and Thomas Watson
Tractable Unordered 3-CNF Games, Md Lutfar Rahman and Thomas Watson
An Empirical Study on Algorithmic Bias, Sajib Sen, Dipankar Dasgupta, and Kishor Datta Gupta
Discrimination between and geolocation of cotton and palmer amaranth using spectral and geometric data, Brandon Simmers, Eddie L. Jacobs, Lan Wang, and Alfredo Ramirez
Morphogenetic systems: Models and experiments, Vladimír Smolka, Jan Drastík, Jaroslav Bradík, Max Garzon, and Petr Sosík
From P systems to morphogenetic systems: an overview and open problems, Petr Sosík, Jan Drastík, Vladimír Smolka, and Max Garzon
Experience Blocking Ratio Based Game Theoretic Approach for Spectrum Sharing in Heterogeneous Networks, Zhou Su, Qichao Xu, Qiyong Zhao, Jiantao Song, Wenxue Shen, and Ying Wang
The effects of open self-explanation prompting during source code comprehension, Lasang Jimba Tamang, Zeyad Alshaikh, Nisrine Ait Khayi, and Vasile Rus
Assembling reads improves taxonomic classification of species, Quang Tran and Vinhthuy Phan
Analysis of Short-read Aligners using Genome Sequence Complexity, Quang Tran, Nam Sy Vo, Eric Hicks, Tin Nguyen, and Vinhthuy Phan
A ZPPNP[1]lifting theorem, Thomas Watson
Communication Complexity with Small Advantage, Thomas Watson
Correction to: Communication complexity with small advantage (computational complexity, (2020), 29, 1, (2), 10.1007/s00037-020-00192-w), Thomas Watson
Qadratic Simulations of Merlin Arthur Games, Thomas Watson
Intelligent Traffic Monitoring Systems for Vehicle Classification: A Survey, Myounggyu Won
UBAT: On Jointly Optimizing UAV Trajectories and Placement of Battery Swap Stations, Myounggyu Won
SaferCross: Enhancing Pedestrian Safety Using Embedded Sensors of Smartphone, Myounggyu Won, Aawesh Shrestha, Kyung Joon Park, and Yongsoon Eun
GROLL: Geographic Routing for Low Power and Lossy IoT Networks, Myounggyu Won, Wei Zhang, Chien An Chen, and Radu Stoleru
VerifyNet: Secure and Verifiable Federated Learning, Guowen Xu, Hongwei Li, Sen Liu, Kan Yang, and Xiaodong Lin
Secure and Verifiable Inference in Deep Neural Networks, Guowen Xu, Hongwei Li, Hao Ren, Jianfei Sun, Shengmin Xu, and Jianting Ning
Model for self-replicating, self-assembling electric circuits with self-controlled growth, Rojoba Yasmin, Max Garzon, and Russell Deaton
ELite: Cost-effective approximation of exploration-based graph analysis, Xiaofei Zhang, M. Tamer Özsu, and Lei Chen
A Weight-based k-prototypes Algorithm for Anomaly Detection in Smart Grid, Bin Zhao, Kai Fan, Wei You, Kan Yang, Zilong Wang, and Hui Li
Submissions from 2019
A Brief Introduction to Named Data Networking, Alex Afanasyev, Jeff Burke, Tamer Refaei, Lan Wang, Beichuan Zhang, and Lixia Zhang
A Comparative Evaluation of Local Feature Descriptors for DeepFakes Detection, Zahid Akhtar and Dipankar Dasgupta
IoMT-SAF: Internet of Medical Things Security Assessment Framework, Faisal Alsubaei, Abdullah Abuhussein, Vivek Shandilya, and Sajjan Shiva
A framework for ranking IoMT solutions based on measuring security and privacy, Faisal Alsubaei, Abdullah Abuhussein, and Sajjan Shiva
Ontology-Based Security Recommendation for the Internet of Medical Things, Faisal Alsubaei, Abdullah Abuhussein, and Sajjan Shiva
Assessing student response in tutorial dialogue context using probabilistic soft logic, Rajendra Banjade and Vasile Rus
Report on the thirty- second international Florida artificial intelligence research society conference (FLAIRS-32), Roman Barták, Eric Bell, Keith Brawner, and Vasile Rus
A Survey on Visual Traffic Simulation: Models, Evaluations, and Applications in Autonomous Driving, Qianwen Chao, Huikun Bi, Weizi Li, Tianlu Mao, Zhaoqi Wang, and Ming C. Lin
Smart forwarding in NDN VaNET, Muktadir Chowdhury, Junaid Ahmed Khan, and Lan Wang
How guiding questions facilitate feedback exchange in project-based learning, Amy Cook, Jessica Hammer, Salma Elsayed-Ali, and Steven Dow
Design and implementation of Negative Authentication System, Dipankar Dasgupta, Abhijit Kumar Nag, Denise Ferebee, Sanjib Kumar Saha, Kul Prasad Subedi, and Arunava Roy
DDoS Intrusion Detection Through Machine Learning Ensemble, Saikat Das, Ahmed M. Mahfouz, Deepak Venugopal, and Sajjan Shiva
Poster Abstract: Experimental Comparison between Geohyperbolic and Hyperbolic Routing in NDN, Saurab Dulal and Lan Wang
Blockchain-based secure time protection scheme in IoT, Kai Fan, Shangyang Wang, Yanhui Ren, Kan Yang, Zheng Yan, and Hui Li
Understand effective coverage by mapped reads using genome repeat complexity, Shanshan Gao, Quang Tran, and Vinhthuy Phan
Effect of domain corpus size and LSA vector dimension: A study in assessing student generated short texts in virtual internships without participant data, Dipesh Gautam, Zhiqiang Cai, and Vasile Rus
Decentralized and secure multimedia sharing application over named data networking, Ashlesh Gawande, Jeremy Clark, Damian Coomes, and Lan Wang
Correction to: Query-to-Communication Lifting for P NP (computational complexity, (2019), 28, 1, (113-144), 10.1007/s00037-018-0175-5), Mika Göös, Pritish Kamath, Toniann Pitassi, and Thomas Watson
Query-to-Communication Lifting for P NP, Mika Göös, Pritish Kamath, Toniann Pitassi, and Thomas Watson
A lower bound for sampling disjoint sets, Mika Göös and Thomas Watson
A conversational intelligent agent for career guidance and counseling, Andrew J. Hampton, Vasile Rus, Frank Andrasik, Benjamin D. Nye, and Arthur C. Graesser
Towards detecting cocaine use using smartwatches in the NIDA clinical trials network: Design, rationale, and methodology, August F. Holtyn, Eugene Bosworth, Lisa A. Marsch, Bethany McLeman, Andrea Meier, Elizabeth C. Saunders, Emre Ertin, Md Azim Ullah, Shahin Alan Samiei, Monowar Hossain, Santosh Kumar, Kenzie L. Preston, Massoud Vahabzadeh, Dikla Shmueli-Blumberg, Julia Collins, Jennifer McCormack, and Udi E. Ghitza
Neural user factor adaptation for text classification: Learning to generalize across author demographics, Xiaolei Huang and Michael J. Paul
Can online self-reports assist in real-time identification of influenza vaccination uptake? A cross-sectional study of influenza vaccine-related tweets in the USA, 2013-2017, Xiaolei Huang, Michael C. Smith, Amelia M. Jamison, David A. Broniatowski, Mark Dredze, and Sandra Crouse Quinn
Scaling up Inference in MLNs with Spark, Mohammad Maminur Islam, Khan Mohammad Al Farabi, Somdeb Sarkhel, and Deepak Venugopal
On lifted inference using neural embeddings, Mohammad Maminur Islam, Somdeb Sarkhel, and Deepak Venugopal
Fine-Grained Crime Prediction in an Urban Neighborhood, Christopher Kent and Deepak Venugopal
Smart cities connected and autonomous vehicles readiness index, Junaid Ahmed Khan, Lan Wang, Eddie Jacobs, Ahmedraza Talebian, Sabyasachee Mishra, and Charles A. Santo
Clustering students based on their prior knowledge, Nisrine Ait Khayi and Vasile Rus
Low Dose Abdominal CT Image Reconstruction: An Unsupervised Learning Based Approach, Shiba Kuanar, Vassilis Athitsos, Dwarikanath Mahapatra, K. R. Rao, Zahid Akhtar, and Dipankar Dasgupta
Detecting Anomalous Online Reviewers: An Unsupervised Approach Using Mixture Models, Naveen Kumar, Deepak Venugopal, Liangfei Qiu, and Subodha Kumar
Approximating distance measures for the skyline, Nirman Kumar, Benjamin Raichel, Stavros Sintos, and Gregory Van Buskirk
Smart Cook: Making cooking easier with multimodal learning, Hyoyoung Lim, Xiaolei Huang, Samuel Miller, Joshua Edelmann, Timothy Euken, and Stephen Voida
A Brief Introduction to NDN Dataset Synchronization (NDN Sync), Tianxiang Li, Wentao Shang, Alex Afanasyev, Lan Wang, and Lixia Zhang
ADAPS: Autonomous driving via principled simulations, Weizi Li, David Wolinski, and Ming C. Lin
A concept map based assessment of free student answers in tutorial dialogues, Nabin Maharjan and Vasile Rus
Towards concept map based free student answer assessment, Nabin Maharjan and Vasile Rus
A survey on computational intelligence techniques in user identity management, Abhijit Kumar Nag and Dipankar Dasgupta
IcHET: Interactive visualization of cytoplasmic heteroplasmy, Vinhthuy Phan, Diem Trang Pham, Caroline Melton, Adam J. Ramsey, Bernie J. Daigle, and Jennifer R. Mandel
Malware Analytics: Review of Data Mining, Machine Learning and Big Data Perspectives, Subash Poudyal, Zahid Akhtar, Dipankar Dasgupta, and Kishor Datta Gupta
A Framework for Analyzing Ransomware using Machine Learning, Subash Poudyal, Kul Prasad Subedi, and Dipankar Dasgupta
Standardizing Unstructured Interaction Data in Adaptive Instructional Systems, Vasile Rus, Arthur C. Graesser, Xiangen Hu, and Jody L. Cockroft
A Locality Sensitive Hashing Based Approach for Generating Cancelable Fingerprints Templates, Debanjan Sadhya, Zahid Akhtar, and Dipankar Dasgupta
Peer feedback processes in the game industry, Joseph Seering, Ray Mayol, Erik Harpstead, Tianying Chen, Amy Cook, and Jessica Hammer
Publish-Subscribe communication in building management systems over named data networking, Wentao Shang, Ashlesh Gawande, Minsheng Zhang, Alexander Afanasyev, Jeffrey Burke, and Lan Wang
CoRuM: Collaborative runtime monitor framework for application security, Sajjan Shiva and Saikat Das
SybSub: Privacy-preserving expressive task subscription with sybil detection in crowdsourcing, Jiangang Shu, Ximeng Liu, Kan Yang, Yinghui Zhang, Xiaohua Jia, and Robert H. Deng
Understanding when students are active-in-thinking through modeling-in-context, Zachari Swiecki, Andrew R. Ruis, Dipesh Gautam, Vasile Rus, and David Williamson Shaffer
Amplification with one NP oracle query, Thomas Watson
A ZPPNP[1] lifting theorem, Thomas Watson
DeepWiTraffic: Low cost WiFi-based traffic monitoring system using deep learning, Myounggyu Won, Sayan Sahu, and Kyung Joon Park
New generation model of word vector representation based on CBOW or skip-gram, Zeyu Xiong, Qiangqiang Shen, Yueshan Xiong, Yijie Wang, and Weizi Li
Enabling efficient and geometric range query with access control over encrypted spatial data, Guowen Xu, Hongwei Li, Yuanshun Dai, Kan Yang, and Xiaodong Lin
Data Security Issues in Deep Learning: Attacks, Countermeasures, and Opportunities, Guowen Xu, Hongwei Li, Hao Ren, Kan Yang, and Robert H. Deng
Blockchain-based decentralized trust management in vehicular networks, Zhe Yang, Kan Yang, Lei Lei, Kan Zheng, and Victor C.M. Leung
Harmonic Circuit Self-Assembly in cTAM Models, Yan Yan, Max Garzon, and Russell Deaton
Self-Assembly of 2-D Resistive Electric Grids, Yan Yan, Max Garzon, and Russell Deaton
Improved logistic regression algorithm based on kernel density estimation for multi-classification with non-equilibrium samples, Yang Yu, Zeyu Xiong, Yueshan Xiong, and Weizi Li
Submissions from 2018
Range-max queries on uncertain data, Pankaj K. Agarwal, Nirman Kumar, Stavros Sintos, and Subhash Suri
The future of distributed network research infrastructure, Jay Aikat, Ilya Baldin, Mark Berman, Joe Breen, Richard Brooks, and Prasad Calyam
Crowdsourcing Multi-Objective Recommendation System∗, Eiman Aldahari, Vivek Shandilya, and Sajjan Shiva
Efficient weight learning in high-dimensional untied MLNs, Khan Mohammad Al Farabi, Somdeb Sarkhel, and Deepak Venugopal
Quantifying security and privacy in Internet of Things solutions, Faisal Alsubaei, Abdullah Abuhussein, and Sajjan Shiva
Poster: Towards a collaborative and retrospective understanding of security events with retro-future, Calvin Ardi, John Heidemann, Gina Fisk, Mike Fisk, and Christos Papadopoulos
Pooling word vector representations across models, Rajendra Banjade, Nabin Maharjan, Dipesh Gautam, Frank Adrasik, Arthur C. Graesser, and Vasile Rus