Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Engineering

Domain Specific Analysis Of Privacy Practices And Concerns In The Mobile Application Market, Fahimeh Ebrahimi Meymand Apr 2023

Domain Specific Analysis Of Privacy Practices And Concerns In The Mobile Application Market, Fahimeh Ebrahimi Meymand

LSU Doctoral Dissertations

Mobile applications (apps) constantly demand access to sensitive user information in exchange for more personalized services. These-mostly unjustified-data collection tactics have raised major privacy concerns among mobile app users. Existing research on mobile app privacy aims to identify these concerns, expose apps with malicious data collection practices, assess the quality of apps' privacy policies, and propose automated solutions for privacy leak detection and prevention. However, existing solutions are generic, frequently missing the contextual characteristics of different application domains. To address these limitations, in this dissertation, we study privacy in the app store at a domain level. Our objective is to …


Spam Detection Using Machine Learning And Deep Learning, Olubodunde Agboola Nov 2022

Spam Detection Using Machine Learning And Deep Learning, Olubodunde Agboola

LSU Doctoral Dissertations

Text messages are essential these days; however, spam texts have contributed negatively to the success of this communication mode. The compromised authenticity of such messages has given rise to several security breaches. Using spam messages, malicious links have been sent to either harm the system or obtain information detrimental to the user. Spam SMS messages as well as emails have been used as media for attacks such as masquerading and smishing ( a phishing attack through text messaging), and this has threatened both the user and service providers. Therefore, given the waves of attacks, the need to identify and remove …


Non-Parametric Classification Of Time Series Using Permutation Ordinal Statistics, Aldo Duarte Vera Tudela Oct 2018

Non-Parametric Classification Of Time Series Using Permutation Ordinal Statistics, Aldo Duarte Vera Tudela

LSU Master's Theses

The present thesis explores some approaches to classify time series without prior statistical information using the concept of permutation entropy. Motivated by the results from a previous published and relevant work that set similarity relationships between EEG time series, a reproduction of the proposed approach was performed giving negative results. The failure to reproduce those results led to the conclusion that the approach of building statistics from permutation patterns have to be complemented with another metric in order to be used for classification purposes. The concept of Total Variation Distance (TVD) was then used to develop three algorithms to classify …


Effective Methods And Tools For Mining App Store Reviews, Nishant Jha Oct 2018

Effective Methods And Tools For Mining App Store Reviews, Nishant Jha

LSU Doctoral Dissertations

Research on mining user reviews in mobile application (app) stores has noticeably advanced in the past few years. The main objective is to extract useful information that app developers can use to build more sustainable apps. In general, existing research on app store mining can be classified into three genres: classification of user feedback into different types of software maintenance requests (e.g., bug reports and feature requests), building practical tools that are readily available for developers to use, and proposing visions for enhanced mobile app stores that integrate multiple sources of user feedback to ensure app survivability. Despite these major …


Psychological Behavior Analysis Using Advanced Signal Processing Techniques For Fmri Data, Charisma Dionne Edwards Jan 2013

Psychological Behavior Analysis Using Advanced Signal Processing Techniques For Fmri Data, Charisma Dionne Edwards

LSU Doctoral Dissertations

Psychological analysis related to voluntary reciprocal trust games were obtained using functional magnetic resonance imaging (fMRI) hyperscanning for 44 pairs of strangers throughout 36 trust games (TG) and 16 control games (CG). Hidden Markov models (HMMs) are proposed to train and classify the fMRI data acquired from these brain regions and extract the essential features of the initial decision of the first player to trust or not trust the second player. These results are evaluated using the different versions of the multifold cross-validation technique and compared to other speech data and other advanced signal processing techniques including linear classification, support …