2021
Impact Assessment, Detection, And Mitigation Of False Data Attacks In Electrical Power Systems, Sagnik Basumallik
Neuromorphic Systems For Pattern Recognition And Uav Trajectory Planning, Yilan Li
Inferring Degree Of Localization Of Twitter Persons And Topics Through Time, Language, And Location Features, Aleksey Valeriy Panasyuk
Inference And Learning In Spiking Neural Networks For Neuromorphic Systems, Amar Shrestha
Multi-label/multi-class Deep Learning Classification Of Spatiotemporal Data, Natalie Sommer
Experience-driven Control For Networking And Computing, Zhiyuan Xu
Person Re-identification And An Adversarial Attack And Defense For Person Re-identification Networks, Yu Zheng
2020
SECURING USER INTERACTION CHANNELS ON MOBILE PLATFORM USING ARM TRUSTZONE, Amit Ahlawat
Uncertainty Modeling of Wind Power Generation for Power System Planning and Stability Study, Wolf Peter Jean Philippe
Reinforcement Learning for Mobile Robot Collision Avoidance in Navigation Tasks, Zilong Jiao
USER AUTHENTICATION ACROSS DEVICES, MODALITIES AND REPRESENTATION: BEHAVIORAL BIOMETRIC METHODS, Amith Kamath Kamath Belman
Amplifier Architectures for Wireless Communication Systems, Mehmet Kok
The Resilience of k-Cores in Graphs, Ricky Laishram
Multi-function RF for Situational Awareness, Yang Liu
GPU Resource Optimization and Scheduling for Shared Execution Environments, Ryan Seamus Luley
HUMAN ACTIVITY RECOGNITION FROM EGOCENTRIC VIDEOS AND ROBUSTNESS ANALYSIS OF DEEP NEURAL NETWORKS, Yantao Lu
Learning Semantic Information from Multimodal Data using Deep Neural Networks, Krittaphat Pugdeethosapol
On Sequence Clustering and Supervised Dimensionality Reduction, Tiexing Wang
Large-Scale Unmanned Aerial Systems Traffic Density Prediction and Management, Ziyi Zhao
2019
Network Sampling through Crawling, Katchaguy Areekijseree
Composite Right-Left Handed Stripline Structures for Antenna Array Feed Networks, Michael Douglas Enders
SEQUENTIAL METHODS FOR NON-PARAMETRIC HYPOTHESIS TESTING, Prashant Khanduri
SAMPLING AND CHARACTERIZING EVOLVING COMMUNITIES IN SOCIAL NETWORKS, Humphrey Appiah Mensah
Efficient Detection of Mutated Clones Using Augmented Scope Trees, Mubarek Mohammed
Inferences from Interactions with Smart Devices: Security Leaks and Defenses, Diksha Shukla
A Web-Based Collaborative Multimedia Presentation Document System, Chunxu Tang
Performance Analysis for 5G cellular networks: Millimeter Wave and UAV Assisted Communications, Esma Turgut
Locating People of Interest in Social Networks, Pivithuru Wijegunawardana
Integrating TrustZone Protection with Communication Paths for Mobile Operating System, Kailiang Ying
Copula-based Multimodal Data Fusion for Inference with Dependent Observations, Shan Zhang
2018
Machine Learning Methods for functional Near Infrared Spectroscopy, Danushka Sandaruwan Bandara
STATIC ENFORCEMENT OF TERMINATION-SENSITIVE NONINTERFERENCE USING THE C++ TEMPLATE TYPE SYSTEM, Scott Douglas Constable
ON FUSION-BASED APPROACHES FOR DETECTING, CLASSIFYING AND TRACKING OBJECTS FROM IMAGE AND VIDEO DATA, Maria Cornacchia
Breaking Symmetry: A Study of Novel Phenomena in Asymmetric Nanoplasmonic Systems, Matthew Scott Davis
On Classification in Human-driven and Data-driven Systems, Qunwei Li
Efficient Online Scheduling in Distributed Stream Data Processing Systems, Teng Li
Efficient machine learning: models and accelerations, Zhe Li
MODELING AND RESOURCE ALLOCATION IN MOBILE WIRELESS NETWORKS, Jing Wang
multimedia transmission over wireless networks: performance analysis and optimal resource allocation, Chuang Ye
Multi-type Fair Resource Allocation for Distributed Multi-Robot Systems, Qinyun Zhu
2017
Facilitating High Performance Code Parallelization, Maria Abi Saad
Efficient Implementation of Stochastic Inference on Heterogeneous Clusters and Spiking Neural Networks, Khadeer Ahmed
Software Performance Estimation Using Feedback-Directed Analysis, Elie ElAaraj
THE SCALABLE AND ACCOUNTABLE BINARY CODE SEARCH AND ITS APPLICATIONS, Qian Feng
DETECTION, DIAGNOSIS AND MITIGATION OF MALICIOUS JAVASCRIPT WITH ENRICHED JAVASCRIPT EXECUTIONS, Xunchao Hu
Delay QoS Provisioning and Optimal Resource Allocation for Wireless Networks, Yi Li
Computer Vision Algorithms for Mobile Camera Applications, KORAY OZCAN
Wireless Throughput and Energy Efficiency under QoS Constraints, Mustafa Ozmen
ONLINE LEARNING WITH BANDITS FOR COVERAGE, Mahmuda Rahman
Information Theoretic Limits of State-dependent Networks, Yunhao Sun
Associative Pattern Recognition for Biological Regulation Data, Yiou Xiao
Risk-aware navigation for UAV digital data collection, Zhi Xing
Enhancing survivability and reliability in the cloud, Jielong Xu
Wireless Information and Power Transfer in Communication Networks: Performance Analysis and Optimal Resource Allocation, Tewodros Aklilu Zewde
Algorithms and Theory for Robust PCA and Phase Retrieval, Huishuai Zhang
Ensemble Methods for Anomaly Detection, Zhiruo Zhao
Quantized Consensus by the Alternating Direction Method of Multipliers: Algorithms and Applications, Shengyu Zhu
2016
SYSTEMATIC DISCOVERY OF ANDROID CUSTOMIZATION HAZARDS, Yousra Aafer
Optimal Inference for Distributed Detection, Earnest Akofor
Automated code extraction from packed android applications., Abhishek Vasisht Bhaskar
SENSOR MANAGEMENT FOR LOCALIZATION AND TRACKING IN WIRELESS SENSOR NETWORKS, Nianxia Cao
Neuromorphic Learning Systems for Supervised and Unsupervised Applications, Qiuwen Chen
Resource Allocation for Interference Management in Wireless Networks, Raghed El Bardan
Identification of key players in networks using multi-objective optimization and its applications, R Chulaka Gunasekara
Selective Dynamic Analysis of Virtualized Whole-System Guest Environments, Andrew William Henderson
Risk-Aware Planning for Sensor Data Collection, Jeffrey Hudack
Distributed Inference and Learning with Byzantine Data, Bhavya Kailkhura
Efficient search algorithms for social networking scheduling applications, Subodh Kalia
Resource Management for Distributed Estimation via Sparsity-Promoting Regularization, Sijia Liu
On the Design and Analysis of Secure Inference Networks, Venkata Sriram Siddhardh Nadendla
Cognitive Radio Systems: Performance Analysis and Optimal Resource Allocation, Gozde Ozcan
On Distributed and Acoustic Sensing for Situational Awareness, FANGRONG PENG
Understanding and Improving Security of the Android Operating System, Edward Paul Ratazzi
Assessing gender inequality from large scale online student reviews, Souradeep Sinha
An All-in-One Debugging Approach: Java Debugging, Execution Visualization and Verification, Beinan Wang
Data Driven Nonparametric Detection, Weiguang Wang
Intentio Ex Machina: Android Intent Access Control via an Extensible Application Hook, Carter Yagemann
ROBUST KULLBACK-LEIBLER DIVERGENCE AND ITS APPLICATIONS IN UNIVERSAL HYPOTHESIS TESTING AND DEVIATION DETECTION, Pengfei Yang
UNCOVERING AND MITIGATING UNSAFE PROGRAM INTEGRATIONS IN ANDROID, Xiao Zhang
Improving the Efficiency of Energy Harvesting Embedded System, Yukan Zhang
Contributions On Theory And Practice For Multi-Mission Wireless Systems, Yu Zhao
Nonparametric Anomaly Detection and Secure Communication, Shaofeng Zou
2015
On robust and secure wireless communication system design using software-defined radios, Kapil Meghashyam Borle
Surface Plasmon Polaritons: Guided-wave Devices and Applications, Ashish Chanana
CHARACTERIZATION OF FUNDAMENTAL COMMUNICATION LIMITS OF STATE-DEPENDENT INTERFERENCE NETWORKS, Ruchen Duan
FABRICATION AND TESTING OF NANOSCALE THICKNESS METAL CYLINDER FIBER, Ronak B. Gandhi
Power-Aware Planning and Design for Next Generation Wireless Networks, Chenfei Gao
Heterogeneous Sensor Signal Processing for Inference with Nonlinear Dependence, Hao He
INDIUM TELLURIDE (In2Te3) SEMICONDUCTOR CYLINDER FIBER SENSOR, Xun Huang
Design of a High Capacity, Scalable, and Green Wireless Communication System Leveraging the Unlicensed Spectrum, Mohammad Riaz Khawer
Link Prediction in Dynamic Weighted and Directed Social Network using Supervised Learning, Ricky Laishram
Gate-level timing analysis and waveform evaluation, Chaobo Li
Integration of EVs and DGs into the Electric Power System for Grid Modernization, Mohammad Nikkhah Mojdehi
Binary Program Integrity Models for Defeating Code-Reuse Attacks, Aravind Prakash
The Rootbeer Gpu Compiler, Phil Pratt-Szeliga