Graduate Student Publications

Graduate Student Publications

RDMTk: A toolkit for Risky Decision Making

Authors:V. Gavirangaswamy, Aakash Gupta, M. Terwilliger and Ajay Gupta

In the Proceedings of the 21st International Conference on Formal Engineering Methods (ICFEM 2019), Xi’an, China, May 2019, https://www.igi-global.com/article/rdmtk/236686

 

Fog-based local and remote policy enforcement for preserving data privacy in the Internet of Things

Authors:A. Al-Hasnawi, Ajay Gupta and S. Carr

Journal of Internet of Things; Engineering Cyber Physical Human Systems, Elsevier, Volume 7, September 2019, 100069, https://www.sciencedirect.com/science/article/pii/S2542660519300174

 

Leveraging Machine Learning and Big Data for Smart Buildings: A Comprehensive Survey

Authors:B. Qolomany, A. Al-Fuqaha, A. Gupta, D. Benhaddou, S. Alwajidi, J. Qadir and A. Fong

IEEE Access, Vol. 7, pp 90316-90356, July 2019, https://arxiv.org/abs/1904.01460

 

sCompile: Critical Path Identification and Analysis for Smart Contracts

Authors:Jialiang Chang, Bo Gao, Hao Xiao, Jun Sun, Yan Cai and Zijiang Yang

In the Proceedings of the 21st International Conference on Formal Engineering Methods (ICFEM 2019), Xi’an, China, May 2019

 

SqlSol: An accurate SQL Query Synthesizer

Author:Lin Cheng

In the Proceedings of the 21st International Conference on Formal Engineering Methods (ICFEM 2019), Xi’an, China, May 2019

 

Rule-Based Arabic Stemmer as an R Package: arStemmer1

Authors:AlShahrani H, Fong ACM, and AlShahrani F

International Conference on Electronics, Information, and Communication (ICEIC 2019), Auckland, New Zealand, Jan 2019, https://ieeexplore.ieee.org/document/8706423

 

Modeling Big Medical Survival Data Using Decision Tree Analysis with Apache Spark

Authors:Alsaedi A and Fong ACM

5th International Conference on Health Information Technology Advancement (ICHITA 2019), Kalamazoo, MI, October 2019.

 

Fake Review Detection on Yelp Dataset Using Machine Learning Classification Techniques

Authors: Sihombing A and Fong ACM

4th International Conference on Contemporary Computing and Informatics (iC3I 2019), Singapore, December 2019.

 

Leveraging Machine Learning and Big Data for Smart Buildings: A Comprehensive Survey

Authors:Qolomany B, Al-Fuqaha A, Gupta A, Benhaddou D, Alwajidi S, Qadir J, and Fong ACM

IEEE Access, Vol. 7/1, pp. 90316-90356, December 2019. DOI: 10.1109/ACCESS.2019.2926642, https://arxiv.org/abs/1904.01460

 

Changing Energy Consumption Patterns Based on Multi-Agent Human Behavior Modeling for Analyzing the Effects of Feedback Techniques

Authors: M Alrizq, E de Doncker and A Fong

Power and Energy Conference Illinois (PECI), 2019 IEEE, pp. 1-8, https://ieeexplore.ieee.org/document/8698779

 

Efficient GPU Integration for Multi-loop Feynman Diagrams with Massless Internal Lines, in Computational and Experimental Simulations in Engineering

Authors:E de Doncker, F Yuasa and A Almulihi

Mechanisms and Machine Science 75, DOI:10.1007/978-3-030-27053-7

 

Numerical Multi-Loop Integration on Heterogeneous Many-Core Processors

Authors:E de Doncker, F Yuasa, A Almulihi, N Nakasato, H Daisaka and T Ishikawa

Journal of Physics: Conf. Series (JPCS), IOP Series. https://indico.cern.ch/event/708041/papers/3266614/files/8571-acat19paper.pdf

 

QSMF: An Approximate Algorithm for Quorum Planted Machine Search on ChiP-Seq Data

Authors:H Al-Shaikhli and E de Doncker

2019 IEEE International Conf. on Electro/Information Technology

 

Twitter Sentiment Analysis with a Deep Neural Network: An Enhanced Approach using User Behavioral Information

Authors: A S M Alharbi and E de Doncker

J. Cognitive Systems Analysis 14 (2019), pp. 50-61, https://doi.org/10.1016/j.cogsys.2018.10.001

 

Regularization with Numerical Extrapolation for Finite and UV-Divergent Multi-loop Integrals

Authors: E de Doncker, F Yuasa, K Kato, T Ishikawa, J Kapenga, O Olagbemi

Computer Physics Communications 224 (2018), pp. 164-185, https://doi.org/10.1016/j.cpc.2017.11.001

Also preprint arXiv:[hep-ph] https://arxiv.org/abs/1702.04904

 

A Novel Fuzzy Based Human Behavior Model for Residential Electricity Consumption Forecasting

Authors: M Alrizq and E de Doncker

2018 Power and Energy Conference in Illinois (PECI), 2018 IEEE, pp. 1-7, https://ieeexplore.ieee.org/document/8334984

 

SMF: Approximate Algorithm for the Planted (l, d) Motif Finding Problem in DNA Sequences

Authors: H Al-Shaikhli and E de Doncker

Conf. BIOCOMP (Bioinformatics and Computational Biology), pp. 123-129 (2018), ISBN: 1-60132-471-5, https://csce.ucmss.com/cr/books/2018/LFS/CSREA2018/BIC4274.pdf

 

A Language for Mandatory Integrity Controls

Authors: Wassnaa Al-Mawee, Paul J. Bonamy (Washington State University – Vancouver), Steve Carr and Jean Mayo (Michigan Technological University)

To appear in the 5th International Conference on Information Systems Security and Privacy (ICISSP 2019), Prague, Czech Republic, February 23-25, 2019.

PHeDHA: Protecting Healthcare Data in Health Information Exchanges with Active Data Bundles

Authors: Wesam Fadheel, Raed Salih and Leszek Lilien

The 17th IEEE International Conference On Trust, Security and Privacy In Computing and Communications (IEEE TrustCom-18) New York, USA, 2018.

 

On Feature Selection for the Prediction of Phishing Websites

Authors: Wesam Fadheel, Mohamed Abusharkh and Ikhlas Abdel-Qader

15th IEEE Intl. Conf. on Pervasive Intelligence and Computing (PICom-2017), Orlando, USA, 2017

 

Pervasive Trust Foundation for Security and Privacy in Opportunistic Resource Utilization Networks.

Authors: Ahmed Al-Gburi, Abduljaleel Al-Hasnawi, Raed Salih, and Leszek Lilien.

Chapter TBD in: N. I. Udzir et al., "Opportunistic Networks: Mobility Models, Protocols, Security & Privacy," CRC Press, Taylor & Francis, Boca Raton, FL, 2018.

 

Pushing Data Privacy Control to the Edge in IoT Using Policy Enforcement Fog Module

Authors: Abduljaleel Al-Hasnawi, and Leszek Lilien.

3rd International Symposium on Real-time Data Processing for Cloud Computing (RTDPCC 2017 – II), in conjunction with the 10th IEEE/ACM International Conference on Utility and Cloud Computing (UCC 2017), Austin, TX, December 5-8, 2017.

 

Differentiating Security from Privacy in Internet of Things — A Survey of Selected Threats and Controls

Authors: Ahmed Al-Gburi, Abduljaleel Al-Hasnawi, and Leszek Lilien.

Computer and Network Security Essentials," Springer International Publishing, Cham, Switzerland, 2018.

 

AtexRace: Across Thread and Execution Sampling for In-house Race Detection

Authors: Yu Guo, Yan Cai, and Zijiang Yang.

17th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE). September 4-8, 2017. Paderborn, Germany.

 

GUICat: GUI Testing as a Service

Authors: Lin Cheng, Jialiang Chang, Zijiang Yang and Chao Wang.

Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering (ASE).

 

Justifying the Transition from Trustworthiness to Resiliency via Generation of Safety Cases

Authors: Chung-Ling Lin, Wuwei Shen, and Steven Drager.

17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2016), The paper has been selected as one of the top 15 papers published by Studies in Computational Intelligence (SCI), Springer, Germany 2016, pp. 57-73.

 

Support for Safety Case Generation via Model Transformation

Authors: Chung-Ling Lin, Wuwei Shen, and Richard Hawkins.

Medical Cyber Physical Systems Workshop 2016 (Medical CPS 2016), Vienna, Austria, April 2016, To appear in ACM SIGBED Review.

 

A Framework To Support Generation and Maintenance of An Assurance Case

Authors: Chung-Ling Lin, Wuwei Shen, and Steven Drager.

27th IEEE International Symposium on Software Reliability Engineering 2016 (ISSRE 2016) industry track, Ottawa, Canada, October 2016.

 

MS-REDUCE: An ultrafast technique for reduction of big mass spectrometry data for high-throughput processing

Authors: Muaaz Gul Awan and Fahad Saeed.

Bioinformatics 2016, 32: 1518-1526.