Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Wright State University (1312)
- University of Nebraska - Lincoln (1097)
- University of Texas at El Paso (778)
- Washington University in St. Louis (684)
- Technological University Dublin (613)
-
- Singapore Management University (467)
- Marquette University (368)
- University of South Carolina (217)
- Old Dominion University (198)
- Portland State University (167)
- University of Dayton (165)
- Nova Southeastern University (159)
- Florida International University (112)
- Chapman University (97)
- Fordham University (72)
- City University of New York (CUNY) (68)
- Western University (68)
- University of New Haven (67)
- San Jose State University (62)
- University of Pennsylvania Carey Law School (62)
- University of Nevada, Las Vegas (61)
- Embry-Riddle Aeronautical University (59)
- Purdue University (54)
- Edith Cowan University (53)
- Syracuse University (43)
- Virginia Commonwealth University (42)
- Morehead State University (38)
- University of Louisville (38)
- Cleveland State University (37)
- University of Massachusetts Amherst (34)
- Keyword
-
- Machine learning (103)
- Deep learning (78)
- Security (70)
- Computer Science and Engineering (69)
- Robotics (58)
-
- Artificial intelligence (57)
- Internet (52)
- Machine Learning (48)
- Computer networks (42)
- Classification (39)
- Cybersecurity (36)
- Data mining (36)
- Deep Learning (34)
- IoT (34)
- Computer vision (33)
- Internet of Things (33)
- Simulation (33)
- Privacy (32)
- Computerized Conferencing & Communications Center (31)
- Blockchain (30)
- Engineering (30)
- Optimization (30)
- Digital forensics (29)
- Cloud computing (27)
- Interval uncertainty (27)
- Software agents (26)
- Technology (26)
- Artificial Intelligence (25)
- Clustering (24)
- Social media (24)
- Publication Year
- Publication
-
- Computer Science & Engineering Syllabi (1312)
- Departmental Technical Reports (CS) (760)
- All Computer Science and Engineering Research (683)
- Department of Electrical and Computer Engineering: Faculty Publications (483)
- Research Collection School Of Computing and Information Systems (451)
-
- Electrical and Computer Engineering Faculty Research and Publications (367)
- Faculty Publications (317)
- Dissertations (220)
- Electrical and Computer Engineering Faculty Publications (209)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (191)
- Conference papers (163)
- College of Engineering and Computing Course Catalogs (152)
- Publications (131)
- Articles (130)
- Department of Electrical and Computer Engineering: Faculty Publications (to 2015) (107)
- Computer Science Faculty Publications and Presentations (105)
- FIU Electronic Theses and Dissertations (102)
- Library Philosophy and Practice (e-journal) (97)
- Computer Science Faculty Publications (88)
- Engineering Faculty Articles and Research (85)
- Electrical and Computer Engineering Publications (68)
- Electrical & Computer Engineering and Computer Science Faculty Publications (67)
- All Faculty Scholarship (63)
- Publications and Research (60)
- Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research (59)
- Conference Papers (51)
- CSE Conference and Workshop Papers (48)
- Computational Modeling & Simulation Engineering Faculty Publications (47)
- Computer Science Publications (41)
- Faculty Scholarship (39)
- File Type
Articles 1 - 30 of 8094
Full-Text Articles in Entire DC Network
Computer Security Lab Experiment, Orit D. Gruber, Herbert Schanker
Computer Security Lab Experiment, Orit D. Gruber, Herbert Schanker
Open Educational Resources
This is a basic experiment for all students of all majors to explore Computer Security. Each instruction included in this experiment is conducted online via a Web Browser; Firefox or Chrome is recommended. Software does not need to be downloaded nor installed. The step by step instructions in this experiment include interactive questions and observations which are then included in the (student's) final report.
Toward Intuitive 3d Interactions In Virtual Reality: A Deep Learning- Based Dual-Hand Gesture Recognition Approach, Trudi Di Qi, Franceli L. Cibrian, Meghna Raswan, Tyler Kay, Hector M. Camarillo-Abad, Yuxin Wen
Toward Intuitive 3d Interactions In Virtual Reality: A Deep Learning- Based Dual-Hand Gesture Recognition Approach, Trudi Di Qi, Franceli L. Cibrian, Meghna Raswan, Tyler Kay, Hector M. Camarillo-Abad, Yuxin Wen
Engineering Faculty Articles and Research
Dual-hand gesture recognition is crucial for intuitive 3D interactions in virtual reality (VR), allowing the user to interact with virtual objects naturally through gestures using both handheld controllers. While deep learning and sensor-based technology have proven effective in recognizing single-hand gestures for 3D interactions, research on dual-hand gesture recognition for VR interactions is still underexplored. In this work, we introduce CWT-CNN-TCN, a novel deep learning model that combines a 2D Convolution Neural Network (CNN) with Continuous Wavelet Transformation (CWT) and a Temporal Convolution Network (TCN). This model can simultaneously extract features from the time-frequency domain and capture long-term dependencies using …
Whispers Of Ai: Unveiling The Paradox Of Gpt Titans, Faria R. Promi, Qing Qing Zhuo
Whispers Of Ai: Unveiling The Paradox Of Gpt Titans, Faria R. Promi, Qing Qing Zhuo
Publications and Research
The advent of large-scale language models, such as GPT, has sparked a revolution in artificial intelligence, enabling computers to comprehend and generate human-like text with remarkable ease. These models can write articles, answer questions, and even engage in conversations that mimic human speech. While their abilities are impressive, concerns about their societal impact abound. This research project dives deep into exploring the multifaceted aspects of these AI titans. We will investigate the positive aspects of big talking AI models through a thorough examination of existing literature, real-world examples, such as their potential to enhance education, entertainment, and customer service experiences. …
Star-Based Reachability Analysis Of Binary Neural Networks On Continuous Input, Mykhailo Ivashchenko
Star-Based Reachability Analysis Of Binary Neural Networks On Continuous Input, Mykhailo Ivashchenko
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
Deep Neural Networks (DNNs) have become a popular instrument for solving various real-world problems. DNNs’ sophisticated structure allows them to learn complex representations and features. However, architecture specifics and floating-point number usage result in increased computational operations complexity. For this reason, a more lightweight type of neural networks is widely used when it comes to edge devices, such as microcomputers or microcontrollers – Binary Neural Networks (BNNs). Like other DNNs, BNNs are vulnerable to adversarial attacks; even a small perturbation to the input set may lead to an errant output. Unfortunately, only a few approaches have been proposed for verifying …
Sliding Markov Decision Processes For Dynamic Task Planning On Uncrewed Aerial Vehicles, Trent Wiens
Sliding Markov Decision Processes For Dynamic Task Planning On Uncrewed Aerial Vehicles, Trent Wiens
Department of Mechanical and Materials Engineering: Dissertations, Theses, and Student Research
Mission and flight planning problems for uncrewed aircraft systems (UASs) are typically large and complex in space and computational requirements. With enough time and computing resources, some of these problems may be solvable offline and then executed during flight. In dynamic or uncertain environments, however, the mission may require online adaptation and replanning. In this work, we will discuss methods of creating MDPs for online applications, and a method of using a sliding resolution and receding horizon approach to build and solve Markov Decision Processes (MDPs) in practical planing applications for UASs. In this strategy, called a Sliding Markov Decision …
Development Of A Multi-Use Modular Microfluidic Platform Using 3d Printing, Carson Emeigh
Development Of A Multi-Use Modular Microfluidic Platform Using 3d Printing, Carson Emeigh
Department of Mechanical and Materials Engineering: Dissertations, Theses, and Student Research
Microfluidic lab-on-a-chip (LoC) technology has driven numerous innovations due to their ability to perform laboratory-scale experiments on a single chip using microchannels. Although LoC technology has been innovative, it still suffers from limitations related to its fabrication and design flexibility. Typical LoC fabrication, with photolithography, is time consuming, expensive, and inflexible. To overcome the limitations of LoC devices, modular microfluidic platforms have been developed where multiple microfluidic modules, each with a specific function or group of functions, can be combined on a single platform. Modular microfluidics have overcome some of the limitations of LoC devices, but currently, their fabrication is …
Bidding Strategy For A Wind Power Producer In Us Energy And Reserve Markets, Anne Stratman
Bidding Strategy For A Wind Power Producer In Us Energy And Reserve Markets, Anne Stratman
Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research
Wind power is one of the world's fastest-growing renewable energy resources and has expanded quickly within the US electric grid. Currently, wind power producers (WPPs) may sell energy products in US markets but are not allowed to sell reserve products, due to the uncertain and intermittent nature of wind power. However, as wind’s share of the power supply grows, it may eventually be necessary for WPPs to contribute to system-wide reserves. This paper proposes a stochastic optimization model to determine the optimal offer strategy for a WPP that participates in the day-ahead and real-time energy and spinning reserve markets. The …
Vr Circuit Simulation With Advanced Visualization For Enhancing Comprehension In Electrical Engineering, Elliott Wolbach
Vr Circuit Simulation With Advanced Visualization For Enhancing Comprehension In Electrical Engineering, Elliott Wolbach
Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research
As technology advances, the field of electrical and computer engineering continuously demands innovative tools and methodologies to facilitate effective learning and comprehension of fundamental concepts. Through a comprehensive literature review, it was discovered that there was a gap in the current research on using VR technology to effectively visualize and comprehend non-observable electrical characteristics of electronic circuits. This thesis explores the integration of Virtual Reality (VR) technology and real-time electronic circuit simulation with enhanced visualization of non-observable concepts such as voltage distribution and current flow within these circuits. The primary objective is to develop an immersive educational platform that makes …
Design And Optimization Of A Novel Monolithic Spring For High-Frequency Press-Pack Sic Fet Modules, Bogac Canbaz
Design And Optimization Of A Novel Monolithic Spring For High-Frequency Press-Pack Sic Fet Modules, Bogac Canbaz
Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research
Silicon Carbide (SiC) Field-Effect Transistor (FET) modules lead the way in power electronics, being superior in efficiency and robustness for high-frequency applications. The shift towards SiC from traditional silicon (Si)-based devices is driven by its superior thermal conductivity, higher electric field strength, and operational efficiency at elevated temperatures. These features are critical for the development of next-generation, grid-oriented power converters aimed at enhancing the reliability and sustainability of power systems. This research focuses on high-frequency press-pack (HFPP) SiC FET modules, addressing the primary challenge of miniaturizing SiC FET dies without compromising performance, through an innovative press-contact design essential for increased …
An Investigation Of Information Structures In Dna, Joel Mohrmann
An Investigation Of Information Structures In Dna, Joel Mohrmann
Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research
The information-containing nature of the DNA molecule has been long known and observed. One technique for quantifying the relationships existing within the information contained in DNA sequences is an entity from information theory known as the average mutual information (AMI) profile. This investigation sought to use principally the AMI profile along with a few other metrics to explore the structure of the information contained in DNA sequences.
Treating DNA sequences as an information source, several computational methods were employed to model their information structure. Maximum likelihood and maximum a posteriori estimators were used to predict missing bases in DNA sequences. …
Detection Of Deficiencies And Data Analysis Of Bridge Members With Deep Convolutional Neural Networks, Bennett Jackson
Detection Of Deficiencies And Data Analysis Of Bridge Members With Deep Convolutional Neural Networks, Bennett Jackson
Department of Civil and Environmental Engineering: Dissertations, Theses, and Student Research
Concrete cracks and structural steel corrosion are two of the most common defects in bridges. Quantifying and classifying these defects provide bridge inspectors and engineers with valuable data for assessing deterioration levels. However, the bridge inspection process is typically a subjective, time intensive, and tedious task, as defects can be overlooked or in locations not easily accessible. Previous studies have investigated deep learning-based inspection methods, implementing popular models such as Mask R-CNN and U-Net. The architectures of these models offer certain advantages depending on the required task. This thesis aims to evaluate and compare Mask R-CNN and U-Net regarding their …
Simulating And Training Autonomous Rover Navigation In Unity Engine Using Local Sensor Data, Christopher Pace
Simulating And Training Autonomous Rover Navigation In Unity Engine Using Local Sensor Data, Christopher Pace
Senior Honors Theses
Autonomous navigation is essential to remotely operating mobile vehicles on Mars, as communication takes up to 20 minutes to travel between the Earth and Mars. Several autonomous navigation methods have been implemented in Mars rovers and other mobile robots, such as odometry or simultaneous localization and mapping (SLAM) until the past few years when deep reinforcement learning (DRL) emerged as a viable alternative. In this thesis, a simulation model for end-to-end DRL Mars rover autonomous navigation training was created using Unity Engine, using local inputs such as GNSS, LiDAR, and gyro. This model was then trained in navigation in a …
Data Engineering: Building Software Efficiency In Medium To Large Organizations, Alessandro De La Torre
Data Engineering: Building Software Efficiency In Medium To Large Organizations, Alessandro De La Torre
Whittier Scholars Program
The introduction of PoetHQ, a mobile application, offers an economical strategy for colleges, potentially ushering in significant cost savings. These savings could be redirected towards enhancing academic programs and services, enriching the educational landscape for students. PoetHQ aims to democratize access to crucial software, effectively removing financial barriers and facilitating a richer educational experience. By providing an efficient software solution that reduces organizational overhead while maximizing accessibility for students, the project highlights the essential role of equitable education and resource optimization within academic institutions.
First-Year Engineering Students And Genai: Experience, Attitudes, Trust, And Ethics., Elisabeth Thomas, Cenetria Crockett, Campbell Rightmyer Bego
First-Year Engineering Students And Genai: Experience, Attitudes, Trust, And Ethics., Elisabeth Thomas, Cenetria Crockett, Campbell Rightmyer Bego
Undergraduate Research Events
Generative AI (GenAI) has the potential to benefit student learning by offering personalized feedback, idea generation, research, and analysis support, writing aid, and administrative support (Chan and Hu, 2023; Zhang, 2023). However, if used inappropriately, the same tools can lead to false/biased content creation and reduced ethical awareness leading to possible academic dishonesty and privacy issues (Schwartz, 2016; Wu, 2023). At this early stage, ethical standards and professorial guidance are unavailable, so it is important to understand what students are thinking about the recent technologies (Shen et al., 2013). Spring 2023 survey results revealed that some students used ChatGPT, a …
2024 (Spring) Ensi Informer Magazine, Morehead State University. Engineering Sciences Department
2024 (Spring) Ensi Informer Magazine, Morehead State University. Engineering Sciences Department
ENSI Informer Magazine Archive
The ENSI Informer Magazine published in the spring of 2024.
Reducing Bias In Cyberbullying Detection With Advanced Llms And Transformer Models, Dahana Moz Ruiz, Annaliese Watson, Anjana Manikandan, Zachary Gordon
Reducing Bias In Cyberbullying Detection With Advanced Llms And Transformer Models, Dahana Moz Ruiz, Annaliese Watson, Anjana Manikandan, Zachary Gordon
Center for Cybersecurity
This paper delved into a comprehensive exploration of the inherent biases present in Large Language Models (LLMs) and various Transformer models, with a focus on their role in identifying and addressing instances of cyberbullying. The objective was to refine and enhance the accuracy and fairness of these models by mitigating the biases deeply ingrained in their structures. This was crucial because language models could inadvertently perpetuate and amplify existing biases present in the data they were trained on.
Use Of Mobile Technology To Identify Behavioral Mechanisms Linked To Mental Health Outcomes In Kenya: Protocol For Development And Validation Of A Predictive Model, Willie Njoroge, Rachel Maina, Frank Elena, Lukoye Atwoli, Anthony Ngugi, Srijan Sen, Stephen Wong, Linda Khakali, Andrew Aballa, James Orwa, Moses Nyongesa, Jasmit Shah, Amina Abubakar, Zul Merali
Use Of Mobile Technology To Identify Behavioral Mechanisms Linked To Mental Health Outcomes In Kenya: Protocol For Development And Validation Of A Predictive Model, Willie Njoroge, Rachel Maina, Frank Elena, Lukoye Atwoli, Anthony Ngugi, Srijan Sen, Stephen Wong, Linda Khakali, Andrew Aballa, James Orwa, Moses Nyongesa, Jasmit Shah, Amina Abubakar, Zul Merali
Brain and Mind Institute
Objective:This study proposes to identify and validate weighted sensor stream signatures that predict near-term risk of a major depressive episode and future mood among healthcare workers in Kenya.
Approach: The study will deploy a mobile application (app) platform and use novel data science analytic approaches (Artificial Intelligence and Machine Learning) to identifying predictors of mental health disorders among 500 randomly sampled healthcare workers from five healthcare facilities in Nairobi, Kenya.
Expectation: This study will lay the basis for creating agile and scalable systems for rapid diagnostics that could inform precise interventions for mitigating depression and ensure a healthy, resilient …
Comparing Anova And Powershap Feature Selection Methods Via Shapley Additive Explanations Of Models Of Mental Workload Built With The Theta And Alpha Eeg Band Ratios, Bujar Raufi, Luca Longo
Comparing Anova And Powershap Feature Selection Methods Via Shapley Additive Explanations Of Models Of Mental Workload Built With The Theta And Alpha Eeg Band Ratios, Bujar Raufi, Luca Longo
Articles
Background: Creating models to differentiate self-reported mental workload perceptions is challenging and requires machine learning to identify features from EEG signals. EEG band ratios quantify human activity, but limited research on mental workload assessment exists. This study evaluates the use of theta-to-alpha and alpha-to-theta EEG band ratio features to distinguish human self-reported perceptions of mental workload. Methods: In this study, EEG data from 48 participants were analyzed while engaged in resting and task-intensive activities. Multiple mental workload indices were developed using different EEG channel clusters and band ratios. ANOVA’s F-score and PowerSHAP were used to extract the statistical features. At …
Uncovering The Critical Drivers Of Blockchain Sustainability In Higher Education Using A Deep Learning-Based Hybrid Sem-Ann Approach, Mohammed Alshamsi, Mostafa Al-Emran, Tugrul Daim, Mohammed A. Al-Sharafi, Gulin Idil Sonmezturk Bolatan, Khaled Shaalan
Uncovering The Critical Drivers Of Blockchain Sustainability In Higher Education Using A Deep Learning-Based Hybrid Sem-Ann Approach, Mohammed Alshamsi, Mostafa Al-Emran, Tugrul Daim, Mohammed A. Al-Sharafi, Gulin Idil Sonmezturk Bolatan, Khaled Shaalan
Engineering and Technology Management Faculty Publications and Presentations
The increasing popularity of Blockchain technology has led to its adoption in various sectors, including higher education. However, the sustainability of Blockchain in higher education is yet to be fully understood. Therefore, this research examines the determinants affecting Blockchain sustainability by developing a theoretical model that integrates the protection motivation theory (PMT) and expectation confirmation model (ECM). Based on 374 valid responses collected from university students, the proposed model is evaluated through a deep learning-based hybrid structural equation modeling (SEM) and artificial neural network (ANN) approach. The PLS-SEM results confirmed most of the hypotheses in the proposed model. The sensitivity …
Detecting Substance Use Disorder Using Social Media Data And Dark Web: Time And Knowledge Aware Study, Usha Lokala, Orchid Chetia Phukan, Triyasha Ghosh Dastidar, Francois Lamy, Raminta Daniulaityte, Amit Sheth
Detecting Substance Use Disorder Using Social Media Data And Dark Web: Time And Knowledge Aware Study, Usha Lokala, Orchid Chetia Phukan, Triyasha Ghosh Dastidar, Francois Lamy, Raminta Daniulaityte, Amit Sheth
Faculty Publications
Opioid and substance misuse is rampant in the United States today, with the phenomenon known as the "opioid crisis". The relationship between substance use and mental health has been extensively studied, with one possible relationship being: substance misuse causes poor mental health. However, the lack of evidence on the relationship has resulted in opioids being largely inaccessible through legal means. This study analyzes the substance use posts on social media with opioids being sold through crypto market listings. We use the Drug Abuse Ontology, state-of-the-art deep learning, and knowledge-aware BERT-based models to generate sentiment and emotion for the social media …
Intellectual Property Rights And Copyright Laws In The Regime Of Artificial Intelligence (Ai) In India, Hemavathy C
Intellectual Property Rights And Copyright Laws In The Regime Of Artificial Intelligence (Ai) In India, Hemavathy C
Library Philosophy and Practice (e-journal)
Artificial Intelligence (AI) has been developing for two decades. The application of AI is budding quickly in business dealings, corporate communication and legal services. AI and Law Forms are increasingly important in the legal arena as they play a significant role in the economy and society. Scientists and policymakers together are facing some of the hardest problems with the advancement of machine learning, cryptology and data protection. This paper is very helpful for policymakers, economists, lawyers and technocrats in the aspect of the ethical use of AI in data protection, privacy, security and social corners turns into very relevant issues …
Life During Wartime: Proactive Cybersecurity Is A Humanitarian Imperative, Stanley Mierzwa, Diane Rubino
Life During Wartime: Proactive Cybersecurity Is A Humanitarian Imperative, Stanley Mierzwa, Diane Rubino
Center for Cybersecurity
In brief:
- Humanitarian agencies responding to conflict face massive challenges in distributing aid. Cyberattacks add to that burden.
- This short overview, tailored for non-technical leaders, demystifies the process and equips clouds security experts to proactively champion cloud security at non-profits, and non-governmental organizations.
Proactive Cybersecurity is a Humanitarian Imperative | CSA (cloudsecurityalliance.org)
Emoji Use In Social Media Posts: Relationships With Personality Traits And Word Usage, Shelia Kennison, Kameryn Fritz, Maria Andrea Hurtado Morales, Eric Chan-Tin
Emoji Use In Social Media Posts: Relationships With Personality Traits And Word Usage, Shelia Kennison, Kameryn Fritz, Maria Andrea Hurtado Morales, Eric Chan-Tin
Computer Science: Faculty Publications and Other Works
Prior research has demonstrated relationships between personality traits of social media users and the language used in their posts. Few studies have examined whether there are relationships between personality traits of users and how they use emojis in their social media posts. Emojis are digital pictographs used to express ideas and emotions. There are thousands of emojis, which depict faces with expressions, objects, animals, and activities. We conducted a study with two samples (n = 76 and n = 245) in which we examined how emoji use on X (formerly Twitter) related to users’ personality traits and language use …
Ai And 6g Into The Metaverse: Fundamentals, Challenges And Future Research Trends, Muhammad Zawish, Fayaz Ali Dharejo, Sunder Ali Khowaja, Saleem Raza, Steven Davy, Kapal Dev, Paolo Bellavista
Ai And 6g Into The Metaverse: Fundamentals, Challenges And Future Research Trends, Muhammad Zawish, Fayaz Ali Dharejo, Sunder Ali Khowaja, Saleem Raza, Steven Davy, Kapal Dev, Paolo Bellavista
Articles
Since Facebook was renamed Meta, a lot of attention, debate, and exploration have intensified about what the Metaverse is, how it works, and the possible ways to exploit it. It is anticipated that Metaverse will be a continuum of rapidly emerging technologies, usecases, capabilities, and experiences that will make it up for the next evolution of the Internet. Several researchers have already surveyed the literature on artificial intelligence (AI) and wireless communications in realizing the Metaverse. However, due to the rapid emergence and continuous evolution of technologies, there is a need for a comprehensive and in-depth survey of the role …
Alice In Cyberspace 2024, Stanley Mierzwa
Alice In Cyberspace 2024, Stanley Mierzwa
Center for Cybersecurity
‘Alice in Cyberspace’ Conference Nurtures Women’s Interest, Representation in Cybersecurity
Immersive Framework For Designing Trajectories Using Augmented Reality, Joseph Anderson, Leo Materne, Karis Cooks, Michelle Aros, Jaia Huggins, Jesika Geliga-Torres, Kamden Kuykendall, David Canales, Barbara Chaparro
Immersive Framework For Designing Trajectories Using Augmented Reality, Joseph Anderson, Leo Materne, Karis Cooks, Michelle Aros, Jaia Huggins, Jesika Geliga-Torres, Kamden Kuykendall, David Canales, Barbara Chaparro
Publications
The intuitive interaction capabilities of augmented reality make it ideal for solving complex 3D problems that require complex spatial representations, which is key for astrodynamics and space mission planning. By implementing common and complex orbital mechanics algorithms in augmented reality, a hands-on method for designing orbit solutions and spacecraft missions is created. This effort explores the aforementioned implementation with the Microsoft Hololens 2 as well as its applications in industry and academia. Furthermore, a human-centered design process and study are utilized to ensure the tool is user-friendly while maintaining accuracy and applicability to higher-fidelity problems.
Tutorial: Knowledge-Infused Artificial Intelligence For Mental Healthcare, Kaushik Roy
Tutorial: Knowledge-Infused Artificial Intelligence For Mental Healthcare, Kaushik Roy
Publications
Artificial Intelligence (AI) systems for mental healthcare (MHCare) have been ever-growing after realizing the importance of early interventions for patients with chronic mental health (MH) conditions. Social media (SocMedia) emerged as the go-to platform for supporting patients seeking MHCare. The creation of peer-support groups without social stigma has resulted in patients transitioning from clinical settings to SocMedia supported interactions for quick help. Researchers started exploring SocMedia content in search of cues that showcase correlation or causation between different MH conditions to design better interventional strategies. User-level Classification-based AI systems were designed to leverage diverse SocMedia data from various MH conditions, …
Matthew Gaber: Peekaboo, Matthew Gaber, Mohiuddin Ahmed, Helge Janicke
Matthew Gaber: Peekaboo, Matthew Gaber, Mohiuddin Ahmed, Helge Janicke
Research Datasets
Cyber-attacks continue to evolve, increasing in frequency and sophistication where Artificial Intelligence (AI) is becoming essential in detecting modern malware. However, the accuracy of AI in malware detection is dependent on the quality of the features it is trained with. Static and dynamic analysis of malware is limited by the widespread use of obfuscation and anti-analysis techniques employed by malware authors, where if an analysis environment is detected the malware will hide its malicious behavior. However, Dynamic Binary Instrumentation (DBI) allows deep and precise control of the malware sample, thereby facilitating the extraction of authentic features from sophisticated and evasive …
K-Perm: Personalized Response Generation Using Dynamic Knowledge Retrieval And Persona-Adaptive Queries, Kanak Raj, Kaushik Roy, Vamshi Bonagiri, Priyanshul Govil, Krishnaprasad Thirunarayan, Raxit Goswami, Manas Gaur
K-Perm: Personalized Response Generation Using Dynamic Knowledge Retrieval And Persona-Adaptive Queries, Kanak Raj, Kaushik Roy, Vamshi Bonagiri, Priyanshul Govil, Krishnaprasad Thirunarayan, Raxit Goswami, Manas Gaur
Publications
Personalizing conversational agents can enhance the quality of conversations and increase user engagement. However, they often lack external knowledge to tend to a user’s persona appropriately. This is particularly crucial for practical applications like mental health support, nutrition planning, culturally sensitive conversations, or reducing toxic behavior in conversational agents. To enhance the relevance and comprehensiveness of personalized responses, we propose using a two-step approach that involves (1) selectively integrating user personas and (2) contextualizing the response with supplementing information from a background knowledge source. We develop K-PERM (Knowledge-guided PErsonalization with Reward Modulation), a dynamic conversational agent that combines these elements. …
Exploring Alternative Approaches To Language Modeling For Learning From Data And Knowledge, Yuxin Zi, Kaushik Roy, Vignesh Narayanan, Amit Sheth
Exploring Alternative Approaches To Language Modeling For Learning From Data And Knowledge, Yuxin Zi, Kaushik Roy, Vignesh Narayanan, Amit Sheth
Publications
Despite their wide applications to language understanding tasks, large language models (LLMs) still face challenges such as hallucinations - the occasional fabrication of information, and alignment issues - the lack of associations with human-curated world models (e.g., intuitive physics or common-sense knowledge). Additionally, the black-box nature of LLMs makes it highly challenging to train them meaningfully in order to achieve a desired behavior. Specifically, the attempt to adjust LLMs’ concept embedding spaces can be highly intractable, which involves analyzing the implicit impact on LLMs’ numerous parameters and the resulting inductive biases. This paper proposes a novel architecture that wraps powerful …