Follow

Submissions from 2020

Link

Characterizing Power Consumption of Dual-Frequency GNSS of Smartphone, Bikram Karki and Myounggyu Won

Adaptive rao-blackwellisation in Gibbs sampling for probabilistic graphical models, Craig Kelly, Somdeb Sarkhel, and Deepak Venugopal

Link

CIDMP: Completely Interpretable Detection of Malaria Parasite in Red Blood Cells using Lower-dimensional Feature Space, Anik Khan, Kishor Datta Gupta, Deepak Venugopal, and Nirman Kumar

Attention based transformer for student answers assessment, Nisrine Ait Khayi and Vasile Rus

Link

Ensemble classifiers for network intrusion detection using a novel network attack dataset, Ahmed Mahfouz, Abdullah Abuhussein, Deepak Venugopal, and Sajjan Shiva

Link

Comparative Analysis of ML Classifiers for Network Intrusion Detection, Ahmed M. Mahfouz, Deepak Venugopal, and Sajjan G. Shiva

Link

New Genomic Information Systems (GenISs): Species Delimitation and IDentification, Sambriddhi Mainali, Max H. Garzon, and Fredy A. Colorado

Link

Profiling Environmental Conditions from DNA, Sambriddhi Mainali, Max H. Garzon, and Fredy A. Colorado

Link

Using novel mobile sensors to assess stress and smoking lapse, Motohiro Nakajima, Andrine M. Lemieux, Mark Fiecas, Soujanya Chatterjee, Hillol Sarker, Nazir Saleheen, Emre Ertin, Santosh Kumar, and Mustafa al'Absi

Link

Nondeterministic and randomized Boolean Hierarchies in communication complexity, Toniann Pitassi, Morgan Shirley, and Thomas Watson

Link

AI-Powered Ransomware Detection Framework, Subash Poudyal and Dipankar Dasgupta

Link

Security Benchmarks for Wearable Medical Things: Stakeholders-Centric Approach, Swapnika Reddy Putta, Abdullah Abuhussein, Faisal Alsubaei, Sajjan Shiva, and Saleh Atiewi

Link

Complexity of Unordered CNF Games, Md Lutfar Rahman and Thomas Watson

Link

Tractable Unordered 3-CNF Games, Md Lutfar Rahman and Thomas Watson

Link

An Empirical Study on Algorithmic Bias, Sajib Sen, Dipankar Dasgupta, and Kishor Datta Gupta

Link

Discrimination between and geolocation of cotton and palmer amaranth using spectral and geometric data, Brandon Simmers, Eddie L. Jacobs, Lan Wang, and Alfredo Ramirez

Link

Morphogenetic systems: Models and experiments, Vladimír Smolka, Jan Drastík, Jaroslav Bradík, Max Garzon, and Petr Sosík

Link

From P systems to morphogenetic systems: an overview and open problems, Petr Sosík, Jan Drastík, Vladimír Smolka, and Max Garzon

Link

Experience Blocking Ratio Based Game Theoretic Approach for Spectrum Sharing in Heterogeneous Networks, Zhou Su, Qichao Xu, Qiyong Zhao, Jiantao Song, Wenxue Shen, and Ying Wang

The effects of open self-explanation prompting during source code comprehension, Lasang Jimba Tamang, Zeyad Alshaikh, Nisrine Ait Khayi, and Vasile Rus

Link

Assembling reads improves taxonomic classification of species, Quang Tran and Vinhthuy Phan

Link

Analysis of Short-read Aligners using Genome Sequence Complexity, Quang Tran, Nam Sy Vo, Eric Hicks, Tin Nguyen, and Vinhthuy Phan

Link

A ZPPNP[1]lifting theorem, Thomas Watson

Link

Communication Complexity with Small Advantage, Thomas Watson

Link

Correction to: Communication complexity with small advantage (computational complexity, (2020), 29, 1, (2), 10.1007/s00037-020-00192-w), Thomas Watson

Link

Qadratic Simulations of Merlin Arthur Games, Thomas Watson

Link

Intelligent Traffic Monitoring Systems for Vehicle Classification: A Survey, Myounggyu Won

Link

UBAT: On Jointly Optimizing UAV Trajectories and Placement of Battery Swap Stations, Myounggyu Won

Link

SaferCross: Enhancing Pedestrian Safety Using Embedded Sensors of Smartphone, Myounggyu Won, Aawesh Shrestha, Kyung Joon Park, and Yongsoon Eun

Link

GROLL: Geographic Routing for Low Power and Lossy IoT Networks, Myounggyu Won, Wei Zhang, Chien An Chen, and Radu Stoleru

Link

VerifyNet: Secure and Verifiable Federated Learning, Guowen Xu, Hongwei Li, Sen Liu, Kan Yang, and Xiaodong Lin

Link

Secure and Verifiable Inference in Deep Neural Networks, Guowen Xu, Hongwei Li, Hao Ren, Jianfei Sun, Shengmin Xu, and Jianting Ning

Link

Model for self-replicating, self-assembling electric circuits with self-controlled growth, Rojoba Yasmin, Max Garzon, and Russell Deaton

Link

ELite: Cost-effective approximation of exploration-based graph analysis, Xiaofei Zhang, M. Tamer Özsu, and Lei Chen

Link

A Weight-based k-prototypes Algorithm for Anomaly Detection in Smart Grid, Bin Zhao, Kai Fan, Wei You, Kan Yang, Zilong Wang, and Hui Li

Submissions from 2019

Link

A Brief Introduction to Named Data Networking, Alex Afanasyev, Jeff Burke, Tamer Refaei, Lan Wang, Beichuan Zhang, and Lixia Zhang

Link

A Comparative Evaluation of Local Feature Descriptors for DeepFakes Detection, Zahid Akhtar and Dipankar Dasgupta

Link

IoMT-SAF: Internet of Medical Things Security Assessment Framework, Faisal Alsubaei, Abdullah Abuhussein, Vivek Shandilya, and Sajjan Shiva

Link

A framework for ranking IoMT solutions based on measuring security and privacy, Faisal Alsubaei, Abdullah Abuhussein, and Sajjan Shiva

Link

Ontology-Based Security Recommendation for the Internet of Medical Things, Faisal Alsubaei, Abdullah Abuhussein, and Sajjan Shiva

Assessing student response in tutorial dialogue context using probabilistic soft logic, Rajendra Banjade and Vasile Rus

Link

Report on the thirty- second international Florida artificial intelligence research society conference (FLAIRS-32), Roman Barták, Eric Bell, Keith Brawner, and Vasile Rus

Link

A Survey on Visual Traffic Simulation: Models, Evaluations, and Applications in Autonomous Driving, Qianwen Chao, Huikun Bi, Weizi Li, Tianlu Mao, Zhaoqi Wang, and Ming C. Lin

Link

Smart forwarding in NDN VaNET, Muktadir Chowdhury, Junaid Ahmed Khan, and Lan Wang

Link

How guiding questions facilitate feedback exchange in project-based learning, Amy Cook, Jessica Hammer, Salma Elsayed-Ali, and Steven Dow

Link

Design and implementation of Negative Authentication System, Dipankar Dasgupta, Abhijit Kumar Nag, Denise Ferebee, Sanjib Kumar Saha, Kul Prasad Subedi, and Arunava Roy

Link

DDoS Intrusion Detection Through Machine Learning Ensemble, Saikat Das, Ahmed M. Mahfouz, Deepak Venugopal, and Sajjan Shiva

Link

Poster Abstract: Experimental Comparison between Geohyperbolic and Hyperbolic Routing in NDN, Saurab Dulal and Lan Wang

Link

Blockchain-based secure time protection scheme in IoT, Kai Fan, Shangyang Wang, Yanhui Ren, Kan Yang, Zheng Yan, and Hui Li

Understand effective coverage by mapped reads using genome repeat complexity, Shanshan Gao, Quang Tran, and Vinhthuy Phan

Effect of domain corpus size and LSA vector dimension: A study in assessing student generated short texts in virtual internships without participant data, Dipesh Gautam, Zhiqiang Cai, and Vasile Rus

Link

Decentralized and secure multimedia sharing application over named data networking, Ashlesh Gawande, Jeremy Clark, Damian Coomes, and Lan Wang

Link

Correction to: Query-to-Communication Lifting for P NP (computational complexity, (2019), 28, 1, (113-144), 10.1007/s00037-018-0175-5), Mika Göös, Pritish Kamath, Toniann Pitassi, and Thomas Watson

Link

Query-to-Communication Lifting for P NP, Mika Göös, Pritish Kamath, Toniann Pitassi, and Thomas Watson

Link

A lower bound for sampling disjoint sets, Mika Göös and Thomas Watson

A conversational intelligent agent for career guidance and counseling, Andrew J. Hampton, Vasile Rus, Frank Andrasik, Benjamin D. Nye, and Arthur C. Graesser

Link

Towards detecting cocaine use using smartwatches in the NIDA clinical trials network: Design, rationale, and methodology, August F. Holtyn, Eugene Bosworth, Lisa A. Marsch, Bethany McLeman, Andrea Meier, Elizabeth C. Saunders, Emre Ertin, Md Azim Ullah, Shahin Alan Samiei, Monowar Hossain, Santosh Kumar, Kenzie L. Preston, Massoud Vahabzadeh, Dikla Shmueli-Blumberg, Julia Collins, Jennifer McCormack, and Udi E. Ghitza

Neural user factor adaptation for text classification: Learning to generalize across author demographics, Xiaolei Huang and Michael J. Paul

Link

Can online self-reports assist in real-time identification of influenza vaccination uptake? A cross-sectional study of influenza vaccine-related tweets in the USA, 2013-2017, Xiaolei Huang, Michael C. Smith, Amelia M. Jamison, David A. Broniatowski, Mark Dredze, and Sandra Crouse Quinn

Link

Scaling up Inference in MLNs with Spark, Mohammad Maminur Islam, Khan Mohammad Al Farabi, Somdeb Sarkhel, and Deepak Venugopal

On lifted inference using neural embeddings, Mohammad Maminur Islam, Somdeb Sarkhel, and Deepak Venugopal

Link

Fine-Grained Crime Prediction in an Urban Neighborhood, Christopher Kent and Deepak Venugopal

Link

Smart cities connected and autonomous vehicles readiness index, Junaid Ahmed Khan, Lan Wang, Eddie Jacobs, Ahmedraza Talebian, Sabyasachee Mishra, and Charles A. Santo

Clustering students based on their prior knowledge, Nisrine Ait Khayi and Vasile Rus

Link

Low Dose Abdominal CT Image Reconstruction: An Unsupervised Learning Based Approach, Shiba Kuanar, Vassilis Athitsos, Dwarikanath Mahapatra, K. R. Rao, Zahid Akhtar, and Dipankar Dasgupta

Link

Detecting Anomalous Online Reviewers: An Unsupervised Approach Using Mixture Models, Naveen Kumar, Deepak Venugopal, Liangfei Qiu, and Subodha Kumar

Link

Approximating distance measures for the skyline, Nirman Kumar, Benjamin Raichel, Stavros Sintos, and Gregory Van Buskirk

Link

Smart Cook: Making cooking easier with multimodal learning, Hyoyoung Lim, Xiaolei Huang, Samuel Miller, Joshua Edelmann, Timothy Euken, and Stephen Voida

Link

A Brief Introduction to NDN Dataset Synchronization (NDN Sync), Tianxiang Li, Wentao Shang, Alex Afanasyev, Lan Wang, and Lixia Zhang

Link

ADAPS: Autonomous driving via principled simulations, Weizi Li, David Wolinski, and Ming C. Lin

Link

A concept map based assessment of free student answers in tutorial dialogues, Nabin Maharjan and Vasile Rus

Towards concept map based free student answer assessment, Nabin Maharjan and Vasile Rus

A survey on computational intelligence techniques in user identity management, Abhijit Kumar Nag and Dipankar Dasgupta

Link

IcHET: Interactive visualization of cytoplasmic heteroplasmy, Vinhthuy Phan, Diem Trang Pham, Caroline Melton, Adam J. Ramsey, Bernie J. Daigle, and Jennifer R. Mandel

Link

Malware Analytics: Review of Data Mining, Machine Learning and Big Data Perspectives, Subash Poudyal, Zahid Akhtar, Dipankar Dasgupta, and Kishor Datta Gupta

Link

A Framework for Analyzing Ransomware using Machine Learning, Subash Poudyal, Kul Prasad Subedi, and Dipankar Dasgupta

Link

Standardizing Unstructured Interaction Data in Adaptive Instructional Systems, Vasile Rus, Arthur C. Graesser, Xiangen Hu, and Jody L. Cockroft

Link

A Locality Sensitive Hashing Based Approach for Generating Cancelable Fingerprints Templates, Debanjan Sadhya, Zahid Akhtar, and Dipankar Dasgupta

Link

Peer feedback processes in the game industry, Joseph Seering, Ray Mayol, Erik Harpstead, Tianying Chen, Amy Cook, and Jessica Hammer

Link

Publish-Subscribe communication in building management systems over named data networking, Wentao Shang, Ashlesh Gawande, Minsheng Zhang, Alexander Afanasyev, Jeffrey Burke, and Lan Wang

Link

CoRuM: Collaborative runtime monitor framework for application security, Sajjan Shiva and Saikat Das

Link

SybSub: Privacy-preserving expressive task subscription with sybil detection in crowdsourcing, Jiangang Shu, Ximeng Liu, Kan Yang, Yinghui Zhang, Xiaohua Jia, and Robert H. Deng

Link

Understanding when students are active-in-thinking through modeling-in-context, Zachari Swiecki, Andrew R. Ruis, Dipesh Gautam, Vasile Rus, and David Williamson Shaffer

Link

Amplification with one NP oracle query, Thomas Watson

Link

A ZPPNP[1] lifting theorem, Thomas Watson

Link

DeepWiTraffic: Low cost WiFi-based traffic monitoring system using deep learning, Myounggyu Won, Sayan Sahu, and Kyung Joon Park

Link

New generation model of word vector representation based on CBOW or skip-gram, Zeyu Xiong, Qiangqiang Shen, Yueshan Xiong, Yijie Wang, and Weizi Li

Link

Enabling efficient and geometric range query with access control over encrypted spatial data, Guowen Xu, Hongwei Li, Yuanshun Dai, Kan Yang, and Xiaodong Lin

Link

Data Security Issues in Deep Learning: Attacks, Countermeasures, and Opportunities, Guowen Xu, Hongwei Li, Hao Ren, Kan Yang, and Robert H. Deng

Link

Blockchain-based decentralized trust management in vehicular networks, Zhe Yang, Kan Yang, Lei Lei, Kan Zheng, and Victor C.M. Leung

Link

Harmonic Circuit Self-Assembly in cTAM Models, Yan Yan, Max Garzon, and Russell Deaton

Link

Self-Assembly of 2-D Resistive Electric Grids, Yan Yan, Max Garzon, and Russell Deaton

Link

Improved logistic regression algorithm based on kernel density estimation for multi-classification with non-equilibrium samples, Yang Yu, Zeyu Xiong, Yueshan Xiong, and Weizi Li

Submissions from 2018

Link

Range-max queries on uncertain data, Pankaj K. Agarwal, Nirman Kumar, Stavros Sintos, and Subhash Suri

Link

The future of distributed network research infrastructure, Jay Aikat, Ilya Baldin, Mark Berman, Joe Breen, Richard Brooks, and Prasad Calyam

Link

Crowdsourcing Multi-Objective Recommendation System∗, Eiman Aldahari, Vivek Shandilya, and Sajjan Shiva

Efficient weight learning in high-dimensional untied MLNs, Khan Mohammad Al Farabi, Somdeb Sarkhel, and Deepak Venugopal

Link

Quantifying security and privacy in Internet of Things solutions, Faisal Alsubaei, Abdullah Abuhussein, and Sajjan Shiva

Link

Poster: Towards a collaborative and retrospective understanding of security events with retro-future, Calvin Ardi, John Heidemann, Gina Fisk, Mike Fisk, and Christos Papadopoulos

Link

Pooling word vector representations across models, Rajendra Banjade, Nabin Maharjan, Dipesh Gautam, Frank Adrasik, Arthur C. Graesser, and Vasile Rus