Department of Electrical Engineering & Computer Science

Search results

  • Conference contribution

    Second-order plasma enabled tunable low-profile frequency selective surface based on coupling inter-layer

    Payne, K., Peters, E. F., Brunett, J., Wedding, D. K., Wedding, C. A. & Choi, J. H., 2016, European Microwave Week 2016: "Microwaves Everywhere", EuMW 2016 - Conference Proceedings; 46th European Microwave Conference, EuMC 2016. Institute of Electrical and Electronics Engineers Inc., p. 309-312 4 p. 7824340. (European Microwave Week 2016: "Microwaves Everywhere", EuMW 2016 - Conference Proceedings; 46th European Microwave Conference, EuMC 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • Secrecy capacity of semi-deterministic wire-tap channels

    Grubb, J., Vishwanath, S., Liang, Y. & Poor, H. V., Dec 1 2007, Proceedings of the 2007 IEEE Information Theory Workshop on Information Theory for Wireless Networks, ITW. p. 199-202 4 p. 4318063. (Proceedings of the 2007 IEEE Information Theory Workshop on Information Theory for Wireless Networks, ITW).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Scopus citations
  • Secrecy capacity region of binary and Gaussian multiple access channels

    Liang, Y. & Vincent Poor, H., 2006, 44th Annual Allerton Conference on Communication, Control, and Computing 2006. University of Illinois at Urbana-Champaign, Coordinated Science Laboratory and Department of Computer and Electrical Engineering, p. 1098-1106 9 p. (44th Annual Allerton Conference on Communication, Control, and Computing 2006; vol. 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Secrecy capacity region of fading broadcast channels

    Liang, Y., Poor, H. V. & Shamai, S., 2007, Proceedings - 2007 IEEE International Symposium on Information Theory, ISIT 2007. p. 1291-1295 5 p. 4557401. (IEEE International Symposium on Information Theory - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    29 Scopus citations
  • Secrecy capacity region of parallel broadcast channels

    Liang, Y., Poor, H. V. & Shamai, S., 2007, 2007 Information Theory and Applications Workshop, Conference Proceedings, ITA. p. 245-250 6 p. 4357587. (2007 Information Theory and Applications Workshop, Conference Proceedings, ITA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • Secrecy throughput of MANETs with malicious nodes

    Liang, Y., Poor, H. V. & Ying, L., Nov 19 2009, 2009 IEEE International Symposium on Information Theory, ISIT 2009. p. 1189-1193 5 p. 5205992. (IEEE International Symposium on Information Theory - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    36 Scopus citations
  • Secret key capacity: Talk or keep silent?

    Zhang, H., Liang, Y. & Lai, L., Sep 28 2015, Proceedings - 2015 IEEE International Symposium on Information Theory, ISIT 2015. Institute of Electrical and Electronics Engineers Inc., p. 291-295 5 p. 7282463. (IEEE International Symposium on Information Theory - Proceedings; vol. 2015-June).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • Secret key-private key generation over three terminals: Capacity region

    Zhang, H., Lai, L., Liang, Y. & Wang, H., 2014, 2014 IEEE International Symposium on Information Theory, ISIT 2014. Institute of Electrical and Electronics Engineers Inc., p. 1141-1145 5 p. 6875011. (IEEE International Symposium on Information Theory - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Secret sharing via noisy broadcast channels

    Lai, L., Liang, Y., Du, W. & Shamai, S., 2011, 2011 IEEE International Symposium on Information Theory Proceedings, ISIT 2011. p. 1955-1959 5 p. 6033894. (IEEE International Symposium on Information Theory - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Secure and efficient multi-party directory publication for privacy-preserving data sharing

    Areekijseree, K., Tang, Y., Chen, J., Wang, S., Iyengar, A. & Palanisamy, B., 2018, Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Proceedings. Li, Y., Chang, B., Zhu, S. & Beyah, R. (eds.). Springer Verlag, p. 71-94 24 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 254).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Secure and Private Sequence Comparisons

    Atallah, M. J., Kerschbaum, F. & Du, W., 2003, Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, WPES 2003. Samarati, P. & Syverson, P. (eds.). Association for Computing Machinery, p. 39-44 6 p. (Proceedings of the ACM Workshop on Privacy in the Electronic Society).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    142 Scopus citations
  • Secure coding over networks

    Xu, J. & Chen, B., Nov 19 2009, 2009 IEEE International Symposium on Information Theory, ISIT 2009. p. 2116-2120 5 p. 5205251. (IEEE International Symposium on Information Theory - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Secure communication over fading channels

    Liang, Y. & Poor, H. V., 2006, 44th Annual Allerton Conference on Communication, Control, and Computing 2006. University of Illinois at Urbana-Champaign, Coordinated Science Laboratory and Department of Computer and Electrical Engineering, p. 817-823 7 p. (44th Annual Allerton Conference on Communication, Control, and Computing 2006; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    44 Scopus citations
  • Secure consistency verification for untrusted cloud storage by public blockchains

    Li, K., Tang, Y., Kim, B. H. B. & Xu, J., 2019, Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Proceedings. Chen, S., Choo, K-K. R., Fu, X., Lou, W. & Mohaisen, A. (eds.). Springer, p. 39-62 24 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 304 LNICST).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Secure distributed detection in the presence of eavesdroppers

    Nadendla, V. S. S., Chen, H. & Varshney, P. K., Dec 1 2010, Conference Record of the 44th Asilomar Conference on Signals, Systems and Computers, Asilomar 2010. p. 1437-1441 5 p. 5757773. (Conference Record - Asilomar Conference on Signals, Systems and Computers).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Scopus citations
  • Secure nested codes for type II wiretap channels

    Liu, R., Liang, Y., Poor, H. V. & Spasojević, P., 2007, 2007 IEEE Information Theory Workshop, ITW 2007, Proceedings. p. 337-342 6 p. 4313097. (2007 IEEE Information Theory Workshop, ITW 2007, Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    81 Scopus citations
  • Securing BGP through keychain-based signatures

    Heng, Y., Bo, S., Haining, W. & Jianping, P., 2007, 2007 Fifteenth IEEE International Workshop on Quality of Service, IWQoS 2007. p. 154-163 10 p. 4262466. (IEEE International Workshop on Quality of Service, IWQoS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Securing Mobile Systems GPS and Camera Functions Using TrustZone Framework

    Salman, A. S. & Du, W., 2021, Intelligent Computing - Proceedings of the 2021 Computing Conference. Arai, K. (ed.). Springer Science and Business Media Deutschland GmbH, p. 868-884 17 p. (Lecture Notes in Networks and Systems; vol. 285).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Security analysis and enhancement of model compressed deep learning systems under adversarial attacks

    Liu, Q., Liu, T., Liu, Z., Wang, Y., Jin, Y. & Wen, W., Feb 20 2018, ASP-DAC 2018 - 23rd Asia and South Pacific Design Automation Conference, Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 721-726 6 p. (Proceedings of the Asia and South Pacific Design Automation Conference, ASP-DAC; vol. 2018-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    29 Scopus citations
  • Security-Aware Virtual Machine Allocation in the Cloud: A Game Theoretic Approach

    Kwiat, L., Kamhoua, C. A., Kwiat, K. A., Tang, J. & Martin, A., Aug 19 2015, Proceedings - 2015 IEEE 8th International Conference on Cloud Computing, CLOUD 2015. Pu, C. & Mohindra, A. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 556-563 8 p. 7214090. (Proceedings - 2015 IEEE 8th International Conference on Cloud Computing, CLOUD 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    25 Scopus citations
  • SEED: A suite of instructional laboratories for computer SEcurity EDucation

    Du, W., Teng, Z. & Wang, R., 2007, SIGCSE 2007: 38th SIGCSE Technical Symposium on Computer Science Education. p. 486-490 5 p. (SIGCSE 2007: 38th SIGCSE Technical Symposium on Computer Science Education).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • Selection, majorization and replicators

    Menon, A., Mehrotra, K. G., Mohan, C. K. & Ranka, S., 1996, Proceedings of the IEEE Conference on Evolutionary Computation. IEEE Computer Society, p. 606-610 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Selection of conventional generation resources for optimal replacement by wind power generations

    Philippe, W. P. J., Iannone, E., Eftekharnejad, S. & Ghosh, P. K., Feb 2020, 2020 IEEE Texas Power and Energy Conference, TPEC 2020. Institute of Electrical and Electronics Engineers Inc., 9042520. (2020 IEEE Texas Power and Energy Conference, TPEC 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Selective crossover: Towards fitter offspring

    Mohan, C. K., Feb 27 1998, Proceedings of the 1998 ACM Symposium on Applied Computing, SAC 1998. Association for Computing Machinery, p. 374-378 5 p. (Proceedings of the ACM Symposium on Applied Computing; vol. 02-February-1998).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Selective parts-based tracking through occlusions

    Cornacchia, M. & Velipasalar, S., Mar 7 2018, 2017 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2017 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 171-175 5 p. (2017 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2017 - Proceedings; vol. 2018-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Self-structured confabulation network for fast anomaly detection and reasoning

    Chen, Q., Wu, Q., Bishop, M., Linderman, R. & Qiu, Q., Sep 28 2015, 2015 International Joint Conference on Neural Networks, IJCNN 2015. Institute of Electrical and Electronics Engineers Inc., 7280371. (Proceedings of the International Joint Conference on Neural Networks; vol. 2015-September).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Seluge: Secure and DoS-resistant code dissemination in wireless sensor networks

    Hyun, S., Ning, P., Liu, A. & Du, W., 2008, Proceedings - 2008 International Conference on Information Processing in Sensor Networks, IPSN 2008. p. 445-456 12 p. 4505494. (Proceedings - 2008 International Conference on Information Processing in Sensor Networks, IPSN 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    90 Scopus citations
  • Semantics-aware Android malware classification using weighted contextual API dependency graphs

    Zhang, M., Duan, Y., Yin, H. & Zhao, Z., Nov 3 2014, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, p. 1105-1116 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    359 Scopus citations
  • Semantics-preserving dissection of Javascript exploits via dynamic JS-binary analysis

    Hu, X., Prakash, A., Wang, J., Zhou, R., Cheng, Y. & Yin, H., 2016, Research in Attacks, Intrusions, and Defenses - 19th International Symposium, RAID 2016, Proceedings. Dacier, M., Monrose, F., Blanc, G. & Garcia-Alfaro, J. (eds.). Springer Verlag, p. 254-276 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9854 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Semantics versus syntax versus computations machine models for type-2 polynomial-time bounded functionals

    Royer, J. S., 1995, Proceedings of the IEEE Annual Structure in Complexity Theory Conference. Anon (ed.). IEEE Computer Society, p. 37-48 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Semi-analytical current source modeling of FinFET devices operating in near/sub-threshold regime with independent gate control and considering process variation

    Cui, T., Wang, Y., Lin, X., Nazarian, S. & Pedram, M., 2014, 2014 19th Asia and South Pacific Design Automation Conference, ASP-DAC 2014 - Proceedings. p. 167-172 6 p. 6742884. (Proceedings of the Asia and South Pacific Design Automation Conference, ASP-DAC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • Semi-analytical current source modeling of near-threshold operating logic cells considering process variations

    Xie, Q., Cui, T., Wang, Y., Nazarian, S. & Pedram, M., 2013, 2013 IEEE 31st International Conference on Computer Design, ICCD 2013. IEEE Computer Society, p. 447-450 4 p. 6657079. (2013 IEEE 31st International Conference on Computer Design, ICCD 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Sensing as a service: A cloud computing system for mobile phone sensing

    Sheng, X., Xiao, X., Tang, J. & Xue, G., 2012, IEEE SENSORS 2012 - Proceedings. 6411516. (Proceedings of IEEE Sensors).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    40 Scopus citations
  • SENSITIVITY AND PERFORMANCE ANALYSIS OF COHERENT SIGNAL-SUBSPACE PROCESSING FOR MULTIPLE WIDEBAND SOURCES.

    Wang, H. & Kaveh, M., 1985, ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings. IEEE Computer Society, p. 636-639 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Sensor fusion enhancement via optimized stochastic resonance at local sensors

    Liu, B., Iyengar, S., Chen, H., Michels, J. H. & Varshney, P. K., Dec 1 2007, FUSION 2007 - 2007 10th International Conference on Information Fusion. 4408142. (FUSION 2007 - 2007 10th International Conference on Information Fusion).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Sensor fusion for video surveillance

    Snidaro, L., Foresti, G. L., Niu, R. & Varshney, P. K., Nov 2 2004, Proceedings of the Seventh International Conference on Information Fusion, FUSION 2004. Svensson, P. & Schubert, J. (eds.). p. 739-746 8 p. (Proceedings of the Seventh International Conference on Information Fusion, FUSION 2004; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    40 Scopus citations
  • Sensor placement algorithms for target localization in sensor networks

    Rajagopalan, R., Niu, R., Mohan, C. K., Varshney, P. K. & Drozd, A. L., Dec 1 2008, 2008 IEEE Radar Conference, RADAR 2008. 4720926. (2008 IEEE Radar Conference, RADAR 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • Sensor placement for ballistic missile localization using evolutionary algorithms

    Rajagopalan, R., Niu, R., Mohan, C. K., Varshney, P. K. & Drozd, A. L., Dec 1 2007, 2007 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2007. p. 284-289 6 p. 4414029. (Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Sensor placement for field estimation via Poisson disk sampling

    Liu, S., Cao, N. & Varshney, P. K., Apr 19 2017, 2016 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2016 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 520-524 5 p. 7905896. (2016 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2016 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Sensor selection with correlated measurements for target tracking in wireless sensor networks

    Liu, S., Masazade, E., Fardad, M. & Varshney, P. K., Aug 4 2015, ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings. Institute of Electrical and Electronics Engineers Inc., Vol. 2015-August. p. 4030-4034 5 p. 7178728

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • Sentiment paradoxes in social networks: Why your friends are more positive than you?

    Zhou, X., Jin, S. & Zafarani, R., 2020, Proceedings of the 14th International AAAI Conference on Web and Social Media, ICWSM 2020. AAAI Press, p. 798-807 10 p. (Proceedings of the 14th International AAAI Conference on Web and Social Media, ICWSM 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Sentiment prediction in social networks

    Jin, S. & Zafarani, R., Feb 7 2019, Proceedings - 18th IEEE International Conference on Data Mining Workshops, ICDMW 2018. Yu, J., Li, Z., Tong, H. & Zhu, F. (eds.). IEEE Computer Society, p. 1340-1347 8 p. 8637419. (IEEE International Conference on Data Mining Workshops, ICDMW; vol. 2018-November).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Sequencer-based data path synthesis of regular iterative algorithms

    Aloqeely, M. & Chen, C. Y. R., 1994, Proceedings - Design Automation Conference. IEEE Computer Society, p. 155-160 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • Sequential and Parallel LASSO: Novel scalable methods for eQTL mapping

    He, A., Hall, B., Wen, J., Liang, Y. & Shi, X., 2016, Proceedings of the 8th International Conference on Bioinformatics and Computational Biology, BICOB 2016. Haspel, N. & Ioerger, T. (eds.). The International Society for Computers and Their Applications (ISCA), p. 143-148 6 p. (Proceedings of the 8th International Conference on Bioinformatics and Computational Biology, BICOB 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Sequential Bayesian estimation with censored data

    Zheng, Y., Niu, R. & Varshney, P. K., Nov 6 2012, 2012 IEEE Statistical Signal Processing Workshop, SSP 2012. p. 57-60 4 p. 6319764. (2012 IEEE Statistical Signal Processing Workshop, SSP 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • Sequential parallel LASSO models for eQTL analysis

    He, A., Hall, B., Wen, J., Liang, Y. & Shi, X., Sep 9 2015, BCB 2015 - 6th ACM Conference on Bioinformatics, Computational Biology, and Health Informatics. Association for Computing Machinery, Inc, p. 533-534 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Server-process restrictiveness in HOL

    Brackin, S. H. & Chin, S. K., 1994, Higher Order Logic Theorem Proving and Its Applications - 6th International Workshop, HUG 1993, Proceedings. Joyce, J. J. & Seger, C-J. H. (eds.). Springer Verlag, p. 450-463 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 780 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • SGCN: A Graph Sparsifier Based on Graph Convolutional Networks

    Li, J., Zhang, T., Tian, H., Jin, S., Fardad, M. & Zafarani, R., 2020, Advances in Knowledge Discovery and Data Mining - 24th Pacific-Asia Conference, PAKDD 2020, Proceedings. Lauw, H. W., Lim, E-P., Wong, R. C-W., Ntoulas, A., Ng, S-K. & Pan, S. J. (eds.). Springer, p. 275-287 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12084 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    5 Scopus citations
  • Shape optimization of patch resonator bandpass filters using multiple circular structures

    Yeung, S. H., Sarkar, T. K., Man, K. F., Salazar-Palma, M. & Garcia-Lamperez, A., Dec 23 2014, European Microwave Week 2014: "Connecting the Future", EuMW 2014 - Conference Proceedings; EuMIC 2014: 9th European Microwave Integrated Circuits Conference. Institute of Electrical and Electronics Engineers Inc., p. 604-607 4 p. 6997929. (European Microwave Week 2014: "Connecting the Future", EuMW 2014 - Conference Proceedings; EuMIC 2014: 9th European Microwave Integrated Circuits Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Shape optimization of patch resonator bandpass filters using multiple circular structures

    Yeung, S. H., Sarkar, T. K., Man, K. F., Salazar-Palma, M. & Garcia-Lamperez, A., Dec 15 2014, European Microwave Week 2014: Connecting the Future, EuMW 2014 - Conference Proceedings; EuMC 2014: 44th European Microwave Conference. Institute of Electrical and Electronics Engineers Inc., p. 1548-1551 4 p. 6986745. (European Microwave Week 2014: Connecting the Future, EuMW 2014 - Conference Proceedings; EuMC 2014: 44th European Microwave Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution