2024
Bridging the Gap between Detection Algorithms and Real-World Challenges, Fatih Altay
Generating and Detecting Adversarial Examples for Increased Security and Privacy, Weiheng Chai
Electric Power Transmission System Performance Monitoring via Traveling Waves, Lawrence George Durante
Broadband and Multiband Designs for Antenna Feeds and Arrays, Jeremy Michael Furgal
Robust Fault Location in Power Systems Transmission Lines Based on Traveling Waves Using Multiple Wavelet Types in an Ensemble Model, Mirjavad Hashemi Gavgani
Unmanned Aerial Systems (UAS) Traffic Density Prediction and Multi-Agent Task Allocation, Chen Luo
Novel Renewable Energy Forecasting Methods and their Application on Power Systems, Cheng Lyu
Prompt Learning for Video Understanding, Chenbin Pan
On Energy-efficient Wireless Sensor Networks in the Presence of Byzantines, chen quan
A TrustZone-based Framework to Secure Mobile Financial Transactions and Provide End-to-End Protection for QR-code Payments and Credit Card Information, Ammar Salman Salman
Path Planning and Cyber-Physical System Integration in Unmanned Aerial Vehicles for Wireless Communication, MOHAMAD HANI SULIEMAN
On Multi-sensor Adaptive Birth Theory for Labeled Random Finite Sets Tracking, Anthony Trezza
Enhancing Security and Robustness of Contextual Human-Centric Sensing, Jingyu Xin
Optimization and Learning Based Energy Efficient Designs in Edge Computing, Yang Yang
2023
ON ROBUST MACHINE LEARNING IN THE PRESENCE OF ADVERSARIES, Saikiran Bulusu
Improving Logic Programming for Program Analysis, Arash Sahebolamri
A Novel Method for Tuning a Transistor-Based non-Foster Matching Circuit for Electrically Small Wideband Antennas, Dojana Salama
THE INTERPLAY BETWEEN PRIVACY AND FAIRNESS IN LEARNING AND DECISION MAKING PROBLEMS, Cuong Tran
FINE-GRAINED ACCESS CONTROL ON ANDROID COMPONENT, Yifei Wang
Visual-Semantic Learning, Chengxiang Yin
Real-time Adaptive Detection and Recovery against Sensor Attacks in Cyber-physical Systems, Lin Zhang
2022
Adversarial Activity Detection and Prediction Using Behavioral Biometrics, Amin Fallahi
Analysis of Wireless Networks With Massive Connectivity, Mangqing Guo
Protection against Contagion in Complex Networks, Pegah Hozhabrierdi
Interpretable Network Representations, Shengmin Jin
Understanding and Hardening Blockchain Network Security Against Denial of Service Attacks, Kai Li
Enhancing Grid Reliability With Phasor Measurement Units, Rui Ma
Fairness in Social Networks, Zeinab Saghati Jalali
Mutual Coupling Reduction Techniques for Multi-band Base Station Antennas, Evan Christopher Wayton
Learning-based Decision Making in Wireless Communications, Chen Zhong
ALGORITHMIC SOLUTIONS TO COMBAT ONLINE FAKE NEWS, Xinyi Zhou
2021
Real-time Adaptive Sensor Attack Detection and Recovery in Autonomous Cyber-physical Systems, Francis Akowuah
Impact Assessment, Detection, and Mitigation of False Data Attacks in Electrical Power Systems, Sagnik Basumallik
Impact Assessment, Detection, And Mitigation Of False Data Attacks In Electrical Power Systems, Sagnik Basumallik
Data-driven Protection of Transformers, Phase Angle Regulators, and Transmission Lines in Interconnected Power Systems, Pallav Kumar Bera
Algorithm Hardware Codesign for High Performance Neuromorphic Computing, Haowen Fang
Augmented Human Machine Intelligence for Distributed Inference, Baocheng Geng
One-bit Compressed Sensing in the Presence of Noise, Swatantra Kafle
Computer Vision Applications for Autonomous Aerial Vehicles, Burak Kakillioglu
Treadmill Assisted Circumvention of Wearable Sensors-based Gait Authentication, Rajesh Kumar
Neuromorphic Systems For Pattern Recognition And Uav Trajectory Planning, Yilan Li
Neuromorphic Systems for Pattern Recognition and Uav Trajectory Planning, Yilan Li
Inferring Degree Of Localization Of Twitter Persons And Topics Through Time, Language, And Location Features, Aleksey Valeriy Panasyuk
Inferring Degree of Localization of Twitter Persons and Topics Through Time, Language, and Location Features, Aleksey Valeriy Panasyuk
Some New Results in Distributed Tracking and Optimization, Pranay Sharma
Inference And Learning In Spiking Neural Networks For Neuromorphic Systems, Amar Shrestha
Inference and Learning in Spiking Neural Networks for Neuromorphic Systems, Amar Shrestha
Multi-label/multi-class Deep Learning Classification Of Spatiotemporal Data, Natalie Sommer
Multi-Label/Multi-Class Deep Learning Classification of Spatiotemporal Data, Natalie Sommer
Performance Analysis and Learning Algorithms in Advanced Wireless Networks, Xueyuan Wang
Experience-driven Control For Networking And Computing, Zhiyuan Xu
Experience-driven Control for Networking and Computing, Zhiyuan Xu
Mathematical Optimization Algorithms for Model Compression and Adversarial Learning in Deep Neural Networks, Tianyun Zhang
Person Re-identification And An Adversarial Attack And Defense For Person Re-identification Networks, Yu Zheng
Person Re-identification and an Adversarial Attack and Defense for Person Re-identification Networks, Yu Zheng
2020
SECURING USER INTERACTION CHANNELS ON MOBILE PLATFORM USING ARM TRUSTZONE, Amit Ahlawat
Uncertainty Modeling of Wind Power Generation for Power System Planning and Stability Study, Wolf Peter Jean Philippe
Reinforcement Learning for Mobile Robot Collision Avoidance in Navigation Tasks, Zilong Jiao
USER AUTHENTICATION ACROSS DEVICES, MODALITIES AND REPRESENTATION: BEHAVIORAL BIOMETRIC METHODS, Amith Kamath Kamath Belman
Amplifier Architectures for Wireless Communication Systems, Mehmet Kok
The Resilience of k-Cores in Graphs, Ricky Laishram
Multi-function RF for Situational Awareness, Yang Liu
GPU Resource Optimization and Scheduling for Shared Execution Environments, Ryan Seamus Luley
HUMAN ACTIVITY RECOGNITION FROM EGOCENTRIC VIDEOS AND ROBUSTNESS ANALYSIS OF DEEP NEURAL NETWORKS, Yantao Lu
Learning Semantic Information from Multimodal Data using Deep Neural Networks, Krittaphat Pugdeethosapol
On Sequence Clustering and Supervised Dimensionality Reduction, Tiexing Wang
Large-Scale Unmanned Aerial Systems Traffic Density Prediction and Management, Ziyi Zhao
2019
Network Sampling through Crawling, Katchaguy Areekijseree
Composite Right-Left Handed Stripline Structures for Antenna Array Feed Networks, Michael Douglas Enders
SEQUENTIAL METHODS FOR NON-PARAMETRIC HYPOTHESIS TESTING, Prashant Khanduri
SAMPLING AND CHARACTERIZING EVOLVING COMMUNITIES IN SOCIAL NETWORKS, Humphrey Appiah Mensah
Efficient Detection of Mutated Clones Using Augmented Scope Trees, Mubarek Mohammed
Inferences from Interactions with Smart Devices: Security Leaks and Defenses, Diksha Shukla
A Web-Based Collaborative Multimedia Presentation Document System, Chunxu Tang
Performance Analysis for 5G cellular networks: Millimeter Wave and UAV Assisted Communications, Esma Turgut
Locating People of Interest in Social Networks, Pivithuru Wijegunawardana
Integrating TrustZone Protection with Communication Paths for Mobile Operating System, Kailiang Ying
Copula-based Multimodal Data Fusion for Inference with Dependent Observations, Shan Zhang
2018
Machine Learning Methods for functional Near Infrared Spectroscopy, Danushka Sandaruwan Bandara
STATIC ENFORCEMENT OF TERMINATION-SENSITIVE NONINTERFERENCE USING THE C++ TEMPLATE TYPE SYSTEM, Scott Douglas Constable
ON FUSION-BASED APPROACHES FOR DETECTING, CLASSIFYING AND TRACKING OBJECTS FROM IMAGE AND VIDEO DATA, Maria Cornacchia
Breaking Symmetry: A Study of Novel Phenomena in Asymmetric Nanoplasmonic Systems, Matthew Scott Davis
On Classification in Human-driven and Data-driven Systems, Qunwei Li
Efficient Online Scheduling in Distributed Stream Data Processing Systems, Teng Li
Efficient machine learning: models and accelerations, Zhe Li
MODELING AND RESOURCE ALLOCATION IN MOBILE WIRELESS NETWORKS, Jing Wang
multimedia transmission over wireless networks: performance analysis and optimal resource allocation, Chuang Ye
Multi-type Fair Resource Allocation for Distributed Multi-Robot Systems, Qinyun Zhu
2017
Facilitating High Performance Code Parallelization, Maria Abi Saad
Efficient Implementation of Stochastic Inference on Heterogeneous Clusters and Spiking Neural Networks, Khadeer Ahmed
Software Performance Estimation Using Feedback-Directed Analysis, Elie ElAaraj
THE SCALABLE AND ACCOUNTABLE BINARY CODE SEARCH AND ITS APPLICATIONS, Qian Feng
DETECTION, DIAGNOSIS AND MITIGATION OF MALICIOUS JAVASCRIPT WITH ENRICHED JAVASCRIPT EXECUTIONS, Xunchao Hu
Delay QoS Provisioning and Optimal Resource Allocation for Wireless Networks, Yi Li
Computer Vision Algorithms for Mobile Camera Applications, KORAY OZCAN
Wireless Throughput and Energy Efficiency under QoS Constraints, Mustafa Ozmen
ONLINE LEARNING WITH BANDITS FOR COVERAGE, Mahmuda Rahman