Follow


Theses/Dissertations from 2021

PDF

Knowledge Extraction and Inference Based on Visual Understanding of Cooking Contents, Ahmad Babaeian Babaeian Jelodar

PDF

Efficient Post-Quantum and Compact Cryptographic Constructions for the Internet of Things, Rouzbeh Behnia

PDF

Efficient Hardware Constructions for Error Detection of Post-Quantum Cryptographic Schemes, Alvaro Cintas Canto

PDF

Using Hyper-Dimensional Spanning Trees to Improve Structure Preservation During Dimensionality Reduction, Curtis Thomas Davis

PDF

Design, Deployment, and Validation of Computer Vision Techniques for Societal Scale Applications, Arup Kanti Dey

PDF

AffectiveTDA: Using Topological Data Analysis to Improve Analysis and Explainability in Affective Computing, Hamza Elhamdadi

PDF

Automatic Detection of Vehicles in Satellite Images for Economic Monitoring, Cole Hill

PDF

Analysis of Contextual Emotions Using Multimodal Data, Saurabh Hinduja

PDF

Data-driven Studies on Social Networks: Privacy and Simulation, Yasanka Sameera Horawalavithana

PDF

Automated Identification of Stages in Gonotrophic Cycle of Mosquitoes Using Computer Vision Techniques, Sherzod Kariev

PDF

Exploring the Use of Neural Transformers for Psycholinguistics, Antonio Laverghetta Jr.

PDF

Secure VLSI Hardware Design Against Intellectual Property (IP) Theft and Cryptographic Vulnerabilities, Matthew Dean Lewandowski

PDF

Turkic Interlingua: A Case Study of Machine Translation in Low-resource Languages, Jamshidbek Mirzakhalov

PDF

Constructing Frameworks for Task-Optimized Visualizations, Ghulam Jilani Abdul Rahim Quadri

PDF

Trilateration-Based Localization in Known Environments with Object Detection, Valeria M. Salas Pacheco

PDF

Recognizing Patterns from Vital Signs Using Spectrograms, Sidharth Srivatsav Sribhashyam

PDF

Recognizing Emotion in the Wild Using Multimodal Data, Shivam Srivastava

PDF

Human-centered Cybersecurity Research — Anthropological Findings from Two Longitudinal Studies, Anwesh Tuladhar

PDF

Learning State-Dependent Sensor Measurement Models To Improve Robot Localization Accuracy, Troi André Williams

PDF

Human-centric Cybersecurity Research: From Trapping the Bad Guys to Helping the Good Ones, Armin Ziaie Tabari

Theses/Dissertations from 2020

PDF

Classifying Emotions with EEG and Peripheral Physiological Data Using 1D Convolutional Long Short-Term Memory Neural Network, Rupal Agarwal

PDF

Keyless Anti-Jamming Communication via Randomized DSSS, Ahmad Alagil

PDF

Active Deep Learning Method to Automate Unbiased Stereology Cell Counting, Saeed Alahmari

PDF

Composition of Atomic-Obligation Security Policies, Yan Cao Albright

PDF

Action Recognition Using the Motion Taxonomy, Maxat Alibayev

PDF

Sentiment Analysis in Peer Review, Zachariah J. Beasley

PDF

Spatial Heterogeneity Utilization in CT Images for Lung Nodule Classication, Dmitrii Cherezov

PDF

Feature Selection Via Random Subsets Of Uncorrelated Features, Long Kim Dang

PDF

Unifying Security Policy Enforcement: Theory and Practice, Shamaria Engram

PDF

PsiDB: A Framework for Batched Query Processing and Optimization, Mehrad Eslami

PDF

Composition of Atomic-Obligation Security Policies, Danielle Ferguson

PDF

Algorithms To Profile Driver Behavior From Zero-permission Embedded Sensors, Bharti Goel

PDF

Beyond the Hype: Challenges of Neural Networks as Applied to Social Networks, Anthony Hernandez

PDF

Privacy-Preserving and Functional Information Systems, Thang Hoang

PDF

Managing Off-Grid Power Use for Solar Fueled Residences with Smart Appliances, Prices-to-Devices and IoT, Donnelle L. January

PDF

Novel Bit-Sliced In-Memory Computing Based VLSI Architecture for Fast Sobel Edge Detection in IoT Edge Devices, Rajeev Joshi

PDF

Establishing Topological Data Analysis: A Comparison of Visualization Techniques, Tanmay J. Kotha

PDF

Machine Learning for the Internet of Things: Applications, Implementation, and Security, Vishalini Laguduva Ramnath

PDF

System Support of Concurrent Database Query Processing on a GPU, Hao Li

PDF

Deep Learning Predictive Modeling with Data Challenges (Small, Big, or Imbalanced), Renhao Liu

PDF

Towards Safe Power Oversubscription and Energy Efficiency of Data Centers, Sulav Malla

PDF

Design of Support Measures for Counting Frequent Patterns in Graphs, Jinghan Meng

PDF

Automating the Classification of Mosquito Specimens Using Image Processing Techniques, Mona Minakshi

PDF

Models of Secure Software Enforcement and Development, Hernan M. Palombo

PDF

Functional Object-Oriented Network: A Knowledge Representation for Service Robotics, David Andrés Paulius Ramos

PDF

Lung Nodule Malignancy Prediction from Computed Tomography Images Using Deep Learning, Rahul Paul

PDF

Algorithms and Framework for Computing 2-body Statistics on Graphics Processing Units, Napath Pitaksirianan

PDF

Efficient Viewshed Computation Algorithms On GPUs and CPUs, Faisal F. Qarah

PDF

Relational Joins on GPUs for In-Memory Database Query Processing, Ran Rui

PDF

Efficient Forward-Secure and Compact Signatures for the Internet of Things (IoT), Efe Ulas Akay Seyitoglu

PDF

Detecting Symptoms of Chronic Obstructive Pulmonary Disease and Congestive Heart Failure via Cough and Wheezing Sounds Using Smart-Phones and Machine Learning, Anthony Windmon

PDF

Toward Culturally Relevant Emotion Detection Using Physiological Signals, Khadija Zanna

Theses/Dissertations from 2019

PDF

Beyond Labels and Captions: Contextualizing Grounded Semantics for Explainable Visual Interpretation, Sathyanarayanan Narasimhan Aakur

PDF

Empirical Analysis of a Cybersecurity Scoring System, Jaleel Ahmed

PDF

Phenomena of Social Dynamics in Online Games, Essa Alhazmi

PDF

A Machine Learning Approach to Predicting Community Engagement on Social Media During Disasters, Adel Alshehri

PDF

Interactive Fitness Domains in Competitive Coevolutionary Algorithm, ATM Golam Bari

PDF

Measuring Influence Across Social Media Platforms: Empirical Analysis Using Symbolic Transfer Entropy, Abhishek Bhattacharjee

PDF

A Communication-Centric Framework for Post-Silicon System-on-chip Integration Debug, Yuting Cao

PDF

Authentication and SQL-Injection Prevention Techniques in Web Applications, Cagri Cetin

PDF

Multimodal Emotion Recognition Using 3D Facial Landmarks, Action Units, and Physiological Data, Diego Fabiano

PDF

Robotic Motion Generation by Using Spatial-Temporal Patterns from Human Demonstrations, Yongqiang Huang

PDF

A GPU-Based Framework for Parallel Spatial Indexing and Query Processing, Zhila Nouri Lewis

PDF

A Flexible, Natural Deduction, Automated Reasoner for Quick Deployment of Non-Classical Logic, Trisha Mukhopadhyay

PDF

An Efficient Run-time CFI Check for Embedded Processors to Detect and Prevent Control Flow Based Attacks, Srivarsha Polnati

PDF

Force Feedback and Intelligent Workspace Selection for Legged Locomotion Over Uneven Terrain, John Rippetoe

PDF

Detecting Digitally Forged Faces in Online Videos, Neilesh Sambhu

PDF

Malicious Manipulation in Service-Oriented Network, Software, and Mobile Systems: Threats and Defenses, Dakun Shen

PDF

Parallelization of Genetic Algorithm to Solve MAX-3SAT Problem on GPUs, Prakruthi Shivram

PDF

Authentication Usability Methodology, Jean-Baptiste Subils

PDF

Autonomous Monocular Obstacle Detection for Avoidance in Quadrotor UAVs, Panos Valavanis

PDF

On Automation of Code Transformations for Concept Inventory Misconceptions, Dmytro Vitel

PDF

Wireless Physical Layer Design for Confidentiality and Authentication, Tao Wang

PDF

Detecting RTL Trojans Using Artificial Immune Systems and High Level Behavior Classification, Farhath Zareen

Theses/Dissertations from 2018

PDF

Duty-Cycle Based Physical Unclonable Functions (PUFs) for Hardware Security Applications, Mahmood Javed Azhar

PDF

Dynamic Energy-Aware Database Storage and Operations, Peyman Behzadnia

PDF

SR Flip-Flop Based Physically Unclonable Function (PUF) for Hardware Security, Rohith Prasad Challa

PDF

Drone Movement Control using Gesture Recognition from Wearable Devices, Venkata Sireesha Dadi

PDF

A Quantitative Analysis of Shape Characteristics of Marine Snow Particles with Interactive Visualization: Validation of Assumptions in Coagulation Models, Palak P. Dave

PDF

A Fall Prevention System for the Elderly and Visually Impaired, Yueng Santiago De La Hoz Isaza

PDF

Channel Camouflage and Manipulation Techniques in Wireless Networks, Song Fang

PDF

Borromean: Preserving Binary Node Attribute Distributions in Large Graph Generations, Clayton A. Gandy

PDF

Change Descriptors for Determining Nodule Malignancy in Lung CT Screening Images, Benjamin Geiger

PDF

Emerging Non-Volatile Memory Technologies for Computing and Security, Rekha Govindaraj

PDF

Gate Level Probabilistic Simulation Based Hardware Trojan Susceptibility Analysis of Combinational Circuits, Venkata Lakshmi Bhargavi Gurram

PDF

Improving the Security of Building Automation Systems Through an seL4-based Communication Framework, Richard Habeeb

PDF

Identification of Individuals from Ears in Real World Conditions, Earnest Eugene Hansley

PDF

A Key Based Obfuscation and Anonymization of Behavior VHDL Models, Balausha Varshini Kandikonda

PDF

Similarity Based Large Scale Malware Analysis: Techniques and Implications, Yuping Li

PDF

Parallelizing Tabu Search Based Optimization Algorithm on GPUs, Vinaya Malleypally

PDF

Offensive and Defensive Security for Everyday Computer Systems, Ian Markwood

PDF

A Machine Learning Framework to Classify Mosquito Species from Smart-phone Images, Mona Minakshi

PDF

A Point Cloud Approach to Object Slicing for 3D Printing, William Edward Oropallo Jr.

PDF

On the Feasibility of Profiling, Forecasting and Authenticating Internet Usage Based on Privacy Preserving NetFlow Logs, Soheil Sarmadi