In 1961, the University of Dayton became one of the first schools in the country to develop an undergraduate program in computer science. Faculty are leaders in the field, publishing in reputed journals and presenting at national and international conferences.

Follow

Publications from 2024

PDF

Image De‑Photobombing Benchmark, Vatsa S. Patel, Kunal Agrawal, Samah Baraheem, Amira Yousif, and Tam Nguyen

PDF

Predicting an Optimal Medication/Prescription Regimen for Patient Discordant Chronic Comorbidities Using Multi-Output Models, Ichchha Pradeep Sharma (0000-0003-0236-7992), Tam Nguyen, Shruti Ajay Singh, and Tom Ongwere (0000-0002-6754-9626)

Publications from 2023

PDF

AI vs. AI: Can AI Detect AI-Generated Images?, Samah S. Baraheem and Tam Van Nguyen

PDF

Model Checking Time Window Temporal Logic for Hyperproperties, Ernest Bonnah, Luan Viet Nguyen (0000-0001-5516-2443), and Khaza Anuarul Hoque

PDF

Collaborative Consultation Doctors Model: Unifying CNN and ViT for COVID-19 Diagnostic, Trong-Thuan Nguyen (0000-0001-7729-2927), Tam Nguyen (0000-0003-0236-7992), and Minh-Triet Tran (0000-0003-3046-3041)

PDF

UIT-ADrone: A Novel Drone Dataset for Traffic Anomaly Detection, Tung Minh Tran (0000-0001-7669-1002), Tu N. Vu (0000-0001-9175-3005), Tam Nguyen (0000-0003-0236-7992), and Khang Nguyen (0000-0002-6571-7075)

Real Estate Pricing Prediction via Textual and Visual Features, Amira Yousif, Samah Baraheem, Sai Surya Vaddi, Vatsa S. Patel, Ju Shen, and Tam Nguyen

Publications from 2022

PDF

Vietnamese Document Analysis: Dataset, Method and Benchmark Suite, Khang Nguyen (0000-0002-6571-7075), An Nguyen, Nguyen D. Vo, and Tam Nguyen

PDF

Pervasive Healthcare Internet of Things: A Survey, Kim Anh Phung, Cemil Kirbas, Leyla Dereci, and Tam Van Nguyen (0000-0003-0236-7992)

PDF

Disease Recognition in X-Ray Images with Doctor Consultation-Inspired Model, Kim Anh Phung (0000-0002-4561-7536), Thuan Trong Nguyen (0000-0001-7729-2927), Nileshkumar Wangad, Samah Baraheem, Nguyen D. Vo, and Khang Nguyen

PDF

Few-Shot Object Detection via Baby Learning, Anh-Khoa Nguyen Vu, Nhat-Duy Nguyen, Khanh-Duy Nguyen, Vinh-Tiep Nguyen, Thanh Duc Ngo, Thanh-Toan Do, and Tam Nguyen

Publications from 2021

PDF

R2U3D: Recurrent Residual 3D U-Net for Lung Segmentation, Dhaval D. Kadia, MD Zahangir Alom, Ranga Burada, Tam Nguyen, and Vijayan K. Asari

PDF

Olympic Games Event Recognition via Transfer Learning with Photobombing Guided Data Augmentation, Yousef I. Mohamad (0000-0001-7657-9686), Samah S. Baraheem, and Tam Van Nguyen (0000-0003-0236-7992)

PDF

Masked Face Analysis via Multi-Task Deep Learning, Vatsa S. Patel, Zhongliang Nie, Trung-Nghia Le (0000-0002-7363-2610), and Tam Van Nguyen (0000-0003-0236-7992)

PDF

Verification of Piecewise Deep Neural Networks: A Star Set Approach with Zonotope Pre-filter, Hoang-Dung Tran, Neelanjana Pal, Diego Manzanas Lopez, Patrick Musau, Xiaodong Yang, Luan Viet Nguyen, Weiming Xiang, Stanley Bak, and Taylor T. Johnson (0000-0001-8021-9923)

Publications from 2020

PDF

Divide and Slide: Layer-Wise Refinement for Output Range Analysis of Deep Neural Networks, Chao Huang (0000-0002-9300-1787), Jiameng Fan (0000-0001-9325-7718), Xin Chen, Wenchao Li (0000-0003-4756-6397), and Qi Zhu

PDF

NNV: The Neural Network Verification Tool for Deep Neural Networks and Learning-Enabled Cyber-Physical Systems, Hoang-Dung Tran, Xiaodong Yang, Diego Manzanas Lopez, Patrick Musau, Luan Viet Nguyen, Weiming Xiang, Stanley Bak, and Taylor T. Johnson

Publications from 2019

PDF

An Interactive, Graphical Simulator for Teaching Operating Systems, Joshua W. Buck and Saverio Perugini

PDF

Reachability Analysis for Neural Feedback Systems Using Regressive Polynomial Rule Inference, Souradeep Dutta, Xin Chen, and Sriram Sankaranarayanan

PDF

ReachNN: Reachability Analysis of Neural-Network Controlled Systems, Chao Huang, Jiameng Fan, Wenchao Li, Xin Chen, and Qi Zhu

PDF

Predicting Public Opinion on Drug Legalization: Social Media Analysis and Consumption Trends, Farahnaz Golrooy Motlagh, Saeedeh Shekarpour, Amit Sheth, Krishnaprasad Thirunarayan, and Michael L. Raymer

PDF

Developing a Contemporary and Innovative Operating Systems Course, Saverio Perugini and David J. Wright

PDF

A New Way to Detect Cyberattacks Extracting Changes in Register Values from Radio-Frequency Side Channels, Ronald A. Riley, James T. Graham, Ryan M. Fuller, Rusty O. Baldwin, and Ashwin Fisher

PDF

An Introduction to Declarative Programming in CLIPS and PROLOG, Jack L. Watkin, Adam C. Volk, and Saverio Perugini

Publications from 2018

PDF

Natural Language, Mixed-Initiative Personal Assistant Agents, Joshua W. Buck, Saverio Perugini, and Tam W. Nguyen

Link

Attentive Systems: A Survey, Tam Nguyen, Qi Zhao, and Shuicheng Yan

PDF

The Design of an Emerging/Multi-Paradigm Programming Languages Course, Saverio Perugini

PDF

ChAmElEoN: A Customizable Language for Teaching Programming Languages, Saverio Perugini and Jack L. Watkin

PDF

Developing a Contemporary Operating Systems Course, Saverio Perugini and David J. Wright

PDF

An Application of the Actor Model of Concurrency in Python: A Euclidean Rhythm Music Sequencer, Daniel P. Prince and Saverio Perugini

Link

Kernel Based Online Learning for Imbalance Multiclass Classification, Ding Shuya, Bilal Mirza, Lin Zhiping, Cao Jiuwen, Lai Xiaoping, Tam Nguyen, and Jose Sepulveda

Publications from 2017

PDF

Mixed-initiative Personal Assistants, Joshua W. Buck and Saverio Perugini

PDF

CSE: U: Mixed-initiative Personal Assistant Agents, Joshua W. Buck, Saverio Perugini, and Tam Nguyen

Link

Compositional Relational Abstraction for Nonlinear Hybrid Systems, Xin Chen, Sergio Mover, and Sriram Sankaranarayanan

Link

Model Predictive Real-Time Monitoring of Linear Systems, Xin Chen and Sriram Sankaranarayanan

Link

Completing Colored Graphs to Meet a Target Property, Kathryn Cook, Elaine M. Eschen, R. Sritharan, and Xiaoqiang Wang

PDF

A Reliable and Efficient Wireless Sensor Network System for Water Quality Monitoring, Dung Nguyen and Phu Huu Phung

Link

Dual-layer Kernel Extreme Learning Machine for Action Recognition, Tam Nguyen and Bilal Mirza

PDF

HybridGuard: A Principal-based Permission and Fine-Grained Policy Enforcement Framework for Web-based Mobile Applications, Phu Huu Phung, Abhinav Mohanty, Rahul Rachapalli, and Meera Sridhar

PDF

P4SINC – An Execution Policy Framework for IoT Services in the Edge, Phu Huu Phung, Hong-Linh Truong, and Divya Teja Yasoju

PDF

Static Human Detection and Scenario Recognition via Wearable Thermal Sensing System, Qingquan Sun, Ju Shen, Haiyan Qiao, Xinlin Huang, Chen Chen, and Fei Hu

PDF

Toward An IoT-based Expert System for Heart Disease Diagnosis, Do Thanh Thai, Quang Tran Minh, and Phu Huu Phung

Publications from 2016

PDF

GECKA3D: A 3D Game Engine for Commonsense Knowledge Acquisition, Erik Cambria, Tam Nguyen, Brian Cheng, Kenneth Kwok, and Jose Sepulveda

Link

Decomposed Reachability Analysis for Nonlinear Systems, Xin Chen and Sriram Sankaranarayanan

PDF

Leveraging Static Analysis Tools for Improving Usability of Memory Error Sanitization Compilers, Rigel Gjomemo, Phu Huu Phung, Edmund Ballou, Kedar S. Namjoshi, V. N. Venkatakrishnan, and Lenore Zuck

Link

As-Similar-As-Possible Saliency Fusion, Tam Nguyen and Mohan Kankanhalli

Link

Augmented Immersion: Video Cutout and Gesture-Guided Embedding for Gaming Applications, Tam Nguyen and Jose Sepulveda

PDF

MARIM: Mobile Augmented Reality for Interactive Manuals, Tam Nguyen, Dorothy Tan, Bilal Mirza, and Jose Sepulveda

PDF

Mining Mixed-Initiative Dialogs, Saverio Perugini

PDF

A Language-Based Model for Specifying and Staging Mixed-Initiative Dialogs, Saverio Perugini and Joshua W. Buck

Link

DASSR: A Distributed Authentication Scheme for Secure Routing in Wireless Ad-hoc Networks, Phu Huu Phung and Quang Tran Minh

Link

Linear Relaxations of Polynomial Positivity for Polynomial Lyapunov Function Synthesis, Mohamed Amin Ben Sassi, Sriram Sankaranarayanan, Xin Chen, and Erika Ábrahám

Link

Graph Modification Problem for Some Classes of Graphs, R. Sritharan

PDF

Revisiting the Futamura Projections: A Diagrammatic Approach, Brandon Williams and Saverio Perugini

Link

A Machine Learning-Based Forwarding Algorithm over Cognitive Radio in Wireless Mesh Networks, Jianjun Yang, Ju Shen, Ping Guo, Bryson Payne, and Tongquan Wei

Publications from 2015

Who’s in Control? Securing Commercial Unmanned Aerial Systems Command and Control: A Methodology and Way Ahead, Rusty O. Baldwin, Terry Hofecker, and Greg Carter

Link

A Benchmark Suite for Hybrid Systems Reachability Analysis, Xin Chen, Stefan Schupp, Ibtissem Ben Makhlouf, Erika Ábrahám, Goran Frehse, and Stefan Kowalewski

Link

From Verification to Optimizations, Rigel Gjomemo, Kedar S. Namjoshi, Phu Huu Phung, V. N. Venkatakrishnan, and Lenore D. Zuck

PDF

Perfect Graphs, Chinh T. Hoang and R. Sritharan

PDF

An Immersive Telepresence System using RGB-D Sensors and Head-mounted Display, Xinzhong Lu, Ju Shen, Saverio Perugini, and Jianjun Yang

PDF

Salient Object Detection via Objectness Proposals, Tam Nguyen

PDF

Adaptive Nonparametric Image Parsing, Tam Nguyen, Canyi Lu, Jose Sepulveda, and Shuicheng Yan

PDF

Salient Object Detection via Augmented Hypotheses, Tam Nguyen and Jose Sepulveda

Link

STAP: Spatial-Temporal Attention-Aware Pooling for Action Recognition, Tam Nguyen, Zheng Song, and Shuicheng Yan

Link

Statistical Analysis and Comparison of Linear Regression Attacks on the Advanced Encryption Standard, Hiren J. Patel, Christine Schubert-Kabban, Rusty O. Baldwin, and David P. Montminy

Link

Improving ZigBee Device Network Authentication Using Ensemble Decision Tree Classifiers with RF-DNA Fingerprinting, Hiren J. Patel, Michael A. Temple, and Rusty O. Baldwin

PDF

Between Worlds: Securing Mixed JavaScript/ActionScript Multi-Party Web Content, Phu Huu Phung, Maliheh Monshizadeh, Meera Sridhar, Kevin W. Hamlen, and V. N. Venkatakrishnan

Link

SINA: Semantic Interpretation of User Queries for Question Answering on Interlinked Data, Saeedeh Shekarpour, Edgard Marx, Axel-Cyrille Ngonga Ngomo, and Sören Auer

PDF

Automatic Video Self Modeling for Voice Disorder, Ju Shen, Changpeng Ti, Anusha Raghunathan, Sen-ching S. Cheung, and Rita Patel

Link

Automatic Human Animation for Non-humanoid 3D Characters, Ju Shen and Jianjun Yang

Link

Automatic Pose Tracking and Motion Transfer to Arbitrary 3D Characters, Ju Shen and Jianjun Yang

Link

Detecting Anomalous Programmable Logic Controller Behavior using RF-based Hilbert Transform Features and a Correlation-based Verification Process, Samuel J. Stone, Michael A. Temple, and Rusty O. Baldwin

PDF

Sense Beyond Expressions: Cuteness, Kang Wang, Tam Nguyen, Jiashi Feng, and Jose Sepulveda

PDF

Compression of Video Tracking and Bandwidth Balancing Routing in Wireless Multimedia Sensor Networks, Yin Wang, Jianjun Yang, Ju Shen, Bryson Payne, Juan Guo, and Kun Hua

PDF

SalAd: A Multimodal Approach for Contextual Video Advertising, Chen Xiang, Tam Nguyen, and Mohan Kankanhalli

PDF

Hole Detection and Shape-Free Representation and Double Landmarks Based Geographic Routing in Wireless Sensor Networks, Jianjun Yang, Zongming Fei, and Ju Shen

PDF

Leading Undergraduate Students to Big Data Generation, Jianjun Yang and Ju Shen

PDF

Teaching Big Data by Three Levels of Projects, Jianjun Yang and Ju Shen

Publications from 2014

Link

Audio Matters in Visual Attention, Yanxiang Chen, Tam Nguyen, Mohan Kankanhalli, Jun Yan, Shuicheng Yan, and Meng Wang

PDF

Seeing Human Weight from a Single RGB-D Image, Tam Nguyen, Jiashi Feng, and Shuicheng Yan

Link

Touch Saliency: Characteristics and Prediction, Bingbing Ni, Mengdi Xu, Tam Nguyen, Meng Wang, Congyan Lang, Zhongyang Huang, and Shuicheng Yan

Link

Random Forest Profiling Attack on Advanced Encryption Standard, Hiren J. Patel and Rusty O. Baldwin

PDF

Pointing Devices for Wearable Computers, Saverio Perugini and Andres A. Calvo

Link

Extrinsic Calibration for Wide-Baseline RGB-D Camera Network, Ju Shen, Wanxin Xu, Ying Luo, Po-Chang Su, and Sen-ching S. Cheung

PDF

Structure Preserving Large Imagery Reconstruction, Ju Shen, Jianjun Yang, Sami Taha Abu Sneineh, Bryson Payne, and Markus Hitz

Link

An Architecture of a Distributed Semantic Social Network, Sebastian Tramp, Phillip Frischmuth, Timofey Ermilov, Saeedeh Shekarpour, and Sören Auer

PDF

Automatic Objects Removal for Scene Completion, Jianjun Yang, Yin Wang, Honggang Wang, Kun Hua, Wei Wang, and Ju Shen

PDF

Unstructured P2P Link Lifetimes Redux, Zhongmei Yao and Daren B. H. Cline

Link

On the Tradeoff between Resilience and Degree Overload in Dynamic P2P Graphs, Zhongmei Yao, Daren B. H. Cline, and Dmitri Loguinov

Link

Unifying Models of Churn and Resilience for Unstructured P2P Graphs, Zhongmei Yao, Daren B. H. Cline, Xiaoming Wang, and Dmitri Loguinov

Publications from 2013

Link

Hamiltonian Spider Intersection Graphs Are Cycle Extendable, Atif Abueida, Arthur Busch, and R. Sritharan

Link

Leakage Mapping: A Systematic Methodology for Assessing the Side Channel Information Leakage of Cryptographic Implementations, William E. Cobb, Rusty O. Baldwin, and Eric D. Laspe

Link

On the Performance Evaluation of Query-Based Wireless Sensor Networks, Guvenc Degirmenci, Jeffrey P. Kharoufeh, and Rusty O. Baldwin

Link

Finding and Listing Induced Paths and Cycles, Chính T. Hoàng, Marcin Kamiński, Joe Sawada, and R. Sritharan

Link

Improving Cross-Device Attacks using Zero-Mean Unit-Variance Normalization, David P. Montminy, Rusty O. Baldwin, Michael A. Temple, and Eric D. Laspe

Link

Differential Electromagnetic Attacks on a 32-bit Microprocessor Using Software Defined Radios, David P. Montminy, Rusty O. Baldwin, Michael A. Temple, and Mark E. Oxley

PDF

Towards Decrypting Attractiveness via Multi-Modality Cue, Tam Nguyen, Si Liu, Bingbing Ni, Jun Tan, Yong Rui, and Shuicheng Yan

Link

Image Re-Attentionizing, Tam Nguyen, Bingbing Ni, Hairong Liu, Wei Xia, Jiebo Luo, Mohan Kankanhalli, and Shuicheng Yan

PDF

Static Saliency vs. Dynamic Saliency: A Comparative Study, Tam Nguyen, Mengdi Xu, Guangyu Gao, Mohan Kankanhalli, Qi Tian, and Shuicheng Yan

Link

Vulnerability Scrying Method for Software Vulnerability Discovery Prediction without a Vulnerability Database, Sanaz Rahimi and Mehdi Zargham