Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Engineering (5)
- Computer Engineering (4)
- Electrical and Computer Engineering (3)
- Information Security (3)
- Software Engineering (2)
-
- Artificial Intelligence and Robotics (1)
- Business (1)
- Data Storage Systems (1)
- Databases and Information Systems (1)
- Digital Communications and Networking (1)
- Environmental Sciences (1)
- Insurance (1)
- Numerical Analysis and Scientific Computing (1)
- Sustainability (1)
- Systems and Communications (1)
- Theory and Algorithms (1)
- Institution
- Keyword
-
- 2.2 ELECTRICAL, ELECTRONIC, INFORMATION ENGINEERING (2)
- Communication engineering and systems (2)
- Telecommunications (2)
- 1.2 COMPUTER AND INFORMATION SCIENCE (1)
- Adaboost (1)
-
- Advanced metering infrastructure (AMI) (1)
- Automobile insurance fraud (1)
- Aviation automation (1)
- Big data (1)
- Blockchain (1)
- Channel capacity (1)
- Community Detection (1)
- Computer Sciences (1)
- Cryptography (1)
- Cyber protection (1)
- Cyber-attack (1)
- Cybersecurity (1)
- Data Structures and Algorithms (1)
- Data mining (1)
- Data separation (1)
- Decision tree (1)
- Delay constraints (1)
- Edge server (1)
- Effective capacity (EC) (1)
- Fading channels (1)
- Graph Partitioning (1)
- Greybox Fuzzing (1)
- Home area networks (HANs) (1)
- Information management (1)
- Internet of Things (1)
Articles 1 - 12 of 12
Full-Text Articles in Computer Sciences
Deepfuzzer: Accelerated Deep Greybox Fuzzing, Jie Liang, Yu Jiang, Mingzhe Wang, Houbing Song, Kim-Kwang Raymond Choo
Deepfuzzer: Accelerated Deep Greybox Fuzzing, Jie Liang, Yu Jiang, Mingzhe Wang, Houbing Song, Kim-Kwang Raymond Choo
Publications
Fuzzing is one of the most effective vulnerability detection techniques, widely used in practice. However, the performance of fuzzers may be limited by their inability to pass complicated checks, inappropriate mutation frequency, arbitrary mutation strategy, or the variability of the environment. In this paper, we present DeepFuzzer, an enhanced greybox fuzzer with qualified seed generation, balanced seed selection, and hybrid seed mutation. First, we use symbolic execution in a lightweight approach to generate qualified initial seeds which then guide the fuzzer through complex checks. Second, we apply a statistical seed selection algorithm to balance the mutation frequency between different seeds. …
Multilevel Combinatorial Optimization Across Quantum Architectures, Hayato Ushijima-Mwesigwa, Ruslan Shaydulin, Christian F.A. Negre, Susan M. Mniszewski, Yuri Alexeev, Ilya Safro
Multilevel Combinatorial Optimization Across Quantum Architectures, Hayato Ushijima-Mwesigwa, Ruslan Shaydulin, Christian F.A. Negre, Susan M. Mniszewski, Yuri Alexeev, Ilya Safro
Publications
Emerging quantum processors provide an opportunity to explore new approaches for solving traditional problems in the Post Moore's law supercomputing era. However, the limited number of qubits makes it infeasible to tackle massive real-world datasets directly in the near future, leading to new challenges in utilizing these quantum processors for practical purposes. Hybrid quantum-classical algorithms that leverage both quantum and classical types of devices are considered as one of the main strategies to apply quantum computing to large-scale problems. In this paper, we advocate the use of multilevel frameworks for combinatorial optimization as a promising general paradigm for designing hybrid …
Effective Capacity In Wireless Networks: A Comprehensive Survey, Muhammad Amjad, Mubashir Husain Rehmani, Leila Musavian
Effective Capacity In Wireless Networks: A Comprehensive Survey, Muhammad Amjad, Mubashir Husain Rehmani, Leila Musavian
Publications
Low latency applications, such as multimedia communications, autonomous vehicles, and Tactile Internet are the emerging applications for next-generation wireless networks, such as 5th generation (5G) mobile networks. Existing physical layer channel models, however, do not explicitly consider quality of service (QoS) aware related parameters under specific delay constraints. To investigate the performance of low-latency applications in future networks, a new mathematical framework is needed. Effective capacity (EC), which is a link-layer channel model with QoS-awareness, can be used to investigate the performance of wireless networks under certain statistical delay constraints. In this paper, we provide a comprehensive survey on existing …
Hypergraph Partitioning With Embeddings, Justin Sybrandt, Ruslan Shaydulin, Ilya Safro
Hypergraph Partitioning With Embeddings, Justin Sybrandt, Ruslan Shaydulin, Ilya Safro
Publications
The problem of placing circuits on a chip or distributing sparse matrix operations can be modeled as the hypergraph partitioning problem. A hypergraph is a generalization of the traditional graph wherein each "hyperedge" may connect any number of nodes. Hypergraph partitioning, therefore, is the NP-Hard problem of dividing nodes into k" role="presentation" style="box-sizing: border-box; display: inline-table; line-height: normal; font-size: 16px; overflow-wrap: normal; white-space: nowrap; float: none; direction: ltr; max-width: none; max-height: none; min-width: 0px; min-height: 0px; border: 0px; padding: 0px; margin: 0px; color: rgb(93, 93, 93); font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; position: relative;">kk similarly sized disjoint sets while …
Design Of Personnel Big Data Management System Based On Blockchain, Houbing Song, Jian Chen, Zhihan Lv
Design Of Personnel Big Data Management System Based On Blockchain, Houbing Song, Jian Chen, Zhihan Lv
Publications
With the continuous development of information technology, enterprises, universities and governments are constantly stepping up the construction of electronic personnel information management system. The information of hundreds of thousands or even millions of people’s information are collected and stored into the system. So much information provides the cornerstone for the development of big data, if such data is tampered with or leaked, it will cause irreparable serious damage. However, in recent years, electronic archives have exposed a series of problems such as information leakage, information tampering, and information loss, which has made the reform of personnel information management more and …
Adaboost‑Based Security Level Classifcation Of Mobile Intelligent Terminals, Feng Wang, Houbing Song, Dingde Jiang, Hong Wen
Adaboost‑Based Security Level Classifcation Of Mobile Intelligent Terminals, Feng Wang, Houbing Song, Dingde Jiang, Hong Wen
Publications
With the rapid development of Internet of Things, massive mobile intelligent terminals are ready to access edge servers for real-time data calculation and interaction. However, the risk of private data leakage follows simultaneously. As the administrator of all intelligent terminals in a region, the edge server needs to clarify the ability of the managed intelligent terminals to defend against malicious attacks. Therefore, the security level classification for mobile intelligent terminals before accessing the network is indispensable. In this paper, we firstly propose a safety assessment method to detect the weakness of mobile intelligent terminals. Secondly, we match the evaluation results …
Alpha Insurance: A Predictive Analytics Case To Analyze Automobile Insurance Fraud Using Sas Enterprise Miner (Tm), Richard Mccarthy, Wendy Ceccucci, Mary Mccarthy, Leila Halawi
Alpha Insurance: A Predictive Analytics Case To Analyze Automobile Insurance Fraud Using Sas Enterprise Miner (Tm), Richard Mccarthy, Wendy Ceccucci, Mary Mccarthy, Leila Halawi
Publications
Automobile Insurance fraud costs the insurance industry billions of dollars annually. This case study addresses claim fraud based on data extracted from Alpha Insurance’s automobile claim database. Students are provided the business problem and data sets. Initially, the students are required to develop their hypotheses and analyze the data. This includes identification of any missing or inaccurate data values and outliers as well as evaluation of the 22 variables. Next students will develop and optimize their predictive models using five techniques: regression, decision tree, neural network, gradient boosting, and ensemble. Then students will determine which model is the best fit …
Cybersecurity In The Maritime Domain, Gary C. Kessler
Cybersecurity In The Maritime Domain, Gary C. Kessler
Publications
In 2017 and 2018, the maritime industry saw a record number of attempted—and many successful—frauds via email, phishing, or other means. Demonstrated and actual attacks on vessel networks, communication systems, and navigation systems have become practically routine. Port and shipping line networks are increasingly vulnerable to what appears to be increasingly targeted attacks against maritime systems.
Relaxation-Based Coarsening For Multilevel Hypergraph Partitioning, Ruslan Shaydulin, Jie Chen, Ilya Safro
Relaxation-Based Coarsening For Multilevel Hypergraph Partitioning, Ruslan Shaydulin, Jie Chen, Ilya Safro
Publications
Multilevel partitioning methods that are inspired by principles of multiscaling are the most powerful practical hypergraph partitioning solvers. Hypergraph partitioning has many applications in disciplines ranging from scientific computing to data science. In this paper we introduce the concept of algebraic distance on hypergraphs and demonstrate its use as an algorithmic component in the coarsening stage of multilevel hypergraph partitioning solvers. The algebraic distance is a vertex distance measure that extends hyperedge weights for capturing the local connectivity of vertices which is critical for hypergraph coarsening schemes. The practical effectiveness of the proposed measure and corresponding coarsening scheme is demonstrated …
An Overview Of Cryptography (Updated Version 24 January 2019), Gary C. Kessler
An Overview Of Cryptography (Updated Version 24 January 2019), Gary C. Kessler
Publications
There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting health care information. One essential aspect for secure communications is that of cryptography. But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient. The reader is advised, then, that the topics covered here only describe the first of many steps necessary for better security in any number of situations.
Artificial Intelligence In The Aviation Manufacturing Process For Complex Assemblies And Components, Elena Vishnevskaya, Ian Mcandrew, Michael Johnson
Artificial Intelligence In The Aviation Manufacturing Process For Complex Assemblies And Components, Elena Vishnevskaya, Ian Mcandrew, Michael Johnson
Publications
Aviation manufacturing is at the leading edge of technology with materials, designs and processes where automation is not only integral; but complex systems require more advanced systems to produce and verify processes. Critical Infrastructure theory is now used to protect systems and equipment from external software infections and cybersecurity techniques add an extra layer of protection. In this research, it is argued that Artificial Intelligence can reduce these risks and allow complex processes to be less exposed to the threat of external problems, internal errors or mistakes in operation.
Software Defined Networks Based Smart Grid Communication: A Comprehensive Survey, Mubashir Husain Rehmani, Alan Davy, Brendan Jennings, Chadi Assi
Software Defined Networks Based Smart Grid Communication: A Comprehensive Survey, Mubashir Husain Rehmani, Alan Davy, Brendan Jennings, Chadi Assi
Publications
The current power grid is no longer a feasible solution due to ever-increasing user demand of electricity, old infrastructure, and reliability issues and thus require transformation to a better grid a.k.a., smart grid (SG). The key features that distinguish SG from the conventional electrical power grid are its capability to perform two-way communication, demand side management, and real time pricing. Despite all these advantages that SG will bring, there are certain issues which are specific to SG communication system. For instance, network management of current SG systems is complex, time consuming, and done manually. Moreover, SG communication (SGC) system is …