MALITE: Lightweight Malware Detection and Classification for Constrained Devices [0.03%]
轻量级约束设备恶意软件检测与分类系统
Sidharth Anand,Barsha Mitra,Soumyadeep Dey et al.
Sidharth Anand et al.
Today, malware is one of the primary cyber threats to organizations, pervading all types of computing devices, including resource constrained devices such as mobile phones, tablets and embedded devices like Internet-of-Things (IoT) devices....
Nathaniel Hobbs,Periklis A Papakonstantinou,Jaideep Vaidya
Nathaniel Hobbs
This work proposes a definition and examines the problem of undetectably engraving special input/output information into a Neural Network (NN). Investigation of this problem is significant given the ubiquity of neural networks and society's...
The Indoor Predictability of Human Mobility: Estimating Mobility with Smart Home Sensors [0.03%]
人类移动的室内可预测性:使用智能家庭传感器估算移动行为
Tinghui Wang,Diane J Cook,Thomas R Fischer
Tinghui Wang
Analyzing human mobility patterns is valuable for understanding human behavior and providing location-anticipating services. In this work, we theoretically estimate the predictability of human movement for indoor settings, a problem that ha...
Eeshan Gupta,Shamik Sural,Jaideep Vaidya et al.
Eeshan Gupta et al.
NoSQL databases are being increasingly used for efficient management of high volumes of unstructured data in applications like information retrieval, natural language processing, social computing, etc. However, unlike traditional databases,...
Mohammed Alawad,Hong-Jun Yoon,Shang Gao et al.
Mohammed Alawad et al.
Population cancer registries can benefit from Deep Learning (DL) to automatically extract cancer characteristics from the high volume of unstructured pathology text reports they process annually. The success of DL to tackle this and other r...
Tinghui Wang,Diane J Cook
Tinghui Wang
Activity recognizers are challenging to design for continuous, in-home settings. However, they are notoriously difficult to create when there is more than one resident in the home. Despite recent efforts, there remains a need for an algorit...
BD2K Training Coordinating Center's ERuDIte: the Educational Resource Discovery Index for Data Science [0.03%]
BD2K教育协调中心的ERuDIte:数据科学教育资源发现索引
José Luis Ambite,Lily Fierro,Jonathan Gordon et al.
José Luis Ambite et al.
Data science is a field that has developed to enable efficient integration and analysis of increasingly large data sets in many domains. In particular, big data in genetics, neuroimaging, mobile health, and other subfields of biomedical sci...
Enabling Workforce Optimization in Constrained Attribute-Based Access Control Systems [0.03%]
在受限制的属性-based访问控制系统中实现 workforce优化
Arindam Roy,Shamik Sural,Arun Kumar Majumdar et al.
Arindam Roy et al.
Effective utilization of human capital is one of the key requirements for any successful business endeavor, with reorganization necessary if there are nonproductive employees or employees that are retiring. However, while reorganizing tasks...
Zhaoyang Zhang,Honggang Wang,Chonggang Wang et al.
Zhaoyang Zhang et al.
Social contact networks and the way people interact with each other are the key factors that impact on epidemics spreading. However, it is challenging to model the behavior of epidemics based on social contact networks due to their high dyn...
Interference Mitigation for Cyber-Physical Wireless Body Area Network System Using Social Networks [0.03%]
基于社交网络的无线体域网系统中的干扰抑制技术研究
Zhaoyang Zhang,Honggang Wang,Chonggang Wang et al.
Zhaoyang Zhang et al.
Wireless body area networks (WBANs) are cyber-physical systems (CPS) that have emerged as a key technology to provide real-time health monitoring and ubiquitous healthcare services. WBANs could operate in dense environments such as in a hos...