Open Access. Powered by Scholars. Published by Universities.®
Graphics and Human Computer Interfaces Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Machine Learning (2)
- Privacy (2)
- Abusive Language (1)
- Accelerometer (1)
- Address Space Layout Randomization (ASLR) (1)
-
- Algorithmic fairness (1)
- Allocation/Deallocation (1)
- Asset pattern (1)
- BERT (1)
- Browser extension (1)
- Cybersecurity (1)
- Data Collection (1)
- Data Integrity (1)
- Data Mining (1)
- Data recovery (1)
- Devices Listening to You (1)
- Differential privacy (1)
- Fairness and diversity (1)
- Fog Computing (1)
- Global memory (1)
- Golden reference library (1)
- Graphics Processing Unit (GPU) (1)
- Hardware trojan (1)
- Home Security (1)
- IPhone (1)
- Information Retrieval (1)
- Intelligent Systems (1)
- Machine learning (1)
- Malicious Transactions (1)
- Marketing (1)
Articles 1 - 9 of 9
Full-Text Articles in Graphics and Human Computer Interfaces
Multivariate Fairness For Paper Selection, Reem Alsaffar
Multivariate Fairness For Paper Selection, Reem Alsaffar
Graduate Theses and Dissertations
Peer review is the process by which publishers select the best publications for inclusion in a journal or a conference. Bias in the peer review process can impact which papers are selected for inclusion in conferences and journals. Although often implicit, race, gender and other demographics can prevent members of underrepresented groups from presenting at major conferences. To try to avoid bias, many conferences use a double-blind review process to increase fairness during reviewing. However, recent studies argue that the bias has not been removed completely. Our research focuses on developing fair algorithms that correct for these biases and select …
Framework Of Hardware Trojan Detection Leveraging Structural Checking Tool, Rafael Dacanay Del Carmen
Framework Of Hardware Trojan Detection Leveraging Structural Checking Tool, Rafael Dacanay Del Carmen
Graduate Theses and Dissertations
Since there is a significant demand for obtaining third-party soft Intellectual Property (IP) by first-party integrated circuit (IC) vendors, it is becoming easier for adversaries to insert malicious logic known as hardware Trojans into designs. Due to this, vendors need to find ways to screen the third-party IPs for possible security threats and then mitigate them. The development of the Structural Checking (SC) tool provides a solution to this issue. This tool analyzes the structure of an unknown soft IP design and creates a network of all the signals within the design and how they are connected to each other. …
Analysis Of Gpu Memory Vulnerabilities, Jarrett Hoover
Analysis Of Gpu Memory Vulnerabilities, Jarrett Hoover
Computer Science and Computer Engineering Undergraduate Honors Theses
Graphics processing units (GPUs) have become a widely used technology for various purposes. While their intended use is accelerating graphics rendering, their parallel computing capabilities have expanded their use into other areas. They are used in computer gaming, deep learning for artificial intelligence and mining cryptocurrencies. Their rise in popularity led to research involving several security aspects, including this paper’s focus, memory vulnerabilities. Research documented many vulnerabilities, including GPUs not implementing address space layout randomization, not zeroing out memory after deallocation, and not initializing newly allocated memory. These vulnerabilities can lead to a victim’s sensitive data being leaked to an …
Using A Bert-Based Ensemble Network For Abusive Language Detection, Noah Ballinger
Using A Bert-Based Ensemble Network For Abusive Language Detection, Noah Ballinger
Computer Science and Computer Engineering Undergraduate Honors Theses
Over the past two decades, online discussion has skyrocketed in scope and scale. However, so has the amount of toxicity and offensive posts on social media and other discussion sites. Despite this rise in prevalence, the ability to automatically moderate online discussion platforms has seen minimal development. Recently, though, as the capabilities of artificial intelligence (AI) continue to improve, the potential of AI-based detection of harmful internet content has become a real possibility. In the past couple years, there has been a surge in performance on tasks in the field of natural language processing, mainly due to the development of …
Automated Privacy Protection For Mobile Device Users And Bystanders In Public Spaces, David Darling
Automated Privacy Protection For Mobile Device Users And Bystanders In Public Spaces, David Darling
Graduate Theses and Dissertations
As smartphones have gained popularity over recent years, they have provided usersconvenient access to services and integrated sensors that were previously only available through larger, stationary computing devices. This trend of ubiquitous, mobile devices provides unparalleled convenience and productivity for users who wish to perform everyday actions such as taking photos, participating in social media, reading emails, or checking online banking transactions. However, the increasing use of mobile devices in public spaces by users has negative implications for their own privacy and, in some cases, that of bystanders around them.
Specifically, digital photography trends in public have negative implications for …
Design And Development Of Techniques To Ensure Integrity In Fog Computing Based Databases, Abdulwahab Fahad S. Alazeb
Design And Development Of Techniques To Ensure Integrity In Fog Computing Based Databases, Abdulwahab Fahad S. Alazeb
Graduate Theses and Dissertations
The advancement of information technology in coming years will bring significant changes to the way sensitive data is processed. But the volume of generated data is rapidly growing worldwide. Technologies such as cloud computing, fog computing, and the Internet of things (IoT) will offer business service providers and consumers opportunities to obtain effective and efficient services as well as enhance their experiences and services; increased availability and higher-quality services via real-time data processing augment the potential for technology to add value to everyday experiences. This improves human life quality and easiness. As promising as these technological innovations, they are prone …
Brave New World Reboot: Technology’S Role In Consumer Manipulation And Implications For Privacy And Transparency, Allie Mertensotto
Brave New World Reboot: Technology’S Role In Consumer Manipulation And Implications For Privacy And Transparency, Allie Mertensotto
Marketing Undergraduate Honors Theses
Most consumers are aware that our data is being obtained and collected through the use of our devices we keep in our homes or even on our person throughout the day. But, it is understated how much data is being collected. Conversations you have with your peers – in a close proximity of a device – are being used to tailor advertising. The advertisements you receive on your devices are uniquely catered to your individual person, due to the fact it consistently uses our data to produce efficient and personal ads. On the flip side, our government is also tapping …
Achieving Differential Privacy And Fairness In Machine Learning, Depeng Xu
Achieving Differential Privacy And Fairness In Machine Learning, Depeng Xu
Graduate Theses and Dissertations
Machine learning algorithms are used to make decisions in various applications, such as recruiting, lending and policing. These algorithms rely on large amounts of sensitive individual information to work properly. Hence, there are sociological concerns about machine learning algorithms on matters like privacy and fairness. Currently, many studies only focus on protecting individual privacy or ensuring fairness of algorithms separately without taking consideration of their connection. However, there are new challenges arising in privacy preserving and fairness-aware machine learning. On one hand, there is fairness within the private model, i.e., how to meet both privacy and fairness requirements simultaneously in …
A Home Security System Based On Smartphone Sensors, Michael Mahler
A Home Security System Based On Smartphone Sensors, Michael Mahler
Graduate Theses and Dissertations
Several new smartphones are released every year. Many people upgrade to new phones, and their old phones are not put to any further use. In this paper, we explore the feasibility of using such retired smartphones and their on-board sensors to build a home security system. We observe that door-related events such as opening and closing have unique vibration signatures when compared to many types of environmental vibrational noise. These events can be captured by the accelerometer of a smartphone when the phone is mounted on a wall near a door. The rotation of a door can also be captured …