Automatically Locating Malicious Packages In Piggybacked Android Apps, 2017 Singapore Management University
Automatically Locating Malicious Packages In Piggybacked Android Apps, Li Li, Daoyuan Li, Tegawende Bissyande, Jacques Klein, Haipeng Cai, David Lo, Yves Le Traon
Research Collection School Of Computing and Information Systems
To devise efficient approaches and tools for detecting malicious packages in the Android ecosystem, researchers are increasingly required to have a deep understanding of malware. There is thus a need to provide a framework for dissecting malware and locating malicious program fragments within app code in order to build a comprehensive dataset of malicious samples. Towards addressing this need, we propose in this work a tool-based approach called HookRanker, which provides ranked lists of potentially malicious packages based on the way malware behaviour code is triggered. With experiments on a ground truth set of piggybacked apps, we are able to …
Tlel: A Two-Layer Ensemble Learning Approach For Just-In-Time Defect Prediction, 2017 Zhejiang University
Tlel: A Two-Layer Ensemble Learning Approach For Just-In-Time Defect Prediction, Xinli Yang, David Lo, Xin Xia, Jianling Sun
Research Collection School Of Computing and Information Systems
Context: Defect prediction is a very meaningful topic, particularly at change-level. Change-level defect prediction, which is also referred as just-in-time defect prediction, could not only ensure software quality in the development process, but also make the developers check and fix the defects in time [1].Objective: Ensemble learning becomes a hot topic in recent years. There have been several studies about applying ensemble learning to defect prediction [2–5]. Traditional ensemble learning approaches only have one layer, i.e., they use ensemble learning once. There are few studies that leverages ensemble learning twice or more. To bridge this research gap, we try to …
Iupdater: Low Cost Rss Fingerprints Updating For Device-Free Localization, 2017 Northwest University
Iupdater: Low Cost Rss Fingerprints Updating For Device-Free Localization, Liqiong Chang, Jie Xiong, Yu Wang, Xiaojiang Chen, Junhao Hu, Dingyi Fang
Research Collection School Of Computing and Information Systems
While most existing indoor localization techniques are device-based, many emerging applications such as intruder detection and elderly monitoring drive the needs of device-free localization, in which the target can be localized without any device attached. Among the diverse techniques, received signal strength (RSS) fingerprint-based methods are popular because of the wide availability of RSS readings in most commodity hardware. However, current fingerprint-based systems suffer from high human labor cost to update the fingerprint database and low accuracy due to the large degree of RSS variations. In this paper, we propose a fingerprint-based device-free localization system named iUpdater to significantly reduce …
Multi-Authority Abs Supporting Dendritic Access Structure, 2017 Xidian University
Multi-Authority Abs Supporting Dendritic Access Structure, Ruo Mo, Jian-Feng Ma, Ximeng Liu, Qi Li
Research Collection School Of Computing and Information Systems
Attribute-based signature (ABS), which could realize fine-grained access control, was considered to be an importantmethod for anonymous authentication in cloud computing. However, normal ABS only provided simple accesscontrol through threshold structure and thus could not cope with the large-scale attribute sets of users in the cloud. Moreover,the attribute sets were supervised by only one attribute authority, which increased the cost of computation and storage.The whole system was in danger of collapsing once the attribute authority was breached. Aiming at tackling theproblems above, a novel scheme, was proposed called multi-authority ABS supporting dendritic access structure whichsupported any AND, OR and threshold …
Attribute-Based Encryption With Expressive And Authorized Keyword Search, 2017 Singapore Management University
Attribute-Based Encryption With Expressive And Authorized Keyword Search, Hui Cui, Robert H. Deng, Joseph K. Liu, Yingjiu Li
Research Collection School Of Computing and Information Systems
To protect data security and privacy in cloud storage systems, a common solution is to outsource data in encrypted forms so that the data will remain secure and private even if storage systems are compromised. The encrypted data, however, must be pliable to search and access control. In this paper, we introduce a notion of attribute-based encryption with expressive and authorized keyword search (ABE-EAKS) to support both expressive keyword search and fine-grained access control over encrypted data in the cloud. In ABE-EAKS, every data user is associated with a set of attributes and is issued a private attribute-key corresponding to …
Fast Adaptation Of Activity Sensing Policies In Mobile Devices, 2017 Singapore Management University
Fast Adaptation Of Activity Sensing Policies In Mobile Devices, Mohammad Abu Alsheikh, Dusit Niyato, Shaowei Lin, Hwee-Pink Tan, Dong In Kim
Research Collection School Of Computing and Information Systems
With the proliferation of sensors, such as accelerometers,in mobile devices, activity and motion tracking has become a viable technologyto understand and create an engaging user experience. This paper proposes afast adaptation and learning scheme of activity tracking policies when userstatistics are unknown a priori, varying with time, and inconsistent for differentusers. In our stochastic optimization, user activities are required to besynchronized with a backend under a cellular data limit to avoid overchargesfrom cellular operators. The mobile device is charged intermittently usingwireless or wired charging for receiving the required energy for transmission andsensing operations. Firstly, we propose an activity tracking policy …
Cyber Foraging: Fifteen Years Later, 2017 Singapore Management University
Cyber Foraging: Fifteen Years Later, Rajesh Krishna Balan, Jason Flinn
Research Collection School Of Computing and Information Systems
Revisiting Mahadev Satyanarayanan's original vision of cyber foraging and reflecting on the last 15 years of related research, the authors discuss the major accomplishments achieved as well as remaining challenges. They also look to current and future applications that could provide compelling application scenarios for making cyber foraging a widely deployed technology. This article is part of a special issue on pervasive computing revisited.
Mopeye: Opportunistic Monitoring Of Per-App Mobile Network Performance, 2017 Singapore Management University
Mopeye: Opportunistic Monitoring Of Per-App Mobile Network Performance, Daoyuan Wu, Rocky K. C. Chang, Weichao Li, Eric K. T. Cheng, Debin Gao
Research Collection School Of Computing and Information Systems
Crowdsourcing mobile user’s network performance has become an effective way of understanding and improving mobile network performance and user quality-of-experience. However, the current measurement method is still based on the landline measurement paradigm in which a measurement app measures the path to fixed (measurement or web) servers. In this work, we introduce a new paradigm of measuring per-app mobile network performance. We design and implement MopEye, an Android app to measure network round-trip delay for each app whenever there is app traffic. This opportunistic measurement can be conducted automatically without user intervention. Therefore, it can facilitate a large-scale and long-term …
How Artificial Intelligence Is Impacting Manufacturing Industry, 2017 University of Florida
How Artificial Intelligence Is Impacting Manufacturing Industry, Deepak Srinivasan, Maitreyi Ramesh Swaroop, Balaji Rajaram, Sri Krishan Iyer
Research Collection School Of Computing and Information Systems
In this survey, we study the impact of Artificial Intelligence (AI) on manufacturing sector. AI methods can be utilized to make new thoughts several ways: by delivering novel mixes of wellknown thoughts; by investigating the capability of theoretical spaces; and by making changes that empower the era of unexplored thoughts. AI will have less trouble in displaying the era of new thoughts than in automating their assessment. We describe the advances that have been made on AI in manufacturing industry. We close with how to overcome the issues in this area.
Elderly Friendliness Evaluation Of Mobile Assistants, 2017 Singapore Management University
Elderly Friendliness Evaluation Of Mobile Assistants, Di Wang, Xinjia Yu, Simon Fauvel, Ah-Hwee Tan, Chunyan Miao
Research Collection School Of Computing and Information Systems
The rapidly increasing elderly population in many developed and developing countries poses great challenges to elderly care systems. To alleviate the problem of a shrinking workforce to deliver elderly care, using mobile intelligent assistants to lessen the caregivers' workload becomes a promising solution. However, the friendliness of such mobile assistants, which is seldom measured in a quantitative manner, may hinder their acceptance by the elderly users. In this paper, we propose a formalized systematic approach named Elderly Friendliness Evaluation Methodology (EFEM) to measure the elderly friendliness of any product, service or system. Furthermore, we apply EFEM to evaluate the elderly …
Deep Learning On Lie Groups For Skeleton-Based Action Recognition, 2017 Singapore Management University
Deep Learning On Lie Groups For Skeleton-Based Action Recognition, Zhiwu Huang, C. Wan, T. Probst, Gool L. Van
Research Collection School Of Computing and Information Systems
In recent years, skeleton-based action recognition has become a popular 3D classification problem. State-of-the-art methods typically first represent each motion sequence as a high-dimensional trajectory on a Lie group with an additional dynamic time warping, and then shallowly learn favorable Lie group features. In this paper we incorporate the Lie group structure into a deep network architecture to learn more appropriate Lie group features for 3D action recognition. Within the network structure, we design rotation mapping layers to transform the input Lie group features into desirable ones, which are aligned better in the temporal domain. To reduce the high feature …
Mergeable And Revocable Identity-Based Encryption, 2017 Singapore Management University
Mergeable And Revocable Identity-Based Encryption, Shengmin Xu, Guomin Yang, Yi Mu, Willy Susilo
Research Collection School Of Computing and Information Systems
Identity-based encryption (IBE) has been extensively studied and widely used in various applications since Boneh and Franklin proposed the first practical scheme based on pairing. In that seminal work, it has also been pointed out that providing an efficient revocation mechanism for IBE is essential. Hence, revocable identity-based encryption (RIBE) has been proposed in the literature to offer an efficient revocation mechanism. In contrast to revocation, another issue that will also occur in practice is to combine two or multiple IBE systems into one system, e.g., due to the merge of the departments or companies. However, this issue has not …
Sparsity Based Reflection Removal Using External Patch Search, 2017 Singapore Management University
Sparsity Based Reflection Removal Using External Patch Search, Renjie Wan, Boxin Shi, Ah-Hwee Tan, Alex C. Kot
Research Collection School Of Computing and Information Systems
Reflection removal aims at separating the mixture of the desired background scenes and the undesired reflections, when the photos are taken through the glass. It has both aesthetic and practical applications which can largely improve the performance of many multimedia tasks. Existing reflection removal approaches heavily rely on scene priors such as separable sparse gradients brought by different levels of blur, and they easily fail when such priors are not observed in many real scenes. Sparse representation models and nonlocal image priors have shown their effectiveness in image restoration with self similarity. In this work, we propose a reflection removal …
Speech Based Machine Learning Models For Emotional State Recognition And Ptsd Detection, 2017 Old Dominion University
Speech Based Machine Learning Models For Emotional State Recognition And Ptsd Detection, Debrup Banerjee
Electrical & Computer Engineering Theses & Dissertations
Recognition of emotional state and diagnosis of trauma related illnesses such as posttraumatic stress disorder (PTSD) using speech signals have been active research topics over the past decade. A typical emotion recognition system consists of three components: speech segmentation, feature extraction and emotion identification. Various speech features have been developed for emotional state recognition which can be divided into three categories, namely, excitation, vocal tract and prosodic. However, the capabilities of different feature categories and advanced machine learning techniques have not been fully explored for emotion recognition and PTSD diagnosis. For PTSD assessment, clinical diagnosis through structured interviews is a …
Finite Element Modeling Driven By Health Care And Aerospace Applications, 2017 Old Dominion University
Finite Element Modeling Driven By Health Care And Aerospace Applications, Fotios Drakopoulos
Computer Science Theses & Dissertations
This thesis concerns the development, analysis, and computer implementation of mesh generation algorithms encountered in finite element modeling in health care and aerospace. The finite element method can reduce a continuous system to a discrete idealization that can be solved in the same manner as a discrete system, provided the continuum is discretized into a finite number of simple geometric shapes (e.g., triangles in two dimensions or tetrahedrons in three dimensions).
In health care, namely anatomic modeling, a discretization of the biological object is essential to compute tissue deformation for physics-based simulations. This thesis proposes an efficient procedure to convert …
Itsblue: A Distributed Bluetooth-Based Framework For Intelligent Transportation Systems, 2017 Old Dominion University
Itsblue: A Distributed Bluetooth-Based Framework For Intelligent Transportation Systems, Ahmed Awad Alghamdi
Computer Science Theses & Dissertations
Inefficiency in transportation networks is having an expanding impact, at a variety of levels. Transportation authorities expect increases in delay hours and in fuel consumption and, consequently, the total cost of congestion. Nowadays, Intelligent Transportation Systems (ITS) have become a necessity in order to alleviate the expensive consequences of the rapid demand on transportation networks. Since the middle of last century, ITS have played a significant role in road safety and comfort enhancements. However, the majority of state of the art ITS are suffering from several drawbacks, among them high deployment costs and complexity of maintenance.
Over the last decade, …
Multi-Material Mesh Representation Of Anatomical Structures For Deep Brain Stimulation Planning, 2017 Old Dominion University
Multi-Material Mesh Representation Of Anatomical Structures For Deep Brain Stimulation Planning, Tanweer Rashid
Computational Modeling & Simulation Engineering Theses & Dissertations
The Dual Contouring algorithm (DC) is a grid-based process used to generate surface meshes from volumetric data. However, DC is unable to guarantee 2-manifold and watertight meshes due to the fact that it produces only one vertex for each grid cube. We present a modified Dual Contouring algorithm that is capable of overcoming this limitation. The proposed method decomposes an ambiguous grid cube into a set of tetrahedral cells and uses novel polygon generation rules that produce 2-manifold and watertight surface meshes with good-quality triangles. These meshes, being watertight and 2-manifold, are geometrically correct, and therefore can be used to …
A Pilot Study Of Computerized, Tailored Intervention To Promote Hpv Vaccination In Mexican-Heritage Adolescents, 2017 Arizona State University
A Pilot Study Of Computerized, Tailored Intervention To Promote Hpv Vaccination In Mexican-Heritage Adolescents, Angaela Chia-Chen Chen, Michael Todd, Ashish Amresh, Usha Menon, Laura Szalacha
Ashish Amresh
Answer Set Programming Paradigm, 2017 Department of Compter Science
Mhealth Games As Rewards: Incentive Or Distraction?, 2017 Arizona State University