Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleMay 2024
Cumulative absolute velocity prediction for earthquake early warning with deep learning
Computer-Aided Civil and Infrastructure Engineering (MICE), Volume 39, Issue 11Pages 1724–1740https://doi.org/10.1111/mice.13065AbstractA rapid and accurate estimate of earthquake damage is a key component in a successful earthquake early warning (EEW) system. The cumulative absolute velocity (CAV) is an important and widely used parameter to measure ground motion intensity, but ...
- posterApril 2024
AutoHammer: Breaking the Compilation Wall Between Deep Neural Network and Overlay-based FPGA Accelerator
FPGA '24: Proceedings of the 2024 ACM/SIGDA International Symposium on Field Programmable Gate ArraysPage 185https://doi.org/10.1145/3626202.3637595Field-Programmable Gate Array (FPGA) has shown great potential in accelerating Deep Neural Networks (DNNs) due to its characteristics of programmability and high power efficiency. In address the compilation challenges between DNNs and FPGA, we propose ...
- research-articleFebruary 2024
Characterizing Internet Card User Portraits for Efficient Churn Prediction Model Design
IEEE Transactions on Mobile Computing (ITMV), Volume 23, Issue 2Pages 1735–1752https://doi.org/10.1109/TMC.2023.3241206Cellular Internet card (IC) as a new business model emerges, which penetrates rapidly and holds the potential to foster a great business market. However, with the explosive growth of IC users, the user churn problem becomes severe, affecting the IC ...
- research-articleOctober 2022
Enlarging the Long-time Dependencies via RL-based Memory Network in Movie Affective Analysis
MM '22: Proceedings of the 30th ACM International Conference on MultimediaPages 5739–5750https://doi.org/10.1145/3503161.3548076Affective analysis of movies heavily depends on the causal understanding of the story with long-time dependencies. Limited by the existing sequence models such as LSTM, Transformer, etc., current works generally split the movies into dependent clips and ...
- research-articleJuly 2022
Binaural Sound Source Localization based on Neural Networks in Mismatched HRTF Condition
ICCAI '22: Proceedings of the 8th International Conference on Computing and Artificial IntelligencePages 62–67https://doi.org/10.1145/3532213.3532223Binaural sound source localization is a field with wide applications, such as virtual sound localization in VR or speech enhancement, which has drawn many researchers’ attention. However, the mismatched HRTF condition is a severe problem, which has been ...
-
- posterMarch 2022
Authentic Learning of Machine Learning in Cybersecurity with Portable Hands-on Labware
SIGCSE 2022: Proceedings of the 53rd ACM Technical Symposium on Computer Science Education V. 2Page 1153https://doi.org/10.1145/3478432.3499070New cyberattacks grow in an exponential rate. However, the state-of-the-art in cyber defense efforts cannot keep pace with the sophisticated cybersecurity threats and attacks. The industry relies excessively on anti-virus software which is effective for ...
- posterMarch 2023
Collaborative and Active Learning with Portable Online Hands-on Labware for Blockchain Development
SIGCSE 2023: Proceedings of the 54th ACM Technical Symposium on Computer Science Education V. 2Page 1307https://doi.org/10.1145/3545947.3576254Blockchain technology has impacted various sectors and there is a high demand for blockchain professionals, however, a lot of schools have not offered courses in blockchain. We propose a portable labware that covers the complete cycle of blockchain ...
- posterMarch 2023
Authentic Learning on Machine Learning for Cybersecurity
SIGCSE 2023: Proceedings of the 54th ACM Technical Symposium on Computer Science Education V. 2Page 1299https://doi.org/10.1145/3545947.3576245The primary goal of the authentic learning approach is to engage and motivate students in learning real world problem solving. We report our experience in developing k-nearest neighbor (KNN) classification for anomaly user behavior detection, one of the ...
- research-articleSeptember 2021
An Adaptive Neural Architecture Search Design for Collaborative Edge-Cloud Computing
IEEE Network: The Magazine of Global Internetworking (IEEENETW), Volume 35, Issue 5Pages 83–89https://doi.org/10.1109/MNET.201.2100069With the development of deep neural networks, the smart edge-cloud scenario is expected to meet the diverse and personalized requirements of users. However, the exiting edge-cloud architecture requires the deployment of manually designed neural networks. ...
- research-articleSeptember 2021
DLGEA: a deep learning guided evolutionary algorithm for water contamination source identification
Neural Computing and Applications (NCAA), Volume 33, Issue 18Pages 11889–11903https://doi.org/10.1007/s00521-021-05894-yAbstractWater distribution network (WDN) is one of the most essential infrastructures all over the world and ensuring water quality is always a top priority. To this end, water quality sensors are often deployed at multiple points of WDNs for real-time ...
- research-articleJanuary 2021
Automatic Recognition and Classification System of Thyroid Nodules in CT Images Based on CNN
Computational Intelligence and Neuroscience (CIAN), Volume 2021https://doi.org/10.1155/2021/5540186Thyroid nodule lesions are one of the most common lesions of the thyroid; the incidence rate has been the highest in the past thirty years. X-ray computed tomography (CT) plays an increasingly important role in the diagnosis of thyroid diseases. ...
- ArticleDecember 2020
Performance Benchmarking and Optimization for IIoT-oriented Blockchain
Security, Privacy, and Anonymity in Computation, Communication, and StoragePages 395–406https://doi.org/10.1007/978-3-030-68884-4_33AbstractThe Industrial Internet of Things (IIoT) is profoundly changing the production mode, e.g., rail freight industry and medical industry, with the widespread applications of sensor technology and wireless network in the industrial field. However, ...
- posterFebruary 2020
Information Assurance and Security Education on Undergraduate Computing Degree Programs
SIGCSE '20: Proceedings of the 51st ACM Technical Symposium on Computer Science EducationPage 1274https://doi.org/10.1145/3328778.3372584A set of Information Assurance and Security hands-on learning modules is developed and open to the public. Topics include networking security, database security, defensive programming, web security, system fundamentals, mobile security, malware ...
- research-articleFebruary 2020
Binaural sound localization based on deep neural network and affinity propagation clustering in mismatched HRTF condition
EURASIP Journal on Audio, Speech, and Music Processing (EJASMP), Volume 2020, Issue 1https://doi.org/10.1186/s13636-020-0171-yAbstractBinaural sound source localization is an important and widely used perceptually based method and it has been applied to machine learning studies by many researchers based on head-related transfer function (HRTF). Because the HRTF is closely ...
- abstractFebruary 2019
Data Protection with SMSD Labware
SIGCSE '19: Proceedings of the 50th ACM Technical Symposium on Computer Science EducationPage 1262https://doi.org/10.1145/3287324.3293785The majority of malicious mobile attacks take advantage of vulnerabilities in mobile applications, such as sensitive data leakage via inadvertent or side channel, unsecured sensitive data storage, data transmission, and many others. Most of these mobile ...
- research-articleOctober 2018
Authentic Learning Secure Software Development (SSD) in Computing Education
2018 IEEE Frontiers in Education Conference (FIE)Pages 1–9https://doi.org/10.1109/FIE.2018.8659217As mobile computing is now becoming more and more popular, the security threats to mobile applications are also growing explosively. Mobile app flaws and security defects could open doors for hackers to break into them and access sensitive information. ...
- research-articleOctober 2017
Learning database security with hands-on mobile labs
2017 IEEE Frontiers in Education Conference (FIE)Pages 1–6https://doi.org/10.1109/FIE.2017.8190716As mobile computing is becoming more and more popular, the security threats to mobile applications are simultaneously increasing explosively. Most malicious activities hack the user's private information, such as contact and location information, hijack ...
- posterJune 2017
Designing an Undergraduate Minor Program in E-Discovery
ITiCSE '17: Proceedings of the 2017 ACM Conference on Innovation and Technology in Computer Science EducationPage 361https://doi.org/10.1145/3059009.3072996While the market for the E-Discovery (Electronic Discovery) is predicted to grow rapidly in coming years, the anticipated shortage of electronic discovery professionals is a result of the lack of education programs in this emerging field. In this paper, ...
- posterJune 2017
Labware for Secure Mobile Software Development (SMSD) Education
ITiCSE '17: Proceedings of the 2017 ACM Conference on Innovation and Technology in Computer Science EducationPage 375https://doi.org/10.1145/3059009.3072983This poster addresses the needs of pedagogical learning materials for Secure Mobile Software Development(SMSD) education and challenges of building SMSD capacity. In this poster, we present an innovative authentic learning approach for SMSD through real-...
- research-articleMay 2017
FlowVisor vulnerability analysis
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)Pages 867–868https://doi.org/10.23919/INM.2017.7987387This paper explored possible vulnerabilities in FlowVisor, SDN virtualized tool, and analyzed the potential isolation issue between multiple virtual slices by FlowVisor. We discovered a security vulnerability of interference between virtual slices in SDN, ...