Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of Nebraska - Lincoln (96)
- Technological University Dublin (36)
- Singapore Management University (26)
- Old Dominion University (19)
- University of South Carolina (19)
-
- Portland State University (11)
- Chapman University (10)
- Marquette University (9)
- Western University (8)
- City University of New York (CUNY) (7)
- Florida International University (6)
- University of Arkansas, Fayetteville (6)
- Embry-Riddle Aeronautical University (5)
- University of Louisville (5)
- University of New Haven (5)
- Ateneo de Manila University (4)
- Air Force Institute of Technology (3)
- Edith Cowan University (3)
- Missouri University of Science and Technology (3)
- University of Mississippi (3)
- University of Pennsylvania Carey Law School (3)
- Fordham University (2)
- Manipal Academy of Higher Education (2)
- Morehead State University (2)
- Santa Clara University (2)
- Southwestern Oklahoma State University (2)
- Tennessee State University (2)
- University of Connecticut (2)
- University of Dayton (2)
- University of Kentucky (2)
- Keyword
-
- Machine learning (14)
- Deep learning (13)
- Artificial intelligence (12)
- Bibliometric Analysis (9)
- Computer vision (8)
-
- Blockchain (7)
- Cybersecurity (7)
- Security (7)
- AI (6)
- Classification (6)
- Deep Learning (6)
- Natural language processing (6)
- Bibliometric analysis (5)
- Cloud computing (5)
- LSTM (5)
- Machine Learning (5)
- Artificial Intelligence (4)
- Authentication (4)
- Bibliometric (4)
- Bibliometric survey (4)
- Bibliometrics (4)
- Data mining (4)
- Education (4)
- Explainability (4)
- Industry 4.0 (4)
- Robotics (4)
- Robots (4)
- Algorithm (3)
- Automation (3)
- BERT (3)
- Publication
-
- Library Philosophy and Practice (e-journal) (55)
- Publications (25)
- Research Collection School Of Computing and Information Systems (25)
- Department of Electrical and Computer Engineering: Faculty Publications (20)
- Dissertations (16)
-
- Articles (10)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (10)
- Electrical and Computer Engineering Faculty Research and Publications (9)
- Engineering Faculty Articles and Research (9)
- Electrical and Computer Engineering Publications (8)
- Publications and Research (7)
- Conference papers (6)
- FIU Electronic Theses and Dissertations (6)
- Faculty Publications (6)
- Mathematical Sciences Spring Lecture Series (6)
- Electrical & Computer Engineering and Computer Science Faculty Publications (5)
- Faculty Scholarship (5)
- VMASC Publications (5)
- Computational Modeling & Simulation Engineering Faculty Publications (4)
- Computer Science Faculty Publications and Presentations (4)
- Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research (4)
- Department of Information Systems & Computer Science Faculty Publications (4)
- Engineering Management & Systems Engineering Faculty Publications (4)
- All Faculty Scholarship (3)
- Electrical and Computer Engineering Faculty Publications (3)
- Faculty and Student Publications (3)
- REU Final Reports (3)
- Research outputs 2014 to 2021 (3)
- altREU Projects (3)
- CSE Conference and Workshop Papers (2)
Articles 1 - 30 of 324
Full-Text Articles in Engineering
The Evolution Of The Internet And Social Media: A Literature Review, Charles Alves De Castro, Isobel O'Reilly Dr, Aiden Carthy
The Evolution Of The Internet And Social Media: A Literature Review, Charles Alves De Castro, Isobel O'Reilly Dr, Aiden Carthy
Articles
This article reviews and analyses factors impacting the evolution of the internet, the web, and social media channels, charting historic trends and highlight recent technological developments. The review comprised a deep search using electronic journal databases. Articles were chosen according to specific criteria with a group of 34 papers and books selected for complete reading and deep analysis. The 34 elements were analysed and processed using NVIVO 12 Pro, enabling the creation of dimensions and categories, codes and nodes, identifying the most frequent words, cluster analysis of the terms, and creating a word cloud based on each word's frequency. The …
Trip Based Modeling Of Fuel Consumption In Modern Heavy-Duty Vehicles Using Artificial Intelligence, Sasanka Katreddi, Arvind Thiruvengadam
Trip Based Modeling Of Fuel Consumption In Modern Heavy-Duty Vehicles Using Artificial Intelligence, Sasanka Katreddi, Arvind Thiruvengadam
Faculty & Staff Scholarship
Heavy-duty trucks contribute approximately 20% of fuel consumption in the United States of America (USA). The fuel economy of heavy-duty vehicles (HDV) is affected by several real-world parameters like road parameters, driver behavior, weather conditions, and vehicle parameters, etc. Although modern vehicles comply with emissions regulations, potential malfunction of the engine, regular wear and tear, or other factors could affect vehicle performance. Predicting fuel consumption per trip based on dynamic on-road data can help the automotive industry to reduce the cost and time for on-road testing. Data modeling can easily help to diagnose the reason behind fuel consumption with a …
Tooth Position Determination By Automatic Cutting And Marking Of Dental Panoramic X-Ray Film In Medical Image Processing, Yen-Cheng Huang, Chiung-An Chen, Tsung-Yi Chen, He-Sheng Chou, Wei-Chi Lin, Tzu-Chien Li, Jia-Jun Yuan, Szu-Yin Lin, Chun-Wei Li, Shih-Lun Chen, Yi-Cheng Mao, Patricia Angela R. Abu, Wei-Yuan Chiang, Wen-Shen Lo
Tooth Position Determination By Automatic Cutting And Marking Of Dental Panoramic X-Ray Film In Medical Image Processing, Yen-Cheng Huang, Chiung-An Chen, Tsung-Yi Chen, He-Sheng Chou, Wei-Chi Lin, Tzu-Chien Li, Jia-Jun Yuan, Szu-Yin Lin, Chun-Wei Li, Shih-Lun Chen, Yi-Cheng Mao, Patricia Angela R. Abu, Wei-Yuan Chiang, Wen-Shen Lo
Department of Information Systems & Computer Science Faculty Publications
This paper presents a novel method for automatic segmentation of dental X-ray images into single tooth sections and for placing every segmented tooth onto a precise corresponding position table. Moreover, the proposed method automatically determines the tooth’s position in a panoramic X-ray film. The image-processing step incorporates a variety of image-enhancement techniques, including sharpening, histogram equalization, and flat-field correction. Moreover, image processing was implemented iteratively to achieve higher pixel value contrast between the teeth and cavity. The next image-enhancement step is aimed at detecting the teeth cavity and involves determining the segment and points separating the upper and lower jaw, …
Defining And Detecting Toxicity On Social Media: Context And Knowledge Are Key, Amit Sheth, Valerie Shalin, Ugur Kursuncu
Defining And Detecting Toxicity On Social Media: Context And Knowledge Are Key, Amit Sheth, Valerie Shalin, Ugur Kursuncu
Publications
As the role of online platforms has become increasingly prominent for communication, toxic behaviors, such as cyberbullying and harassment, have been rampant in the last decade. On the other hand, online toxicity is multi-dimensional and sensitive in nature, which makes its detection challenging. As the impact of exposure to online toxicity can lead to serious implications for individuals and communities, reliable models and algorithms are required for detecting and understanding such communications. In this paper We define toxicity to provide a foundation drawing social theories. Then, we provide an approach that identifies multiple dimensions of toxicity and incorporates explicit knowledge …
A Systematic Review On Blockchain In Education: Opportunities And Challenges, Navin Duwadi, Navin Duwadi
A Systematic Review On Blockchain In Education: Opportunities And Challenges, Navin Duwadi, Navin Duwadi
School of Information Systems and Technology Publications
This study focuses on bloackchain as an emerging technology regarding its use to restructure the systems and advance education upon quality outcomes. What are the benefits of integrating blockchain in education concerning system reformation and advancement in developing better educational process for all encompassing learning outcomes? With the recent developments of blockchain applications across multiple domains, the education industry seems to be benefited from this technology in considerable degree. Transcripts and certificates play a vital role in individual’s life so it needs to be stored in tamper-proof and long term available ledger. In pursuant to addressing afore stated question, this …
A Systematic Review On Blockchain In Education: Opportunities And Challenges, Navin Duwadi
A Systematic Review On Blockchain In Education: Opportunities And Challenges, Navin Duwadi
Walden Faculty and Staff Publications
This study focuses on bloackchain as an emerging technology regarding its use to restructure the systems and advance education upon quality outcomes. What are the benefits of integrating blockchain in education concerning system reformation and advancement in developing better educational process for all encompassing learning outcomes? With the recent developments of blockchain applications across multiple domains, the education industry seems to be benefited from this technology in considerable degree. Transcripts and certificates play a vital role in individual’s life so it needs to be stored in tamper-proof and long term available ledger. In pursuant to addressing afore stated question, this …
Messiness: Automating Iot Data Streaming Spatial Analysis, Christopher White, Atilio Barreda Ii
Messiness: Automating Iot Data Streaming Spatial Analysis, Christopher White, Atilio Barreda Ii
Publications and Research
The spaces we live in go through many transformations over the course of a year, a month, or a day; My room has seen tremendous clutter and pristine order within the span of a few hours. My goal is to discover patterns within my space and formulate an understanding of the changes that occur. This insight will provide actionable direction for maintaining a cleaner environment, as well as provide some information about the optimal times for productivity and energy preservation.
Using a Raspberry Pi, I will set up automated image capture in a room in my home. These images will …
Computational Solutions To Exosomal Microrna Biomarker Detection In Pancreatic Cancer, Thuy T. An
Computational Solutions To Exosomal Microrna Biomarker Detection In Pancreatic Cancer, Thuy T. An
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
Pancreatic cancer is the fourth leading cause of cancer death in the United States and the 5-year survival rate is only 5% to 10%. There are only a few non-specific symptoms associated with the early-stage cancer, therefore most patients are diagnosed in a late stage. Due to the lack of effective treatments and the fact that the early stage has a 39% 5-year survival rate, the biggest hope to control this disease is early detection. Therefore, discovery of effective and reliable non-invasive biomarkers for early detection of pancreatic cancer has been a major topic. Very recently, exosomal microRNAs have become …
Semantically Meaningful Sentence Embeddings, Rojina Deuja
Semantically Meaningful Sentence Embeddings, Rojina Deuja
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
Text embedding is an approach used in Natural Language Processing (NLP) to represent words, phrases, sentences, and documents. It is the process of obtaining numeric representations of text to feed into machine learning models as vectors (arrays of numbers). One of the biggest challenges in text embedding is representing longer text segments like sentences. These representations should capture the meaning of the segment and the semantic relationship between its constituents. Such representations are known as semantically meaningful embeddings. In this thesis, we seek to improve upon the quality of sentence embeddings that capture semantic information.
The current state-of-the-art models are …
Digitization Of Academic Libraries Through Cloud Environment, Sivankalai S, Virumandi A, Sivasekaran K, Jeyanthi R, M Sharmila
Digitization Of Academic Libraries Through Cloud Environment, Sivankalai S, Virumandi A, Sivasekaran K, Jeyanthi R, M Sharmila
Library Philosophy and Practice (e-journal)
Libraries may soon be able to establish and manage their own data centres. This paradigm would allow libraries to control the apps and data stores that include sensitive and private information about their users' personal and financial information. The provisioning and management of infrastructure for a Web-based digital library present several complicated difficulties for library administrators. In this article, we address the challenges that digital libraries confront, and the efforts being made to solve those challenges. Infrastructure virtualization and cloud Environment are incredibly enticing options, but they are being challenged by the expansion of the indexed document collection, the addition …
Risk-Based Machine Learning Approaches For Probabilistic Transient Stability, Umair Shahzad
Risk-Based Machine Learning Approaches For Probabilistic Transient Stability, Umair Shahzad
Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research
Power systems are getting more complex than ever and are consequently operating close to their limit of stability. Moreover, with the increasing demand of renewable wind generation, and the requirement to maintain a secure power system, the importance of transient stability cannot be overestimated. Considering its significance in power system security, it is important to propose a different approach for enhancing the transient stability, considering uncertainties. Current deterministic industry practices of transient stability assessment ignore the probabilistic nature of variables (fault type, fault location, fault clearing time, etc.). These approaches typically provide a conservative criterion and can result in expensive …
Comparative Analysis Of Kmer Counting And Estimation Tools, Ankitha Vejandla
Comparative Analysis Of Kmer Counting And Estimation Tools, Ankitha Vejandla
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
The rapid development of next-generation sequencing (NGS) technologies for determining the sequence of DNA has revolutionized genome research in recent years. De novo assemblers are the most commonly used tools to perform genome assembly. Most of the assemblers use de Bruijn graphs that break the sequenced reads into smaller sequences (sub-strings), called kmers, where k denotes the length of the sub-strings. The kmer counting and analysis of kmer frequency distribution are important in genome assembly. The main goal of this research is to provide a detailed analysis of the performance of different kmer counting and estimation tools that are currently …
Let's Read: Designing A Smart Display Application To Support Codas When Learning Spoken Language, Katie Rodeghiero, Yingying Yuki Chen, Annika M. Hettmann, Franceli L. Cibrian
Let's Read: Designing A Smart Display Application To Support Codas When Learning Spoken Language, Katie Rodeghiero, Yingying Yuki Chen, Annika M. Hettmann, Franceli L. Cibrian
Engineering Faculty Articles and Research
Hearing children of Deaf adults (CODAs) face many challenges including having difficulty learning spoken languages, experiencing social judgment, and encountering greater responsibilities at home. In this paper, we present a proposal for a smart display application called Let's Read that aims to support CODAs when learning spoken language. We conducted a qualitative analysis using online community content in English to develop the first version of the prototype. Then, we conducted a heuristic evaluation to improve the proposed prototype. As future work, we plan to use this prototype to conduct participatory design sessions with Deaf adults and CODAs to evaluate the …
Digital Markers Of Autism, Ivonne Monarca, Franceli L. Cibrian, Monica Tentori
Digital Markers Of Autism, Ivonne Monarca, Franceli L. Cibrian, Monica Tentori
Engineering Faculty Articles and Research
Autism Spectrum Disorder (ASD) is a neurological condition that affects how a people communicate and interact with others. The use of screening tools during childhood is very important to detect those children who need to be referred for a diagnosis of ASD. However, most screening tools are based on parents' responses so the result can be subjective. In addition, most screening tools focus on social and communicative skills leaving aside sensory features, which have shown to have the potential to be ASD markers. Tactile processing has been little explored due to lack of tools to asses it, however with the …
Feel And Touch: A Haptic Mobile Game To Assess Tactile Processing, Ivonne Monarca, Monica Tentori, Franceli L. Cibrian
Feel And Touch: A Haptic Mobile Game To Assess Tactile Processing, Ivonne Monarca, Monica Tentori, Franceli L. Cibrian
Engineering Faculty Articles and Research
Haptic interfaces have great potential for assessing the tactile processing of children with Autism Spectrum Disorder (ASD), an area that has been under-explored due to the lack of tools to assess it. Until now, haptic interfaces for children have mostly been used as a teaching or therapeutic tool, so there are still open questions about how they could be used to assess tactile processing of children with ASD. This article presents the design process that led to the development of Feel and Touch, a mobile game augmented with vibrotactile stimuli to assess tactile processing. Our feasibility evaluation, with 5 children …
Plasmonic Field-Effect Transistors (Terafets) For 6g Communications, Michael Shur, Gregory Aizin, Taiichi Otsuji, Victor Ryzhii
Plasmonic Field-Effect Transistors (Terafets) For 6g Communications, Michael Shur, Gregory Aizin, Taiichi Otsuji, Victor Ryzhii
Publications and Research
Ever increasing demands of data traffic makes the transition to 6G communications in the 300 GHz band inevitable. Short-channel field-effect transistors (FETs) have demonstrated excellent potential for detection and generation of terahertz (THz) and sub-THz radiation. Such transistors (often referred to as TeraFETs) include short-channel silicon complementary metal oxide (CMOS). The ballistic and quasi-ballistic electron transport in the TeraFET channels determine the TeraFET response at the sub-THz and THz frequencies. TeraFET arrays could form plasmonic crystals with nanoscale unit cells smaller or comparable to the electron mean free path but with the overall dimensions comparable with the radiation wavelength. Such …
Ggnb: Graph-Based Gaussian Naive Bayes Intrusion Detection System For Can Bus, Riadul Islam, Maloy K. Devnath, Manar D. Samad, Syed Md Jaffrey Al Kadry
Ggnb: Graph-Based Gaussian Naive Bayes Intrusion Detection System For Can Bus, Riadul Islam, Maloy K. Devnath, Manar D. Samad, Syed Md Jaffrey Al Kadry
Computer Science Faculty Research
The national highway traffic safety administration (NHTSA) identified cybersecurity of the automobile systems are more critical than the security of other information systems. Researchers already demonstrated remote attacks on critical vehicular electronic control units (ECUs) using controller area network (CAN). Besides, existing intrusion detection systems (IDSs) often propose to tackle a specific type of attack, which may leave a system vulnerable to numerous other types of attacks. A generalizable IDS that can identify a wide range of attacks within the shortest possible time has more practical value than attack-specific IDSs, which is not a trivial task to accomplish. In this …
Real-Time Bidding Campaigns Optimization Using User Profile Settings, Luis Miralles-Pechuán, Muhammad Atif Qureshi, Brian Mac Namee
Real-Time Bidding Campaigns Optimization Using User Profile Settings, Luis Miralles-Pechuán, Muhammad Atif Qureshi, Brian Mac Namee
Articles
Real-time bidding is nowadays one of the most promising systems in the online advertising ecosystem. In this study, the performance of RTB campaigns is improved by optimising the parameters of the users' profiles and the publishers' websites. Most studies concerning optimising RTB campaigns are focused on the bidding strategy, i.e., estimating the best value for each bid. However, this research focuses on optimising RTB campaigns by finding out configurations that maximise both the number of impressions and the average profitability of the visits. An online campaign configuration generally consists of a set of parameters along with their values such as …
Multilayer Lateral Heterostructures Of Van Der Waals Crystals With Sharp, Carrier–Transparent Interfaces, Eli A. Sutter, Raymond R. Unocic, Juan-Carlos Idrobo, Peter Sutter
Multilayer Lateral Heterostructures Of Van Der Waals Crystals With Sharp, Carrier–Transparent Interfaces, Eli A. Sutter, Raymond R. Unocic, Juan-Carlos Idrobo, Peter Sutter
Department of Electrical and Computer Engineering: Faculty Publications
Research on engineered materials that integrate different 2D crystals has largely focused on two prototypical heterostructures: Vertical van der Waals stacks and lateral heterostructures of covalently stitched monolayers. Extending lateral integration to few layer or even multilayer van der Waals crystals could enable architectures that combine the superior light absorption and photonic properties of thicker crystals with close proximity to interfaces and efficient carrier separation within the layers, potentially benefiting applications such as photovoltaics. Here, the realization of multilayer heterstructures of the van der Waals semiconductors SnS and GeS with lateral interfaces spanning up to several hundred individual layers is …
Needle In A Haystack: Detecting Subtle Malicious Edits To Additive Manufacturing G-Code Files, Caleb Beckwith, Harsh Sankar Naicker, Svara Mehta, Viba R. Udupa, Nghia Tri Nim, Varun Gadre, Hammond Pearce, Gary Mac
Needle In A Haystack: Detecting Subtle Malicious Edits To Additive Manufacturing G-Code Files, Caleb Beckwith, Harsh Sankar Naicker, Svara Mehta, Viba R. Udupa, Nghia Tri Nim, Varun Gadre, Hammond Pearce, Gary Mac
Publications and Research
Increasing usage of Digital Manufacturing (DM) in safety-critical domains is increasing attention on the cybersecurity of the manufacturing process, as malicious third parties might aim to introduce defects in digital designs. In general, the DM process involves creating a digital object (as CAD files) before using a slicer program to convert the models into printing instructions (e.g. g-code) suitable for the target printer. As the g-code is an intermediate machine format, malicious edits may be difficult to detect, especially when the golden (original) models are not available to the manufacturer. In this work we aim to quantify this hypothesis through …
Analysis Of Library Book Borrower Patterns Using Apriori Association Data Mining Techniques, Lucky Zamzami, Ari Agung Prastowo, R Rulinawaty, Robbi Rahim
Analysis Of Library Book Borrower Patterns Using Apriori Association Data Mining Techniques, Lucky Zamzami, Ari Agung Prastowo, R Rulinawaty, Robbi Rahim
Library Philosophy and Practice (e-journal)
The library is one of the most important facilities because it manages collections of written works, printed works, and recorded works and can provide information resources as well as be a driving force for the advancement of an educational institution. Conventional libraries will have piles of book borrowing transaction data recorded in the agenda book, which is only an archive, and the placement of books far apart, which causes members to take longer to find books when borrowing books of different types, is an issue that must be addressed. To overcome these two issues, a recommendation for an intelligent system …
Virtual Reality As Pedagogical Tool To Enhance Experiential Learning: A Systematic Literature Review, Muhammad Mujtaba Asad, Aisha Naz Ansari, Prathamesh Churi, Mohammad Mehdi Tahanzadeh
Virtual Reality As Pedagogical Tool To Enhance Experiential Learning: A Systematic Literature Review, Muhammad Mujtaba Asad, Aisha Naz Ansari, Prathamesh Churi, Mohammad Mehdi Tahanzadeh
Institute for Educational Development, Karachi
Since half of the century, technology has dominated the modern era. The rapid advancement of technology has reached generating artificial intelligence and artificial realities. So, virtual reality is an emerging technology and is applicable in education as well. Virtual reality is a computer-generated simulation, where people can interact within an artificial environment. Moreover, in an educational setting, such an environment provides students with a chance to get experiential learning. This paper has a systematic literature review on emerging technologies, such as virtual reality as a pedagogical tool for enhancing students’ experiential learning. This review aims to explore and understand the …
Robust Feature Space Separation For Deep Convolutional Neural Network Training, Ali Sekmen, Mustafa Parlaktuna, Ayad Abdul-Malek, Erdem Erdemir, Ahmet Bugra Koku
Robust Feature Space Separation For Deep Convolutional Neural Network Training, Ali Sekmen, Mustafa Parlaktuna, Ayad Abdul-Malek, Erdem Erdemir, Ahmet Bugra Koku
Computer Science Faculty Research
This paper introduces two deep convolutional neural network training techniques that lead to more robust feature subspace separation in comparison to traditional training. Assume that dataset has M labels. The first method creates M deep convolutional neural networks called {DCNNi}M i=1 . Each of the networks DCNNi is composed of a convolutional neural network ( CNNi ) and a fully connected neural network ( FCNNi ). In training, a set of projection matrices are created and adaptively updated as representations for feature subspaces {S i}M i=1 . A rejection value is computed for each training based on its projections on …
Inverse Kinematics Of The 6dof C12xl, Carl Liu, Lili Ma
Inverse Kinematics Of The 6dof C12xl, Carl Liu, Lili Ma
Publications and Research
Industrial robotic manipulators are widely used in applications such as pick & place, welding, and assembly to perform repeated tasks in replace of human labor. Such tasks typically require fully autonomous mechanical arms that are capable of identifying the parts to operate, path planning, and trajectory generation & tracking. A robotic arm consists of a sequence of rigid links connected by movable components (the joints). Proper control of the arm’s motion requires the knowledge of inverse kinematics, which computes/outputs the joint variables, i.e., angles for revolute joints and displacement for prismatic joints, causing the robotic arm’s end effector (e.g., gripper, …
Disaster Recovery System And Service Continuity Of Digital Library, Sivankalai S, Virumandi A, Sivasekaran K, Sharmila M
Disaster Recovery System And Service Continuity Of Digital Library, Sivankalai S, Virumandi A, Sivasekaran K, Sharmila M
Library Philosophy and Practice (e-journal)
This paper will discuss catastrophe recovery and likelihood development for digital library structures. The article establishes a foundation for establishing Library continuity and disaster recovery strategies through the use of best practices. Library continuity development and catastrophe recovery are critical modules of the planning stage for a virtual digital library. Few institutions that experience a catastrophic disaster occurrence are powerless to recover always, but libraries can suggestively boost the possibility of long-term recovery of institutional digital resources by drafting a continuity and recovery strategy in preparation. This article is intended for system designers and administrators, as well as high-ranking library …
Cybert: Cybersecurity Claim Classification By Fine-Tuning The Bert Language Model, Kimia Ameri, Michael Hempel, Hamid Sharif, Juan Lopez Jr., Kalyan Perumalla
Cybert: Cybersecurity Claim Classification By Fine-Tuning The Bert Language Model, Kimia Ameri, Michael Hempel, Hamid Sharif, Juan Lopez Jr., Kalyan Perumalla
Department of Electrical and Computer Engineering: Faculty Publications
We introduce CyBERT, a cybersecurity feature claims classifier based on bidirectional encoder representations from transformers and a key component in our semi-automated cybersecurity vetting for industrial control systems (ICS). To train CyBERT, we created a corpus of labeled sequences from ICS device documentation collected across a wide range of vendors and devices. This corpus provides the foundation for fine-tuning BERT’s language model, including a prediction-guided relabeling process. We propose an approach to obtain optimal hyperparameters, including the learning rate, the number of dense layers, and their configuration, to increase the accuracy of our classifier. Fine-tuning all hyperparameters of the resulting …
A Deep-Dive Into Cryptojacking Malware: From An Empirical Analysis To A Detection Method For Computationally Weak Devices, Ege Tekiner
FIU Electronic Theses and Dissertations
Cryptojacking is an act of using a victim's computation power without his/her consent. Unauthorized mining costs extra electricity consumption and decreases the victim host's computational efficiency dramatically. In this thesis, we perform an extensive research on cryptojacking malware from every aspects. First, we present a systematic overview of cryptojacking malware based on the information obtained from the combination of academic research papers, two large cryptojacking datasets of samples, and numerous major attack instances. Second, we created a dataset of 6269 websites containing cryptomining scripts in their source codes to characterize the in-browser cryptomining ecosystem by differentiating permissioned and permissionless cryptomining …
Reliability Models For Smartphone Applications, Sonia Meskini, Ali Bou Nassif, Luiz Fernando Capretz
Reliability Models For Smartphone Applications, Sonia Meskini, Ali Bou Nassif, Luiz Fernando Capretz
Electrical and Computer Engineering Publications
Smartphones have become the most used electronic devices. They carry out most of the functionalities of desktops, offering various useful applications that suit the user’s needs. Therefore, instead of the operator, the user has been the main controller of the device and its applications, therefore its reliability has become an emergent requirement. As a first step, based on collected smartphone applications failure data, we investigated and evaluated the efficacy of Software Reliability Growth Models (SRGMs) when applied to these smartphone data in order to check whether they achieve the same accuracy as in the desktop/laptop area. None of the selected …
Formulating Automated Responses To Cognitive Distortions For Cbt Interactions, Ignacio De Toledo, Giancarlo Salton, Robert J. Ross
Formulating Automated Responses To Cognitive Distortions For Cbt Interactions, Ignacio De Toledo, Giancarlo Salton, Robert J. Ross
Conference papers
One of the key ideas of Cognitive Behavioural Therapy (CBT) is the ability to convert negative or distorted thoughts into more realistic alternatives. Although modern machine learning techniques can be successfully applied to a variety of Natural Language Processing tasks, including Cognitive Behavioural Therapy, the lack of a publicly available dataset makes supervised training difficult for tasks such as reforming distorted thoughts. In this research, we constructed a small CBT dataset via crowd-sourcing, and leveraged state of the art pre-trained architectures to transform cognitive distortions, producing text that is relevant and more positive than the original negative thoughts. In particular, …
Traffic Collision Avoidance System: False Injection Viability, John Hannah, Robert F. Mills, Richard A. Dill, Douglas D. Hodson
Traffic Collision Avoidance System: False Injection Viability, John Hannah, Robert F. Mills, Richard A. Dill, Douglas D. Hodson
Faculty Publications
Safety is a simple concept but an abstract task, specifically with aircraft. One critical safety system, the Traffic Collision Avoidance System II (TCAS), protects against mid-air collisions by predicting the course of other aircraft, determining the possibility of collision, and issuing a resolution advisory for avoidance. Previous research to identify vulnerabilities associated with TCAS’s communication processes discovered that a false injection attack presents the most comprehensive risk to veritable trust in TCAS, allowing for a mid-air collision. This research explores the viability of successfully executing a false injection attack against a target aircraft, triggering a resolution advisory. Monetary constraints precluded …