College of Engineering & Computer Science

Filter
Conference contribution

Search results

  • Conference contribution

    RSS-Based Detection of Drones in the Presence of RF Interferers

    Sinha, P., Yapici, Y., Guvene, I., Turgut, E. & Cenk Gursoy, M., Jan 2020, 2020 IEEE 17th Annual Consumer Communications and Networking Conference, CCNC 2020. Institute of Electrical and Electronics Engineers Inc., 9045281. (2020 IEEE 17th Annual Consumer Communications and Networking Conference, CCNC 2020).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
    5 Scopus citations
  • Rule networks in learning classifier systems

    Kuber, K., Card, S. W., Mehrotra, K. G. & Mohan, C. K., 2014, GECCO 2014 - Companion Publication of the 2014 Genetic and Evolutionary Computation Conference. Association for Computing Machinery, p. 977-982 6 p. (GECCO 2014 - Companion Publication of the 2014 Genetic and Evolutionary Computation Conference).

    Research output: Chapter in Book/Entry/PoemConference contribution

  • SAFE: Similarity-Aware Multi-modal Fake News Detection

    Zhou, X., Wu, J. & Zafarani, R., 2020, Advances in Knowledge Discovery and Data Mining - 24th Pacific-Asia Conference, PAKDD 2020, Proceedings. Lauw, H. W., Lim, E.-P., Wong, R.C.-W., Ntoulas, A., Ng, S.-K. & Pan, S. J. (eds.). Springer, p. 354-367 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12085 LNAI).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
    225 Scopus citations
  • Sample size effects on the behavior of EPS geofoam

    Elragi, A., Negussey, D. & Kyanka, G., 2000, Proceedings of the United Engineering Foundation / ASCE Geo-Institute Soft Ground Technology Conference - Soft Ground Technology, GSP 112. p. 280-291 12 p. (Proceedings of the United Engineering Foundation / ASCE Geo-Institute Soft Ground Technology Conference - Soft Ground Technology, GSP 112; vol. 301).

    Research output: Chapter in Book/Entry/PoemConference contribution

    18 Scopus citations
  • Sampling community structure in dynamic social networks

    Mensah, H. & Soundarajan, S., 2018, Recent Trends and Future Technology in Applied Intelligence - 31st International Conference on Industrial Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2018, Proceedings. Ait Mohamed, O., Mouhoub, M., Sadaoui, S. & Ali, M. (eds.). Springer Verlag, p. 114-126 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10868 LNAI).

    Research output: Chapter in Book/Entry/PoemConference contribution

    2 Scopus citations
  • Scalable graph-based bug search for firmware images

    Feng, Q., Zhou, R., Xu, C., Cheng, Y., Testa, B. & Yin, H., Oct 24 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 480-491 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 24-28-October-2016).

    Research output: Chapter in Book/Entry/PoemConference contribution

    369 Scopus citations
  • Scalable Log Auditing on Private Blockchains via Lightweight Log-Fork Prevention

    Tang, Y., Li, K., Wang, Y. & Somuncuoglu, S. B., Dec 7 2020, SERIAL 2020 - Proceedings of the 2020 4th Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers, Part of Middleware 2020. Association for Computing Machinery, Inc, p. 1-4 4 p. (SERIAL 2020 - Proceedings of the 2020 4th Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers, Part of Middleware 2020).

    Research output: Chapter in Book/Entry/PoemConference contribution

    3 Scopus citations
  • Scalable NoC-based Neuromorphic Hardware Learning and Inference

    Fang, H., Shrestha, A., De Ma, M. & Qiu, Q., Oct 10 2018, 2018 International Joint Conference on Neural Networks, IJCNN 2018 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8489619. (Proceedings of the International Joint Conference on Neural Networks; vol. 2018-July).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
    25 Scopus citations
  • Scale estimation with difference of ordered residuals

    Scalzo-Cornacchia, M. & Velipasalar, S., Dec 9 2015, 2015 IEEE International Conference on Image Processing, ICIP 2015 - Proceedings. IEEE Computer Society, p. 3377-3381 5 p. 7351430. (Proceedings - International Conference on Image Processing, ICIP; vol. 2015-December).

    Research output: Chapter in Book/Entry/PoemConference contribution

  • Scattering from arbitrary planar periodic screen consisting of resistive patches and dielectric layers

    Petre, P., Sarkar, T. K., Zombory, L. & Swaminathan, M., 1991, 1991 Digest. IEEE Computer Society, p. 1870-1873 4 p. (AP-S International Symposium (Digest) (IEEE Antennas and Propagation Society); vol. 3).

    Research output: Chapter in Book/Entry/PoemConference contribution

  • SC-DCNN: Highly-scalable deep convolutional neural network using stochastic computing

    Ren, A., Li, Z., Ding, C., Qiu, Q., Wang, Y., Li, J., Qian, X. & Yuan, B., Apr 4 2017, ASPLOS 2017 - 22nd International Conference on Architectural Support for Programming Languages and Operating Systems. Association for Computing Machinery, p. 405-418 14 p. (International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS; vol. Part F127193).

    Research output: Chapter in Book/Entry/PoemConference contribution

    79 Scopus citations
  • Scheduling in D2D underlaid cellular networks with deadline constraints

    Li, Y., Cenk Gursoy, M. & Velipasalar, S., Jul 2 2016, 2016 IEEE 84th Vehicular Technology Conference, VTC Fall 2016 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 7881211. (IEEE Vehicular Technology Conference; vol. 0).

    Research output: Chapter in Book/Entry/PoemConference contribution

    3 Scopus citations
  • Schelkunoff integrals for vertical dipoles

    Dyab, W. M., Sarkar, T. K. & Salazar-Palma, M., 2013, 2013 IEEE Antennas and Propagation Society International Symposium, APSURSI 2013 - Proceedings. p. 726-727 2 p. 6711022. (IEEE Antennas and Propagation Society, AP-S International Symposium (Digest)).

    Research output: Chapter in Book/Entry/PoemConference contribution

  • SCUTA: A server-side access control system for web applications

    Tan, X., Du, W., Luo, T. & Soundararaj, K. D., 2012, SACMAT'12 - Proceedings of the 17th ACM Symposium on Access Control Models and Technologies. p. 71-82 12 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

    Research output: Chapter in Book/Entry/PoemConference contribution

    2 Scopus citations
  • Seamless Deductive Inference via Macros

    Sahebolamri, A., Gilray, T. & Micinski, K., Sep 19 2022, CC 2022 - Proceedings of the 31st ACM SIGPLAN International Conference on Compiler Construction. Egger, B. & Smith, A. (eds.). Association for Computing Machinery, Inc, p. 77-88 12 p. (CC 2022 - Proceedings of the 31st ACM SIGPLAN International Conference on Compiler Construction).

    Research output: Chapter in Book/Entry/PoemConference contribution

    8 Scopus citations
  • Searching for better randomized response schemes for privacy-preserving data mining

    Huang, Z., Du, W. & Teng, Z., 2007, Knowledge Discovery in Database: PKDD 2007 - 11th European Conference on Principles and Practice of Knowledge Discovery in Databases, Proceedings. Springer Verlag, p. 487-497 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4702 LNAI).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
    2 Scopus citations
  • Second-order plasma enabled tunable low-profile frequency selective surface based on coupling inter-layer

    Payne, K., Peters, E. F., Brunett, J., Wedding, D. K., Wedding, C. A. & Choi, J. H., 2016, European Microwave Week 2016: "Microwaves Everywhere", EuMW 2016 - Conference Proceedings; 46th European Microwave Conference, EuMC 2016. Institute of Electrical and Electronics Engineers Inc., p. 309-312 4 p. 7824340. (European Microwave Week 2016: "Microwaves Everywhere", EuMW 2016 - Conference Proceedings; 46th European Microwave Conference, EuMC 2016).

    Research output: Chapter in Book/Entry/PoemConference contribution

    12 Scopus citations
  • Secrecy capacity of semi-deterministic wire-tap channels

    Grubb, J., Vishwanath, S., Liang, Y. & Poor, H. V., 2007, Proceedings of the 2007 IEEE Information Theory Workshop on Information Theory for Wireless Networks, ITW. p. 199-202 4 p. 4318063. (Proceedings of the 2007 IEEE Information Theory Workshop on Information Theory for Wireless Networks, ITW).

    Research output: Chapter in Book/Entry/PoemConference contribution

    10 Scopus citations
  • Secrecy capacity region of binary and Gaussian multiple access channels

    Liang, Y. & Vincent Poor, H., 2006, 44th Annual Allerton Conference on Communication, Control, and Computing 2006. University of Illinois at Urbana-Champaign, Coordinated Science Laboratory and Department of Computer and Electrical Engineering, p. 1098-1106 9 p. (44th Annual Allerton Conference on Communication, Control, and Computing 2006; vol. 3).

    Research output: Chapter in Book/Entry/PoemConference contribution

    2 Scopus citations
  • Secrecy capacity region of fading broadcast channels

    Liang, Y., Poor, H. V. & Shamai, S., 2007, Proceedings - 2007 IEEE International Symposium on Information Theory, ISIT 2007. p. 1291-1295 5 p. 4557401. (IEEE International Symposium on Information Theory - Proceedings).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
    29 Scopus citations
  • Secrecy capacity region of parallel broadcast channels

    Liang, Y., Poor, H. V. & Shamai, S., 2007, 2007 Information Theory and Applications Workshop, Conference Proceedings, ITA. p. 245-250 6 p. 4357587. (2007 Information Theory and Applications Workshop, Conference Proceedings, ITA).

    Research output: Chapter in Book/Entry/PoemConference contribution

    8 Scopus citations
  • Secrecy throughput of MANETs with malicious nodes

    Liang, Y., Poor, H. V. & Ying, L., 2009, 2009 IEEE International Symposium on Information Theory, ISIT 2009. p. 1189-1193 5 p. 5205992. (IEEE International Symposium on Information Theory - Proceedings).

    Research output: Chapter in Book/Entry/PoemConference contribution

    37 Scopus citations
  • Secret key capacity: Talk or keep silent?

    Zhang, H., Liang, Y. & Lai, L., Sep 28 2015, Proceedings - 2015 IEEE International Symposium on Information Theory, ISIT 2015. Institute of Electrical and Electronics Engineers Inc., p. 291-295 5 p. 7282463. (IEEE International Symposium on Information Theory - Proceedings; vol. 2015-June).

    Research output: Chapter in Book/Entry/PoemConference contribution

    9 Scopus citations
  • Secret key-private key generation over three terminals: Capacity region

    Zhang, H., Lai, L., Liang, Y. & Wang, H., 2014, 2014 IEEE International Symposium on Information Theory, ISIT 2014. Institute of Electrical and Electronics Engineers Inc., p. 1141-1145 5 p. 6875011. (IEEE International Symposium on Information Theory - Proceedings).

    Research output: Chapter in Book/Entry/PoemConference contribution

    4 Scopus citations
  • Secret sharing via noisy broadcast channels

    Lai, L., Liang, Y., Du, W. & Shamai, S., 2011, 2011 IEEE International Symposium on Information Theory Proceedings, ISIT 2011. p. 1955-1959 5 p. 6033894. (IEEE International Symposium on Information Theory - Proceedings).

    Research output: Chapter in Book/Entry/PoemConference contribution

    5 Scopus citations
  • Secure and efficient multi-party directory publication for privacy-preserving data sharing

    Areekijseree, K., Tang, Y., Chen, J., Wang, S., Iyengar, A. & Palanisamy, B., 2018, Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Proceedings. Li, Y., Chang, B., Zhu, S. & Beyah, R. (eds.). Springer Verlag, p. 71-94 24 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 254).

    Research output: Chapter in Book/Entry/PoemConference contribution

    2 Scopus citations
  • Secure and Private Sequence Comparisons

    Atallah, M. J., Kerschbaum, F. & Du, W., 2003, Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, WPES 2003. Samarati, P. & Syverson, P. (eds.). Association for Computing Machinery, p. 39-44 6 p. (Proceedings of the ACM Workshop on Privacy in the Electronic Society).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
    153 Scopus citations
  • Secure coding over networks

    Xu, J. & Chen, B., 2009, 2009 IEEE International Symposium on Information Theory, ISIT 2009. p. 2116-2120 5 p. 5205251. (IEEE International Symposium on Information Theory - Proceedings).

    Research output: Chapter in Book/Entry/PoemConference contribution

    2 Scopus citations
  • Secure communication over fading channels

    Liang, Y. & Poor, H. V., 2006, 44th Annual Allerton Conference on Communication, Control, and Computing 2006. University of Illinois at Urbana-Champaign, Coordinated Science Laboratory and Department of Computer and Electrical Engineering, p. 817-823 7 p. (44th Annual Allerton Conference on Communication, Control, and Computing 2006; vol. 2).

    Research output: Chapter in Book/Entry/PoemConference contribution

    44 Scopus citations
  • Secure consistency verification for untrusted cloud storage by public blockchains

    Li, K., Tang, Y., Kim, B. H. B. & Xu, J., 2019, Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Proceedings. Chen, S., Choo, K.-K. R., Fu, X., Lou, W. & Mohaisen, A. (eds.). Springer, p. 39-62 24 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 304 LNICST).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
    3 Scopus citations
  • Secure distributed detection in the presence of eavesdroppers

    Nadendla, V. S. S., Chen, H. & Varshney, P. K., 2010, Conference Record of the 44th Asilomar Conference on Signals, Systems and Computers, Asilomar 2010. p. 1437-1441 5 p. 5757773. (Conference Record - Asilomar Conference on Signals, Systems and Computers).

    Research output: Chapter in Book/Entry/PoemConference contribution

    18 Scopus citations
  • Secure nested codes for type II wiretap channels

    Liu, R., Liang, Y., Poor, H. V. & Spasojević, P., 2007, 2007 IEEE Information Theory Workshop, ITW 2007, Proceedings. p. 337-342 6 p. 4313097. (2007 IEEE Information Theory Workshop, ITW 2007, Proceedings).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
    85 Scopus citations
  • Securing BGP through keychain-based signatures

    Heng, Y., Bo, S., Haining, W. & Jianping, P., 2007, 2007 Fifteenth IEEE International Workshop on Quality of Service, IWQoS 2007. p. 154-163 10 p. 4262466. (IEEE International Workshop on Quality of Service, IWQoS).

    Research output: Chapter in Book/Entry/PoemConference contribution

    2 Scopus citations
  • Securing Mobile Systems GPS and Camera Functions Using TrustZone Framework

    Salman, A. S. & Du, W., 2021, Intelligent Computing - Proceedings of the 2021 Computing Conference. Arai, K. (ed.). Springer Science and Business Media Deutschland GmbH, p. 868-884 17 p. (Lecture Notes in Networks and Systems; vol. 285).

    Research output: Chapter in Book/Entry/PoemConference contribution

    4 Scopus citations
  • Security analysis and enhancement of model compressed deep learning systems under adversarial attacks

    Liu, Q., Liu, T., Liu, Z., Wang, Y., Jin, Y. & Wen, W., Feb 20 2018, ASP-DAC 2018 - 23rd Asia and South Pacific Design Automation Conference, Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 721-726 6 p. (Proceedings of the Asia and South Pacific Design Automation Conference, ASP-DAC; vol. 2018-January).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
    37 Scopus citations
  • Security-Aware Virtual Machine Allocation in the Cloud: A Game Theoretic Approach

    Kwiat, L., Kamhoua, C. A., Kwiat, K. A., Tang, J. & Martin, A., Aug 19 2015, Proceedings - 2015 IEEE 8th International Conference on Cloud Computing, CLOUD 2015. Pu, C. & Mohindra, A. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 556-563 8 p. 7214090. (Proceedings - 2015 IEEE 8th International Conference on Cloud Computing, CLOUD 2015).

    Research output: Chapter in Book/Entry/PoemConference contribution

    28 Scopus citations
  • SEED: A suite of instructional laboratories for computer SEcurity EDucation

    Du, W., Teng, Z. & Wang, R., 2007, SIGCSE 2007: 38th SIGCSE Technical Symposium on Computer Science Education. p. 486-490 5 p. (SIGCSE 2007: 38th SIGCSE Technical Symposium on Computer Science Education).

    Research output: Chapter in Book/Entry/PoemConference contribution

    7 Scopus citations
  • SEED Emulator: An Internet Emulator for Research and Education

    Du, W., Zeng, H. & Won, K., Nov 14 2022, HotNets 2022 - Proceedings of the 2022 21st ACM Workshop on Hot Topics in Networks. Association for Computing Machinery, Inc, p. 101-107 7 p. (HotNets 2022 - Proceedings of the 2022 21st ACM Workshop on Hot Topics in Networks).

    Research output: Chapter in Book/Entry/PoemConference contribution

    9 Scopus citations
  • Seismic performance study on the joint of crisscross concrete-filled steel tube column-steel beam in different axial compression ratios

    Xu, Y. F., Zhu, S. J., Xu, P. Y. & Aboutaha, R. S., 2014, Advances in Civil Structures IV. Trans Tech Publications Ltd, p. 305-308 4 p. (Applied Mechanics and Materials; vol. 578-579).

    Research output: Chapter in Book/Entry/PoemConference contribution

    1 Scopus citations
  • Selection, majorization and replicators

    Menon, A., Mehrotra, K. G., Mohan, C. K. & Ranka, S., 1996, Proceedings of the IEEE Conference on Evolutionary Computation. IEEE Computer Society, p. 606-610 5 p.

    Research output: Chapter in Book/Entry/PoemConference contribution

    1 Scopus citations
  • Selection of conventional generation resources for optimal replacement by wind power generations

    Philippe, W. P. J., Iannone, E., Eftekharnejad, S. & Ghosh, P. K., Feb 2020, 2020 IEEE Texas Power and Energy Conference, TPEC 2020. Institute of Electrical and Electronics Engineers Inc., 9042520. (2020 IEEE Texas Power and Energy Conference, TPEC 2020).

    Research output: Chapter in Book/Entry/PoemConference contribution

  • Selective parts-based tracking through occlusions

    Cornacchia, M. & Velipasalar, S., Mar 7 2018, 2017 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2017 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 171-175 5 p. (2017 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2017 - Proceedings; vol. 2018-January).

    Research output: Chapter in Book/Entry/PoemConference contribution

    3 Scopus citations
  • Selective water transport across uniform sub-nanometer pores in microfabricated membranes

    Humplik, T., Raj, R., Maroo, S. C., Laoui, T. & Wang, E. N., 2014, 2014 Solid-State Sensors, Actuators and Microsystems Workshop, Hilton Head 2014. Allen, M. G. & Mehregany, M. (eds.). Transducer Research Foundation, p. 107-108 2 p. (Technical Digest - Solid-State Sensors, Actuators, and Microsystems Workshop).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
  • Self assembled fibrinogen structures film on selected surfaces in molecule level

    Bai, Z., Gilbert, J. L. & Gettens, R., 2004, Transactions - 7th World Biomaterials Congress. p. 1740 1 p. (Transactions - 7th World Biomaterials Congress).

    Research output: Chapter in Book/Entry/PoemConference contribution

    2 Scopus citations
  • Self-induced transition between stable and thermoacoustically excited states in a gas turbine combustor

    Boxx, I. G., Geigle, K. P., Carter, C. D., Lewalle, J. & Kumgeh, B. A., 2017, AIAA SciTech Forum - 55th AIAA Aerospace Sciences Meeting. American Institute of Aeronautics and Astronautics Inc., AIAA 2017-1102. (AIAA SciTech Forum - 55th AIAA Aerospace Sciences Meeting).

    Research output: Chapter in Book/Entry/PoemConference contribution

    2 Scopus citations
  • Self-structured confabulation network for fast anomaly detection and reasoning

    Chen, Q., Wu, Q., Bishop, M., Linderman, R. & Qiu, Q., Sep 28 2015, 2015 International Joint Conference on Neural Networks, IJCNN 2015. Institute of Electrical and Electronics Engineers Inc., 7280371. (Proceedings of the International Joint Conference on Neural Networks; vol. 2015-September).

    Research output: Chapter in Book/Entry/PoemConference contribution

    5 Scopus citations
  • Seluge: Secure and DoS-resistant code dissemination in wireless sensor networks

    Hyun, S., Ning, P., Liu, A. & Du, W., 2008, Proceedings - 2008 International Conference on Information Processing in Sensor Networks, IPSN 2008. p. 445-456 12 p. 4505494. (Proceedings - 2008 International Conference on Information Processing in Sensor Networks, IPSN 2008).

    Research output: Chapter in Book/Entry/PoemConference contribution

    95 Scopus citations
  • Semantics-aware Android malware classification using weighted contextual API dependency graphs

    Zhang, M., Duan, Y., Yin, H. & Zhao, Z., Nov 3 2014, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, p. 1105-1116 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
    423 Scopus citations
  • SemanticSLAM: Learning based Semantic Map Construction and Robust Camera Localization

    Li, M., Ma, Y. & Qiu, Q., 2023, 2023 IEEE Symposium Series on Computational Intelligence, SSCI 2023. Institute of Electrical and Electronics Engineers Inc., p. 312-317 6 p. (2023 IEEE Symposium Series on Computational Intelligence, SSCI 2023).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
    1 Scopus citations
  • Semantics-preserving dissection of Javascript exploits via dynamic JS-binary analysis

    Hu, X., Prakash, A., Wang, J., Zhou, R., Cheng, Y. & Yin, H., 2016, Research in Attacks, Intrusions, and Defenses - 19th International Symposium, RAID 2016, Proceedings. Dacier, M., Monrose, F., Blanc, G. & Garcia-Alfaro, J. (eds.). Springer Verlag, p. 254-276 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9854 LNCS).

    Research output: Chapter in Book/Entry/PoemConference contribution