Mousumi Roy, Analysis of Cellular Feature Differences of Astrocytomas with Distinct Mutational Profiles |
Saeed Boorboor, Visualization of Neuronal Structures in Wide-Field Microscopy Brain Images |
Shirin Feiz, Visual Accessibility for Low Vision Users |
Conor Kelton, Understanding, Modeling, and Improving the User Quality Experience of the Web |
Syed Fahad Sultan, Instability of Brain Networks as an early warningsign for Diabetes and Dementia |
Jun S. Kang, PoMo: Generating Entity-Specific Post-Modifiers in Context |
Aria Rezaei, Privacy Protection in Machine Learning and Data Mining |
Youngseo Son, Health Trajectory Prediction with Language |
Md Naimul Hoque, Learning Dataset Shift in Clustering using Gradient Descent |
Bhavya Ghai, A Human-in-the-loop Auditing Tool for Exploration and Mitigation of Social Biases encoded in Word Embeddings |
Hao-Tsung Yang, Patrol Scheduling Against Adversaries with Varying Attack Durations |
Arani Bhattacharya, SpecSense: Towards Low-Cost Distributed Spectrum Patrolling |
Haotian Wang, Efficient Beacon Placement Algorithm for Time-of-Flight Indoor Localization |
Richard DeFrancisco, Swarm Model Checking on the GPU |
Anand Aiyer, Towards an AI model that forewarns of the onset of Sepsis in Patients in Critical Care |
Darius Suciu, Automatic Detection of Confused-Deputy Attackson ARM TrustZone Environments |
Meng Luo, Knowing Your Enemy: A Study of Malicious Campaigns in Web Browsing |
Alok Mishra, Kernel Fusion/Decomposition for Automatic GPU-Offloading |
Sanaz Sheikhi, Attack Detection and Reconstruction from Windows Audit Log |
Timothy Barron, DNS Security |
Sohee Kim Park, Advancing User QoE in 360-degree Video Streaming using Machine Learning and MP-TCP |
Radhika Dhawan, Performance Comparison Framework for Distributed Consensus Algorithms |
Mousumi Roy, Segmentation of Overlapped Steatosis in Whole-Slide Liver Histopathology Microscopy Images |
Viresh Ranjan, Iterative Crowd Counting |
Hae-Na Lee, Surrogate Mouse for People with Visual Impairments |
Shirin feiz, A writing aid for blind people |
Mohaddeseh Bastan, Inferring Authors' Sentiment in News Articles |
Charuta Pethe, Approaches to user characterization on Twitter |
Heeyoung Kwon, Recognizing Semantic Connection between Events |
Qi Zeng, Text Assisted Insight Ranking Using Context-Aware Memory Network |
Shih-Yu Tsai, Multi-Channel Assignment and Link Scheduling for Prioritized Latency-Sensitive Applications |
Zafar Ahmad, A self-improving work-stealing scheduler |
Saksham Chand, Simpler Specifications and Easier Proofs of Distributed Algorithms Using History Variables |
Anand Aiyer, Popularity Probing for massive dynamic datasets |
Mohit Marwari, Sruti Kumari, Analysis of various HTTP adaptive bitrate algorithms |
Babak, Amin Azad, Attack Surface Reduction for Web Applications |
Darius Suciu, DroidShield: Protection from Untrusted APPS and OSes |
Chen Chen, PD-DM |
Huan Nguyen, Translating Assembly to Intermediate Representation |
Christopher Kane, High-level Cryptographic Abstractions |
Shachee, Breaking Exploits through API Specialization |
Prabuddha Kumar, Winking Router: A Side Channel Attack |