Publications from 2024
Image De‑Photobombing Benchmark, Vatsa S. Patel, Kunal Agrawal, Samah Baraheem, Amira Yousif, and Tam Nguyen
Predicting an Optimal Medication/Prescription Regimen for Patient Discordant Chronic Comorbidities Using Multi-Output Models, Ichchha Pradeep Sharma (0000-0003-0236-7992), Tam Nguyen, Shruti Ajay Singh, and Tom Ongwere (0000-0002-6754-9626)
Publications from 2023
AI vs. AI: Can AI Detect AI-Generated Images?, Samah S. Baraheem and Tam Van Nguyen
Model Checking Time Window Temporal Logic for Hyperproperties, Ernest Bonnah, Luan Viet Nguyen (0000-0001-5516-2443), and Khaza Anuarul Hoque
Collaborative Consultation Doctors Model: Unifying CNN and ViT for COVID-19 Diagnostic, Trong-Thuan Nguyen (0000-0001-7729-2927), Tam Nguyen (0000-0003-0236-7992), and Minh-Triet Tran (0000-0003-3046-3041)
UIT-ADrone: A Novel Drone Dataset for Traffic Anomaly Detection, Tung Minh Tran (0000-0001-7669-1002), Tu N. Vu (0000-0001-9175-3005), Tam Nguyen (0000-0003-0236-7992), and Khang Nguyen (0000-0002-6571-7075)
Real Estate Pricing Prediction via Textual and Visual Features, Amira Yousif, Samah Baraheem, Sai Surya Vaddi, Vatsa S. Patel, Ju Shen, and Tam Nguyen
Publications from 2022
Vietnamese Document Analysis: Dataset, Method and Benchmark Suite, Khang Nguyen (0000-0002-6571-7075), An Nguyen, Nguyen D. Vo, and Tam Nguyen
Pervasive Healthcare Internet of Things: A Survey, Kim Anh Phung, Cemil Kirbas, Leyla Dereci, and Tam Van Nguyen (0000-0003-0236-7992)
Disease Recognition in X-Ray Images with Doctor Consultation-Inspired Model, Kim Anh Phung (0000-0002-4561-7536), Thuan Trong Nguyen (0000-0001-7729-2927), Nileshkumar Wangad, Samah Baraheem, Nguyen D. Vo, and Khang Nguyen
Few-Shot Object Detection via Baby Learning, Anh-Khoa Nguyen Vu, Nhat-Duy Nguyen, Khanh-Duy Nguyen, Vinh-Tiep Nguyen, Thanh Duc Ngo, Thanh-Toan Do, and Tam Nguyen
Publications from 2021
R2U3D: Recurrent Residual 3D U-Net for Lung Segmentation, Dhaval D. Kadia, MD Zahangir Alom, Ranga Burada, Tam Nguyen, and Vijayan K. Asari
Olympic Games Event Recognition via Transfer Learning with Photobombing Guided Data Augmentation, Yousef I. Mohamad (0000-0001-7657-9686), Samah S. Baraheem, and Tam Van Nguyen (0000-0003-0236-7992)
Masked Face Analysis via Multi-Task Deep Learning, Vatsa S. Patel, Zhongliang Nie, Trung-Nghia Le (0000-0002-7363-2610), and Tam Van Nguyen (0000-0003-0236-7992)
Verification of Piecewise Deep Neural Networks: A Star Set Approach with Zonotope Pre-filter, Hoang-Dung Tran, Neelanjana Pal, Diego Manzanas Lopez, Patrick Musau, Xiaodong Yang, Luan Viet Nguyen, Weiming Xiang, Stanley Bak, and Taylor T. Johnson (0000-0001-8021-9923)
Publications from 2020
Divide and Slide: Layer-Wise Refinement for Output Range Analysis of Deep Neural Networks, Chao Huang (0000-0002-9300-1787), Jiameng Fan (0000-0001-9325-7718), Xin Chen, Wenchao Li (0000-0003-4756-6397), and Qi Zhu
NNV: The Neural Network Verification Tool for Deep Neural Networks and Learning-Enabled Cyber-Physical Systems, Hoang-Dung Tran, Xiaodong Yang, Diego Manzanas Lopez, Patrick Musau, Luan Viet Nguyen, Weiming Xiang, Stanley Bak, and Taylor T. Johnson
Publications from 2019
An Interactive, Graphical Simulator for Teaching Operating Systems, Joshua W. Buck and Saverio Perugini
Reachability Analysis for Neural Feedback Systems Using Regressive Polynomial Rule Inference, Souradeep Dutta, Xin Chen, and Sriram Sankaranarayanan
ReachNN: Reachability Analysis of Neural-Network Controlled Systems, Chao Huang, Jiameng Fan, Wenchao Li, Xin Chen, and Qi Zhu
Predicting Public Opinion on Drug Legalization: Social Media Analysis and Consumption Trends, Farahnaz Golrooy Motlagh, Saeedeh Shekarpour, Amit Sheth, Krishnaprasad Thirunarayan, and Michael L. Raymer
Developing a Contemporary and Innovative Operating Systems Course, Saverio Perugini and David J. Wright
A New Way to Detect Cyberattacks Extracting Changes in Register Values from Radio-Frequency Side Channels, Ronald A. Riley, James T. Graham, Ryan M. Fuller, Rusty O. Baldwin, and Ashwin Fisher
An Introduction to Declarative Programming in CLIPS and PROLOG, Jack L. Watkin, Adam C. Volk, and Saverio Perugini
Publications from 2018
Natural Language, Mixed-Initiative Personal Assistant Agents, Joshua W. Buck, Saverio Perugini, and Tam W. Nguyen
Attentive Systems: A Survey, Tam Nguyen, Qi Zhao, and Shuicheng Yan
The Design of an Emerging/Multi-Paradigm Programming Languages Course, Saverio Perugini
ChAmElEoN: A Customizable Language for Teaching Programming Languages, Saverio Perugini and Jack L. Watkin
Developing a Contemporary Operating Systems Course, Saverio Perugini and David J. Wright
An Application of the Actor Model of Concurrency in Python: A Euclidean Rhythm Music Sequencer, Daniel P. Prince and Saverio Perugini
Kernel Based Online Learning for Imbalance Multiclass Classification, Ding Shuya, Bilal Mirza, Lin Zhiping, Cao Jiuwen, Lai Xiaoping, Tam Nguyen, and Jose Sepulveda
Publications from 2017
Mixed-initiative Personal Assistants, Joshua W. Buck and Saverio Perugini
CSE: U: Mixed-initiative Personal Assistant Agents, Joshua W. Buck, Saverio Perugini, and Tam Nguyen
Compositional Relational Abstraction for Nonlinear Hybrid Systems, Xin Chen, Sergio Mover, and Sriram Sankaranarayanan
Model Predictive Real-Time Monitoring of Linear Systems, Xin Chen and Sriram Sankaranarayanan
Completing Colored Graphs to Meet a Target Property, Kathryn Cook, Elaine M. Eschen, R. Sritharan, and Xiaoqiang Wang
A Reliable and Efficient Wireless Sensor Network System for Water Quality Monitoring, Dung Nguyen and Phu Huu Phung
Dual-layer Kernel Extreme Learning Machine for Action Recognition, Tam Nguyen and Bilal Mirza
HybridGuard: A Principal-based Permission and Fine-Grained Policy Enforcement Framework for Web-based Mobile Applications, Phu Huu Phung, Abhinav Mohanty, Rahul Rachapalli, and Meera Sridhar
P4SINC – An Execution Policy Framework for IoT Services in the Edge, Phu Huu Phung, Hong-Linh Truong, and Divya Teja Yasoju
Static Human Detection and Scenario Recognition via Wearable Thermal Sensing System, Qingquan Sun, Ju Shen, Haiyan Qiao, Xinlin Huang, Chen Chen, and Fei Hu
Toward An IoT-based Expert System for Heart Disease Diagnosis, Do Thanh Thai, Quang Tran Minh, and Phu Huu Phung
Publications from 2016
GECKA3D: A 3D Game Engine for Commonsense Knowledge Acquisition, Erik Cambria, Tam Nguyen, Brian Cheng, Kenneth Kwok, and Jose Sepulveda
Decomposed Reachability Analysis for Nonlinear Systems, Xin Chen and Sriram Sankaranarayanan
Leveraging Static Analysis Tools for Improving Usability of Memory Error Sanitization Compilers, Rigel Gjomemo, Phu Huu Phung, Edmund Ballou, Kedar S. Namjoshi, V. N. Venkatakrishnan, and Lenore Zuck
As-Similar-As-Possible Saliency Fusion, Tam Nguyen and Mohan Kankanhalli
Augmented Immersion: Video Cutout and Gesture-Guided Embedding for Gaming Applications, Tam Nguyen and Jose Sepulveda
MARIM: Mobile Augmented Reality for Interactive Manuals, Tam Nguyen, Dorothy Tan, Bilal Mirza, and Jose Sepulveda
Mining Mixed-Initiative Dialogs, Saverio Perugini
A Language-Based Model for Specifying and Staging Mixed-Initiative Dialogs, Saverio Perugini and Joshua W. Buck
DASSR: A Distributed Authentication Scheme for Secure Routing in Wireless Ad-hoc Networks, Phu Huu Phung and Quang Tran Minh
Linear Relaxations of Polynomial Positivity for Polynomial Lyapunov Function Synthesis, Mohamed Amin Ben Sassi, Sriram Sankaranarayanan, Xin Chen, and Erika Ábrahám
Graph Modification Problem for Some Classes of Graphs, R. Sritharan
Revisiting the Futamura Projections: A Diagrammatic Approach, Brandon Williams and Saverio Perugini
A Machine Learning-Based Forwarding Algorithm over Cognitive Radio in Wireless Mesh Networks, Jianjun Yang, Ju Shen, Ping Guo, Bryson Payne, and Tongquan Wei
Publications from 2015
Who’s in Control? Securing Commercial Unmanned Aerial Systems Command and Control: A Methodology and Way Ahead, Rusty O. Baldwin, Terry Hofecker, and Greg Carter
A Benchmark Suite for Hybrid Systems Reachability Analysis, Xin Chen, Stefan Schupp, Ibtissem Ben Makhlouf, Erika Ábrahám, Goran Frehse, and Stefan Kowalewski
From Verification to Optimizations, Rigel Gjomemo, Kedar S. Namjoshi, Phu Huu Phung, V. N. Venkatakrishnan, and Lenore D. Zuck
Perfect Graphs, Chinh T. Hoang and R. Sritharan
An Immersive Telepresence System using RGB-D Sensors and Head-mounted Display, Xinzhong Lu, Ju Shen, Saverio Perugini, and Jianjun Yang
Salient Object Detection via Objectness Proposals, Tam Nguyen
Adaptive Nonparametric Image Parsing, Tam Nguyen, Canyi Lu, Jose Sepulveda, and Shuicheng Yan
Salient Object Detection via Augmented Hypotheses, Tam Nguyen and Jose Sepulveda
STAP: Spatial-Temporal Attention-Aware Pooling for Action Recognition, Tam Nguyen, Zheng Song, and Shuicheng Yan
Statistical Analysis and Comparison of Linear Regression Attacks on the Advanced Encryption Standard, Hiren J. Patel, Christine Schubert-Kabban, Rusty O. Baldwin, and David P. Montminy
Improving ZigBee Device Network Authentication Using Ensemble Decision Tree Classifiers with RF-DNA Fingerprinting, Hiren J. Patel, Michael A. Temple, and Rusty O. Baldwin
Between Worlds: Securing Mixed JavaScript/ActionScript Multi-Party Web Content, Phu Huu Phung, Maliheh Monshizadeh, Meera Sridhar, Kevin W. Hamlen, and V. N. Venkatakrishnan
SINA: Semantic Interpretation of User Queries for Question Answering on Interlinked Data, Saeedeh Shekarpour, Edgard Marx, Axel-Cyrille Ngonga Ngomo, and Sören Auer
Automatic Video Self Modeling for Voice Disorder, Ju Shen, Changpeng Ti, Anusha Raghunathan, Sen-ching S. Cheung, and Rita Patel
Automatic Human Animation for Non-humanoid 3D Characters, Ju Shen and Jianjun Yang
Automatic Pose Tracking and Motion Transfer to Arbitrary 3D Characters, Ju Shen and Jianjun Yang
Detecting Anomalous Programmable Logic Controller Behavior using RF-based Hilbert Transform Features and a Correlation-based Verification Process, Samuel J. Stone, Michael A. Temple, and Rusty O. Baldwin
Sense Beyond Expressions: Cuteness, Kang Wang, Tam Nguyen, Jiashi Feng, and Jose Sepulveda
Compression of Video Tracking and Bandwidth Balancing Routing in Wireless Multimedia Sensor Networks, Yin Wang, Jianjun Yang, Ju Shen, Bryson Payne, Juan Guo, and Kun Hua
SalAd: A Multimodal Approach for Contextual Video Advertising, Chen Xiang, Tam Nguyen, and Mohan Kankanhalli
Hole Detection and Shape-Free Representation and Double Landmarks Based Geographic Routing in Wireless Sensor Networks, Jianjun Yang, Zongming Fei, and Ju Shen
Leading Undergraduate Students to Big Data Generation, Jianjun Yang and Ju Shen
Teaching Big Data by Three Levels of Projects, Jianjun Yang and Ju Shen
Publications from 2014
Audio Matters in Visual Attention, Yanxiang Chen, Tam Nguyen, Mohan Kankanhalli, Jun Yan, Shuicheng Yan, and Meng Wang
Seeing Human Weight from a Single RGB-D Image, Tam Nguyen, Jiashi Feng, and Shuicheng Yan
Touch Saliency: Characteristics and Prediction, Bingbing Ni, Mengdi Xu, Tam Nguyen, Meng Wang, Congyan Lang, Zhongyang Huang, and Shuicheng Yan
Random Forest Profiling Attack on Advanced Encryption Standard, Hiren J. Patel and Rusty O. Baldwin
Pointing Devices for Wearable Computers, Saverio Perugini and Andres A. Calvo
Extrinsic Calibration for Wide-Baseline RGB-D Camera Network, Ju Shen, Wanxin Xu, Ying Luo, Po-Chang Su, and Sen-ching S. Cheung
Structure Preserving Large Imagery Reconstruction, Ju Shen, Jianjun Yang, Sami Taha Abu Sneineh, Bryson Payne, and Markus Hitz
An Architecture of a Distributed Semantic Social Network, Sebastian Tramp, Phillip Frischmuth, Timofey Ermilov, Saeedeh Shekarpour, and Sören Auer
Automatic Objects Removal for Scene Completion, Jianjun Yang, Yin Wang, Honggang Wang, Kun Hua, Wei Wang, and Ju Shen
Unstructured P2P Link Lifetimes Redux, Zhongmei Yao and Daren B. H. Cline
On the Tradeoff between Resilience and Degree Overload in Dynamic P2P Graphs, Zhongmei Yao, Daren B. H. Cline, and Dmitri Loguinov
Unifying Models of Churn and Resilience for Unstructured P2P Graphs, Zhongmei Yao, Daren B. H. Cline, Xiaoming Wang, and Dmitri Loguinov
Publications from 2013
Hamiltonian Spider Intersection Graphs Are Cycle Extendable, Atif Abueida, Arthur Busch, and R. Sritharan
Leakage Mapping: A Systematic Methodology for Assessing the Side Channel Information Leakage of Cryptographic Implementations, William E. Cobb, Rusty O. Baldwin, and Eric D. Laspe
On the Performance Evaluation of Query-Based Wireless Sensor Networks, Guvenc Degirmenci, Jeffrey P. Kharoufeh, and Rusty O. Baldwin
Finding and Listing Induced Paths and Cycles, Chính T. Hoàng, Marcin Kamiński, Joe Sawada, and R. Sritharan
Improving Cross-Device Attacks using Zero-Mean Unit-Variance Normalization, David P. Montminy, Rusty O. Baldwin, Michael A. Temple, and Eric D. Laspe
Differential Electromagnetic Attacks on a 32-bit Microprocessor Using Software Defined Radios, David P. Montminy, Rusty O. Baldwin, Michael A. Temple, and Mark E. Oxley
Towards Decrypting Attractiveness via Multi-Modality Cue, Tam Nguyen, Si Liu, Bingbing Ni, Jun Tan, Yong Rui, and Shuicheng Yan
Image Re-Attentionizing, Tam Nguyen, Bingbing Ni, Hairong Liu, Wei Xia, Jiebo Luo, Mohan Kankanhalli, and Shuicheng Yan
Static Saliency vs. Dynamic Saliency: A Comparative Study, Tam Nguyen, Mengdi Xu, Guangyu Gao, Mohan Kankanhalli, Qi Tian, and Shuicheng Yan
Vulnerability Scrying Method for Software Vulnerability Discovery Prediction without a Vulnerability Database, Sanaz Rahimi and Mehdi Zargham