Follow

Submissions from 2024

Link

EC-YOLOX: A Deep-Learning Algorithm for Floating Objects Detection in Ground Images of Complex Water Environments, Jiaxin He; Yong Cheng; Wei Wang; Yakang Gu; Yixuan Wang; Wenjie Zhang; Achyut Shankar; Shitharth Selvarajan,; and Sathish Kumar

Link

High-Granularity Modulation for OFDM Backscatter, Xin Liu, Zicheng Chi, Wei Wang, Yao Yao, Pei Hao, and Ting Zhu

Submissions from 2022

Link

Delay-aware Robust Control for Safe Autonomous Driving, Dvij Kalaria, Qin Lin, and John M. Dolan

Link

Power Analysis Side Channel Attacks and Countermeasures for the Internet of Things, Christopher Liptak, Sanchita Mal-Sarkar, and Sathish Kumar

Link

Introduction to the Special Section on Advances of Machine Learning in Cybersecurity (VSI-mlsec), Suyel Namasudra, Ruben Gonzalez Crespo, and Sathish Kumar

Link

Breathe-to-Pair (B2P): Respiration-Based Pairing Protocol for Wearable Devices, Jafar Pourbemany, Ye Zhu, and Riccardo Bettati

Link

Compact Multi-level Sparse Neural Networks with Input Independent Dynamic Rerouting, Minghai Qin, Tianyun Zhang, Fei Sun, Yen-Kuang Chen, Makan Fardad, Yanzhi Wang, and Yuan Xie

Link

A Secured Protocol for IoT Devices in Tactical Networks, Wei Wang, Zicheng Chi, and et. al

Submissions from 2021

Link

Intelligent Vehicle Parking System (IVPS) Using Wireless Sensor Networks, Sathish Kumar, Resmi R. Nair, E. Kannan, A. Suresh, and S. Raj Anand

PDF

5G Security Challenges and Solutions: A Review by OSI Layers, S. Sullivan, Alessandro Brighente, and Sathish Kumar

Submissions from 2020

PDF

3D Face Reconstruction from Single 2D Image Using Distinctive Features, H. M. Rehan Afzal, Suhuai Luo, M. Kamran Afzal, Gopal Chaudhary, Manju Khari, and Sathish Kumar

PDF

NSDroid: Efficient Multi-classification of Android Malware using Neighborhood Signature in Local Function Call Graphs, Pengfei Liu, Weiping Wang, Xi Luo, Haodong Wang, and Chushu Liu

Submissions from 2019

PDF

FPC: A New Approach to Firewall Policies Compression, Yuzhu Cheng, Weiping Wang, Jianxin Wang, and Haodong Wang

Link

Page-Sharing-Based Virtual Machine Packing with Multi-Resource Constraints to Reduce Network Traffic in Migration for Clouds, Huixi Li, Wenjun Li, Shigeng Zhang, Haodong Wang, Yi Pan, and Jianxin Wang

PDF

Experiences with Implementing Parallel Discrete-event Simulation on GPU, Janche Sang, Che-Rung Lee, Vernon Rego, and Chung-Ta King

Submissions from 2018

Link

DOPA: Detecting Open Ports in Android OS, Ali Alshehri; Hani Alshahrani; Abdulrahman Alzahrani; Raed Alharthi,; Huirong Fu; Anyi Liu; and Ye Zhu

Link

A Survey of Password Schemes in Different Contexts, Sean Caldwell, Ye Zhu, and Huirong Fu

PDF

Reducing Transport Latency for Short Flows with Multipath TCP, Pingping Dong, Wenjun Yang, Wensheng Tang, Jiawei Huang, Haodong Wang, Yi Pan, and Jianxin Wang

PDF

On Threshold-Free Error Detection for Industrial Wireless Sensor Networks, Jianliang Gao, Jianxin Wang, Ping Zhong, and Haodong Wang

Link

A Fine-Grained Rule Partition Algorithm in Cloud Data Centers, Wei Jiang, Wanchun Jiang, Weiping Wang, Haodong Wang, Yi Pan, and Jianxin Wang

PDF

An Optimization of Virtual Machine Selection and Placement by Using Memory Content Similarity for Server Consolidation in Cloud, Huixi Li, Wenjun Li, Haodong Wang, and Jianxin Wang

PDF

CMAPS: A Chess-Based Multi-Facet Password Scheme for Mobile Devices, Ye Zhu, Jonathan Gurary, George Corser, Jared Oluoch, Nahed Alnahash, Huirong Fu, and Junhua Tang

Submissions from 2017

Link

Accurate Indoor Localization with Multiple Feature Fusion, Yalong Xiao, Jianxin Wang, Shigeng Zhang, Haodong Wang, and Jiannong Cao

Submissions from 2016

PDF

Design and Validation for FPGA Trust under Hardware Trojan Attacks, Sanchita Mal-Sarkar, Robert Karam, Seetharam Narasimhan, Anandaroop Ghosh, Aswin Krishna, and Swarup Bhunia

Link

Spatio-temporal Pattern Discovery in Sensor Data: A Multivalued Decision Systems Approach, Sanchita Mal-Sarkar, Iftikhar U. Sikder, and Vijay K. Konangi

Link

Panel: Engage in Reasoning with Tools, Nigamanth Sridhar, Gregory Kulczycki, Murali Sitaraman, and Bruce W. Weide

Submissions from 2015

Link

Computer Science Principles Curricula, Owen Astrachan, Dan Garcia, Bennett Brown, Jeff Gray, Ralph Morelli, Nigamanth Sridhar, and Baker Franke

Link

A Fast Parallel Selection Algorithm on GPUs, Darius Bakunas-Milanowski, Vernon Rego, Janche Sang, and Chansu Yu

Link

Ambiguous Multi-Symmetric Cryptography, Richard Bassous, Roger Bassous, Huirong Fu, and Ye Zhu

Link

Refinement-Based Verification of the FreeRTOS Scheduler in VCC, Sumesh Divakaran, Deepak D’Souza, Anirudh Kushwah, Prahladavaradan Sampath, Nigamanth Sridhar, and Jim Woodcock

Link

Computer Science Principles Curricula: On-the-Ground, Adoptable, Adaptable, Approaches to Teaching, Daniel D. Garcia, Owen Astrachan, Bennett Brown, Jeff Gray, Calvin Lin, Bradley Beth, Ralph Morelli, Marie desJardins, and Nigamanth Sridhar

Link

DESALβ: A Framework For Implementing Self-stabilizing Embedded Network Applications, Yangyang He, Yuheng Du, Shiree Hughes, Jiannan Zhai, Jason O. Hallstrom, and Nigamanth Sridhar

PDF

SPE: Security and Privacy Enhancement Framework for Mobile Devices, Brian Krupp, Nigamanth Sridhar, and Wenbing Zhao

PDF

Stackless Multi-Threading for Embedded Systems, William P. McCartney and Nigamanth Sridhar

Link

An Improved Implementation of Parallel Selection on GPUs, Janche Sang, Darius Bakunas Milanowski, Vernon Rego, and Chansu Yu

Link

Integrating Computing Principles to Enhance Science Classes, Nigamanth Sridhar and Debbie Jackson

Submissions from 2014

Link

Protecting Vehicle Privacy Using Dummy Events, Nahed Alnahash, George Corser, Huirong Fu, and Ye Zhu

Link

Synchronize Confidential Authentication (SCA), Mazen AlObaidi, Huirong Fu, and Ye Zhu

PDF

Energy Prediction Based Intrusion Detection In Wireless Sensor Networks, Nancy Alrajei, George Corser, Huirong Fu, and Ye Zhu

PDF

Evaluating Throughput and Delay in 3G and 4G Mobile Architectures, Eralda Caushaj, Ivan Ivanov, Huirong Fu, Ishwar Sethi, and Ye Zhu

Link

Designing Coalescing Network-on-Chip for Efficient Memory Accesses of GPGPUs, Chien-Ting Chen, Yoshi Shih-Chieh Huang, Yuan-Ying Chang, Chiao-Yun Tu, Chung-Ta King, Tai-Yuan Wang, Janche Sang, and Ming-Hua Li

Link

Privacy-By-Decoy: Protecting Location Privacy against Collusion and Deanonymization in Vehicular Location Based Services, George Corser, Huirong Fu, Tao Shu, Patrick D’Errico, Warren Ma, Supeng Leng, and Ye Zhu

PDF

Efficient Refinement Checking in VCC, Sumesh Divakaran, Deepak D’Souza, and Nigamanth Sridhar

Link

An Ontology for Enforcing Security and Privacy Policies on Mobile Devices, Brian Krupp, Nigamanth Sridhar, and Wenbing Zhao

Link

Hardware Trojan Attacks in FPGA Devices: Threat Analysis and Effective Counter Measures, Sanchita Mal-Sarkar, Aswin Krishna, Anandaroop Ghosh, and Swarup Bhunia

Link

Simulation Study of Trust Management Schemes in Vehicular Ad Hoc Networks (VANETs), Jared Oluoch, George Corser, Huirong Fu, Ye Zhu, and Supeng Le

Link

Evaluation of Active Position Detection in Vehicular Ad Hoc Networks, K. Penna, V. Yalavarthi, Huirong Fu, and Ye Zhu

PDF

Supporting the Specification and Runtime Validation of Asynchronous Calling Patterns in Reactive Systems, Jiannan Zhai, Nigamanth Sridhar, and Jason O. Hallstrom

PDF

On Topology of Sensor Networks Deployed for Multi-Target Tracking, Ye Zhu, A. Vikram, and Huirong Fu

PDF

On Non-Cooperative Multiple-Target Tracking with Wireless Sensor Networks, Ye Zhu, A. Vikram, Huirong Fu, and Yong Guan

Submissions from 2013

Link

Secure and Trusted SoC: Challenges and Emerging Solutions, Abhishek Basak, Sanchita Mal-Sarkar, and Swarup Bhunia

Link

Theoretical Analysis and Experimental Study: Monitoring Data Privacy in Smartphone Communications, Eralda Caushaj, Huirong Fu, Ishwar Sethi, Haissam Badih, Dion Watson, Ye Zhu, and Supeng Leng

Link

A Framework for Enhancing Security and Privacy on Unmodified Mobile Operating Systems, Brian Krupp, Nigamanth Sridhar, and Wenbing Zhao

Link

Testing and Debugging Sensor Network Applications, Sally K . Wahba, Jason O. Hallstromand, and Nigamanth Sridhar

Submissions from 2012

Link

Attacks and Countermeasures in Wireless Cellular Networks, Eralda Caushaj, Huirong Fu, Haissam Badih, Ishwar Sethi, Ye Zhu, and Supeng Leng

Link

A Simulation Study of Impacts of Collaborative Worm Hole Attacks In Mobile Ad Hoc Networks (MANETs), Jared Oluoch, Huirong Fu, Astrid Younang, Ye Zhu, and Bao Tri-Tran

Link

Utilization of a Wrist-Mounted Accelerometer to Count Movement Repetitions, Sriram Sanka, Prashanth G. Reddy, Amber Alt, Ann Reinthal, and Nigamanth Sridhar

Link

On Tracking Multiple Indistinguishable Targets, Ye Zhu, Vikram A, and Huirong Fu

PDF

On Privacy of Encrypted Speech Communications, Ye Zhu, Yuanchao Lu, and Anil Vikram

Submissions from 2011

Link

Medium Access Control in Vehicular Ad Hoc Networks, Supeng Leng, Jianding Guo, Huirong Fu, and Ye Zhu

Link

Stackless preemptive multi-threading for TinyOS, William P. McCartney and Nigamanth Sridhar

Link

A Mobility Management Framework for Optimizing the Trajectory of a Mobile Base-station, Madhu Mudigonda, Trisul Kanipakam, Adam Dutko, Manohar Bathula, Nigamanth Sridhar, Srinivasan Seetharaman, and Jason O. Hallstrom

Link

Enhancing Unlinkability in Vehicular Ad Hoc Networks, H Weerasinghe, Huirong Fu, S Leng, and Ye Zhu

PDF

Traffic Analysis Attacks on Skype VoIP Calls, Ye Zhu and Huirong Fu

Link

Preserving Privacy in Time Series Data Mining, Ye Zhu, Yongjian Fu, and Huirong Fu

Link

On Topology of Sensor Networks Deployed for Tracking, Ye Zhu, Anil Vikram, and Huirong Fu

Submissions from 2010

PDF

Correlation-Based Traffic Analysis Attacks on Anonymity Networks, Ye Zhu, Xinwen Fu, Byran Gramham, Riccardo Bettati, and Wei Zhao

PDF

A New Class of Attacks on Time Series Data Mining, Ye Zhu, Yongjian Fu, and Huirong Fu

Submissions from 2009

Link

Reducing the Impact of Link Quality Variation in Embedded Wireless Network, Andrew R. Dalton, Jason O. Hallstrom, Hamza A. Zia, and Nigamanth Sridhar

PDF

Compromising Anonymous Communication Systems Using Blind Source Separation, Ye Zhu and Riccardo Bettati

PDF

Information Leakage as a Model for Quality of Anonymity Networks, Ye Zhu and Riccardo Bettati

PDF

Failure Detectors for Wireless Sensor-Actuator Systems, Hamza A. Zia, Nigamanth Sridhar, and Shivakumar Sastry

Submissions from 2007

PDF

Serfs: Dynamically-Bound Parameterized Components, Nigamanth Sridhar

Submissions from 2005

Link

A Knowledge Capturing Integrated Design Environment For A Course In Electrical Circuits, Yongjian Fu, Daniel J. Simon, and Charles Alexander