Recent Submissions

  • An Adaptive DPPM for Efficient and Robust Visible Light Communication Across the Air-Water Interface 

    Islam, Md Shafiqul; Younis, Mohamed (IEEE, 2020-05-02)
    The scarcity of the optical power is the main challenge for underwater visible light communication. It becomes worst for communication across the air-water interface because of the reflection of light from the air-water ...
  • Chasing Lions: Co-Designing Human-Drone Interaction in Sub-Saharan Africa 

    Wojciechowska, Anna; Hamidi, Foad; Lucero, Andrés; Cauchard, Jessica R. (2020-05-17)
    Drones are an exciting technology that is quickly being adopted in the global consumer market. Africa has become a center of deployment with the first drone airport established in Rwanda and drones currently being used for ...
  • Towards More Universal Wayfinding Technologies: Navigation Preferences Across Disabilities 

    Gupta, Maya; Abdolrahmani, Ali; Edwards, Emory; Cortez, Mayra; Tumang, Andrew; Majali, Yasmin; Lazaga, Marc; Tarra, Samhitha; Patil, Prasad; Kuber, Ravi; Branham, Stacy M.
    Accessibility researchers have been studying wayfinding technologies for people with disabilities for decades, typically focusing on solutions within disability populations - for example, technologies to support blind ...
  • A User Study on a De-biased Career Recommender System 

    Wang, Clarice; Wang, Kathryn; Bian, Andrew; Islam, Rashidul; Keya, Kamrun Naher; Foulds, James R.; Pan, Shimei
    AI is increasingly being used in making consequential decisions such as determining whether someone is granted parole or not (Angwin et al., 2016). Unfortunately, there have been a wide range of recent discoveries of biased ...
  • Privacy and Power: Acknowledging the Importance of Privacy Research and Design for Vulnerable Populations 

    McDonald, Nora; Badillo-Urquiola, Karla; Ames, Morgan G.; Dell, Nicola; Keneski, Elizabeth; Sleeper, Manya; Wisniewski, Pamela J. (ACM, 2020-04)
    Privacy researchers and designers must take into consideration the unique needs and challenges of vulnerable populations. Normative and privileged lenses can impair conceptualizations of identities and privacy needs, as ...
  • Mitigating Socio-lingustic Bias in Job Recommendation  

    Deshpande, Ketki V.; Pan, Shimei; Foulds, James R.
    With increasing diversity in the job market as well as the workforce, employers receive resumes from an increasingly diverse population. Many employers have started using automated resume screening to filter the many ...
  • End-to-End Joint Modeling for Fake News Detection 

    Rahman, Munshi Mahbubur; Foulds, James R.
    The rapid spread of misinformation, including misleading and manipulative content, is a current and urgent threat to our society and to our democracy (Starbird, 2017). Several fact-checking websites (e.g., Snopes.com and ...
  • AutoCogniSys: IoT Assisted Context-Aware Automatic Cognitive Health Assessment 

    Alam, Mohammad Arif Ul; Roy, Nirmalya; Holmes, Sarah; Gangopadhyay, Aryya; Galik, Elizabeth (2020-03-17)
    Cognitive impairment has become epidemic in older adult population. The recent advent of tiny wearable and ambient devices, a.k.a Internet of Things (IoT) provides ample platforms for continuous functional and cognitive ...
  • Bypassing Detection of URL-based Phishing Attacks Using Generative Adversarial Deep Neural Networks 

    AlEroud, Ahmed; Karabatis, George (Association for Computing Machinery, 2020-03-18)
    The URL components of web addresses are frequently used in creating phishing detection techniques. Typically, machine learning techniques are widely used to identify anomalous patterns in URLs as signs of possible phishing. ...
  • Accelerated AI for Edge Computing 

    Rahnemoonfar, Maryam (2020-02-25)
  • Measuring Peer Mentoring Effectiveness in Computing Courses: A Case study in Data Analytics for Cybersecurity 

    Faridee, Abu Zaher Md; Janeja, Vandana P. (IEEE, 2020-02-20)
    Computing courses often suffer from lack of diversity. In this paper we evaluate an intervention method of peer mentoring to help increase interest in data analytics in cybersecurity. We present a text mining approach to ...
  • Efficient Product Inventory Maintenance for Black Friday Sale via Spark Big Data System 

    Kulkarni, Chhaya; Rajan, Kavitha Loganathan Sundara; Wang, Xin
    Black Friday fever attracts customers from far and wide. Excitement also leads to frantic chaos for e-commerce websites. To help ease the burden on the e-commerce companies managing the traffic as well as inventory is of ...
  • A Deterministic Self-Organizing Map Approach and its Application on Satellite Data based Cloud Type Classification 

    Zhang, Wenbin; Wang, Jianwu; Jin, Daeho; Oreopoulos, Lazaros; Zhang, Zhibo (2018-10-31)
    A self-organizing map (SOM) is a type of competitive artificial neural network, which projects the high dimensional input space of the training samples into a low dimensional space with the topology relations preserved. ...
  • The Politics of Privacy Theories: Moving from Norms to Vulnerabilities 

    McDonald, Nora; Forte, Andrea (Association for Computing Machinery, 2020-04-25)
    Privacy and surveillance are central features of public discourse around use of computing systems. As the systems we design and study are increasingly used and regulated as potential instruments of surveillance, HCI ...
  • Tangibly Enhancing Haptics 

    Feldman, Philip; Kuber, Ravi (Association for Computing Machinery, 2015-01-15)
    In this paper, we describe the development of a novel, low-cost, compact sensor/actuator that can be integrated with a commercially-available haptic device, such as the Geomagic Touch, to provide additional capability when ...
  • Improving Topic Model Stability for Effective Document Exploration 

    Yang, Yi; Pan, Shimei; Song, Yangqiu; Lu, Jie; Topkara, Mercan
    Topic modeling has become a ubiquitous topic analysis tool for text exploration. Most of the existing works on topic modeling focus on fitting topic models to input data. They however ignore an important usability issue ...
  • Two Tier Analysis of Social Media Collaboration for Student Migration 

    Razavisousan, Ronak; Joshi, Karuna P. (IEEE, 2019-12-14)
    Global adoption of Social Media as the preferred medium for collaboration and information exchange is increasingly reshaping social realities and facilitating new research methodologies in various disciplines. Social Media ...
  • Differential Fairness 

    Foulds, James R.; Islam, Rashidul; Keya, Kamrun Naher; Pan, Shimei (2019)
    We propose differential fairness, a multi-attribute definition of fairness in machine learning which is informed by the framework of intersectionality, a critical lens arising from the humanities literature, leveraging ...
  • Demo Abstract: ByzGame, a Visualized and Understandable BFT Consensus 

    Clavin, James R.; Duan, Sisi (Association for Computing Machinery, 2019-12-09)
    Byzantine Fault Tolerance (BFT) is the only generic technique that tolerates arbitrary failures in distributed systems, and can be used as a core primitive in building consensus in blockchains. Numerous BFT protocols have ...
  • Performance Benchmarking of Data Augmentation and Deep Learning for Tornado Prediction 

    Barajas, Carlos A.; Gobbert, Matthias K.; Wang, Jianwu (2019)
    Predicting violent storms and dangerous weather conditions with current models can take a long time due to the immense complexity associated with weather simulation. Machine learning has the potential to classify tornadic ...

View more