Browsing SoC Research Publications by Title
Now showing items 9-28 of 49
-
Benchmarking neural network compression techniques for ocular-based user authentication on smartphones
(Institute of Electrical and Electronics Engineers Inc., 2023-04-06)With the unprecedented mobile technology revolution, mobile devices have transcended from being the primary means of communication to an all-in-one platform. Consequently, an increasing number of individuals are accessing ... -
Beyond just safety: Delay-aware security monitoring for real-time control systems
(Association for Computing Machinery, 2022-07-01)Modern embedded real-time systems (RTS) are increasingly facing more security threats than the past. A simplistic straightforward integration of security mechanisms might not be able to guarantee the safety and predictability ... -
Commitment over multiple-access channels
(Institute of Electrical and Electronics Engineers Inc., 2022-09-04)The problem of multi-user commitment is one in which multiple users first commit to individual messages with a bookmaker and later reveal their messages. The objective of the bookmaker is then to decide whether the revealed ... -
Common reality: An interface of human-robot communication and mutual understanding
(Springer, Cham, 2021-11-02)An interface that can share effective and comprehensive mutual understanding is critical for human-robot interaction. This paper designs a novel human-robot interaction interface that enables humans and robots to interact ... -
Compact CNN models for on-device ocular-based user recognition in mobile devices
(IEEE, 2021-12-05)A number of studies have demonstrated the efficacy of deep learning convolutional neural network (CNN) models for ocular-based user recognition in mobile devices. However, these high-performing networks have enormous space ... -
Comprehension of spatial constraints by neural logic learning from a single RGB-D scan
(IEEE, 2021-09-27)Autonomous industrial assembly relies on the precise measurement of spatial constraints as designed by computer-aided design (CAD) software such as SolidWorks. This paper proposes a framework for an intelligent industrial ... -
Convolutional neural network optimization for phishing email classification
(IEEE, 2021-12-15)Phishing emails are one of the most common and effective tools that cybercriminals use to gain access to an organization’s network or personal information. To detect these attacks, email service providers use a variety of ... -
Coverage characteristics of hurricane monitoring CubeSat constellations under orbital perturbations
(AIAA, 2022-01-03)Miniaturized precipitation radars deployed on CubeSats have the potential to significantly improve hurricane forecasting by collecting measurements over data-starved regions and by complementing the existing sensor ... -
Deep Learning–Based Advances
(Humana Press Inc., 2022-06-14)Posttranslational modification (PTM ) is a ubiquitous phenomenon in both eukaryotes and prokaryotes which gives rise to enormous proteomic diversity. PTM mostly comes in two flavors: covalent modification to polypeptide ... -
DeepNGlypred: A deep neural network-based approach for human N-linked glycosylation site prediction
(MDPI, 2021-12-02)Protein N-linked glycosylation is a post-translational modification that plays an importantrole in a myriad of biological processes. Computational prediction approaches serve as comple-mentary methods for the characterization ... -
Design of short blocklength wiretap channel codes: Deep learning and cryptography working hand in hand
(IEEE, 2021-10-17)We design short blocklength codes for the Gaussian wiretap channel under information-theoretic security guarantees. Our approach consists in decoupling the reliability and secrecy constraints in our code design. Specifically, ... -
Efficient near-optimal t-closeness with low information loss
(IEEE, 2021-09-22)The t-closeness technique is one of the most popular techniques for preserving individual privacy in data. It involves generalizing and suppressing some attributes of a given table, after partitioning the set of all records ... -
An experimental evaluation on deepfake detection using deep face recognition
(IEEE, 2021-10-11)Significant advances in deep learning have obtained hallmark accuracy rates for various computer vision applications. However, advances in deep generative models have also led to the generation of very realistic fake ... -
Federated nearest neighbor classification with a colony of fruit-flies
(AAAI, 2022-06-28)The mathematical formalization of a neurological mechanism in the fruit-fly olfactory circuit as a locality sensitive hash (Flyhash) and bloom filter (FBF) has been recently proposed and "reprogrammed" for various ... -
Function computation without secure links: Information and leakage rates
(IEEE, 2022-06-26)Consider L users, who each holds private data, and one fusion center who must compute a function of the private data of the L users. To accomplish this task, each user can make a single use of a public and noiseless broadcast ... -
Harnessing unlabeled data to improve generalization of biometric gender and age classifiers
(IEEE, 2021-12-05)With significant advances in deep learning, many computer vision applications have reached the inflection point. However, these deep learning models need large amount of labeled data for model training and optimum parameter ... -
Holographic augmented reality visualization interface for exploration
(Wichita State University, 2022-04-29)Based on Wichita's wheat harvesting nickname, Harvesters, Wichita State University NASA SUITS (Spacesuit User Interface Technologies for Students) team Harvestars proposed the integrated system H. A. R. V. I. E. (Holographic ... -
Integration of instance-based learning and computed torque control for an effective assist-as-needed support in human-exoskeleton interaction
(Association for Industry, Engineering and Management Systems (AIEMS), 2022-12)The physiological responses that arise from human-robot interaction may vary across subjects in magnitude and rate. Such individual variations may require instance-based learning over model-based learning algorithms. For ... -
Investigating fairness of ocular biometrics among young, middle-aged, and older adults
(IEEE, 2021-10-11)A number of studies suggest bias of the face biometrics, i.e., face recognition and soft-biometric estimation methods, across gender, race, and age-groups. There is a recent urge to investigate the bias of different biometric ... -
An IoT-based framework for an optimal monitoring and control of cyber-physical systems: Application on Biogas Production system
(ACM, 2022-03-08)Among the possible conversion processes for biomass is Anaerobic Digestion (AD) that produces a valuable energy known as biogas. However, the instability of biogas production is challenging due to the complex process of ...