Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

55,200 Full-Text Articles 71,980 Authors 23,183,657 Downloads 375 Institutions

All Articles in Computer Sciences

Faceted Search

55,200 full-text articles. Page 1111 of 2009.

Automatically Locating Malicious Packages In Piggybacked Android Apps, Li LI, Daoyuan LI, Tegawende BISSYANDE, Jacques KLEIN, Haipeng CAI, David LO, Yves LE TRAON 2017 Singapore Management University

Automatically Locating Malicious Packages In Piggybacked Android Apps, Li Li, Daoyuan Li, Tegawende Bissyande, Jacques Klein, Haipeng Cai, David Lo, Yves Le Traon

Research Collection School Of Computing and Information Systems

To devise efficient approaches and tools for detecting malicious packages in the Android ecosystem, researchers are increasingly required to have a deep understanding of malware. There is thus a need to provide a framework for dissecting malware and locating malicious program fragments within app code in order to build a comprehensive dataset of malicious samples. Towards addressing this need, we propose in this work a tool-based approach called HookRanker, which provides ranked lists of potentially malicious packages based on the way malware behaviour code is triggered. With experiments on a ground truth set of piggybacked apps, we are able to …


Tlel: A Two-Layer Ensemble Learning Approach For Just-In-Time Defect Prediction, Xinli YANG, David LO, Xin XIA, Jianling SUN 2017 Zhejiang University

Tlel: A Two-Layer Ensemble Learning Approach For Just-In-Time Defect Prediction, Xinli Yang, David Lo, Xin Xia, Jianling Sun

Research Collection School Of Computing and Information Systems

Context: Defect prediction is a very meaningful topic, particularly at change-level. Change-level defect prediction, which is also referred as just-in-time defect prediction, could not only ensure software quality in the development process, but also make the developers check and fix the defects in time [1].Objective: Ensemble learning becomes a hot topic in recent years. There have been several studies about applying ensemble learning to defect prediction [2–5]. Traditional ensemble learning approaches only have one layer, i.e., they use ensemble learning once. There are few studies that leverages ensemble learning twice or more. To bridge this research gap, we try to …


Iupdater: Low Cost Rss Fingerprints Updating For Device-Free Localization, Liqiong CHANG, Jie XIONG, Yu WANG, Xiaojiang CHEN, Junhao HU, Dingyi FANG 2017 Northwest University

Iupdater: Low Cost Rss Fingerprints Updating For Device-Free Localization, Liqiong Chang, Jie Xiong, Yu Wang, Xiaojiang Chen, Junhao Hu, Dingyi Fang

Research Collection School Of Computing and Information Systems

While most existing indoor localization techniques are device-based, many emerging applications such as intruder detection and elderly monitoring drive the needs of device-free localization, in which the target can be localized without any device attached. Among the diverse techniques, received signal strength (RSS) fingerprint-based methods are popular because of the wide availability of RSS readings in most commodity hardware. However, current fingerprint-based systems suffer from high human labor cost to update the fingerprint database and low accuracy due to the large degree of RSS variations. In this paper, we propose a fingerprint-based device-free localization system named iUpdater to significantly reduce …


Multi-Authority Abs Supporting Dendritic Access Structure, Ruo MO, Jian-feng MA, Ximeng LIU, Qi LI 2017 Xidian University

Multi-Authority Abs Supporting Dendritic Access Structure, Ruo Mo, Jian-Feng Ma, Ximeng Liu, Qi Li

Research Collection School Of Computing and Information Systems

Attribute-based signature (ABS), which could realize fine-grained access control, was considered to be an importantmethod for anonymous authentication in cloud computing. However, normal ABS only provided simple accesscontrol through threshold structure and thus could not cope with the large-scale attribute sets of users in the cloud. Moreover,the attribute sets were supervised by only one attribute authority, which increased the cost of computation and storage.The whole system was in danger of collapsing once the attribute authority was breached. Aiming at tackling theproblems above, a novel scheme, was proposed called multi-authority ABS supporting dendritic access structure whichsupported any AND, OR and threshold …


Attribute-Based Encryption With Expressive And Authorized Keyword Search, Hui CUI, Robert H. DENG, Joseph K. LIU, Yingjiu LI 2017 Singapore Management University

Attribute-Based Encryption With Expressive And Authorized Keyword Search, Hui Cui, Robert H. Deng, Joseph K. Liu, Yingjiu Li

Research Collection School Of Computing and Information Systems

To protect data security and privacy in cloud storage systems, a common solution is to outsource data in encrypted forms so that the data will remain secure and private even if storage systems are compromised. The encrypted data, however, must be pliable to search and access control. In this paper, we introduce a notion of attribute-based encryption with expressive and authorized keyword search (ABE-EAKS) to support both expressive keyword search and fine-grained access control over encrypted data in the cloud. In ABE-EAKS, every data user is associated with a set of attributes and is issued a private attribute-key corresponding to …


Fast Adaptation Of Activity Sensing Policies In Mobile Devices, Mohammad Abu ALSHEIKH, Dusit NIYATO, Shaowei LIN, Hwee-Pink TAN, Dong In KIM 2017 Singapore Management University

Fast Adaptation Of Activity Sensing Policies In Mobile Devices, Mohammad Abu Alsheikh, Dusit Niyato, Shaowei Lin, Hwee-Pink Tan, Dong In Kim

Research Collection School Of Computing and Information Systems

With the proliferation of sensors, such as accelerometers,in mobile devices, activity and motion tracking has become a viable technologyto understand and create an engaging user experience. This paper proposes afast adaptation and learning scheme of activity tracking policies when userstatistics are unknown a priori, varying with time, and inconsistent for differentusers. In our stochastic optimization, user activities are required to besynchronized with a backend under a cellular data limit to avoid overchargesfrom cellular operators. The mobile device is charged intermittently usingwireless or wired charging for receiving the required energy for transmission andsensing operations. Firstly, we propose an activity tracking policy …


Cyber Foraging: Fifteen Years Later, Rajesh Krishna BALAN, Jason FLINN 2017 Singapore Management University

Cyber Foraging: Fifteen Years Later, Rajesh Krishna Balan, Jason Flinn

Research Collection School Of Computing and Information Systems

Revisiting Mahadev Satyanarayanan's original vision of cyber foraging and reflecting on the last 15 years of related research, the authors discuss the major accomplishments achieved as well as remaining challenges. They also look to current and future applications that could provide compelling application scenarios for making cyber foraging a widely deployed technology. This article is part of a special issue on pervasive computing revisited.


Mopeye: Opportunistic Monitoring Of Per-App Mobile Network Performance, Daoyuan WU, Rocky K. C. CHANG, Weichao LI, Eric K. T. CHENG, Debin GAO 2017 Singapore Management University

Mopeye: Opportunistic Monitoring Of Per-App Mobile Network Performance, Daoyuan Wu, Rocky K. C. Chang, Weichao Li, Eric K. T. Cheng, Debin Gao

Research Collection School Of Computing and Information Systems

Crowdsourcing mobile user’s network performance has become an effective way of understanding and improving mobile network performance and user quality-of-experience. However, the current measurement method is still based on the landline measurement paradigm in which a measurement app measures the path to fixed (measurement or web) servers. In this work, we introduce a new paradigm of measuring per-app mobile network performance. We design and implement MopEye, an Android app to measure network round-trip delay for each app whenever there is app traffic. This opportunistic measurement can be conducted automatically without user intervention. Therefore, it can facilitate a large-scale and long-term …


How Artificial Intelligence Is Impacting Manufacturing Industry, Deepak SRINIVASAN, Maitreyi Ramesh SWAROOP, Balaji RAJARAM, Sri Krishan IYER 2017 University of Florida

How Artificial Intelligence Is Impacting Manufacturing Industry, Deepak Srinivasan, Maitreyi Ramesh Swaroop, Balaji Rajaram, Sri Krishan Iyer

Research Collection School Of Computing and Information Systems

In this survey, we study the impact of Artificial Intelligence (AI) on manufacturing sector. AI methods can be utilized to make new thoughts several ways: by delivering novel mixes of wellknown thoughts; by investigating the capability of theoretical spaces; and by making changes that empower the era of unexplored thoughts. AI will have less trouble in displaying the era of new thoughts than in automating their assessment. We describe the advances that have been made on AI in manufacturing industry. We close with how to overcome the issues in this area.


Elderly Friendliness Evaluation Of Mobile Assistants, Di WANG, Xinjia YU, Simon FAUVEL, Ah-hwee TAN, Chunyan MIAO 2017 Singapore Management University

Elderly Friendliness Evaluation Of Mobile Assistants, Di Wang, Xinjia Yu, Simon Fauvel, Ah-Hwee Tan, Chunyan Miao

Research Collection School Of Computing and Information Systems

The rapidly increasing elderly population in many developed and developing countries poses great challenges to elderly care systems. To alleviate the problem of a shrinking workforce to deliver elderly care, using mobile intelligent assistants to lessen the caregivers' workload becomes a promising solution. However, the friendliness of such mobile assistants, which is seldom measured in a quantitative manner, may hinder their acceptance by the elderly users. In this paper, we propose a formalized systematic approach named Elderly Friendliness Evaluation Methodology (EFEM) to measure the elderly friendliness of any product, service or system. Furthermore, we apply EFEM to evaluate the elderly …


Deep Learning On Lie Groups For Skeleton-Based Action Recognition, Zhiwu HUANG, C. WAN, T. PROBST, Gool L. VAN 2017 Singapore Management University

Deep Learning On Lie Groups For Skeleton-Based Action Recognition, Zhiwu Huang, C. Wan, T. Probst, Gool L. Van

Research Collection School Of Computing and Information Systems

In recent years, skeleton-based action recognition has become a popular 3D classification problem. State-of-the-art methods typically first represent each motion sequence as a high-dimensional trajectory on a Lie group with an additional dynamic time warping, and then shallowly learn favorable Lie group features. In this paper we incorporate the Lie group structure into a deep network architecture to learn more appropriate Lie group features for 3D action recognition. Within the network structure, we design rotation mapping layers to transform the input Lie group features into desirable ones, which are aligned better in the temporal domain. To reduce the high feature …


Mergeable And Revocable Identity-Based Encryption, Shengmin XU, Guomin YANG, Yi MU, Willy SUSILO 2017 Singapore Management University

Mergeable And Revocable Identity-Based Encryption, Shengmin Xu, Guomin Yang, Yi Mu, Willy Susilo

Research Collection School Of Computing and Information Systems

Identity-based encryption (IBE) has been extensively studied and widely used in various applications since Boneh and Franklin proposed the first practical scheme based on pairing. In that seminal work, it has also been pointed out that providing an efficient revocation mechanism for IBE is essential. Hence, revocable identity-based encryption (RIBE) has been proposed in the literature to offer an efficient revocation mechanism. In contrast to revocation, another issue that will also occur in practice is to combine two or multiple IBE systems into one system, e.g., due to the merge of the departments or companies. However, this issue has not …


Sparsity Based Reflection Removal Using External Patch Search, Renjie WAN, Boxin SHI, Ah-hwee TAN, Alex C. KOT 2017 Singapore Management University

Sparsity Based Reflection Removal Using External Patch Search, Renjie Wan, Boxin Shi, Ah-Hwee Tan, Alex C. Kot

Research Collection School Of Computing and Information Systems

Reflection removal aims at separating the mixture of the desired background scenes and the undesired reflections, when the photos are taken through the glass. It has both aesthetic and practical applications which can largely improve the performance of many multimedia tasks. Existing reflection removal approaches heavily rely on scene priors such as separable sparse gradients brought by different levels of blur, and they easily fail when such priors are not observed in many real scenes. Sparse representation models and nonlocal image priors have shown their effectiveness in image restoration with self similarity. In this work, we propose a reflection removal …


Speech Based Machine Learning Models For Emotional State Recognition And Ptsd Detection, Debrup Banerjee 2017 Old Dominion University

Speech Based Machine Learning Models For Emotional State Recognition And Ptsd Detection, Debrup Banerjee

Electrical & Computer Engineering Theses & Dissertations

Recognition of emotional state and diagnosis of trauma related illnesses such as posttraumatic stress disorder (PTSD) using speech signals have been active research topics over the past decade. A typical emotion recognition system consists of three components: speech segmentation, feature extraction and emotion identification. Various speech features have been developed for emotional state recognition which can be divided into three categories, namely, excitation, vocal tract and prosodic. However, the capabilities of different feature categories and advanced machine learning techniques have not been fully explored for emotion recognition and PTSD diagnosis. For PTSD assessment, clinical diagnosis through structured interviews is a …


Finite Element Modeling Driven By Health Care And Aerospace Applications, Fotios Drakopoulos 2017 Old Dominion University

Finite Element Modeling Driven By Health Care And Aerospace Applications, Fotios Drakopoulos

Computer Science Theses & Dissertations

This thesis concerns the development, analysis, and computer implementation of mesh generation algorithms encountered in finite element modeling in health care and aerospace. The finite element method can reduce a continuous system to a discrete idealization that can be solved in the same manner as a discrete system, provided the continuum is discretized into a finite number of simple geometric shapes (e.g., triangles in two dimensions or tetrahedrons in three dimensions).

In health care, namely anatomic modeling, a discretization of the biological object is essential to compute tissue deformation for physics-based simulations. This thesis proposes an efficient procedure to convert …


Itsblue: A Distributed Bluetooth-Based Framework For Intelligent Transportation Systems, Ahmed Awad Alghamdi 2017 Old Dominion University

Itsblue: A Distributed Bluetooth-Based Framework For Intelligent Transportation Systems, Ahmed Awad Alghamdi

Computer Science Theses & Dissertations

Inefficiency in transportation networks is having an expanding impact, at a variety of levels. Transportation authorities expect increases in delay hours and in fuel consumption and, consequently, the total cost of congestion. Nowadays, Intelligent Transportation Systems (ITS) have become a necessity in order to alleviate the expensive consequences of the rapid demand on transportation networks. Since the middle of last century, ITS have played a significant role in road safety and comfort enhancements. However, the majority of state of the art ITS are suffering from several drawbacks, among them high deployment costs and complexity of maintenance.

Over the last decade, …


Multi-Material Mesh Representation Of Anatomical Structures For Deep Brain Stimulation Planning, Tanweer Rashid 2017 Old Dominion University

Multi-Material Mesh Representation Of Anatomical Structures For Deep Brain Stimulation Planning, Tanweer Rashid

Computational Modeling & Simulation Engineering Theses & Dissertations

The Dual Contouring algorithm (DC) is a grid-based process used to generate surface meshes from volumetric data. However, DC is unable to guarantee 2-manifold and watertight meshes due to the fact that it produces only one vertex for each grid cube. We present a modified Dual Contouring algorithm that is capable of overcoming this limitation. The proposed method decomposes an ambiguous grid cube into a set of tetrahedral cells and uses novel polygon generation rules that produce 2-manifold and watertight surface meshes with good-quality triangles. These meshes, being watertight and 2-manifold, are geometrically correct, and therefore can be used to …


A Pilot Study Of Computerized, Tailored Intervention To Promote Hpv Vaccination In Mexican-Heritage Adolescents, Angaela Chia-Chen Chen, Michael Todd, Ashish Amresh, Usha Menon, Laura Szalacha 2017 Arizona State University

A Pilot Study Of Computerized, Tailored Intervention To Promote Hpv Vaccination In Mexican-Heritage Adolescents, Angaela Chia-Chen Chen, Michael Todd, Ashish Amresh, Usha Menon, Laura Szalacha

Ashish Amresh

This study examined feasibility, acceptability, and preliminary effect of a computer-tailored intervention aimed at promoting HPV vaccination in Mexican-heritage adolescents aged 11-17. Among 46 Mexican-heritage parents who had one or more eligible children who had not received HPV vaccines, 91% (n = 42) completed the intervention and assessments via tablets in a vaccine clinic. Mean knowledge scores increased significantly from pre- to post-intervention. After the intervention, 95% (n = 40) of parents intended to get their children vaccinated; 50% (n = 21) of them consented to vaccination immediately, resulting in 24 adolescents being vaccinated at that time. All parents reported …


Answer Set Programming Paradigm, Yuliya Lierler 2017 Department of Compter Science

Answer Set Programming Paradigm, Yuliya Lierler

Yuliya Lierler

No abstract provided.


Mhealth Games As Rewards: Incentive Or Distraction?, Kevin Gary, Ryan Stoll, Pooja Rallabhandi, Mandar Patwardhan, Derek Hamel, Ashish Amresh, Armando Pina, Kevin Cleary, Zenaide Quezado 2017 Arizona State University

Mhealth Games As Rewards: Incentive Or Distraction?, Kevin Gary, Ryan Stoll, Pooja Rallabhandi, Mandar Patwardhan, Derek Hamel, Ashish Amresh, Armando Pina, Kevin Cleary, Zenaide Quezado

Ashish Amresh

Games may be employed for delivery of a clinical protocol, or as an incentive for protocol tasks. We focus on serious games in mHealth apps for pediatric patients with a chronic disease as an incentive for behavior modification. A patient is rewarded with enhanced gameplay in proportion to her/his compliance with a clinical protocol. The game-as-reward prevents fatigue and sustains patient engagement as the mHealth apps are used on a frequent basis when the affliction is a chronic disease. However, our experience shows a fine line between games that encourage engagement and ones that distract patients from protocol tasks.


Digital Commons powered by bepress