Follow

2024

PDF

Electric Power Transmission System Performance Monitoring via Traveling Waves, Lawrence George Durante

PDF

Broadband and Multiband Designs for Antenna Feeds and Arrays, Jeremy Michael Furgal

PDF

Unmanned Aerial Systems (UAS) Traffic Density Prediction and Multi-Agent Task Allocation, Chen Luo

PDF

On Energy-efficient Wireless Sensor Networks in the Presence of Byzantines, chen quan

PDF

Optimization and Learning Based Energy Efficient Designs in Edge Computing, Yang Yang

2023

File

ON ROBUST MACHINE LEARNING IN THE PRESENCE OF ADVERSARIES, Saikiran Bulusu

File

Improving Logic Programming for Program Analysis, Arash Sahebolamri

PDF

A Novel Method for Tuning a Transistor-Based non-Foster Matching Circuit for Electrically Small Wideband Antennas, Dojana Salama

File

THE INTERPLAY BETWEEN PRIVACY AND FAIRNESS IN LEARNING AND DECISION MAKING PROBLEMS, Cuong Tran

File

FINE-GRAINED ACCESS CONTROL ON ANDROID COMPONENT, Yifei Wang

PDF

Visual-Semantic Learning, Chengxiang Yin

PDF

Real-time Adaptive Detection and Recovery against Sensor Attacks in Cyber-physical Systems, Lin Zhang

2022

PDF

Adversarial Activity Detection and Prediction Using Behavioral Biometrics, Amin Fallahi

PDF

Analysis of Wireless Networks With Massive Connectivity, Mangqing Guo

PDF

Protection against Contagion in Complex Networks, Pegah Hozhabrierdi

PDF

Interpretable Network Representations, Shengmin Jin

PDF

Understanding and Hardening Blockchain Network Security Against Denial of Service Attacks, Kai Li

PDF

Enhancing Grid Reliability With Phasor Measurement Units, Rui Ma

PDF

Fairness in Social Networks, Zeinab Saghati Jalali

PDF

Mutual Coupling Reduction Techniques for Multi-band Base Station Antennas, Evan Christopher Wayton

PDF

Learning-based Decision Making in Wireless Communications, Chen Zhong

PDF

ALGORITHMIC SOLUTIONS TO COMBAT ONLINE FAKE NEWS, Xinyi Zhou

2021

PDF

Real-time Adaptive Sensor Attack Detection and Recovery in Autonomous Cyber-physical Systems, Francis Akowuah

PDF

Impact Assessment, Detection, And Mitigation Of False Data Attacks In Electrical Power Systems, Sagnik Basumallik

PDF

Impact Assessment, Detection, and Mitigation of False Data Attacks in Electrical Power Systems, Sagnik Basumallik

PDF

Data-driven Protection of Transformers, Phase Angle Regulators, and Transmission Lines in Interconnected Power Systems, Pallav Kumar Bera

PDF

Algorithm Hardware Codesign for High Performance Neuromorphic Computing, Haowen Fang

PDF

Augmented Human Machine Intelligence for Distributed Inference, Baocheng Geng

PDF

One-bit Compressed Sensing in the Presence of Noise, Swatantra Kafle

PDF

Computer Vision Applications for Autonomous Aerial Vehicles, Burak Kakillioglu

PDF

Treadmill Assisted Circumvention of Wearable Sensors-based Gait Authentication, Rajesh Kumar

PDF

Neuromorphic Systems for Pattern Recognition and Uav Trajectory Planning, Yilan Li

PDF

Neuromorphic Systems For Pattern Recognition And Uav Trajectory Planning, Yilan Li

PDF

Inferring Degree of Localization of Twitter Persons and Topics Through Time, Language, and Location Features, Aleksey Valeriy Panasyuk

PDF

Inferring Degree Of Localization Of Twitter Persons And Topics Through Time, Language, And Location Features, Aleksey Valeriy Panasyuk

PDF

Some New Results in Distributed Tracking and Optimization, Pranay Sharma

PDF

Inference and Learning in Spiking Neural Networks for Neuromorphic Systems, Amar Shrestha

PDF

Inference And Learning In Spiking Neural Networks For Neuromorphic Systems, Amar Shrestha

PDF

Multi-Label/Multi-Class Deep Learning Classification of Spatiotemporal Data, Natalie Sommer

PDF

Multi-label/multi-class Deep Learning Classification Of Spatiotemporal Data, Natalie Sommer

PDF

Performance Analysis and Learning Algorithms in Advanced Wireless Networks, Xueyuan Wang

PDF

Experience-driven Control For Networking And Computing, Zhiyuan Xu

PDF

Experience-driven Control for Networking and Computing, Zhiyuan Xu

PDF

Mathematical Optimization Algorithms for Model Compression and Adversarial Learning in Deep Neural Networks, Tianyun Zhang

PDF

Person Re-identification And An Adversarial Attack And Defense For Person Re-identification Networks, Yu Zheng

PDF

Person Re-identification and an Adversarial Attack and Defense for Person Re-identification Networks, Yu Zheng

2020

PDF

SECURING USER INTERACTION CHANNELS ON MOBILE PLATFORM USING ARM TRUSTZONE, Amit Ahlawat

PDF

Uncertainty Modeling of Wind Power Generation for Power System Planning and Stability Study, Wolf Peter Jean Philippe

PDF

Reinforcement Learning for Mobile Robot Collision Avoidance in Navigation Tasks, Zilong Jiao

PDF

USER AUTHENTICATION ACROSS DEVICES, MODALITIES AND REPRESENTATION: BEHAVIORAL BIOMETRIC METHODS, Amith Kamath Kamath Belman

PDF

Amplifier Architectures for Wireless Communication Systems, Mehmet Kok

PDF

The Resilience of k-Cores in Graphs, Ricky Laishram

PDF

Multi-function RF for Situational Awareness, Yang Liu

PDF

GPU Resource Optimization and Scheduling for Shared Execution Environments, Ryan Seamus Luley

PDF

HUMAN ACTIVITY RECOGNITION FROM EGOCENTRIC VIDEOS AND ROBUSTNESS ANALYSIS OF DEEP NEURAL NETWORKS, Yantao Lu

PDF

Synthesis Technique of Thickness-Customizable Multilayered Frequency Selective Surface for Plasma-Based Electromagnetic Structures, Komlan Payne

PDF

Learning Semantic Information from Multimodal Data using Deep Neural Networks, Krittaphat Pugdeethosapol

PDF

On Sequence Clustering and Supervised Dimensionality Reduction, Tiexing Wang

PDF

Large-Scale Unmanned Aerial Systems Traffic Density Prediction and Management, Ziyi Zhao

2019

PDF

Network Sampling through Crawling, Katchaguy Areekijseree

PDF

Use of Computational Electromagnetics to Enhance the Accuracy and Efficiency of Antenna Pattern Measurements, Heng Chen

PDF

Composite Right-Left Handed Stripline Structures for Antenna Array Feed Networks, Michael Douglas Enders

PDF

SEQUENTIAL METHODS FOR NON-PARAMETRIC HYPOTHESIS TESTING, Prashant Khanduri

PDF

SAMPLING AND CHARACTERIZING EVOLVING COMMUNITIES IN SOCIAL NETWORKS, Humphrey Appiah Mensah

Efficient Detection of Mutated Clones Using Augmented Scope Trees, Mubarek Mohammed

PDF

Inferences from Interactions with Smart Devices: Security Leaks and Defenses, Diksha Shukla

PDF

A Web-Based Collaborative Multimedia Presentation Document System, Chunxu Tang

PDF

Performance Analysis for 5G cellular networks: Millimeter Wave and UAV Assisted Communications, Esma Turgut

PDF

Locating People of Interest in Social Networks, Pivithuru Wijegunawardana

PDF

Integrating TrustZone Protection with Communication Paths for Mobile Operating System, Kailiang Ying

PDF

Copula-based Multimodal Data Fusion for Inference with Dependent Observations, Shan Zhang

2018

PDF

Machine Learning Methods for functional Near Infrared Spectroscopy, Danushka Sandaruwan Bandara

PDF

STATIC ENFORCEMENT OF TERMINATION-SENSITIVE NONINTERFERENCE USING THE C++ TEMPLATE TYPE SYSTEM, Scott Douglas Constable

ON FUSION-BASED APPROACHES FOR DETECTING, CLASSIFYING AND TRACKING OBJECTS FROM IMAGE AND VIDEO DATA, Maria Cornacchia

PDF

Breaking Symmetry: A Study of Novel Phenomena in Asymmetric Nanoplasmonic Systems, Matthew Scott Davis

PDF

On Classification in Human-driven and Data-driven Systems, Qunwei Li

PDF

Efficient Online Scheduling in Distributed Stream Data Processing Systems, Teng Li

PDF

Efficient machine learning: models and accelerations, Zhe Li

PDF

MODELING AND RESOURCE ALLOCATION IN MOBILE WIRELESS NETWORKS, Jing Wang

PDF

multimedia transmission over wireless networks: performance analysis and optimal resource allocation, Chuang Ye

PDF

Multi-type Fair Resource Allocation for Distributed Multi-Robot Systems, Qinyun Zhu

2017

PDF

Facilitating High Performance Code Parallelization, Maria Abi Saad

PDF

Efficient Implementation of Stochastic Inference on Heterogeneous Clusters and Spiking Neural Networks, Khadeer Ahmed

Software Performance Estimation Using Feedback-Directed Analysis, Elie ElAaraj

PDF

THE SCALABLE AND ACCOUNTABLE BINARY CODE SEARCH AND ITS APPLICATIONS, Qian Feng

PDF

DETECTION, DIAGNOSIS AND MITIGATION OF MALICIOUS JAVASCRIPT WITH ENRICHED JAVASCRIPT EXECUTIONS, Xunchao Hu

PDF

Delay QoS Provisioning and Optimal Resource Allocation for Wireless Networks, Yi Li

PDF

Computer Vision Algorithms for Mobile Camera Applications, KORAY OZCAN

PDF

Wireless Throughput and Energy Efficiency under QoS Constraints, Mustafa Ozmen

PDF

ONLINE LEARNING WITH BANDITS FOR COVERAGE, Mahmuda Rahman

PDF

Rectangular Waveguide Filled with Uniaxial Medium and Negative Resistance Enhanced Composite Right/Left-Handed Transmission Line, Kepei Sun

PDF

Information Theoretic Limits of State-dependent Networks, Yunhao Sun

PDF

Associative Pattern Recognition for Biological Regulation Data, Yiou Xiao

PDF

Risk-aware navigation for UAV digital data collection, Zhi Xing

Enhancing survivability and reliability in the cloud, Jielong Xu

PDF

Wireless Information and Power Transfer in Communication Networks: Performance Analysis and Optimal Resource Allocation, Tewodros Aklilu Zewde

PDF

Algorithms and Theory for Robust PCA and Phase Retrieval, Huishuai Zhang

PDF

Ensemble Methods for Anomaly Detection, Zhiruo Zhao

PDF

Quantized Consensus by the Alternating Direction Method of Multipliers: Algorithms and Applications, Shengyu Zhu

2016

PDF

SYSTEMATIC DISCOVERY OF ANDROID CUSTOMIZATION HAZARDS, Yousra Aafer