Theses/Dissertations from 2021
Learning State-Dependent Sensor Measurement Models To Improve Robot Localization Accuracy, Troi André Williams
Human-centric Cybersecurity Research: From Trapping the Bad Guys to Helping the Good Ones, Armin Ziaie Tabari
Theses/Dissertations from 2020
Classifying Emotions with EEG and Peripheral Physiological Data Using 1D Convolutional Long Short-Term Memory Neural Network, Rupal Agarwal
Keyless Anti-Jamming Communication via Randomized DSSS, Ahmad Alagil
Active Deep Learning Method to Automate Unbiased Stereology Cell Counting, Saeed Alahmari
Composition of Atomic-Obligation Security Policies, Yan Cao Albright
Action Recognition Using the Motion Taxonomy, Maxat Alibayev
Sentiment Analysis in Peer Review, Zachariah J. Beasley
Spatial Heterogeneity Utilization in CT Images for Lung Nodule Classication, Dmitrii Cherezov
Feature Selection Via Random Subsets Of Uncorrelated Features, Long Kim Dang
Unifying Security Policy Enforcement: Theory and Practice, Shamaria Engram
PsiDB: A Framework for Batched Query Processing and Optimization, Mehrad Eslami
Composition of Atomic-Obligation Security Policies, Danielle Ferguson
Algorithms To Profile Driver Behavior From Zero-permission Embedded Sensors, Bharti Goel
The Efficiency and Accuracy of YOLO for Neonate Face Detection in the Clinical Setting, Jacqueline Hausmann
Beyond the Hype: Challenges of Neural Networks as Applied to Social Networks, Anthony Hernandez
Privacy-Preserving and Functional Information Systems, Thang Hoang
Managing Off-Grid Power Use for Solar Fueled Residences with Smart Appliances, Prices-to-Devices and IoT, Donnelle L. January
Novel Bit-Sliced In-Memory Computing Based VLSI Architecture for Fast Sobel Edge Detection in IoT Edge Devices, Rajeev Joshi
Edge Computing for Deep Learning-Based Distributed Real-time Object Detection on IoT Constrained Platforms at Low Frame Rate, Lakshmikavya Kalyanam
Establishing Topological Data Analysis: A Comparison of Visualization Techniques, Tanmay J. Kotha
Machine Learning for the Internet of Things: Applications, Implementation, and Security, Vishalini Laguduva Ramnath
System Support of Concurrent Database Query Processing on a GPU, Hao Li
Deep Learning Predictive Modeling with Data Challenges (Small, Big, or Imbalanced), Renhao Liu
Countermeasures Against Various Network Attacks Using Machine Learning Methods, Yi Li
Towards Safe Power Oversubscription and Energy Efficiency of Data Centers, Sulav Malla
Design of Support Measures for Counting Frequent Patterns in Graphs, Jinghan Meng
Automating the Classification of Mosquito Specimens Using Image Processing Techniques, Mona Minakshi
Models of Secure Software Enforcement and Development, Hernan M. Palombo
Functional Object-Oriented Network: A Knowledge Representation for Service Robotics, David Andrés Paulius Ramos
Lung Nodule Malignancy Prediction from Computed Tomography Images Using Deep Learning, Rahul Paul
Algorithms and Framework for Computing 2-body Statistics on Graphics Processing Units, Napath Pitaksirianan
Efficient Viewshed Computation Algorithms On GPUs and CPUs, Faisal F. Qarah
Relational Joins on GPUs for In-Memory Database Query Processing, Ran Rui
Micro-architectural Countermeasures for Control Flow and Misspeculation Based Software Attacks, Love Kumar Sah
Efficient Forward-Secure and Compact Signatures for the Internet of Things (IoT), Efe Ulas Akay Seyitoglu
Toward Culturally Relevant Emotion Detection Using Physiological Signals, Khadija Zanna
Theses/Dissertations from 2019
Beyond Labels and Captions: Contextualizing Grounded Semantics for Explainable Visual Interpretation, Sathyanarayanan Narasimhan Aakur
Empirical Analysis of a Cybersecurity Scoring System, Jaleel Ahmed
Phenomena of Social Dynamics in Online Games, Essa Alhazmi
A Machine Learning Approach to Predicting Community Engagement on Social Media During Disasters, Adel Alshehri
Interactive Fitness Domains in Competitive Coevolutionary Algorithm, ATM Golam Bari
Measuring Influence Across Social Media Platforms: Empirical Analysis Using Symbolic Transfer Entropy, Abhishek Bhattacharjee
A Communication-Centric Framework for Post-Silicon System-on-chip Integration Debug, Yuting Cao
Authentication and SQL-Injection Prevention Techniques in Web Applications, Cagri Cetin
Multimodal Emotion Recognition Using 3D Facial Landmarks, Action Units, and Physiological Data, Diego Fabiano
Robotic Motion Generation by Using Spatial-Temporal Patterns from Human Demonstrations, Yongqiang Huang
A GPU-Based Framework for Parallel Spatial Indexing and Query Processing, Zhila Nouri Lewis
A Flexible, Natural Deduction, Automated Reasoner for Quick Deployment of Non-Classical Logic, Trisha Mukhopadhyay
An Efficient Run-time CFI Check for Embedded Processors to Detect and Prevent Control Flow Based Attacks, Srivarsha Polnati
Force Feedback and Intelligent Workspace Selection for Legged Locomotion Over Uneven Terrain, John Rippetoe
Detecting Digitally Forged Faces in Online Videos, Neilesh Sambhu
Malicious Manipulation in Service-Oriented Network, Software, and Mobile Systems: Threats and Defenses, Dakun Shen
Parallelization of Genetic Algorithm to Solve MAX-3SAT Problem on GPUs, Prakruthi Shivram
Authentication Usability Methodology, Jean-Baptiste Subils
Autonomous Monocular Obstacle Detection for Avoidance in Quadrotor UAVs, Panos Valavanis
On Automation of Code Transformations for Concept Inventory Misconceptions, Dmytro Vitel
Wireless Physical Layer Design for Confidentiality and Authentication, Tao Wang
Detecting RTL Trojans Using Artificial Immune Systems and High Level Behavior Classification, Farhath Zareen
Theses/Dissertations from 2018
Duty-Cycle Based Physical Unclonable Functions (PUFs) for Hardware Security Applications, Mahmood Javed Azhar
Dynamic Energy-Aware Database Storage and Operations, Peyman Behzadnia
SR Flip-Flop Based Physically Unclonable Function (PUF) for Hardware Security, Rohith Prasad Challa
Drone Movement Control using Gesture Recognition from Wearable Devices, Venkata Sireesha Dadi
A Fall Prevention System for the Elderly and Visually Impaired, Yueng Santiago De La Hoz Isaza
Channel Camouflage and Manipulation Techniques in Wireless Networks, Song Fang
Borromean: Preserving Binary Node Attribute Distributions in Large Graph Generations, Clayton A. Gandy
Change Descriptors for Determining Nodule Malignancy in Lung CT Screening Images, Benjamin Geiger
Emerging Non-Volatile Memory Technologies for Computing and Security, Rekha Govindaraj
Gate Level Probabilistic Simulation Based Hardware Trojan Susceptibility Analysis of Combinational Circuits, Venkata Lakshmi Bhargavi Gurram
Improving the Security of Building Automation Systems Through an seL4-based Communication Framework, Richard Habeeb
Identification of Individuals from Ears in Real World Conditions, Earnest Eugene Hansley
A Key Based Obfuscation and Anonymization of Behavior VHDL Models, Balausha Varshini Kandikonda
Similarity Based Large Scale Malware Analysis: Techniques and Implications, Yuping Li
Parallelizing Tabu Search Based Optimization Algorithm on GPUs, Vinaya Malleypally
Offensive and Defensive Security for Everyday Computer Systems, Ian Markwood
A Machine Learning Framework to Classify Mosquito Species from Smart-phone Images, Mona Minakshi
A Point Cloud Approach to Object Slicing for 3D Printing, William Edward Oropallo Jr.
On the Feasibility of Profiling, Forecasting and Authenticating Internet Usage Based on Privacy Preserving NetFlow Logs, Soheil Sarmadi
Emotion Recognition Using Deep Convolutional Neural Network with Large Scale Physiological Data, Astha Sharma
Determining Level of Cognitive Impairment via Computing Fractals using a Computer, Kodhanda Karthik Siriyala
Orientation Invariance Methods for Inertial Gait, Ravichandran Subramanian
A Secure Computing Platform for Building Automation Using Microkernel-based Operating Systems, Xiaolong Wang
Precise, General, and Efficient Data-flow Analysis for Security Vetting of Android Apps, Fengguo Wei
Automatic Multimodal Assessment of Neonatal Pain, Ghada Zamzmi
Theses/Dissertations from 2017
Mitigation of Insider Attacks for Data Security in Distributed Computing Environments, Santosh Aditham
Adaptive Region-Based Approaches for Cellular Segmentation of Bright-Field Microscopy Images, Hady Ahmady Phoulady
Context-based Human Activity Recognition Using Multimodal Wearable Sensors, Pratool Bharti
Initial Comparative Empirical Usability Testing for the Collaborative Authentication System, Kim Bursum
Scalable Unsupervised Learning with Game Theory, Alireza Chakeri
Semantic Description of Activities in Videos, Fillipe Dias Moreira De Souza
Active Cleaning of Label Noise Using Support Vector Machines, Rajmadhan Ekambaram
Learning to Predict Clinical Outcomes from Soft Tissue Sarcoma MRI, Hamidreza Farhidzadeh
Estimation of Human Poses Categories and Physical Object Properties from Motion Trajectories, Mona Fathollahi Ghezelghieh
Lung CT Radiomics: An Overview of Using Images as Data, Samuel Hunt Hawkins
Strong-DISM: A First Attempt to a Dynamically Typed Assembly Language (D-TAL), Ivory Hernandez
Experimental Analysis on the Feasibility of Voice Based Symmetric Key Generation for Embedded Devices, Surya Bharat Kamineni
Multi-Scale Spatial Cognition Models and Bio-Inspired Robot Navigation, Martin I. Llofriu Alonso
Constructing a Clinical Research Data Management System, Michael C. Quintero
