Department of Electrical Engineering & Computer Science

Search results

  • Conference contribution

    Robust sparse Bayesian learning STAP method for discrete interference suppression in nonhomogeneous clutter

    Sun, Y., Yang, X., Long, T. & Sarkar, T. K., Jun 7 2017, 2017 IEEE Radar Conference, RadarConf 2017. Institute of Electrical and Electronics Engineers Inc., p. 1003-1008 6 p. 7944350

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Robust suboptimal decision fusion in wireless sensor networks

    Jiang, R., Misra, S., Chen, B. & Swami, A., Dec 1 2005, MILCOM 2005: Military Communications Conference 2005. 1605981. (Proceedings - IEEE Military Communications Conference MILCOM; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Scopus citations
  • Role of Academia to Create Re-entry Pathways in Computing

    Billionniere, E., Rahman, F., Brown, Q. & Seo, H., Mar 10 2020, 2020 Research on Equity and Sustained Participation in Engineering, Computing, and Technology, RESPECT 2020 - Proceedings. Gardner-McCune, C., Washington, N., Dillon, E., Washington, G. & Payton, J. (eds.). Institute of Electrical and Electronics Engineers Inc., 9272425. (2020 Research on Equity and Sustained Participation in Engineering, Computing, and Technology, RESPECT 2020 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Room shape reconstruction with a single mobile acoustic sensor

    Peng, F., Wang, T. & Chen, B., Feb 23 2016, 2015 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2015. Institute of Electrical and Electronics Engineers Inc., p. 1116-1120 5 p. 7418371

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • Routing wires with non-uniform width and spacing in data paths

    Krishna, B., Chen, C. Y. R. & Sehgal, N. K., 1999, Proceedings of the International Conference on Microelectronics, ICM. Institute of Electrical and Electronics Engineers Inc., Vol. 2000-January. p. 85-88 4 p. 884811

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • RSS-Based Detection of Drones in the Presence of RF Interferers

    Sinha, P., Yapici, Y., Guvene, I., Turgut, E. & Cenk Gursoy, M., Jan 2020, 2020 IEEE 17th Annual Consumer Communications and Networking Conference, CCNC 2020. Institute of Electrical and Electronics Engineers Inc., 9045281. (2020 IEEE 17th Annual Consumer Communications and Networking Conference, CCNC 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Rule networks in learning classifier systems

    Kuber, K., Card, S. W., Mehrotra, K. G. & Mohan, C. K., 2014, GECCO 2014 - Companion Publication of the 2014 Genetic and Evolutionary Computation Conference. Association for Computing Machinery, p. 977-982 6 p. (GECCO 2014 - Companion Publication of the 2014 Genetic and Evolutionary Computation Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • SAFE: Similarity-Aware Multi-modal Fake News Detection

    Zhou, X., Wu, J. & Zafarani, R., 2020, Advances in Knowledge Discovery and Data Mining - 24th Pacific-Asia Conference, PAKDD 2020, Proceedings. Lauw, H. W., Lim, E-P., Wong, R. C-W., Ntoulas, A., Ng, S-K. & Pan, S. J. (eds.). Springer, p. 354-367 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12085 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    24 Scopus citations
  • Sampling community structure in dynamic social networks

    Mensah, H. & Soundarajan, S., 2018, Recent Trends and Future Technology in Applied Intelligence - 31st International Conference on Industrial Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2018, Proceedings. Ait Mohamed, O., Mouhoub, M., Sadaoui, S. & Ali, M. (eds.). Springer Verlag, p. 114-126 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10868 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Scalable graph-based bug search for firmware images

    Feng, Q., Zhou, R., Xu, C., Cheng, Y., Testa, B. & Yin, H., Oct 24 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 480-491 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 24-28-October-2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    178 Scopus citations
  • Scalable Log Auditing on Private Blockchains via Lightweight Log-Fork Prevention

    Tang, Y., Li, K., Wang, Y. & Somuncuoglu, S. B., Dec 7 2020, SERIAL 2020 - Proceedings of the 2020 4th Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers, Part of Middleware 2020. Association for Computing Machinery, Inc, p. 1-4 4 p. (SERIAL 2020 - Proceedings of the 2020 4th Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers, Part of Middleware 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Scalable NoC-based Neuromorphic Hardware Learning and Inference

    Fang, H., Shrestha, A., De Ma, M. & Qiu, Q., Oct 10 2018, 2018 International Joint Conference on Neural Networks, IJCNN 2018 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8489619. (Proceedings of the International Joint Conference on Neural Networks; vol. 2018-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Scopus citations
  • Scale estimation with difference of ordered residuals

    Scalzo-Cornacchia, M. & Velipasalar, S., Dec 9 2015, Proceedings - International Conference on Image Processing, ICIP. IEEE Computer Society, Vol. 2015-December. p. 3377-3381 5 p. 7351430

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Scattering from arbitrary planar periodic screen consisting of resistive patches and dielectric layers

    Petre, P., Sarkar, T. K., Zombory, L. & Swaminathan, M., Dec 1 1991, 1991 Digest. IEEE Computer Society, p. 1870-1873 4 p. (AP-S International Symposium (Digest) (IEEE Antennas and Propagation Society); vol. 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • SC-DCNN: Highly-scalable deep convolutional neural network using stochastic computing

    Ren, A., Li, Z., Ding, C., Qiu, Q., Wang, Y., Li, J., Qian, X. & Yuan, B., Apr 4 2017, ASPLOS 2017 - 22nd International Conference on Architectural Support for Programming Languages and Operating Systems. Association for Computing Machinery, p. 405-418 14 p. (International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS; vol. Part F127193).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    65 Scopus citations
  • Scheduling in D2D underlaid cellular networks with deadline constraints

    Li, Y., Cenk Gursoy, M. & Velipasalar, S., Jul 2 2016, 2016 IEEE 84th Vehicular Technology Conference, VTC Fall 2016 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 7881211. (IEEE Vehicular Technology Conference; vol. 0).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Schelkunoff integrals for vertical dipoles

    Dyab, W. M., Sarkar, T. K. & Salazar-Palma, M., Dec 1 2013, 2013 IEEE Antennas and Propagation Society International Symposium, APSURSI 2013 - Proceedings. p. 726-727 2 p. 6711022. (IEEE Antennas and Propagation Society, AP-S International Symposium (Digest)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • SCUTA: A server-side access control system for web applications

    Tan, X., Du, W., Luo, T. & Soundararaj, K. D., Jul 25 2012, SACMAT'12 - Proceedings of the 17th ACM Symposium on Access Control Models and Technologies. p. 71-82 12 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Seamless Deductive Inference via Macros

    Sahebolamri, A., Gilray, T. & Micinski, K., Sep 19 2022, CC 2022 - Proceedings of the 31st ACM SIGPLAN International Conference on Compiler Construction. Egger, B. & Smith, A. (eds.). Association for Computing Machinery, Inc, p. 77-88 12 p. (CC 2022 - Proceedings of the 31st ACM SIGPLAN International Conference on Compiler Construction).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Searching for better randomized response schemes for privacy-preserving data mining

    Huang, Z., Du, W. & Teng, Z., 2007, Knowledge Discovery in Database: PKDD 2007 - 11th European Conference on Principles and Practice of Knowledge Discovery in Databases, Proceedings. Springer Verlag, p. 487-497 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4702 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    2 Scopus citations
  • Second-order plasma enabled tunable low-profile frequency selective surface based on coupling inter-layer

    Payne, K., Peters, E. F., Brunett, J., Wedding, D. K., Wedding, C. A. & Choi, J. H., 2016, European Microwave Week 2016: "Microwaves Everywhere", EuMW 2016 - Conference Proceedings; 46th European Microwave Conference, EuMC 2016. Institute of Electrical and Electronics Engineers Inc., p. 309-312 4 p. 7824340. (European Microwave Week 2016: "Microwaves Everywhere", EuMW 2016 - Conference Proceedings; 46th European Microwave Conference, EuMC 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • Secrecy capacity of semi-deterministic wire-tap channels

    Grubb, J., Vishwanath, S., Liang, Y. & Poor, H. V., Dec 1 2007, Proceedings of the 2007 IEEE Information Theory Workshop on Information Theory for Wireless Networks, ITW. p. 199-202 4 p. 4318063. (Proceedings of the 2007 IEEE Information Theory Workshop on Information Theory for Wireless Networks, ITW).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Scopus citations
  • Secrecy capacity region of binary and Gaussian multiple access channels

    Liang, Y. & Vincent Poor, H., 2006, 44th Annual Allerton Conference on Communication, Control, and Computing 2006. University of Illinois at Urbana-Champaign, Coordinated Science Laboratory and Department of Computer and Electrical Engineering, p. 1098-1106 9 p. (44th Annual Allerton Conference on Communication, Control, and Computing 2006; vol. 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Secrecy capacity region of fading broadcast channels

    Liang, Y., Poor, H. V. & Shamai, S., 2007, Proceedings - 2007 IEEE International Symposium on Information Theory, ISIT 2007. p. 1291-1295 5 p. 4557401. (IEEE International Symposium on Information Theory - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    28 Scopus citations
  • Secrecy capacity region of parallel broadcast channels

    Liang, Y., Poor, H. V. & Shamai, S., 2007, 2007 Information Theory and Applications Workshop, Conference Proceedings, ITA. p. 245-250 6 p. 4357587. (2007 Information Theory and Applications Workshop, Conference Proceedings, ITA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • Secrecy throughput of MANETs with malicious nodes

    Liang, Y., Poor, H. V. & Ying, L., Nov 19 2009, 2009 IEEE International Symposium on Information Theory, ISIT 2009. p. 1189-1193 5 p. 5205992. (IEEE International Symposium on Information Theory - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    36 Scopus citations
  • Secret key capacity: Talk or keep silent?

    Zhang, H., Liang, Y. & Lai, L., Sep 28 2015, Proceedings - 2015 IEEE International Symposium on Information Theory, ISIT 2015. Institute of Electrical and Electronics Engineers Inc., p. 291-295 5 p. 7282463. (IEEE International Symposium on Information Theory - Proceedings; vol. 2015-June).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • Secret key-private key generation over three terminals: Capacity region

    Zhang, H., Lai, L., Liang, Y. & Wang, H., 2014, 2014 IEEE International Symposium on Information Theory, ISIT 2014. Institute of Electrical and Electronics Engineers Inc., p. 1141-1145 5 p. 6875011. (IEEE International Symposium on Information Theory - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Secret sharing via noisy broadcast channels

    Lai, L., Liang, Y., Du, W. & Shamai, S., 2011, 2011 IEEE International Symposium on Information Theory Proceedings, ISIT 2011. p. 1955-1959 5 p. 6033894. (IEEE International Symposium on Information Theory - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Secure and efficient multi-party directory publication for privacy-preserving data sharing

    Areekijseree, K., Tang, Y., Chen, J., Wang, S., Iyengar, A. & Palanisamy, B., 2018, Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Proceedings. Li, Y., Chang, B., Zhu, S. & Beyah, R. (eds.). Springer Verlag, p. 71-94 24 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 254).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Secure and Private Sequence Comparisons

    Atallah, M. J., Kerschbaum, F. & Du, W., 2003, Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, WPES 2003. Samarati, P. & Syverson, P. (eds.). Association for Computing Machinery, p. 39-44 6 p. (Proceedings of the ACM Workshop on Privacy in the Electronic Society).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    139 Scopus citations
  • Secure coding over networks

    Xu, J. & Chen, B., Nov 19 2009, 2009 IEEE International Symposium on Information Theory, ISIT 2009. p. 2116-2120 5 p. 5205251. (IEEE International Symposium on Information Theory - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Secure communication over fading channels

    Liang, Y. & Poor, H. V., 2006, 44th Annual Allerton Conference on Communication, Control, and Computing 2006. University of Illinois at Urbana-Champaign, Coordinated Science Laboratory and Department of Computer and Electrical Engineering, p. 817-823 7 p. (44th Annual Allerton Conference on Communication, Control, and Computing 2006; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    43 Scopus citations
  • Secure consistency verification for untrusted cloud storage by public blockchains

    Li, K., Tang, Y., Kim, B. H. B. & Xu, J., 2019, Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Proceedings. Chen, S., Choo, K-K. R., Fu, X., Lou, W. & Mohaisen, A. (eds.). Springer, p. 39-62 24 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 304 LNICST).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Secure distributed detection in the presence of eavesdroppers

    Nadendla, V. S. S., Chen, H. & Varshney, P. K., Dec 1 2010, Conference Record of the 44th Asilomar Conference on Signals, Systems and Computers, Asilomar 2010. p. 1437-1441 5 p. 5757773. (Conference Record - Asilomar Conference on Signals, Systems and Computers).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Scopus citations
  • Secure nested codes for type II wiretap channels

    Liu, R., Liang, Y., Poor, H. V. & Spasojević, P., 2007, 2007 IEEE Information Theory Workshop, ITW 2007, Proceedings. p. 337-342 6 p. 4313097. (2007 IEEE Information Theory Workshop, ITW 2007, Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    80 Scopus citations
  • Securing BGP through keychain-based signatures

    Heng, Y., Bo, S., Haining, W. & Jianping, P., 2007, 2007 Fifteenth IEEE International Workshop on Quality of Service, IWQoS 2007. p. 154-163 10 p. 4262466. (IEEE International Workshop on Quality of Service, IWQoS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Securing Mobile Systems GPS and Camera Functions Using TrustZone Framework

    Salman, A. S. & Du, W., 2021, Intelligent Computing - Proceedings of the 2021 Computing Conference. Arai, K. (ed.). Springer Science and Business Media Deutschland GmbH, p. 868-884 17 p. (Lecture Notes in Networks and Systems; vol. 285).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Security analysis and enhancement of model compressed deep learning systems under adversarial attacks

    Liu, Q., Liu, T., Liu, Z., Wang, Y., Jin, Y. & Wen, W., Feb 20 2018, ASP-DAC 2018 - 23rd Asia and South Pacific Design Automation Conference, Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 721-726 6 p. (Proceedings of the Asia and South Pacific Design Automation Conference, ASP-DAC; vol. 2018-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    24 Scopus citations
  • Security-Aware Virtual Machine Allocation in the Cloud: A Game Theoretic Approach

    Kwiat, L., Kamhoua, C. A., Kwiat, K. A., Tang, J. & Martin, A., Aug 19 2015, Proceedings - 2015 IEEE 8th International Conference on Cloud Computing, CLOUD 2015. Pu, C. & Mohindra, A. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 556-563 8 p. 7214090. (Proceedings - 2015 IEEE 8th International Conference on Cloud Computing, CLOUD 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    25 Scopus citations
  • SEED: A suite of instructional laboratories for computer SEcurity EDucation

    Du, W., Teng, Z. & Wang, R., 2007, SIGCSE 2007: 38th SIGCSE Technical Symposium on Computer Science Education. p. 486-490 5 p. (SIGCSE 2007: 38th SIGCSE Technical Symposium on Computer Science Education).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • Selection, majorization and replicators

    Menon, A., Mehrotra, K. G., Mohan, C. K. & Ranka, S., 1996, Proceedings of the IEEE Conference on Evolutionary Computation. IEEE Computer Society, p. 606-610 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Selection of conventional generation resources for optimal replacement by wind power generations

    Philippe, W. P. J., Iannone, E., Eftekharnejad, S. & Ghosh, P. K., Feb 2020, 2020 IEEE Texas Power and Energy Conference, TPEC 2020. Institute of Electrical and Electronics Engineers Inc., 9042520. (2020 IEEE Texas Power and Energy Conference, TPEC 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Selective crossover: Towards fitter offspring

    Mohan, C. K., Feb 27 1998, Proceedings of the 1998 ACM Symposium on Applied Computing, SAC 1998. Association for Computing Machinery, p. 374-378 5 p. (Proceedings of the ACM Symposium on Applied Computing; vol. 02-February-1998).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Selective parts-based tracking through occlusions

    Cornacchia, M. & Velipasalar, S., Mar 7 2018, 2017 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2017 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 171-175 5 p. (2017 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2017 - Proceedings; vol. 2018-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Self-structured confabulation network for fast anomaly detection and reasoning

    Chen, Q., Wu, Q., Bishop, M., Linderman, R. & Qiu, Q., Sep 28 2015, 2015 International Joint Conference on Neural Networks, IJCNN 2015. Institute of Electrical and Electronics Engineers Inc., 7280371. (Proceedings of the International Joint Conference on Neural Networks; vol. 2015-September).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Seluge: Secure and DoS-resistant code dissemination in wireless sensor networks

    Hyun, S., Ning, P., Liu, A. & Du, W., 2008, Proceedings - 2008 International Conference on Information Processing in Sensor Networks, IPSN 2008. p. 445-456 12 p. 4505494. (Proceedings - 2008 International Conference on Information Processing in Sensor Networks, IPSN 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    87 Scopus citations
  • Semantics-aware Android malware classification using weighted contextual API dependency graphs

    Zhang, M., Duan, Y., Yin, H. & Zhao, Z., Nov 3 2014, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, p. 1105-1116 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    327 Scopus citations
  • Semantics-preserving dissection of Javascript exploits via dynamic JS-binary analysis

    Hu, X., Prakash, A., Wang, J., Zhou, R., Cheng, Y. & Yin, H., 2016, Research in Attacks, Intrusions, and Defenses - 19th International Symposium, RAID 2016, Proceedings. Dacier, M., Monrose, F., Blanc, G. & Garcia-Alfaro, J. (eds.). Springer Verlag, p. 254-276 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9854 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Semantics versus syntax versus computations machine models for type-2 polynomial-time bounded functionals

    Royer, J. S., 1995, Proceedings of the IEEE Annual Structure in Complexity Theory Conference. Anon (ed.). IEEE Computer Society, p. 37-48 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations