Follow


Submissions from 2023

PDF

E-Learning Course Recommender System Using Collaborative Filtering Models, Kalyan Kumar Jena, Sourav Kumar Bhoi, Tushar Kanta Malik, Kshira Sagar Sahoo, N. Z. Jhanjhi, Sajal Bhatia, and Fathi Amsaad

Link

Security and Resilience of Cyber Physical Systems, Krishan Kumar Ed., Sunny Behal Ed., Abhinav Bhandari Ed., and Sajal Bhatia Ed.

Link

Empirical Validation of Automated Vulnerability Curation and Characterization, Ahmet Okutan, Peter Mell, Mehdi Mirakhorli, Igor Khokhlov, Joanna C.S. Santos, Danielle Gonzalez, and Steven Simmons

Link

Complexities in Computer Science Teaching Attitudes and Beliefs: Findings of a Baseline Study of Elementary School Educators, Darcy Ronan, Dennis Brylow, Maverick Berner, Sydney Crespo, Heidi Williams, Christine Thorp, and D. Cenk Erdil

Link

Alkali Metals (Na, K) Doped ZnO/CuO Composite Films for Real-time Tracking of Sweat Loss, Bünyamin Sahin, G. Ozyilmaz, and Kaya Tolga

Submissions from 2022

Link

Influence of Transfer Learning on Machine Learning Systems Robustness to Data Quality Degradation, Sergei Chuprov, Igor Khokhlov, Leon Reznik, and Srujan Shetty

Link

Multi-Modal Sensor Selection with Genetic Algorithms, Sergei Chuprov, Leon Reznik, Igor Khokhlov, and Karan Manghi

Link

Comparative Analysis of Open-Source Vulnerability Scanners for IoT Devices, Christopher deRito and Sajal Bhatia

Link

A Hands-on Learning Approach to Introducing Computer Organization and Architecture to Early-college Students, D. Cenk Erdil; Kevin Bowlyn; and Joshua A, Randall

Link

Session Replay Scripts: A Privacy Analysis, Frances S. Grodzinsky, Keith W. Miller, and Marty J. Wolf

PDF

Discovering Ways to Increase Inclusivity for Dyslexic Students in Computing Education, Felicia Hellems and Sajal Bhatia

PDF

Removing the Veil: Shining Light on the Lack of Inclusivity in Cybersecurity Education for Students with Disabilities, Felicia Hellems and Sajal Bhatia

Link

Integrating Security with Accuracy Evaluation in Sensors Fusion, Igor Khokhlov, Sergei Chuprov, and Leon Reznik

Link

Automated Extraction of Software Names from Vulnerability Reports using LSTM and Expert System, Igor Khokhlov, Ahmet Okutan, Ryan Bryla, Steven Simmons, and Mehdi Mirakhorli

Link

Comparative Analysis of Cloud Computing Security Frameworks for Financial Sector, Sudhish Mohanan, Nandagopal Sridhar, and Sajal Bhatia

Link

CyRRA: Cyberattack Resilient Robotic Arm, Souparna Saha, Sahaj Saxena, and Sajal Bhatia

PDF

Religious Violence and Twitter: Networks of Knowledge, Empathy and Fascination, Samah Senbel, Carly Seigel, and Emily Bryan

Link

Word Frequency Analysis of Community Reaction to Religious Violence on Social Media, Samah Senbel, Carly Seigel, and Emily Bryan

Link

Using Data Analytics to Assess Factors Affecting the Survival Rate of Young Urban Trees, Samah Senbel, Carly Seigel, Tom Corell, and Mary Hogue

PDF

Impact of Sleep and Training on Game Performance and Injury in Division-1 Women’s Basketball Amidst the Pandemic, Samah Senbel, S. Sharma, S. M. Raval, Christopher B. Taber, Julie K. Nolan, N. S. Artan, Diala Ezzeddine, and Kaya Tolga

Link

A Hybrid Approach for Interpretable Game Performance Prediction in Basketball, S. Sharma, Srikrishnan Divakaran, Tolga Kaya, and Mehul S. Raval

Link

Ethical Reflections on Handling Digital Remains: Computing Professionals Picking Up Bones, Marty J. Wolf, Frances Grodzinsky, and Keith W. Miller

Submissions from 2021

Link

VowPass: Novel Method to Generate Secure and Memorable Passwords, Abdulrahman Alhamed and Sajal Bhatia

Link

An Efficient and Reliable Lightweight PUF for IoT-based Applications, Fathi Amsaad, Abdul Razaque, Mohamed Baza, Seluck Kose, Sajal Bhatia, and Gautam Srivastava

PDF

Automated Waterloo Rubric for Concept Map Grading, Shresht Bhatia, Sajal Bhatia, and Irfan Ahmed

PDF

Autonomous Aerial Vehicle Vision and Sensor Guided Landing, Gabriel Bitencourt, Elijah J. Brown, Cedric Bleimling, Gilbert Lai, Arman Molki, and Tolga Kaya

Link

AI Ethics: A Long History and a Recent Burst of Attention, Jason Borenstein, Frances Grodzinsky, Ayanna Howard, Keith W. Miller, and Marty J. Wolf

Link

Improving Knowledge Based Detection of Soft Attacks Against Autonomous Vehicles with Reputation, Trust and Data Quality Service Models, Sergei Chuprov, Ilia Viksnin, Timofey Melnikov, Leon Reznik, and Igor Khokhlov

PDF

Agent-Based Semantic Role Mining for Intelligent Access Control in Multi-Domain Collaborative Applications of Smart Cities, Rubina Ghazal, Ahmad Kamran Malik, Basit Raza, Nauman Qadeer, Nafees Qamar, and Sajal Bhatia

Link

A First-Principle Study of Nanostructured CuO Thin Film-Based Caffeine Sensing Scheme, Tolga Kaya and Bünyamin Sahin

Link

Development of an Autonomous Indoor Robot for Mapping Applications, Michael O'Hara, Kaitlyn Mangano, Gilbert Lai, John Sebastian, Mario Montuori, Arman Molki, and Kaya Tolga

Link

Analysis of Sentimental Behaviour over Social Data Using Machine Learning Algorithms, Abdul Razaque, Fathi Amsaad, Dipal Halder, Mohamed Baza, Abobakr Aboshgifa, and Sajal Bhatia

Link

Simple and Low-Cost Synthesis of Al-doped ZnO/CuO Composite Nanowires for Highly Efficient Hydration Level Sensing, Bünyamin Sahin, Ayşegül Acar, and Tolga Kaya

Link

Facile Preparation and Characterization of Nanostructured ZnO/CuO Composite Thin Film for Sweat Concentration Sensing Applications, Bünyamin Sahin and Tolga Kaya

PDF

Cybersecurity Analysis of Load Frequency Control in Power Systems: A Survey, Sahaj Saxena, Sajal Bhatia, and Rahul Gupta

Link

A Fairness-Based Heuristic Technique for Long-Term Nurse Scheduling, Samah Senbel

PDF

Fast and Memory-Efficient TFIDF Calculation for Text Analysis of Large Datasets, Samah Senbel

Link

Sleep and Physical Performance: A Case Study of Collegiate Women’s Division 1 Basketball Players, Christopher Taber, Samah Senbel, Diala Ezzeddine, Julie K. DeMartini, Alexa Ocel, N.S. Artan, and Kaya Tolga

Submissions from 2020

PDF

Introducing Parallelism to First-Year CS Majors, Barbara M. Anthony, D. Cenk Erdil, Olga Glebova, and Robert Montante

Link

An Improved Distributed Multiplier-Less Approach for Radix-2 FFT, Kevin Bowlyn and Sena Hounsinou

Link

Improved Sensing Response of Nanostructured CuO Thin Films Towards Sweat Rate Monitoring: Effect of Cr Doping, Serdar Dinc, Bünyamin Şahin, and Tolga Kaya

Link

Trust in Artificial Agents, Frances Grodzinsky, Keith W. Miller, and Marty J. Wolf

PDF

On Using Model For Downstream Responsibility, Frances S. Grodzinsky, Marty J. Wolf, and Keith W. Miller

Link

The Evidence Appraisal Game: An Innovative Strategy for Teaching Step 3 in Evidence‐Based Practice, Kerry A. Milner, Robert McCloud, and Justin C. Cullen

PDF

Leading Through Change: 2020, Domenick Pinto

PDF

Effect of Multinational Projects on Engineering Students through a Summer Exposure Research Program, Mehul S. Raval and Tolga Kaya

Link

Experiments with Multinational Cross-Course Project, Mehul S. Raval, Tolga Kaya, Mazad Zaveri, and Paawan Sharma

Link

Assessing and Exploiting Security Vulnerabilities of Unmanned Aerial Vehicles, Fekadu Yihunie, Aman Kumar Singh, and Sajal Bhatia

Submissions from 2019

PDF

Securing the Human: Broadening Diversity in Cybersecurity, Mohammad Azhar, Sajal Bhatia, Greg Gagne, Chadi Kari, Joseph Maguire, Xenia Montrouidou, Liviana Tudor, David Vosen, and Timothy T. Yuen

PDF

An Artificial Sweating System for Sweat Sensor Testing Applications, Andrew Brueck, Kyle Bates, Trent Wood, William House, Zachary Martinez, Shannon Peters, Blain Root, Kumar Yelamarthi, and Tolga Kaya

Link

A Comparison of Health Informatics Education in the USA, D. Cenk Erdil

Link

Using NSFCloud Testbeds for Research: Conference Tutorial, D. Cenk Erdil

Link

Toward Developing a Cloud Computing Model Curriculum, D. Cenk Erdil, Laurie White, Derek Foster, Joshua Adams, Amadeo Jose Arguelles Cruz, Brian Hainey, Harvey Hyman, Gareth Lewis, Sajid Nazir, Manh Van Nguyen, Majd Sakr, and Lee Stott

Link

Applying a Social-Relational Model to Explore the Curious Case of hitchBOT, Frances Grodzinsky, Marty J. Wolf, and Keith W. Miller

Link

Intrinsic Complexity of Partial Learning, Sanjay Jain and Efim Kinber

Link

Wearable Sweat Sensors: Background and Current Trends, Tolga Kaya, Gengchen Liu, Jenny Ho, Kumar Yelamarthi, Kevin Miller, Jeffrey Edwards, and Alicja B. Stannard

Link

Securing the Human: A Review of Literature on Broadening Diversity in Cybersecurity Education, Xenia Mountrouidou, David Vosen, Chadi Kari, Mohammad Azhar, Sajal Bhatia, Greg Gagne, Joseph Maguire, Liviana Tudor, and Timothy Yuen

PDF

Effective Communication in Academia: It Goes Both ways!, Domenick Pinto

Link

A Novel Amperometric Sweat Sensor Approach Through Characterization of Hausmannite (Mn3O4) Thin Films, Bünyamin Şahin, Büşra Aslan, and Tolga Kaya

PDF

Electrochemical Amperometric Biosensor Applications of Nanostructured Metal Oxides: A Review, Bünyamin Sahin and Tolga Kaya

Link

Novel Recursive Technique for Finding the Optimal Solution of the Nurse Scheduling Problem, Samah Senbel

PDF

Teaching Self-Balancing Trees Using a Beauty Contest, Samah Senbel

PDF

Responding to Some Challenges Posed by the Re-identification of Anonymized Personal Data, Herman T. Tavani and Frances Grodzinsky, ed.

PDF

On the Responsibility for Uses of Downstream Software, Marty J. Wolf; Keith W. Miller; and Frances Grodzinsky, ed.

PDF

Applying Machine Learning to Anomaly-Based Intrusion Detection Systems, Fekadu Yihunie, Eman Abdelfattah, and Amish Regmi

PDF

RCrab: An R Analytics Tool to Visualize and Analyze the Movement of Horseshoe Crabs in Long Island Sound, Ismael Youssef, Samah Senbel, Jo-Marie Kasinak, and Jennifer Mattei

Submissions from 2018

Link

Distributed Denial of Service Attacks and Defense Mechanisms: Current Landscape and Future Directions, Sajal Bhatia, Sunny Behal, and Irfan Ahmed

Link

A Custom Computer-Controlled Fluid Mixing and Dispensing System for Sweat Sensor Testing Applications, Andrew Brueck, Kyle Bates, Trent Wood, William House, Zachary Martinez, Shannon Peters, Blain Root, Kumar Yelamarthi, and Tolga Kaya

PDF

A Real-Time Wireless Sweat Rate Measurement System for Physical Activity Monitoring, Andrew Brueck, Tashfin Iftekhar, Alicja B. Stannard, Kumar Yelamarthi, and Tolga Kaya

Link

Analysis of Routing Protocols in an Emergency Communications Center, John A. Bucherati and Eman Abdelfattah

Link

Cloud Computing: Developing Contemporary Computer Science Curriculum for a Cloud-first Future, Derek Foster, Laurie White, Joshua Adams, D. Cenk Erdil, Harvey Hyman, Stan Kurkovsky, Majd Sakr, and Lee Stott

PDF

The Inevitability of Playing Politics as Chair: 2018, Domenick Pinto

PDF

Evaluation of Routing Protocols with FTP and P2P, Tyler Wilson, Eman Abdelfattah, and Samir Hamada

Link

Analysis of Ping of Death DoS and DDoS Attacks, Fekadu Yihunie, Eman Abdelfattah, and Ammar Odeh

PDF

A Bi-level Heuristic Solution for the Nurse Scheduling Problem Based on Shift-swapping, Ahmed Youssef and Samah Senbel

Submissions from 2017

Link

I Am 'Totally' Human: Bypassing the reCaptcha, Samuel S. Brown, Nicholas DiBari, and Sajal Bhatia

Link

Self-organized Dynamic Provisioning for Big Data, D. Cenk Erdil

Link

Why Big Data Needs the Virtues, Frances Grodzinsky

Link

Implementation of Blogging as an Alternative to the Lab Report, Troy Hicks, Justin Bruner, and Tolga Kaya

Link

Automatic Learning from Positive Data and Negative Counterexamples., Sanjay Jain, Efim Kinber, and Frank Stephan

Link

Analyzing the Effect of DoS Attacks on Network Performance, Gaurav Kumar, Eman Abdelfattah, Johnathon Holbrooks, and Alexander Perez

Link

Wearable IoT Computing: Interface, Emotions, Wearer's Culture, and Security/Privacy Concerns, Robert McCloud, Martha B. Lerski, Joon Park, and Tyson T. Brooks

PDF

What Does Playing Games Teach Us About a Student's Ethical Life?, Robert McCloud and Tamara Luarasi

Link

This “Ethical Trap” is for Roboticists, Not Robots: On the Issue of Artificial Agent Ethical Decision Making, Keith W. Miller, Marty J. Wolf, and Frances Grodzinsky

PDF

Why We Should Have Seen That Coming: Comments on Microsoft’s Tay “Experiment,” and Wider Implications, K. W. Miller, Marty J. Wolf, and Frances S. Grodzinsky

PDF

A Robust and Secure Video Steganography Method in DWT-DCT Domains Based on Multiple Object Tracking and ECC, Ramadhan J. Mstafa, Khaled M. Elleithy, and Eman Abdelfattah

Link

Video Steganography Techniques: Taxonomy, Challenges, and Future Directions, Ramadhan J. Mstafa, Khaled M. Elleithy, and Eman Abdelfattah

Link

A New Tree Target Tracking Algorithm in WSNs, Ammar Odeh and Eman Abdelfattah

Link

Quantum Min / Max Algorithms Based on Qubits {00, 11}, Ammar Odeh and Eman Abdelfattah

PDF

The Inevitability of Playing Politics as Chair: Advantages and Pitfalls, Domenick Pinto

Link

Why We Should Have Seen That Coming: Comments on Microsoft's tay "Experiment," and Wider Implications, Marty J. Wolf, Keith W. Miller, and Frances Grodzinsky

Submissions from 2016

Link

Intrinsic Complexity of Partial Learning, Sanjay Jain and Efim Kinber

Link

Parallel Learning of Automatic Classes of Languages, Sanjay Jain and Efim Kinber

PDF

To the Memory of R. Freivalds, Efim Kinber

Link

Quantum Sort Algorithm Based on Entanglement Qubits {00, 11}, Ammar Odeh and Eman Abdelfattah

PDF

The Inevitability of Playing Politics as Chair: Advantages and Pitfalls, Domenick Pinto

Link

Improved Monostatic Pulse Radar Design Using Ultra Wide Band for Range Estimation, A. V. N. R. Sai Shiva, Khaled Elleithy, and Eman Abdelfattah

Link

Robots, Ethics and Software - FOSS vs. Proprietary Licenses, Marty J. Wolf, Frances Grodzinsky, and Keith W. Miller

Link

There's Something in Your Eye: Ethical Implications of Augmented Visual Field Devices, Marty J. Wolf, Frances Grodzinsky, and Keith W. Miller

Submissions from 2015

Link

Developing Automated Deceptions and the Impact on Trust, Frances Grodzinsky, Keith W. Miller, and Marty J. Wolf