Submissions from 2024
EC-YOLOX: A Deep-Learning Algorithm for Floating Objects Detection in Ground Images of Complex Water Environments, Jiaxin He; Yong Cheng; Wei Wang; Yakang Gu; Yixuan Wang; Wenjie Zhang; Achyut Shankar; Shitharth Selvarajan,; and Sathish Kumar
High-Granularity Modulation for OFDM Backscatter, Xin Liu, Zicheng Chi, Wei Wang, Yao Yao, Pei Hao, and Ting Zhu
Submissions from 2023
Compromising Random Linear Network Coding as A Cipher, Sravya Bethu and Ye Zhu
Detection and Localization of DDoS Attack During Inter-Slice Handover in 5G Network Slicing, Himanshu Bisht, Moumita Patra, and Sathish Kumar
Design of Quantum Machine Learning Course for a Computer Science Program, Sathish Kumar, Temitope Adeniyi, Ahmad Alomari, and Santanu Ganguly
Network Intrusion Detection with Two-Phased Hybrid Ensemble Learning and Automatic Feature Selection, Asanka Kavinda Mananayaka and Sunnie S. Chung
A Survey of Wearable Devices Pairing Based on Biometric Signals, Jafar Pourbemany, Ye Zhu, and Riccardo Bettati
SDN-Based Federated Learning Approach for Satellite-IoT Framework to Enhance Data Security and Privacy in Space Communication, Ryhan Uddin and Sathish Kumar
Simultaneous Data Dissemination Among WiFi and ZigBee Devices, Wei Wang, Xin Liu, Yao Yao, Zicheng Chi, Stuart Ray, Ting Zhu, and Yanchao Zhang
The Two-Center Problem of Uncertain Points on a Real Line, Haitao Xu and Jingru Zhang
Submissions from 2022
Delay-aware Robust Control for Safe Autonomous Driving, Dvij Kalaria, Qin Lin, and John M. Dolan
Power Analysis Side Channel Attacks and Countermeasures for the Internet of Things, Christopher Liptak, Sanchita Mal-Sarkar, and Sathish Kumar
Introduction to the Special Section on Advances of Machine Learning in Cybersecurity (VSI-mlsec), Suyel Namasudra, Ruben Gonzalez Crespo, and Sathish Kumar
Breathe-to-Pair (B2P): Respiration-Based Pairing Protocol for Wearable Devices, Jafar Pourbemany, Ye Zhu, and Riccardo Bettati
Compact Multi-level Sparse Neural Networks with Input Independent Dynamic Rerouting, Minghai Qin, Tianyun Zhang, Fei Sun, Yen-Kuang Chen, Makan Fardad, Yanzhi Wang, and Yuan Xie
A Secured Protocol for IoT Devices in Tactical Networks, Wei Wang, Zicheng Chi, and et. al
Submissions from 2021
Intelligent Vehicle Parking System (IVPS) Using Wireless Sensor Networks, Sathish Kumar, Resmi R. Nair, E. Kannan, A. Suresh, and S. Raj Anand
5G Security Challenges and Solutions: A Review by OSI Layers, S. Sullivan, Alessandro Brighente, and Sathish Kumar
Submissions from 2020
3D Face Reconstruction from Single 2D Image Using Distinctive Features, H. M. Rehan Afzal, Suhuai Luo, M. Kamran Afzal, Gopal Chaudhary, Manju Khari, and Sathish Kumar
NSDroid: Efficient Multi-classification of Android Malware using Neighborhood Signature in Local Function Call Graphs, Pengfei Liu, Weiping Wang, Xi Luo, Haodong Wang, and Chushu Liu
Submissions from 2019
FPC: A New Approach to Firewall Policies Compression, Yuzhu Cheng, Weiping Wang, Jianxin Wang, and Haodong Wang
Page-Sharing-Based Virtual Machine Packing with Multi-Resource Constraints to Reduce Network Traffic in Migration for Clouds, Huixi Li, Wenjun Li, Shigeng Zhang, Haodong Wang, Yi Pan, and Jianxin Wang
Experiences with Implementing Parallel Discrete-event Simulation on GPU, Janche Sang, Che-Rung Lee, Vernon Rego, and Chung-Ta King
Submissions from 2018
DOPA: Detecting Open Ports in Android OS, Ali Alshehri; Hani Alshahrani; Abdulrahman Alzahrani; Raed Alharthi,; Huirong Fu; Anyi Liu; and Ye Zhu
A Survey of Password Schemes in Different Contexts, Sean Caldwell, Ye Zhu, and Huirong Fu
Reducing Transport Latency for Short Flows with Multipath TCP, Pingping Dong, Wenjun Yang, Wensheng Tang, Jiawei Huang, Haodong Wang, Yi Pan, and Jianxin Wang
On Threshold-Free Error Detection for Industrial Wireless Sensor Networks, Jianliang Gao, Jianxin Wang, Ping Zhong, and Haodong Wang
A Fine-Grained Rule Partition Algorithm in Cloud Data Centers, Wei Jiang, Wanchun Jiang, Weiping Wang, Haodong Wang, Yi Pan, and Jianxin Wang
An Optimization of Virtual Machine Selection and Placement by Using Memory Content Similarity for Server Consolidation in Cloud, Huixi Li, Wenjun Li, Haodong Wang, and Jianxin Wang
CMAPS: A Chess-Based Multi-Facet Password Scheme for Mobile Devices, Ye Zhu, Jonathan Gurary, George Corser, Jared Oluoch, Nahed Alnahash, Huirong Fu, and Junhua Tang
Submissions from 2017
Accurate Indoor Localization with Multiple Feature Fusion, Yalong Xiao, Jianxin Wang, Shigeng Zhang, Haodong Wang, and Jiannong Cao
Submissions from 2016
Design and Validation for FPGA Trust under Hardware Trojan Attacks, Sanchita Mal-Sarkar, Robert Karam, Seetharam Narasimhan, Anandaroop Ghosh, Aswin Krishna, and Swarup Bhunia
Spatio-temporal Pattern Discovery in Sensor Data: A Multivalued Decision Systems Approach, Sanchita Mal-Sarkar, Iftikhar U. Sikder, and Vijay K. Konangi
Panel: Engage in Reasoning with Tools, Nigamanth Sridhar, Gregory Kulczycki, Murali Sitaraman, and Bruce W. Weide
Submissions from 2015
Computer Science Principles Curricula, Owen Astrachan, Dan Garcia, Bennett Brown, Jeff Gray, Ralph Morelli, Nigamanth Sridhar, and Baker Franke
A Fast Parallel Selection Algorithm on GPUs, Darius Bakunas-Milanowski, Vernon Rego, Janche Sang, and Chansu Yu
Ambiguous Multi-Symmetric Cryptography, Richard Bassous, Roger Bassous, Huirong Fu, and Ye Zhu
Refinement-Based Verification of the FreeRTOS Scheduler in VCC, Sumesh Divakaran, Deepak D’Souza, Anirudh Kushwah, Prahladavaradan Sampath, Nigamanth Sridhar, and Jim Woodcock
Computer Science Principles Curricula: On-the-Ground, Adoptable, Adaptable, Approaches to Teaching, Daniel D. Garcia, Owen Astrachan, Bennett Brown, Jeff Gray, Calvin Lin, Bradley Beth, Ralph Morelli, Marie desJardins, and Nigamanth Sridhar
DESALβ: A Framework For Implementing Self-stabilizing Embedded Network Applications, Yangyang He, Yuheng Du, Shiree Hughes, Jiannan Zhai, Jason O. Hallstrom, and Nigamanth Sridhar
SPE: Security and Privacy Enhancement Framework for Mobile Devices, Brian Krupp, Nigamanth Sridhar, and Wenbing Zhao
Stackless Multi-Threading for Embedded Systems, William P. McCartney and Nigamanth Sridhar
An Improved Implementation of Parallel Selection on GPUs, Janche Sang, Darius Bakunas Milanowski, Vernon Rego, and Chansu Yu
Integrating Computing Principles to Enhance Science Classes, Nigamanth Sridhar and Debbie Jackson
Submissions from 2014
Protecting Vehicle Privacy Using Dummy Events, Nahed Alnahash, George Corser, Huirong Fu, and Ye Zhu
Synchronize Confidential Authentication (SCA), Mazen AlObaidi, Huirong Fu, and Ye Zhu
Energy Prediction Based Intrusion Detection In Wireless Sensor Networks, Nancy Alrajei, George Corser, Huirong Fu, and Ye Zhu
Evaluating Throughput and Delay in 3G and 4G Mobile Architectures, Eralda Caushaj, Ivan Ivanov, Huirong Fu, Ishwar Sethi, and Ye Zhu
Designing Coalescing Network-on-Chip for Efficient Memory Accesses of GPGPUs, Chien-Ting Chen, Yoshi Shih-Chieh Huang, Yuan-Ying Chang, Chiao-Yun Tu, Chung-Ta King, Tai-Yuan Wang, Janche Sang, and Ming-Hua Li
Privacy-By-Decoy: Protecting Location Privacy against Collusion and Deanonymization in Vehicular Location Based Services, George Corser, Huirong Fu, Tao Shu, Patrick D’Errico, Warren Ma, Supeng Leng, and Ye Zhu
Efficient Refinement Checking in VCC, Sumesh Divakaran, Deepak D’Souza, and Nigamanth Sridhar
An Ontology for Enforcing Security and Privacy Policies on Mobile Devices, Brian Krupp, Nigamanth Sridhar, and Wenbing Zhao
Hardware Trojan Attacks in FPGA Devices: Threat Analysis and Effective Counter Measures, Sanchita Mal-Sarkar, Aswin Krishna, Anandaroop Ghosh, and Swarup Bhunia
Simulation Study of Trust Management Schemes in Vehicular Ad Hoc Networks (VANETs), Jared Oluoch, George Corser, Huirong Fu, Ye Zhu, and Supeng Le
Evaluation of Active Position Detection in Vehicular Ad Hoc Networks, K. Penna, V. Yalavarthi, Huirong Fu, and Ye Zhu
Supporting the Specification and Runtime Validation of Asynchronous Calling Patterns in Reactive Systems, Jiannan Zhai, Nigamanth Sridhar, and Jason O. Hallstrom
On Topology of Sensor Networks Deployed for Multi-Target Tracking, Ye Zhu, A. Vikram, and Huirong Fu
On Non-Cooperative Multiple-Target Tracking with Wireless Sensor Networks, Ye Zhu, A. Vikram, Huirong Fu, and Yong Guan
Submissions from 2013
Secure and Trusted SoC: Challenges and Emerging Solutions, Abhishek Basak, Sanchita Mal-Sarkar, and Swarup Bhunia
Theoretical Analysis and Experimental Study: Monitoring Data Privacy in Smartphone Communications, Eralda Caushaj, Huirong Fu, Ishwar Sethi, Haissam Badih, Dion Watson, Ye Zhu, and Supeng Leng
A Framework for Enhancing Security and Privacy on Unmodified Mobile Operating Systems, Brian Krupp, Nigamanth Sridhar, and Wenbing Zhao
Testing and Debugging Sensor Network Applications, Sally K . Wahba, Jason O. Hallstromand, and Nigamanth Sridhar
Submissions from 2012
Attacks and Countermeasures in Wireless Cellular Networks, Eralda Caushaj, Huirong Fu, Haissam Badih, Ishwar Sethi, Ye Zhu, and Supeng Leng
A Simulation Study of Impacts of Collaborative Worm Hole Attacks In Mobile Ad Hoc Networks (MANETs), Jared Oluoch, Huirong Fu, Astrid Younang, Ye Zhu, and Bao Tri-Tran
Utilization of a Wrist-Mounted Accelerometer to Count Movement Repetitions, Sriram Sanka, Prashanth G. Reddy, Amber Alt, Ann Reinthal, and Nigamanth Sridhar
On Tracking Multiple Indistinguishable Targets, Ye Zhu, Vikram A, and Huirong Fu
On Privacy of Encrypted Speech Communications, Ye Zhu, Yuanchao Lu, and Anil Vikram
Submissions from 2011
Medium Access Control in Vehicular Ad Hoc Networks, Supeng Leng, Jianding Guo, Huirong Fu, and Ye Zhu
Stackless preemptive multi-threading for TinyOS, William P. McCartney and Nigamanth Sridhar
A Mobility Management Framework for Optimizing the Trajectory of a Mobile Base-station, Madhu Mudigonda, Trisul Kanipakam, Adam Dutko, Manohar Bathula, Nigamanth Sridhar, Srinivasan Seetharaman, and Jason O. Hallstrom
Enhancing Unlinkability in Vehicular Ad Hoc Networks, H Weerasinghe, Huirong Fu, S Leng, and Ye Zhu
Traffic Analysis Attacks on Skype VoIP Calls, Ye Zhu and Huirong Fu
Preserving Privacy in Time Series Data Mining, Ye Zhu, Yongjian Fu, and Huirong Fu
On Topology of Sensor Networks Deployed for Tracking, Ye Zhu, Anil Vikram, and Huirong Fu
Submissions from 2010
Correlation-Based Traffic Analysis Attacks on Anonymity Networks, Ye Zhu, Xinwen Fu, Byran Gramham, Riccardo Bettati, and Wei Zhao
A New Class of Attacks on Time Series Data Mining, Ye Zhu, Yongjian Fu, and Huirong Fu
Submissions from 2009
Reducing the Impact of Link Quality Variation in Embedded Wireless Network, Andrew R. Dalton, Jason O. Hallstrom, Hamza A. Zia, and Nigamanth Sridhar
Compromising Anonymous Communication Systems Using Blind Source Separation, Ye Zhu and Riccardo Bettati
Information Leakage as a Model for Quality of Anonymity Networks, Ye Zhu and Riccardo Bettati
Failure Detectors for Wireless Sensor-Actuator Systems, Hamza A. Zia, Nigamanth Sridhar, and Shivakumar Sastry
Submissions from 2005
A Knowledge Capturing Integrated Design Environment For A Course In Electrical Circuits, Yongjian Fu, Daniel J. Simon, and Charles Alexander