Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

Discipline
Institution
Keyword
Publication Year
Publication
File Type

Articles 691 - 720 of 8110

Full-Text Articles in Computer Engineering

Distributed Neural Network Based Architecture For Ddos Detection In Vehicular Communication Systems, Nicholas Jaton Jul 2021

Distributed Neural Network Based Architecture For Ddos Detection In Vehicular Communication Systems, Nicholas Jaton

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

With the continued development of modern vehicular communication systems, there is an ever growing need for cutting edge security in these systems. A misbehavior detection systems (MDS) is a tool developed to determine if a vehicle is being attacked so that the vehicle can take steps to mitigate harm from the attacker. Some attacks such as distributed denial of service (DDoS) attacks are a concern for vehicular communication systems. During a DDoS attack, multiple nodes are used to flood the target with an overwhelming amount of communication packets. In this thesis, we investigated the current MDS literature and how it …


An Efficient Multi-Message And Multi-Receiver Signcryption Scheme For Heterogeneous Smart Mobile Iot, Jianying Qiu, Kai Fan, Kuan Zhang, Qiang Pan, Hui Li, Yintang Yang Jul 2021

An Efficient Multi-Message And Multi-Receiver Signcryption Scheme For Heterogeneous Smart Mobile Iot, Jianying Qiu, Kai Fan, Kuan Zhang, Qiang Pan, Hui Li, Yintang Yang

Department of Electrical and Computer Engineering: Faculty Publications

The Internet of Things (IoT) is developing towards smart and mobile Internet of Things (SM-IoT), which has made great progress. Due to the inherent heterogeneity, distribution, intensive communication, and resource constraints of SM-IoT, efficient security and privacy communication protocols become a particularly critical challenge. Signcryption has received considerable attention. Various signcryption schemes have been proposed to solve secure communication. However, most of them are low in efficiency, without the consideration of characteristics of the SM-IoT. In this paper, we propose a signcryption scheme to achieve efficient secure multi-message and multi-receiver communication for the heterogeneous and distributed SM-IoT. We develop Identity-based …


Connecting Islamic Technology And The History Of Robotics In Wikidata Via Wikidatabot, Anchalee Panigabutra-Roberts Jul 2021

Connecting Islamic Technology And The History Of Robotics In Wikidata Via Wikidatabot, Anchalee Panigabutra-Roberts

UT Libraries Faculty: Other Publications and Presentations

My current study is on the connection between the history of robotics and Islamic technology. I focused on early Muslim inventors, such as al-Jazari, from Artuqid Dynasty of Jazira in Mesopotamia (modern day Iraq, Syria and Turkey) who is considered to be the father of robotics. He wrote the Book of Knowledge of Ingenious Mechanical Devices, the manuscript treaty published after his passing in 1206, translated by Donald R. Hill, a British engineer and scholar on Islamic technology, in 1974. The manuscript in Arabic (MS. Greaves 27) is archived at the Bodleian Library, University of Oxford, United Kingdom. In …


A Kinetic Model For Blood Biomarker Levels After Mild Traumatic Brain Injury, Sima Azizi, Daniel B. Hier, Blaine Allen, Tayo Obafemi-Ajayi, Gayla R. Olbricht, Matthew S. Thimgan, Donald C. Wunsch Jul 2021

A Kinetic Model For Blood Biomarker Levels After Mild Traumatic Brain Injury, Sima Azizi, Daniel B. Hier, Blaine Allen, Tayo Obafemi-Ajayi, Gayla R. Olbricht, Matthew S. Thimgan, Donald C. Wunsch

Mathematics and Statistics Faculty Research & Creative Works

Traumatic brain injury (TBI) imposes a significant economic and social burden. The diagnosis and prognosis of mild TBI, also called concussion, is challenging. Concussions are common among contact sport athletes. After a blow to the head, it is often difficult to determine who has had a concussion, who should be withheld from play, if a concussed athlete is ready to return to the field, and which concussed athlete will develop a post-concussion syndrome. Biomarkers can be detected in the cerebrospinal fluid and blood after traumatic brain injury and their levels may have prognostic value. Despite significant investigation, questions remain as …


Caries And Restoration Detection Using Bitewing Film Based On Transfer Learning With Cnns, Yi-Cheng Mao, Tsung-Yi Chen, He-Sheng Jhou, Szu-Yin Lin, Sheng-Yu Liu, Yu-An Chen, Yu-Lin Liu, Chiung-An Chen, Yen-Cheng Huang, Shih-Lun Chen, Chun-Wei Li, Patricia Angela R. Abu, Wei-Yuan Chiang Jul 2021

Caries And Restoration Detection Using Bitewing Film Based On Transfer Learning With Cnns, Yi-Cheng Mao, Tsung-Yi Chen, He-Sheng Jhou, Szu-Yin Lin, Sheng-Yu Liu, Yu-An Chen, Yu-Lin Liu, Chiung-An Chen, Yen-Cheng Huang, Shih-Lun Chen, Chun-Wei Li, Patricia Angela R. Abu, Wei-Yuan Chiang

Department of Information Systems & Computer Science Faculty Publications

Caries is a dental disease caused by bacterial infection. If the cause of the caries is detected early; the treatment will be relatively easy; which in turn prevents caries from spreading. The current common procedure of dentists is to first perform radiographic examination on the patient and mark the lesions manually. However; the work of judging lesions and markings requires professional experience and is very time-consuming and repetitive. Taking advantage of the rapid development of artificial intelligence imaging research and technical methods will help dentists make accurate markings and improve medical treatments. It can also shorten the judgment time of …


A Meta-Level Approach For Multilingual Taint Analysis, Damian Lyons, Dino Becaj Jul 2021

A Meta-Level Approach For Multilingual Taint Analysis, Damian Lyons, Dino Becaj

Faculty Publications

It is increasingly common for software developers to leverage the features and ease-of-use of different languages in building software systems. Nonetheless, interaction between different languages has proven to be a source of software engineering concerns. Existing static analysis tools handle the software engineering concerns of monolingual software but there is little general work for multilingual systems despite the increasing visibility of these systems. While recent work in this area has greatly extended the scope of multilingual static analysis systems, the focus has still been on a primary, host language interacting with subsidiary, guest language functions. In this paper we propose …


A Half- Yearly E-Newsletter Of The Department Of Computer Science And Engineering, Manipal Institute Of Technology - Jul 2021, Ashalatha Nayak Dr. Jul 2021

A Half- Yearly E-Newsletter Of The Department Of Computer Science And Engineering, Manipal Institute Of Technology - Jul 2021, Ashalatha Nayak Dr.

Faculty work

No abstract provided.


Geometric Analysis Leads To Adversarial Teaching Of Cybersecurity, Christian Servin, Olga Kosheleva, Vladik Kreinovich Jul 2021

Geometric Analysis Leads To Adversarial Teaching Of Cybersecurity, Christian Servin, Olga Kosheleva, Vladik Kreinovich

Departmental Technical Reports (CS)

As time goes, our civilization becomes more and more dependent on computers and therefore, more and more vulnerable to cyberattacks. Because of this threat, it is very important to make sure that computer science students -- tomorrow's computer professionals -- are sufficiently skilled in cybersecurity. In this paper, we analyze the need for teaching cybersecurity from the geometric viewpoint. We show that the corresponding geometric analysis leads to adversarial teaching -- an empirically effective but not-well-theoretically-understood approach, when the class is divided into sparring mini-teams that try their best to attack each other and defend from each other. Thus, our …


Multi-Agents For Microgrids, Salem Al-Agtash, Nisrein Al-Mutlaq, Mohamed Elabbas, Asma Alkhraibat, Mohamad Al Hashem Jul 2021

Multi-Agents For Microgrids, Salem Al-Agtash, Nisrein Al-Mutlaq, Mohamed Elabbas, Asma Alkhraibat, Mohamad Al Hashem

Computer Science and Engineering

Microgrid systems are built to integrate a generation mix of solar and wind renewable energy resources that are generally intermittent in nature. This paper presents a novel decentralized multi-agent system to securely operate microgrids in real-time while maintaining generation, load balance. Agents provide a normal operation in a grid-connected mode and a contingency operation in an islanded mode for fault handling. Fault handling is especially critical in microgrid operation to simulate possible contingencies and microgrid outages in a real-world scenario. A robust agent design has been implemented using MATLAB-Simulink and Java Agent Development Framework technologies to simulate microgrids with load …


Bayesian Adaptive Path Allocation Techniques For Intra-Datacenter Workloads, Ali Malik, Ruairí De Fréin, Chih-Heng Ke, Hasanen Alyasiri, Obinna Izima Jul 2021

Bayesian Adaptive Path Allocation Techniques For Intra-Datacenter Workloads, Ali Malik, Ruairí De Fréin, Chih-Heng Ke, Hasanen Alyasiri, Obinna Izima

Conference papers

Data center networks (DCNs) are the backbone of many cloud and Internet services. They are vulnerable to link failures, that occur on a daily basis, with a high frequency. Service disruption due to link failure may incur financial losses, compliance breaches and reputation damage. Performance metrics such as packet loss and routing flaps are negatively affected by these failure events. We propose a new Bayesian learning approach towards adaptive path allocation that aims to improve DCN performance by reducing both packet loss and routing flaps ratios. The proposed approach incorporates historical information about link failure and usage probabilities into its …


Wall Detection Via Imu Data Classification In Autonomous Quadcopters, Jason Hughes, Damian Lyons Jul 2021

Wall Detection Via Imu Data Classification In Autonomous Quadcopters, Jason Hughes, Damian Lyons

Faculty Publications

Abstract—An autonomous drone flying near obstacles needs to be able to detect and avoid the obstacles or it will collide with them. In prior work, drones can detect and avoid walls using data from camera, ultrasonic or laser sensors mounted either on the drone or in the environment. It is not always possible to instrument the environment, and sensors added to the drone consume payload and power - both of which are constrained for drones. This paper studies how data mining classification techniques can be used to predict where an obstacle is in relation to the drone based only on …


Vibransee: Enabling Simultaneous Visible Light Communication And Sensing, Ila Nitin Gokarn, Archan Misra Jul 2021

Vibransee: Enabling Simultaneous Visible Light Communication And Sensing, Ila Nitin Gokarn, Archan Misra

Research Collection School Of Computing and Information Systems

Driven by the ubiquitous proliferation of low-cost LED luminaires, visible light communication (VLC) has been established as a high-speed communications technology based on the high-frequency modulation of an optical source. In parallel, Visible Light Sensing (VLS) has recently demonstrated how vision-based at-a-distance sensing of mechanical vibrations (e.g., of factory equipment) can be performed using high frequency optical strobing. However, to date, exemplars of VLC and VLS have been explored in isolation, without consideration of their mutual dependencies. In this work, we explore whether and how high-throughput VLC and high-coverage VLS can be simultaneously supported. We first demonstrate the existence of …


Creation Of A Customized College Student Cybersecurity Awareness Online Learning Solution, Stanley Mierzwa, Iassen Christov, Bruno Lima Jul 2021

Creation Of A Customized College Student Cybersecurity Awareness Online Learning Solution, Stanley Mierzwa, Iassen Christov, Bruno Lima

Center for Cybersecurity

Many businesses, agencies, for-profit and non-profit organizations have implemented cybersecurity awareness training programs for their staff.


Modernization Of Scienttific Mathematics Formula In Technology, Iwasan D. Kejawa Ed.D, Prof. Iwasan D. Kejawa Ed.D Jul 2021

Modernization Of Scienttific Mathematics Formula In Technology, Iwasan D. Kejawa Ed.D, Prof. Iwasan D. Kejawa Ed.D

Department of Mathematics: Faculty Publications

Abstract
Is it true that we solve problem using techniques in form of formula? Mathematical formulas can be derived through thinking of a problem or situation. Research has shown that we can create formulas by applying theoretical, technical, and applied knowledge. The knowledge derives from brainstorming and actual experience can be represented by formulas. It is intended that this research article is geared by an audience of average knowledge level of solving mathematics and scientific intricacies. This work details an introductory level of simple, at times complex problems in a mathematical epidermis and computability and solvability in a Computer Science. …


Dynamic Planning Networks, Norman Tasfi, Miriam A M Capretz Jul 2021

Dynamic Planning Networks, Norman Tasfi, Miriam A M Capretz

Electrical and Computer Engineering Publications

We introduce Dynamic Planning Networks (DPN), a novel architecture for deep reinforcement learning, that combines model-based and model-free aspects for online planning. Our architecture learns to dynamically construct plans using a learned state-transition model by selecting and traversing between simulated states and actions to maximize information before acting. DPN learns to efficiently form plans by expanding a single action conditional state transition at a time instead of exhaustively evaluating each action, reducing the number of state-transitions used during planning. We observe emergent planning patterns in our agent, including classical search methods such as breadth-first and depth-first search. DPN shows improved …


Scholarly Communication On Web 3.0: An Analysis Based On Web Of Science, Arunkumar V R Jul 2021

Scholarly Communication On Web 3.0: An Analysis Based On Web Of Science, Arunkumar V R

Library Philosophy and Practice (e-journal)

For investigating the structure and process of academic communication, bibliometrics provides an excellent set of methodologies and measures. Web 3.0 is a concept that incorporates artificial intelligence and other advanced technologies and brings forth new opportunities and challenges to information scientists. The present study provides an evaluation of the scientific productivity related to Web 3.0 technologies in Web of Science (WoS) during the period of 2007 to 2020. The country-wise distribution of the literature revealed that the majorities (22.330%) of the documents were published from the USA, followed by Spain, and scholarly output of Web 3.0 literature received a total …


Visualizing Publication Trends In Webology Journal: A Bibliometric Review Based On The Scopus Database (2006-2020), Ayush Kumar Patel, Madan Singh, Kunwar Singh, Avadhesh Kumar Patel, Akhilesh Kumar Varma, Ramesh Kuri Jul 2021

Visualizing Publication Trends In Webology Journal: A Bibliometric Review Based On The Scopus Database (2006-2020), Ayush Kumar Patel, Madan Singh, Kunwar Singh, Avadhesh Kumar Patel, Akhilesh Kumar Varma, Ramesh Kuri

Library Philosophy and Practice (e-journal)

This study aims to explore the publication trends in Webology Journal. The Scopus database was chosen for the extraction of bibliographic data for the period 2006 to 2020. Then, VOSviewer software was used to analyse the data and generate visualization network maps. A total of 295 publications were found during the study period. The various bibliometrics indicators have been applied to identify the publication trends of Webology Journal. The finding revealed that the highest number of papers (92) and the maximum number of citations (273) appeared in 2020. Among the most contributing nations, Iran has contributed 63 documents, followed by …


Website Based Library Service Development For Elementary School Library Services (Case Study: A Private Elementary School Library In Surabaya), Nasa Zata Dina, Iva Nur Annisya, Nyoman Juniarta Jul 2021

Website Based Library Service Development For Elementary School Library Services (Case Study: A Private Elementary School Library In Surabaya), Nasa Zata Dina, Iva Nur Annisya, Nyoman Juniarta

Library Philosophy and Practice (e-journal)

This study was conducted to develop library services at a private elementary school by developing a system using the waterfall method and PHP framework. It is developed to provide website based library. Many users, especially librarian, experience restlessness in cataloging, processing and lending services because all the services had been processed manually. Librarian’s workload increased because there is limited number of people work in the library. The purpose of this research is to make librarian easier to provide library services which are packaged in a website based library services. This study uses the waterfall method to develop library services. The …


Securing The Internet Of Things Communication Using Named Data Networking Approaches, Sanjeev Kaushik Ramani Jun 2021

Securing The Internet Of Things Communication Using Named Data Networking Approaches, Sanjeev Kaushik Ramani

FIU Electronic Theses and Dissertations

The rapid advancement in sensors and their use in devices has led to the drastic increase of Internet-of-Things (IoT) device applications and usage. A fundamental requirement of an IoT-enabled ecosystem is the device’s ability to communicate with other devices, humans etc. IoT devices are usually highly resource constrained and come with varying capabilities and features. Hence, a host-based communication approach defined by the TCP/IP architecture relying on securing the communication channel between the hosts displays drawbacks especially when working in a highly chaotic environment (common with IoT applications). The discrepancies between requirements of the application and the network supporting the …


Web Services In Cloud Computing Research: Insights From Scientometric, Sivankalai S, Virumandi A Jun 2021

Web Services In Cloud Computing Research: Insights From Scientometric, Sivankalai S, Virumandi A

Library Philosophy and Practice (e-journal)

The research is the outcome of the investigation of 4035 papers on web services and cloud study, as covered in the Web of Knowledge core collection database during 2010 - 2019, going through an overall group author contribution of 29.00% during the period, Iosup, Alexandru, et al with a citation impact per paper of 44.10% and a journal impact per paper of 5.768 by Future generation computer systems-the international journal of science. The world's web services and cloud research output is diverse, with the top three open access research journals accounting for 66.59% (All Open Access 44.03%, DOAJ Gold 17.41%, …


Towards Semantic Integration Of Machine Vision Systems To Aid Manufacturing Event Understanding, Kaishu Xia, Clint Saidy, Max Kirkpatrick, Noble Anumbe, Amit Sheth, Ramy Harik Jun 2021

Towards Semantic Integration Of Machine Vision Systems To Aid Manufacturing Event Understanding, Kaishu Xia, Clint Saidy, Max Kirkpatrick, Noble Anumbe, Amit Sheth, Ramy Harik

Publications

A manufacturing paradigm shift from conventional control pyramids to decentralized, service-oriented, and cyber-physical systems (CPSs) is taking place in today’s 4th industrial revolution. Generally accepted roles and implementation recipes of cyber systems are expected to be standardized in the future of manufacturing industry. The authors intend to develop a novel CPS-enabled control architecture that accommodates: (1) intelligent information systems involving domain knowledge, empirical model, and simulation; (2) fast and secured industrial communication networks; (3) cognitive automation by rapid signal analytics and machine learning (ML) based feature extraction; (4) interoperability between machine and human. Semantic integration of process indicators is fundamental …


A Quantitative Validation Of Multi-Modal Image Fusion And Segmentation For Object Detection And Tracking, Nicholas Lahaye, Michael J. Garay, Brian D. Bue, Hesham El-Askary, Erik Linstead Jun 2021

A Quantitative Validation Of Multi-Modal Image Fusion And Segmentation For Object Detection And Tracking, Nicholas Lahaye, Michael J. Garay, Brian D. Bue, Hesham El-Askary, Erik Linstead

Mathematics, Physics, and Computer Science Faculty Articles and Research

In previous works, we have shown the efficacy of using Deep Belief Networks, paired with clustering, to identify distinct classes of objects within remotely sensed data via cluster analysis and qualitative analysis of the output data in comparison with reference data. In this paper, we quantitatively validate the methodology against datasets currently being generated and used within the remote sensing community, as well as show the capabilities and benefits of the data fusion methodologies used. The experiments run take the output of our unsupervised fusion and segmentation methodology and map them to various labeled datasets at different levels of global …


Mac For Machine-Type Communications In Industrial Iot—Part Ii: Scheduling And Numerical Results, Jie Gao, Mushu Li, Weihua Zhuang, Xuemin Shen, Xu Li Jun 2021

Mac For Machine-Type Communications In Industrial Iot—Part Ii: Scheduling And Numerical Results, Jie Gao, Mushu Li, Weihua Zhuang, Xuemin Shen, Xu Li

Electrical and Computer Engineering Faculty Research and Publications

In the second part of this article, we develop a centralized packet transmission scheduling scheme to pair with the protocol designed in Part I and complete our medium access control (MAC) design for machine-type communications in the industrial Internet of Things. For the networking scenario, fine-grained scheduling that attends to each device becomes necessary, given stringent Quality-of-Service (QoS) requirements and diversified service types, but prohibitively complex for a large number of devices. To address this challenge, we propose a scheduling solution in two steps. First, we develop algorithms for device assignment based on the analytical results from Part I, when …


Mac For Machine-Type Communications In Industrial Iot—Part I: Protocol Design And Analysis, Jie Gao, Weihua Zhuang, Mushu Li, Xuemin Shen, Xu Li Jun 2021

Mac For Machine-Type Communications In Industrial Iot—Part I: Protocol Design And Analysis, Jie Gao, Weihua Zhuang, Mushu Li, Xuemin Shen, Xu Li

Electrical and Computer Engineering Faculty Research and Publications

In this two-part paper, we propose a novel medium access control (MAC) protocol for machine-type communications in the Industrial Internet of Things. The considered use case features a limited geographical area and a massive number of devices with sporadic data traffic and different priority types. We target supporting the devices while satisfying their Quality-of-Service (QoS) requirements with a single access point and a single channel, which necessitates a customized design that can significantly improve the MAC performance. In Part I of this paper, we present the MAC protocol that comprises a new slot structure, corresponding channel access procedure, and mechanisms …


Three Degrees Of Freedom Robotic Arm And Its Digital Twin Using Simulink – A Bibliometric Analysis, Bharath Suthar Mr., Arunkumar Bongale Dr, Satish Kumar Dr, Anupkumar Bongale Dr Jun 2021

Three Degrees Of Freedom Robotic Arm And Its Digital Twin Using Simulink – A Bibliometric Analysis, Bharath Suthar Mr., Arunkumar Bongale Dr, Satish Kumar Dr, Anupkumar Bongale Dr

Library Philosophy and Practice (e-journal)

The 3-degree Digital Twin robotic arm for freedom can diagnose the joints off-board by placing a torque in the robotic arm joint. MATLAB, Simulink®, SimscapeTM, and Simscape Multibody were the basis of this model. Virtual space with a virtual robot arm was connected to a physical space that was a 3D printed replica of the virtual space and robot arm, built using Unity (a modern Game Engine). The arm in the Digital Twin model was created using the hardware prototype’s dimensions, which were then used to simulate a real-world situation. With its revolute joints, the arm has a certain degree …


Personalized Digital Phenotype Score, Healthcare Management And Intervention Strategies Using Knowledge Enabled Digital Health Framework For Pediatric Asthma, Utkarshani Jaimini, Amit Sheth Jun 2021

Personalized Digital Phenotype Score, Healthcare Management And Intervention Strategies Using Knowledge Enabled Digital Health Framework For Pediatric Asthma, Utkarshani Jaimini, Amit Sheth

Publications

Asthma is a personalized, and multi-trigger respiratory condition which requires continuous monitoring and management of symptoms and medication adherence. We developed kHealth: Knowledge-enabled Digital Healthcare Framework to monitor and manage the asthma symptoms, medication adherence, lung function, daily activity, sleep quality, indoor, and outdoor environmental triggers of pediatric asthma patients. The kHealth framework collects up to 1852 data points per patient per day. It is practically impossible for the clinicians, parents, and the patient to analyze this vast amount of multimodal data collected from the kHealth framework. In this chapter, we describe the personalized scores, clinically relevant asthma categorization using …


Hierarchical Reinforcement Learning: A Comprehensive Survey, Shubham Pateria, Budhitama Subagdja, Ah-Hwee Tan, Chai Quek Jun 2021

Hierarchical Reinforcement Learning: A Comprehensive Survey, Shubham Pateria, Budhitama Subagdja, Ah-Hwee Tan, Chai Quek

Research Collection School Of Computing and Information Systems

Hierarchical Reinforcement Learning (HRL) enables autonomous decomposition of challenging long-horizon decision-making tasks into simpler subtasks. During the past years, the landscape of HRL research has grown profoundly, resulting in copious approaches. A comprehensive overview of this vast landscape is necessary to study HRL in an organized manner. We provide a survey of the diverse HRL approaches concerning the challenges of learning hierarchical policies, subtask discovery, transfer learning, and multi-agent learning using HRL. The survey is presented according to a novel taxonomy of the approaches. Based on the survey, a set of important open problems is proposed to motivate the future …


Ultrapin: Inferring Pin Entries Via Ultrasound, Liu, Ximing, Robert H. Deng, Robert H. Deng Jun 2021

Ultrapin: Inferring Pin Entries Via Ultrasound, Liu, Ximing, Robert H. Deng, Robert H. Deng

Research Collection School Of Computing and Information Systems

While PIN-based user authentication systems such as ATM have long been considered to be secure enough, they are facing new attacks, named UltraPIN, which can be launched from commodity smartphones. As a target user enters a PIN on a PIN-based user authentication system, an attacker may use UltraPIN to infer the PIN from a short distance (50 cm to 100 cm). In this process, UltraPIN leverages smartphone speakers to issue human-inaudible ultrasound signals and uses smartphone microphones to keep recording acoustic signals. It applies a series of signal processing techniques to extract high-quality feature vectors from low-energy and high-noise signals …


When Program Analysis Meets Bytecode Search: Targeted And Efficient Inter-Procedural Analysis Of Modern Android Apps In Backdroid, Daoyuan Wu, Debin Gao, Robert H. Deng, Rocky Chang Jun 2021

When Program Analysis Meets Bytecode Search: Targeted And Efficient Inter-Procedural Analysis Of Modern Android Apps In Backdroid, Daoyuan Wu, Debin Gao, Robert H. Deng, Rocky Chang

Research Collection School Of Computing and Information Systems

Widely-used Android static program analysis tools,e.g., Amandroid and FlowDroid, perform the whole-app interprocedural analysis that is comprehensive but fundamentallydifficult to handle modern (large) apps. The average app size hasincreased three to four times over five years. In this paper, weexplore a new paradigm of targeted inter-procedural analysis thatcan skip irrelevant code and focus only on the flows of securitysensitive sink APIs. To this end, we propose a technique calledon-the-fly bytecode search, which searches the disassembled appbytecode text just in time when a caller needs to be located. In thisway, it guides targeted (and backward) inter-procedural analysisstep by step until reaching …


Minimum Coresets For Maxima Representation Of Multidimensional Data, Yanhao Wang, Michael Mathioudakis, Yuchen Li, Kian-Lee Tan Jun 2021

Minimum Coresets For Maxima Representation Of Multidimensional Data, Yanhao Wang, Michael Mathioudakis, Yuchen Li, Kian-Lee Tan

Research Collection School Of Computing and Information Systems

Coresets are succinct summaries of large datasets such that, for a given problem, the solution obtained from a coreset is provably competitive with the solution obtained from the full dataset. As such, coreset-based data summarization techniques have been successfully applied to various problems, e.g., geometric optimization, clustering, and approximate query processing, for scaling them up to massive data. In this paper, we study coresets for the maxima representation of multidimensional data: Given a set �� of points in R �� , where �� is a small constant, and an error parameter �� ∈ (0, 1), a subset �� ⊆ �� …