Submissions from 2021
Domain Model Discovery from Textbooks for Computer Programming Intelligent Tutors, Rabin Banjade, Priti Oli, Lasang Jimba Tamang, Jeevan Chapagain, and Vasile Rus
Ransomware detection using deep learning in the SCADA system of electric vehicle charging station, Manoj Basnet, Subash Poudyal, Mohd Hasan Ali, and Dipankar Dasgupta
Bias and Fairness in Multimodal Machine Learning: A Case Study of Automated Video Interviews, Brandon M. Booth, Louis Hickman, Shree Krishna Subburaj, Louis Tay, Sang Eun Woo, and Sidney K. D'Mello
Bias and Fairness in Multimodal Machine Learning: A Case Study of Automated Video Interviews, Brandon M. Booth, Louis Hickman, Shree Krishna Subburaj, Louis Tay, Sang Eun Woo, and Sidney K. D'Mello
Integrating Psychometrics and Computing Perspectives on Bias and Fairness in Affective Computing: A case study of automated video interviews, Brandon M. Booth, Louis Hickman, Shree Krishna Subburaj, Louis Tay, Sang Eun Woo, and Sidney K. D'Mello
Integrating Psychometrics and Computing Perspectives on Bias and Fairness in Affective Computing: A case study of automated video interviews, Brandon M. Booth, Louis Hickman, Shree Krishna Subburaj, Louis Tay, Sang Eun Woo, and Sidney K. D'Mello
Frequent, Timed Coding Tests for Training and Assessment of Full-Stack Web Development Skills: An Experience Report, Kathryn Bridson and Scott D. Fleming
A Narrative Systematic Literature Review: A Focus on Qualitative Studies on HIV and Medication-Assisted Therapy in the United States, Alina Cernasev, Sunitha Kodidela, Michael P. Veve, Theodore Cory, Hilary Jasmin, and Santosh Kumar
DDoS Explainer using Interpretable Machine Learning, Saikat Das, Namita Agarwal, and Sajjan Shiva
Network Intrusion Detection and Comparative Analysis using Ensemble Machine Learning and Feature Selection, Saikat Das, Sajal Saha, Annita Tahsin Priyoti, Etee Kawna Roy, Frederick T. Sheldon, and Anwar Haque
Machine Learning application lifecycle augmented with explanation and security, Saikat Das and Sajjan Shiva
Separated Red Blue Center Clustering, Marzieh Eskandari, Bhavika Khare, and Nirman Kumar
Secure sharing of spatio-temporal data through name-based access control, Laqin Fan and Lan Wang
A multimodal analysis of physical activity, sleep, and work shift in nurses with wearable sensor data, Tiantian Feng, Brandon M. Booth, Brooke Baldwin-Rodríguez, Felipe Osorno, and Shrikanth Narayanan
A multimodal analysis of physical activity, sleep, and work shift in nurses with wearable sensor data, Tiantian Feng, Brandon M. Booth, Brooke Baldwin-Rodríguez, Felipe Osorno, and Shrikanth Narayanan
Using Negative Detectors for Identifying Adversarial Data Manipulation in Machine Learning, Kishor Datta Gupta and Dipankar Dasgupta
The Nature of Achievement Goal Motivation Profiles: Exploring Situational Motivation in An Algebra-Focused Intelligent Tutoring System, Leigh Harrell-Williams, Christian Mueller, Stephen Fancsali, Steven Ritter, Xiaofei Zhang, and Deepak Venugopal
User factor adaptation for user embedding via multitask learning, Xiaolei Huang, Michael J. Paul, Robin Burke, Franck Dernoncourt, and Mark Dredze
Supporting Equity and Inclusion of Deaf and Hard-of-Hearing Individuals in Professional Organizations, Julia Jones Huyck, Kelsey L. Anbuhl, Brad N. Buran, Henry J. Adler, Samuel R. Atcherson, Ozan Cakmak, Robert T. Dwyer, Morgan Eddolls, Fadhel El May, Juergen-Theodor Fraenzer, Rebekah Funkhouser, Mathilde Gagliardini, Frederick J. Gallun, Raymond L. Goldsworthy, Samir Gouin, Joseph Heng, Ariel Edward Hight, Zina Jawadi, Damir Kovacic, Rachit Kumar, Santosh Kumar, Stacey R. Lim, Chengeng Mo, Lisa S. Nolan, Alexandra Parbery-Clark, Dominic V. Pisano, Valluri R. Rao, and Robert M. Raphael
BBR-Inspired Congestion Control for Data Fetching over NDN, Yi Hu, Constantin Serban, Lan Wang, Alex Afanasyev, and Lixia Zhang
PLI-Sync: Prefetch Loss-Insensitive Sync for NDN Group Streaming, Yi Hu, Constantin Serban, Lan Wang, Alex Afanasyev, and Lixia Zhang
Reducing Operation Cost of LPWAN Roadside Sensors Using Cross Technology Communication, Navid Mohammad Imran and Myounggyu Won
Contrastive Learning in Neural Tensor Networks using Asymmetric Examples, Mohammad Maminur Islam, Somdeb Sarkhel, and Deepak Venugopal
On the mappings of optimization problems to neural networks, Arun Jagota and Max Garzon
Towards Improving Open Student Answer Assessment using Pretrained Transformers, Nisrine Ait Khayi, Vasile Rus, and Lasang Tamang
Towards Improving Open Student Answer Assessment using Pretrained Transformers, Nisrine Ait Khayi, Vasile Rus, and Lasang Tamang
Vehicle Trajectory Prediction Using LSTMs with Spatial-Temporal Attention Mechanisms, Lei Lin, Weizi Li, Huikun Bi, and Lingqiao Qin
Assessing inequality, irregularity, and severity regarding road traffic safety during COVID-19, Lei Lin, Feng Shi, and Weizi Li
Foretelling the Phenotype of a Genomic Sequence, Sambriddhi Mainali, Fredy A. Colorado, and Max H. Garzon
An Information-theoretic approach to dimensionality reduction in data science, Sambriddhi Mainali, Max Garzon, Deepak Venugopal, Kalidas Jana, Ching Chi Yang, and Nirman Kumar
Double-Stateoral Difference Learning for Resource Provisioning in Uncertain Fog Computing Environment, Bhargavi Krishna Murthy and Sajjan G. Shiva
Automated Assessment of Quality of Jupyter Notebooks Using Artificial Intelligence and Big Code, Priti Oli, Rabin Banjade, Lasang Jimba Tamang, and Vasile Rus
Automated Assessment of Quality of Jupyter Notebooks Using Artificial Intelligence and Big Code, Priti Oli, Rabin Banjade, Lasang Jimba Tamang, and Vasile Rus
JupyterLab Extensions for Blocks Programming, Self-Explanations, and HTML Injection, Andrew M. Olney and Scott D. Fleming
A Name-Based Secure Communications Architecture for Vehicular Networks, Christos Papadopoulos, Alexander Afanasyev, and Susmit Shannigrahi
In-vehicle networking with NDN, Christos Papadopoulos, Susmit Shannigrahi, and Alex Afanaseyv
Nondeterministic and Randomized Boolean Hierarchies in Communication Complexity, Toniann Pitassi, Morgan Shirley, and Thomas Watson
Black-box Adversarial Attacks on Network-wide Multi-step Traffic State Prediction Models, Bibek Poudel and Weizi Li
Analysis of Crypto-Ransomware Using ML-Based Multi-Level Profiling, Subash Poudyal and DIpankar Dasgupta
6-Uniform maker-breaker game is PSPACE-complete, Md Lutfar Rahman and Thomas Watson
Synthesis and characterization of Sn-doped TiO2 film for antibacterial applications, R. Rajeswari, D. Venugopal, Amal George, A. Dhayal Raj, S. John Sundaram, A. K.H. Bashir, M. Maaza, and K. Kaviyarasu
Synthesis and characterization of Sn-doped TiO2 film for antibacterial applications, R. Rajeswari, D. Venugopal, Amal George, A. Dhayal Raj, S. John Sundaram, A. K.H. Bashir, M. Maaza, and K. Kaviyarasu
Machine Learning and Feature Selection Based Ransomware Detection Using Hexacodes, Bheemidi Vikram Reddy, Gutha Jaya Krishna, Vadlamani Ravi, and Dipankar Dasgupta
Prompting for Free Self-Explanations Promotes Better Code Comprehension, Vasile Rus, Kamil Akhuseyinoglu, Jeevan Chapagain, Lasang Tamang, and Peter Brusilovsky
Proceedings of the 2nd Workshop of the Learner Data Institute: Big Data, Research Challenges, & Science Convergence in Educational Data Science, Vasile Rus and Stephen E. Fancsali
The Learner Data Institute-Conceptualization: A Progress Report, Vasile Rus, Stephen E. Fancsali, Philip Pavlik, Deepak Venugopal, Arthur C. Graesser, and Steve Ritter
WristPrint: Characterizing User Re-identification Risks from Wrist-worn Accelerometry Data, Nazir Saleheen, Md Azim Ullah, Supriyo Chakraborty, Deniz S. Ones, Mani Srivastava, and Santosh Kumar
Student Strategy Prediction using a Neuro-Symbolic Approach, Anup Shakya, Vasile Rus, and Deepak Venugopal
Student Strategy Prediction using a Neuro-Symbolic Approach, Anup Shakya, Vasile Rus, and Deepak Venugopal
Morphological characterization of hepatic steatosis and Monte Carlo modeling of MRI signal for accurate quantification of fat fraction and relaxivity, Utsav Shrestha, Marie van der Merwe, Nirman Kumar, Eddie Jacobs, Sanjaya K. Satapathy, and Cara Morin
Privacy-Preserving Task Recommendation Services for Crowdsourcing, Jiangang Shu, Xiaohua Jia, Kan Yang, and Hua Wang
Proxy-Free Privacy-Preserving Task Matching with Efficient Revocation in Crowdsourcing, Jiangang Shu, Kan Yang, Xiaohua Jia, Ximeng Liu, Cong Wang, and Robert H. Deng
Self-healing turing-universal computation in morphogenetic systems, Petr Sosík, Max Garzon, and Jan Drastík
Morphogenetic systems for resource bounded computation and modeling, Petr Sosík, Max Garzon, Vladimír Smolka, and Jan Drastík
Mapping design spaces for audience participation in game live streaming, Alina Striner, Andrew M. Webb, Jessica Hammer, and Amy Shannon Cook
A Comparative Study of Free Self-Explanations and Socratic Tutoring Explanations for Source Code Comprehension, Lasang Jimba Tamang, Zeyad Alshaikh, Nisrine Ait Khayi, Priti Oli, and Vasile Rus
An Investigation on Microstructural, Morphological, Optical, Photoluminescence and Photocatalytic Activity of WO3 for Photocatalysis Applications: An Effect of Annealing, T. Thilagavathi, D. Venugopal, R. Marnadu, J. Chandrasekaran, T. Alshahrani, and Mohd Shkir
An Investigation on Microstructural, Morphological, Optical, Photoluminescence and Photocatalytic Activity of WO3 for Photocatalysis Applications: An Effect of Annealing, T. Thilagavathi, D. Venugopal, R. Marnadu, J. Chandrasekaran, T. Alshahrani, and Mohd Shkir
WO3/CoWO4 nanocomposite synthesis using a facile co-precipitation method for enhanced photocatalytic applications, T. Thilagavathi, D. Venugopal, R. Marnadu, J. Chandrasekaran, D. Thangaraju, Baskaran Palanivel, Mohamed S. Hamdy, M. Shkir, and H. Elhosiny Ali
WO3/CoWO4 nanocomposite synthesis using a facile co-precipitation method for enhanced photocatalytic applications, T. Thilagavathi, D. Venugopal, R. Marnadu, J. Chandrasekaran, D. Thangaraju, Baskaran Palanivel, Mohamed S. Hamdy, M. Shkir, and H. Elhosiny Ali
A facile co-precipitation synthesis of novel WO3/NiWO4 nanocomposite with improved photocatalytic activity, T. Thilagavathi, D. Venugopal, D. Thangaraju, R. Marnadu, Baskaran Palanivel, Mohd Imran, Mohd Shkir, Mohd Ubaidullah, and S. AlFaify
A facile co-precipitation synthesis of novel WO3/NiWO4 nanocomposite with improved photocatalytic activity, T. Thilagavathi, D. Venugopal, D. Thangaraju, R. Marnadu, Baskaran Palanivel, Mohd Imran, Mohd Shkir, Mohd Ubaidullah, and S. AlFaify
Neuro-Symbolic Models: A Scalable, Explainable Framework for Strategy Discovery from Big Edu-Data, Deepak Venugopal, Vasile Rus, and Anup Shakya
A Spatial-Temporal Analysis of COVID-19's Impact on Human Mobility: The Case of the United States, Songhe Wang, Kangda Wei, Lei Lin, and Weizi Li
L-Platooning: A Protocol for Managing a Long Platoon With DSRC, Myounggyu Won
PMAB: A Public Mutual Audit Blockchain for Outsourced Data in Cloud Storage, Hanzhe Yang, Ruidan Su, Pei Huang, Yuhan Bai, Kai Fan, and Kan Yang
Secure and Efficient Task Matching with Multi-keyword in Multi-requester and Multi-worker Crowdsourcing, Kan Yang and Senjuti Dutta
Reputation-based Truth Discovery with Long-term Quality of Source in Internet of Things, Lei Yan, Kan Yang, and Shouyi Yang
PROTECT: Efficient Password-Based Threshold Single-Sign-On Authentication for Mobile Users against Perpetual Leakage, Yuan Zhang, Chunxiang Xu, Hongwei Li, Kan Yang, Nan Cheng, and Xuemin Shen
Anonymous and Privacy-Preserving Federated Learning with Industrial Big Data, Bin Zhao, Kai Fan, Kan Yang, Zilong Wang, Hui Li, and Yintang Yang
Submissions from 2020
Weighted quasi-arithmetic mean based score level fusion for multi-biometric systems, Herbadji Abderrahmane, Guermat Noubeil, Ziet Lahcene, Zahid Akhtar, and Dipankar Dasgupta
Graph convolutional networks for student answers assessment, Nisrine Ait Khayi and Vasile Rus
Utility of Deep Learning Features for Facial Attributes Manipulation Detection, Zahid Akhtar, Murshida Rahman Mouree, and Dipankar Dasgupta
Fine-Grained Explanations Using Markov Logic, Khan Mohammad Al Farabi, Somdeb Sarkhel, Sanorita Dey, and Deepak Venugopal
Ads-Guard: Detecting Scammers in Online Classified Ads, Suhaib Al-Rousan, Abdullah Abuhussein, Faisal Alsubaei, Lynn Collen, and Sajjan Shiva
Social-Guard: Detecting Scammers in Online Dating, Suhaib Al-Rousan, Abdullah Abuhussein, Faisal Alsubaei, Ozkan Kahveci, Hazem Farra, and Sajjan Shiva
A Socratic Tutor for Source Code Comprehension, Zeyad Alshaikh, Lasagn Tamang, and Vasile Rus
Experiments with a socratic intelligent tutoring system for source code understanding, Zeyad Alshaikh, Lasang Tamang, and Vasile Rus
Detecting stealthy false data injection attacks in the smart grid using ensemble-based machine learning, Mohammad Ashrafuzzaman, Saikat Das, Yacine Chakhchoukh, Sajjan Shiva, and Frederick T. Sheldon
When is amplification necessary for composition in randomized query complexity?, Shalev Ben-David, Mika Göös, Robin Kothari, and Thomas Watson
Transforming Healthcare Cybersecurity from Reactive to Proactive: Current Status and Future Recommendations, Soumitra Sudip Bhuyan, Umar Y. Kabir, Jessica M. Escareno, Kenya Ector, Sandeep Palakodeti, and David Wyant
Fifty Shades of Green: Towards a Robust Measure of Inter-annotator Agreement for Continuous Signals, Brandon M. Booth and Shrikanth S. Narayanan
Fifty Shades of Green: Towards a Robust Measure of Inter-annotator Agreement for Continuous Signals, Brandon M. Booth and Shrikanth S. Narayanan
Trapezoidal Segment Sequencing: A Novel Approach for Fusion of Human-Produced Continuous Annotations, Brandon M. Booth and Shrikanth S. Narayanan
Trapezoidal Segment Sequencing: A Novel Approach for Fusion of Human-Produced Continuous Annotations, Brandon M. Booth and Shrikanth S. Narayanan
Opioid Use Disorders in People Living with HIV/AIDS: A Review of Implications for Patient Outcomes, Drug Interactions, and Neurocognitive Disorders, Alina Cernasev, Michael P. Veve, Theodore J. Cory, Nathan A. Summers, Madison Miller, Sunitha Kodidela, and Santosh Kumar
Leveraging Content Connectivity and Location Awareness for Adaptive Forwarding in NDN-based Mobile Ad Hoc Networks, Muktadir Chowdhury, Junaid Ahmed Khan, and Lan Wang
Designing interactive scaffolds to encourage reflection on peer feedback, Amy Cook, Steven Dow, and Jessica Hammer
Machine learning in cybersecurity: a comprehensive survey, Dipankar Dasgupta, Zahid Akhtar, and Sajib Sen
Taxonomy and Survey of Interpretable Machine Learning Method, Saikat Das, Namita Agarwal, Deepak Venugopal, Frederick T. Sheldon, and Sajjan Shiva
Network Intrusion Detection using Natural Language Processing and Ensemble Machine Learning, Saikat Das, Mohammad Ashrafuzzaman, Frederick T. Sheldon, and Sajjan Shiva
A Stealth Migration Approach to Moving Target Defense in Cloud Computing, Saikat Das, Ahmed M. Mahfouz, and Sajjan Shiva
A Holistic Approach for Detecting DDoS Attacks by Using Ensemble Unsupervised Machine Learning, Saikat Das, Deepak Venugopal, and Sajjan Shiva
Empirical Evaluation of the Ensemble Framework for Feature Selection in DDoS Attack, Saikat Das, Deepak Venugopal, Sajjan Shiva, and Frederick T. Sheldon
A model for self-assembling circuits with voltage-controlled growth, Russell Deaton, Max Garzon, Rojoba Yasmin, and Tyler Moore
Discovering in-network Caching Policies in NDN Networks from a Measurement Perspective, Chengyu Fan, Susmit Shannigrahi, Christos Papadopoulos, and Craig Partridge
Modeling Behavior as Mutual Dependency between Physiological Signals and Indoor Location in Large-Scale Wearable Sensor Study, Tiantian Feng, Brandon M. Booth, and Shrikanth S. Narayanan
Modeling Behavior as Mutual Dependency between Physiological Signals and Indoor Location in Large-Scale Wearable Sensor Study, Tiantian Feng, Brandon M. Booth, and Shrikanth S. Narayanan
Using neural tensor networks for open ended short answer assessment, Dipesh Gautam and Vasile Rus
Query-to-communication lifting for BPP, Mika Goos, Toniann Pitassi, and Thomas Watson