Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

PDF

Old Dominion University

Series

Keyword
Publication Year
Publication

Articles 1 - 30 of 724

Full-Text Articles in Entire DC Network

Boring But Demanding: Using Secondary Tasks To Counter The Driver Vigilance Decrement For Partially Automated Driving, Scott Mishler, Jing Chen Jun 2024

Boring But Demanding: Using Secondary Tasks To Counter The Driver Vigilance Decrement For Partially Automated Driving, Scott Mishler, Jing Chen

Psychology Faculty Publications

Objective

We investigated secondary–task–based countermeasures to the vigilance decrement during a simulated partially automated driving (PAD) task, with the goal of understanding the underlying mechanism of the vigilance decrement and maintaining driver vigilance in PAD.

Background

Partial driving automation requires a human driver to monitor the roadway, but humans are notoriously bad at monitoring tasks over long periods of time, demonstrating the vigilance decrement in such tasks. The overload explanations of the vigilance decrement predict the decrement to be worse with added secondary tasks due to increased task demands and depleted attentional resources, whereas the underload explanations predict the vigilance …


Applications Of Ai/Ml In Maritime Cyber Supply Chains, Rafael Diaz, Ricardo Ungo, Katie Smith, Lida Haghnegahdar, Bikash Singh, Tran Phuong Jan 2024

Applications Of Ai/Ml In Maritime Cyber Supply Chains, Rafael Diaz, Ricardo Ungo, Katie Smith, Lida Haghnegahdar, Bikash Singh, Tran Phuong

School of Cybersecurity Faculty Publications

Digital transformation is a new trend that describes enterprise efforts in transitioning manual and likely outdated processes and activities to digital formats dominated by the extensive use of Industry 4.0 elements, including the pervasive use of cyber-physical systems to increase efficiency, reduce waste, and increase responsiveness. A new domain that intersects supply chain management and cybersecurity emerges as many processes as possible of the enterprise require the convergence and synchronizing of resources and information flows in data-driven environments to support planning and execution activities. Protecting the information becomes imperative as big data flows must be parsed and translated into actions …


A Review Of Hybrid Cyber Threats Modelling And Detection Using Artificial Intelligence In Iiot, Yifan Liu, Shancang Li, Xinheng Wang, Li Xu Jan 2024

A Review Of Hybrid Cyber Threats Modelling And Detection Using Artificial Intelligence In Iiot, Yifan Liu, Shancang Li, Xinheng Wang, Li Xu

Information Technology & Decision Sciences Faculty Publications

The Industrial Internet of Things (IIoT) has brought numerous benefits, such as improved efficiency, smart analytics, and increased automation. However, it also exposes connected devices, users, applications, and data generated to cyber security threats that need to be addressed. This work investigates hybrid cyber threats (HCTs), which are now working on an entirely new level with the increasingly adopted IIoT. This work focuses on emerging methods to model, detect, and defend against hybrid cyber attacks using machine learning (ML) techniques. Specifically, a novel ML-based HCT modelling and analysis framework was proposed, in which regularisation and Random Forest …


Machine Learning As A Tool For Early Detection: A Focus On Late-Stage Colorectal Cancer Across Socioeconomic Spectrums, Hadiza Galadima, Rexford Anson-Dwamena, Ashley Johnson, Ghalib Bello, Georges Adunlin, James Blando Jan 2024

Machine Learning As A Tool For Early Detection: A Focus On Late-Stage Colorectal Cancer Across Socioeconomic Spectrums, Hadiza Galadima, Rexford Anson-Dwamena, Ashley Johnson, Ghalib Bello, Georges Adunlin, James Blando

Community & Environmental Health Faculty Publications

Purpose: To assess the efficacy of various machine learning (ML) algorithms in predicting late-stage colorectal cancer (CRC) diagnoses against the backdrop of socio-economic and regional healthcare disparities. Methods: An innovative theoretical framework was developed to integrate individual- and census tract-level social determinants of health (SDOH) with sociodemographic factors. A comparative analysis of the ML models was conducted using key performance metrics such as AUC-ROC to evaluate their predictive accuracy. Spatio-temporal analysis was used to identify disparities in late-stage CRC diagnosis probabilities. Results: Gradient boosting emerged as the superior model, with the top predictors for late-stage CRC diagnosis being anatomic site, …


A Benchmark Framework For Data Visualization And Explainable Ai (Xai), Murat Kuzlu, Gokcen Ozdemir, Umut Ozdemir Jan 2024

A Benchmark Framework For Data Visualization And Explainable Ai (Xai), Murat Kuzlu, Gokcen Ozdemir, Umut Ozdemir

Engineering Technology Faculty Publications

This research introduces a benchmark framework, called EDUMX, designed for machine learning (ML)- based forecasting and XAI tasks, leveraging the Streamlit open-source Python library. The framework offers a comprehensive suite of functionalities, including data loading, feature selection, relationship analysis, data preprocessing, model selection, metric evaluation, training, and real-time monitoring. Users can easily upload data in diverse formats, explore relationships between variables, preprocess data using various techniques, and assess the performance of the ML model using customizable metrics. With its user-friendly interface, this framework offers invaluable insights for forecasting tasks in various domains, catering to the evolving needs of predictive analytics. …


Designing High-Performance Identity-Based Quantum Signature Protocol With Strong Security, Sunil Prajapat, Pankaj Kumar, Sandeep Kumar, Ashok Kumar Das, Sachin Shetty, M. Shamim Hossain Jan 2024

Designing High-Performance Identity-Based Quantum Signature Protocol With Strong Security, Sunil Prajapat, Pankaj Kumar, Sandeep Kumar, Ashok Kumar Das, Sachin Shetty, M. Shamim Hossain

VMASC Publications

Due to the rapid advancement of quantum computers, there has been a furious race for quantum technologies in academia and industry. Quantum cryptography is an important tool for achieving security services during quantum communication. Designated verifier signature, a variant of quantum cryptography, is very useful in applications like the Internet of Things (IoT) and auctions. An identity-based quantum-designated verifier signature (QDVS) scheme is suggested in this work. Our protocol features security attributes like eavesdropping, non-repudiation, designated verification, and hiding sources attacks. Additionally, it is protected from attacks on forgery, inter-resending, and impersonation. The proposed scheme benefits from the traditional designated …


A Secure And Privacy-Preserving Signature Protocol Using Quantum Teleportation In Metaverse Environment, Pankaj Kumar, Vivek Bharmaik, Sunil Prajapat, Garima Thakur, Ashok Kumar Das, Sachin Shetty, Joel J. P. C. Rodrigues Jan 2024

A Secure And Privacy-Preserving Signature Protocol Using Quantum Teleportation In Metaverse Environment, Pankaj Kumar, Vivek Bharmaik, Sunil Prajapat, Garima Thakur, Ashok Kumar Das, Sachin Shetty, Joel J. P. C. Rodrigues

VMASC Publications

The burgeoning concept of the metaverse as an interconnected virtual space represents the forefront of the next-generation internet. Quantum teleportation, known for its prowess in ensuring secure and reliable communications, stands poised to revolutionize interactions within this immersive digital realm. In this context, we propose a comprehensive interaction protocol tailored for the metaverse environment. The designed protocol entails two fundamental components: first, the interaction between a user and their avatar, facilitated by a secure seven-qubit entangled state; and second, the interaction between two avatars, enabled through an efficient two-qubit entangled state. To fortify the protocol’s resilience, quantum key distribution (QKD) …


A Comparison Of Machine Learning Surrogate Models Of Street-Scale Flooding In Norfolk, Virginia, Diana Mcspadden, Steven Goldenberg, Binata Roy, Malachi Schram, Jonathan L. Goodall, Heather Richter Jan 2024

A Comparison Of Machine Learning Surrogate Models Of Street-Scale Flooding In Norfolk, Virginia, Diana Mcspadden, Steven Goldenberg, Binata Roy, Malachi Schram, Jonathan L. Goodall, Heather Richter

Community & Environmental Health Faculty Publications

Low-lying coastal cities, exemplified by Norfolk, Virginia, face the challenge of street flooding caused by rainfall and tides, which strain transportation and sewer systems and can lead to personal and property damage. While high-fidelity, physics-based simulations provide accurate predictions of urban pluvial flooding, their computational complexity renders them unsuitable for real-time applications. Using data from Norfolk rainfall events between 2016 and 2018, this study compares the performance of a previous surrogate model based on a random forest algorithm with two deep learning models: Long Short-Term Memory (LSTM) and Gated Recurrent Unit (GRU). The comparison of deep learning to the random …


A Survey On Few-Shot Class-Incremental Learning, Songsong Tian, Lusi Li, Weijun Li, Hang Ran, Xin Ning, Prayag Tiwari Jan 2024

A Survey On Few-Shot Class-Incremental Learning, Songsong Tian, Lusi Li, Weijun Li, Hang Ran, Xin Ning, Prayag Tiwari

Computer Science Faculty Publications

Large deep learning models are impressive, but they struggle when real-time data is not available. Few-shot class-incremental learning (FSCIL) poses a significant challenge for deep neural networks to learn new tasks from just a few labeled samples without forgetting the previously learned ones. This setup can easily leads to catastrophic forgetting and overfitting problems, severely affecting model performance. Studying FSCIL helps overcome deep learning model limitations on data volume and acquisition time, while improving practicality and adaptability of machine learning models. This paper provides a comprehensive survey on FSCIL. Unlike previous surveys, we aim to synthesize few-shot learning and incremental …


Charged Track Reconstruction With Artificial Intelligence For Clas12, Gagik Gavalian, Polykarpos Thomadakis, Angelos Angelopoulos, Nikos Chrisochoides Jan 2024

Charged Track Reconstruction With Artificial Intelligence For Clas12, Gagik Gavalian, Polykarpos Thomadakis, Angelos Angelopoulos, Nikos Chrisochoides

Computer Science Faculty Publications

In this paper, we present the results of charged particle track reconstruction in CLAS12 using artificial intelligence. In our approach, we use neural networks working together to identify tracks based on the raw signals in the Drift Chambers. A Convolutional Auto-Encoder is used to de-noise raw data by removing the hits that do not satisfy the patterns for tracks, and second Multi-Layer Perceptron is used to identify tracks from combinations of clusters in the drift chambers. Our method increases the tracking efficiency by 50% for multi-particle final states already conducted experiments. The de-noising results indicate that future experiments can run …


Short: Can Citations Tell Us About A Paper's Reproducibility? A Case Study Of Machine Learning Papers, Rochana R. Obadage, Sarah M. Rajtmajer, Jian Wu Jan 2024

Short: Can Citations Tell Us About A Paper's Reproducibility? A Case Study Of Machine Learning Papers, Rochana R. Obadage, Sarah M. Rajtmajer, Jian Wu

Computer Science Faculty Publications

The iterative character of work in machine learning (ML) and artificial intelligence (AI) and reliance on comparisons against benchmark datasets emphasize the importance of reproducibility in that literature. Yet, resource constraints and inadequate documentation can make running replications particularly challenging. Our work explores the potential of using downstream citation contexts as a signal of reproducibility. We introduce a sentiment analysis framework applied to citation contexts from papers involved in Machine Learning Reproducibility Challenges in order to interpret the positive or negative outcomes of reproduction attempts. Our contributions include training classifiers for reproducibility-related contexts and sentiment analysis, and exploring correlations between …


Archiving Digital Marketing: Examining Preservation Of Dynamic Content On The Web Through The Lens Of Online Advertisements, Christopher Rauch, Alex H. Poole, Travis Reid, Michele C. Weigle, Michael L. Nelson, Faryaneh Poursardar, Mat Kelly Jan 2024

Archiving Digital Marketing: Examining Preservation Of Dynamic Content On The Web Through The Lens Of Online Advertisements, Christopher Rauch, Alex H. Poole, Travis Reid, Michele C. Weigle, Michael L. Nelson, Faryaneh Poursardar, Mat Kelly

Computer Science Faculty Publications

The transition to digital marketing has revolutionized advertising, reflecting and shaping societal norms and trends. The “Saving Ads” project addresses the challenges of preserving these ephemeral digital artifacts, essential for understanding the evolution of advertising and its socio-cultural impact. The initiative focuses on technical solutions for archiving dynamic online ads and enhancing access to these critical resources for future scholarship. By examining the preservation of online advertisements and suggesting improved approaches for archiving dynamic online content, this project contributes to the documentation of digital history.


Sub-Band Backdoor Attack In Remote Sensing Imagery, Kazi Aminul Islam, Hongyi Wu, Chunsheng Xin, Rui Ning, Liuwan Zhu, Jiang Li Jan 2024

Sub-Band Backdoor Attack In Remote Sensing Imagery, Kazi Aminul Islam, Hongyi Wu, Chunsheng Xin, Rui Ning, Liuwan Zhu, Jiang Li

Electrical & Computer Engineering Faculty Publications

Remote sensing datasets usually have a wide range of spatial and spectral resolutions. They provide unique advantages in surveillance systems, and many government organizations use remote sensing multispectral imagery to monitor security-critical infrastructures or targets. Artificial Intelligence (AI) has advanced rapidly in recent years and has been widely applied to remote image analysis, achieving state-of-the-art (SOTA) performance. However, AI models are vulnerable and can be easily deceived or poisoned. A malicious user may poison an AI model by creating a stealthy backdoor. A backdoored AI model performs well on clean data but behaves abnormally when a planted trigger appears in …


Sscm: A Secured Approach To Supply Chain Management Using Blowfish Optimization, Shitharth Selvarajan, Hariprasath Manoharan, Alaa O. Khadidos, Achyut Shankar, Adil O. Khadidos, Wattana Viriyasitavat, Li Da Xu Jan 2024

Sscm: A Secured Approach To Supply Chain Management Using Blowfish Optimization, Shitharth Selvarajan, Hariprasath Manoharan, Alaa O. Khadidos, Achyut Shankar, Adil O. Khadidos, Wattana Viriyasitavat, Li Da Xu

Information Technology & Decision Sciences Faculty Publications

This study examines the importance of enterprise information systems that link several corporate organisations to share information about diverse products under high security settings. The primary goal of the proposed strategy is to create a direct link between product demand and production to minimise the impact of rising costs. The research motive to make a connection cannot be resolved without suitable data that shows both quantity and quality in each organisation unit. The suggested method is designed to deliver accurate data to authorised end users while preventing any data exposure to unauthorised users. Security cryptographic keys are utilised to create …


Selecting And Evaluating Key Mds-Updrs Activities Using Wearable Devices For Parkinson's Disease Self-Assessment, Yuting Zhao, Xulong Wang, Xiyang Peng, Ziheng Li, Fengtao Nan, Menghui Zhuo, Jun Qi, Yun Yang, Zhong Zhao, Lida Xu, Po Yang Jan 2024

Selecting And Evaluating Key Mds-Updrs Activities Using Wearable Devices For Parkinson's Disease Self-Assessment, Yuting Zhao, Xulong Wang, Xiyang Peng, Ziheng Li, Fengtao Nan, Menghui Zhuo, Jun Qi, Yun Yang, Zhong Zhao, Lida Xu, Po Yang

Information Technology & Decision Sciences Faculty Publications

Parkinson's disease (PD) is a complex neurodegenerative disease in the elderly. This disease has no cure, but assessing these motor symptoms will help slow down that progression. Inertial sensing-based wearable devices (ISWDs) such as mobile phones and smartwatches have been widely employed to analyse the condition of PD patients. However, most studies purely focused on a single activity or symptom, which may ignore the correlation between activities and complementary characteristics. In this paper, a novel technical pipeline is proposed for fine-grained classification of PD severity grades, which identify the most representative activities. We also propose a multi-activities combination scheme based …


Trading Cloud Computing Stocks Using Sma, Xianrong Zheng, Lingyu Li Jan 2024

Trading Cloud Computing Stocks Using Sma, Xianrong Zheng, Lingyu Li

Information Technology & Decision Sciences Faculty Publications

As cloud computing adoption becomes mainstream, the cloud services market offers vast profits. Moreover, serverless computing, the next stage of cloud computing, comes with huge economic potential. To capitalize on this trend, investors are interested in trading cloud stocks. As high-growth technology stocks, investing in cloud stocks is both rewarding and challenging. The research question here is how a trading strategy will perform on cloud stocks. As a result, this paper employs an effective method—Simple Moving Average (SMA)—to trade cloud stocks. To evaluate its performance, we conducted extensive experiments with real market data that spans over 23 years. Results show …


Reducing The Uncertainty In Estimating Soil Microbial-Derived Carbon Storage, Han Hu, Chao Qian, Ke Xue, Rainer Georg Jörgensen, Marco Keiluweit, Chao Liang, Xuefeng Zhu, Ji Chen, Yishen Sun, Haowei Ni, Jixian Ding, Weigen Huang, Jingdong Mao, Rong-Xi Tan, Jizhong Zhou, Thomas W. Crowther, Zhi-Hua Zhou, Jiabao Zhang, Yuting Liang Jan 2024

Reducing The Uncertainty In Estimating Soil Microbial-Derived Carbon Storage, Han Hu, Chao Qian, Ke Xue, Rainer Georg Jörgensen, Marco Keiluweit, Chao Liang, Xuefeng Zhu, Ji Chen, Yishen Sun, Haowei Ni, Jixian Ding, Weigen Huang, Jingdong Mao, Rong-Xi Tan, Jizhong Zhou, Thomas W. Crowther, Zhi-Hua Zhou, Jiabao Zhang, Yuting Liang

Chemistry & Biochemistry Faculty Publications

Soil organic carbon (SOC) is the largest carbon pool in terrestrial ecosystems and plays a crucial role in mitigating climate change and enhancing soil productivity. Microbial-derived carbon (MDC) is the main component of the persistent SOC pool. However, current formulas used to estimate the proportional contribution of MDC are plagued by uncertainties due to limited sample sizes and the neglect of bacterial group composition effects. Here, we compiled the comprehensive global dataset and employed machine learning approaches to refine our quantitative understanding of MDC contributions to total carbon storage. Our efforts resulted in a reduction in the relative standard errors …


Urban Flood Extent Segmentation And Evaluation From Real-World Surveillance Camera Images Using Deep Convolutional Neural Network, Yidi Wang, Yawen Shen, Behrouz Salahshour, Mecit Cetin, Khan Iftekharuddin, Navid Tahvildari, Guoping Huang, Devin K. Harris, Kwame Ampofo, Jonathan L. Goodall Jan 2024

Urban Flood Extent Segmentation And Evaluation From Real-World Surveillance Camera Images Using Deep Convolutional Neural Network, Yidi Wang, Yawen Shen, Behrouz Salahshour, Mecit Cetin, Khan Iftekharuddin, Navid Tahvildari, Guoping Huang, Devin K. Harris, Kwame Ampofo, Jonathan L. Goodall

Civil & Environmental Engineering Faculty Publications

This study explores the use of Deep Convolutional Neural Network (DCNN) for semantic segmentation of flood images. Imagery datasets of urban flooding were used to train two DCNN-based models, and camera images were used to test the application of the models with real-world data. Validation results show that both models extracted flood extent with a mean F1-score over 0.9. The factors that affected the performance included still water surface with specular reflection, wet road surface, and low illumination. In testing, reduced visibility during a storm and raindrops on surveillance cameras were major problems that affected the segmentation of flood extent. …


Modeling Coupled Driving Behavior During Lane Change: A Multi-Agent Transformer Reinforcement Learning Approach, Hongyu Guo, Mehdi Keyvan-Ekbatani, Kun Xie Jan 2024

Modeling Coupled Driving Behavior During Lane Change: A Multi-Agent Transformer Reinforcement Learning Approach, Hongyu Guo, Mehdi Keyvan-Ekbatani, Kun Xie

Civil & Environmental Engineering Faculty Publications

In a lane change (LC) scenario, the lane change vehicle interacts with surrounding vehicles. The interactions not only affect their driving behaviors but also influence the traffic flow. This study aims to model the coupled behavior of the lane changer and the follower in the target lane during LC. Large-scale real-world connected vehicle (CV) data from the Safety Pilot Model Deployment (SPMD) program are used to extract LCs and study vehicle interactions. A multi-agent Transformer-based deep deterministic policy gradient (MA-TDDPG) method is proposed to model the coupled behaviors during LC. The multi-agent framework can handle the multiple agents’ behaviors with …


Implications Of Alternative Communications And Sensing Technologies For Implementing Variable Speed Limit Control Through Connected Vehicles: Sag Curve As A Case Study, Reza Vatani Nezafat, Mecit Cetin, Elizabeth Williams, George F. List Jan 2024

Implications Of Alternative Communications And Sensing Technologies For Implementing Variable Speed Limit Control Through Connected Vehicles: Sag Curve As A Case Study, Reza Vatani Nezafat, Mecit Cetin, Elizabeth Williams, George F. List

Civil & Environmental Engineering Faculty Publications

Connected vehicles (CVs) will enable various applications to improve traffic flow. This paper's focus is to investigate how the potential implementation of variable speed limit (VSL) through different types of communication and sensing technologies on CVs makes it possible to mitigate congestion at a sag curve bottleneck. A VSL algorithm is developed and implemented in a simulation environment for controlling the inflow of vehicles to a sag curve to minimize delays and increase throughput. Both vehicle-to-vehicle (V2V) and infrastructure-to-vehicle (I2V) options for CVs are investigated when implementing the VSL control strategy in a simulation environment. Also, for measuring traffic density …


Exploring Hedonic And Utilitarian Aspects Through Perceived Warmth In Human-Designed Vs. Ai-Generated Fashion, Dooyoung Choi, Ha Kyung Lee Jan 2024

Exploring Hedonic And Utilitarian Aspects Through Perceived Warmth In Human-Designed Vs. Ai-Generated Fashion, Dooyoung Choi, Ha Kyung Lee

Educational Leadership & Workforce Development Faculty Publications

Among various ways in which artificial intelligence (AI) is used in the fashion industry, its utilization in design has sparked public discussion about the potential replacement of human designers by AI. Along with this critical question, it is imminent to examine how consumers would respond to designs by AI. The purpose of this study is to explore consumers’ perceptions toward a fashion product labeled as generated by an AI system, comparing it to the same product labeled as designed by a human designer. Specifically, drawing from existing literature, we examine if the design source affects consumers’ perceptions of a product …


Enhancing Decision-Making In Higher Education: Exploring The Integration Of Chatgpt And Data Visualization Tools In Data Analysis, Tristan Jiang, Elina Liu, Tasawar Baig, Qingrong Li Jan 2024

Enhancing Decision-Making In Higher Education: Exploring The Integration Of Chatgpt And Data Visualization Tools In Data Analysis, Tristan Jiang, Elina Liu, Tasawar Baig, Qingrong Li

University Administration Publications

This chapter explores the potential of integrating conversational AI tools such as ChatGPT with data visualization (DV) tools such as Power BI in higher education settings. A brief history of chatbots is summarized and challenges and opportunities in higher education are outlined. The highlights include AI's prospects for enhancing data-informed decision-making while needing safeguards to mitigate risks. Through a pioneering exercise, we integrated ChatGPT's conversational capabilities with Power BI's interface via API and tested functionality. Suggestions for good practice and implications for higher education are discussed.


Ethical Decision-Making In Older Drivers During Critical Driving Situations: An Online Experiment, Amandeep Singh, Sarah Yahoodik, Yovela Murzello, Samuel Petkac, Yusuke Yamani, Siby Samuel Jan 2024

Ethical Decision-Making In Older Drivers During Critical Driving Situations: An Online Experiment, Amandeep Singh, Sarah Yahoodik, Yovela Murzello, Samuel Petkac, Yusuke Yamani, Siby Samuel

Psychology Faculty Publications

The present study examined the impact of aging on ethical decision-making in simulated critical driving scenarios. 204 participants from North America, grouped into two age groups (18–30 years and 65 years and above), were asked to decide whether their simulated automated vehicle should stay in or change from the current lane in scenarios mimicking the Trolley Problem. Each participant viewed a video clip rendered by the driving simulator at Old Dominion University and pressed the space-bar if they decided to intervene in the control of the simulated automated vehicle in an online experiment. Bayesian hierarchical models were used to analyze …


Reverse-Engineering Of Disinformation Campaigns During The War In Ukraine, Lora Pitman, Ava Baratz, Kelly Morgan, Marcy Alvarado Jan 2024

Reverse-Engineering Of Disinformation Campaigns During The War In Ukraine, Lora Pitman, Ava Baratz, Kelly Morgan, Marcy Alvarado

School of Cybersecurity Faculty Publications

Information operations have long been a part of warfare. Disinformation campaigns, in particular, are usually launched by states in order to mislead and confuse populations in adversarial countries, but also to obtain support for their actions from domestic audiences. These campaigns threaten human security, at the individual level, but also state- and even international security. The invasion of Ukraine by Russia came with a new wave of disinformation not only in Ukraine itself, but also in countries from various other continents. This paper studies the characteristics of the spread of disinformation from the first day of the war in February …


Deep Transfer Learning-Based Bird Species Classification Using Mel Spectrogram Images, Mrinal Kanti Baowaly, Bisnu Chandra Sarkar, Md.Abul Ala Walid, Md. Martuza Ahamad, Bikash Chandra Singh, Eduardo Silva Alvarado, Imran Ashraf, Md. Abdus Samad Jan 2024

Deep Transfer Learning-Based Bird Species Classification Using Mel Spectrogram Images, Mrinal Kanti Baowaly, Bisnu Chandra Sarkar, Md.Abul Ala Walid, Md. Martuza Ahamad, Bikash Chandra Singh, Eduardo Silva Alvarado, Imran Ashraf, Md. Abdus Samad

School of Cybersecurity Faculty Publications

The classification of bird species is of significant importance in the field of ornithology, as it plays an important role in assessing and monitoring environmental dynamics, including habitat modifications, migratory behaviors, levels of pollution, and disease occurrences. Traditional methods of bird classification, such as visual identification, were time-intensive and required a high level of expertise. However, audio-based bird species classification is a promising approach that can be used to automate bird species identification. This study aims to establish an audio-based bird species classification system for 264 Eastern African bird species employing modified deep transfer learning. In particular, the pre-trained EfficientNet …


Robustsentembed: Robust Sentence Embeddings Using Adversarial Self-Supervised Contrastive Learning, Javad Rafiei Asl, Prajwal Panzade, Eduardo Blanco, Daniel Takabi, Zhipeng Cai Jan 2024

Robustsentembed: Robust Sentence Embeddings Using Adversarial Self-Supervised Contrastive Learning, Javad Rafiei Asl, Prajwal Panzade, Eduardo Blanco, Daniel Takabi, Zhipeng Cai

School of Cybersecurity Faculty Publications

Pre-trained language models (PLMs) have consistently demonstrated outstanding performance across a diverse spectrum of natural language processing tasks. Nevertheless, despite their success with unseen data, current PLM-based representations often exhibit poor robustness in adversarial settings. In this paper, we introduce RobustSentEmbed, a self-supervised sentence embedding framework designed to improve both generalization and robustness in diverse text representation tasks and against a diverse set of adversarial attacks. Through the generation of high-risk adversarial perturbations and their utilization in a novel objective function, RobustSentEmbed adeptly learns high-quality and robust sentence embeddings. Our experiments confirm the superiority of RobustSentEmbed over state-of-the-art representations. Specifically, …


Diffusion Model Approach To Simulating Electron-Proton Scattering Events, Peter Devlin, Jian-Wei Qiu, Felix Ringer, Nobuo Sato Jan 2024

Diffusion Model Approach To Simulating Electron-Proton Scattering Events, Peter Devlin, Jian-Wei Qiu, Felix Ringer, Nobuo Sato

Physics Faculty Publications

Generative artificial intelligence is a fast-growing area of research offering various avenues for exploration in high-energy nuclear physics. In this work, we explore the use of generative models for simulating electron-proton collisions relevant to experiments like the Continuous Electron Beam Accelerator Facility and the future Electron-Ion Collider (EIC). These experiments play a critical role in advancing our understanding of nucleons and nuclei in terms of quark and gluon degrees of freedom. The use of generative models for simulating collider events faces several challenges such as the sparsity of the data, the presence of global or eventwide constraints, and steeply falling …


A New Cache Replacement Policy In Named Data Network Based On Fib Table Information, Mehran Hosseinzadeh, Neda Moghim, Samira Taheri, Nasrin Gholami Jan 2024

A New Cache Replacement Policy In Named Data Network Based On Fib Table Information, Mehran Hosseinzadeh, Neda Moghim, Samira Taheri, Nasrin Gholami

VMASC Publications

Named Data Network (NDN) is proposed for the Internet as an information-centric architecture. Content storing in the router’s cache plays a significant role in NDN. When a router’s cache becomes full, a cache replacement policy determines which content should be discarded for the new content storage. This paper proposes a new cache replacement policy called Discard of Fast Retrievable Content (DFRC). In DFRC, the retrieval time of the content is evaluated using the FIB table information, and the content with less retrieval time receives more discard priority. An impact weight is also used to involve both the grade of retrieval …


A Systemic Mapping Study On Intrusion Response Systems, Adel Rezapour, Mohammad Ghasemigol, Daniel Takabi Jan 2024

A Systemic Mapping Study On Intrusion Response Systems, Adel Rezapour, Mohammad Ghasemigol, Daniel Takabi

School of Cybersecurity Faculty Publications

With the increasing frequency and sophistication of network attacks, network administrators are facing tremendous challenges in making fast and optimum decisions during critical situations. The ability to effectively respond to intrusions requires solving a multi-objective decision-making problem. While several research studies have been conducted to address this issue, the development of a reliable and automated Intrusion Response System (IRS) remains unattainable. This paper provides a Systematic Mapping Study (SMS) for IRS, aiming to investigate the existing studies, their limitations, and future directions in this field. A novel semi-automated research methodology is developed to identify and summarize related works. The innovative …


Age Of Sensing Empowered Holographic Isac Framework For Nextg Wireless Networks: A Vae And Drl Approach, Apurba Adhikary, Avi Deb Raha, Yu Qiao, Md. Shirajum Munir, Monishanker Halder, Choong Seon Hong Jan 2024

Age Of Sensing Empowered Holographic Isac Framework For Nextg Wireless Networks: A Vae And Drl Approach, Apurba Adhikary, Avi Deb Raha, Yu Qiao, Md. Shirajum Munir, Monishanker Halder, Choong Seon Hong

School of Cybersecurity Faculty Publications

This paper proposes an artificial intelligence (AI) framework that leverages integrated sensing and communication (ISAC), aided by the age of sensing (AoS) to ensure the timely location updates of the users for a holographic MIMO (HMIMO)- enabled wireless network. The AI-driven framework guarantees optimal power allocation for efficient beamforming by activating the minimal number of grids from the HMIMO base station. An optimization problem is formulated to maximize the sensing utility function, aiming to maximize the signal-to-interference-plus-noise ratio (SINR) of the received signal, beam-pattern gains to improve the sensing SINR of reflected echo signals and maximizing the evidence lower bound …