Attach Resources

Step Files:

File Type File Name Thumbnail Submitted By Date Created Description Action
link NCAT SU Research Computer Science A Hybrid Federated Learning Architecture with Online Learning and Model Compression NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science A Hybrid Federated Learning Architecture with Online Learning and Model Compression NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science Explainable AI for Cyber-Physical Systems: Issues and Challenges NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science Explainable AI for Cyber-Physical Systems: Issues and Challenges NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science Network-Based Intrusion Detection for Industrial and Robotics Systems: A Comprehensive Survey NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science Network-Based Intrusion Detection for Industrial and Robotics Systems: A Comprehensive Survey NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science Byzantine-Resilient Federated Learning With Differential Privacy Using Online Mirror Descent NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science Identifying Fake and Real Images by Using Masked Face Periocular Region NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science Online Learning of Time-Varying Unbalanced Networks In Non-Convex Environments: A Multi-Armed Bandit Approach NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science Online Learning of Time-Varying Unbalanced Networks In Non-Convex Environments: A Multi-Armed Bandit Approach NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science Determining Phishing Emails using URL Domain Features NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science Developing and Assessing Educational Games to Enhance Cyber Security Learning in Computer Science NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science Differential Privacy in Social Networks Using Multi-Armed Bandit NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science Learn ARP Spoofing Attack in a Game NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science 1/Sigma Term Weighting Scheme for Sentiment Analysis NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science An Optimal Approach for Maximizing the Sum Rate NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science Autoencoder-based Anomaly Detection in Smart Farming Ecosystem NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science Differentially-Private Federated Learning with Long-Term Budget Constraints Using Online Lagrangian Descent NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science Differentially-Private Federated Learning with Long-Term Constraints Using Online Mirror Descent NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science Drone-based face recognition using deep learning NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science Learning LAN and ARP Spoofing Attack in a Game NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science Privacy-Preserving Online Mirror Descent for Federated Learning with Single-Sided Trust NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science Traffic sign recognition for self-driving cars with deep learning NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science An Investigation of Biometric Authentication in the Healthcare Environment NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science Increasing security of webids through biometrics NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science Learning the Truth by Weakly Connected Agents in Social Networks Using Multi-Armed Bandit NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science Learning the Truth in Social Networks Using Multi-Armed Bandit NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science Mitigating Jamming Attacks in Uncoordinated Frequency Hopping Using Multi-Armed Bandit NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science Time-Varying Truth Prediction in Social Networks Using Online Learning NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science Truth Prediction by Weakly Connected Agents in Social Networks Using Online Learning NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science A Framework to Identify People in Unstructured Environments Incorporating Biometrics NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science A Framework to Identify People in Unstructured Environments Incorporating Biometrics NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science Teaching cybersecurity using guided inquiry collaborative learning NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science Teaching Secure Program Design NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science Using a Long Short-Term Memory Recurrent Neural Network (LSTM-RNN) to Classify Network Attacks, NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science Adversarial authorship, interactive evolutionary hill-climbing, and author CAAT-III NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science An evaluation of user movement data NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science Authorship Attribution via Evolutionary Hybridization of Sentiment Analysis, LIWC, and Topic Modeling Features NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science Authorship Attribution vs. Adversarial Authorship from a LIWC and Sentiment Analysis Perspective NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science Evaluating Two Hands-On Tools for Teaching Local Area Network Vulnerabilities NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science Formalization of the responsive and formal design process using category theory NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science Learn DDoS Attacks with a Game NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science An Interactive Visualization Tool for Teaching ARP Spoofing Attack NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science Identifying Domain Reasoning to Support Computer Monitoring in Typed-Chat Problem Solving Dialogues NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science Marshalling situation-based evidence in identity cases NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science Ontologies for situation-based crime scene identities NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science Topic Modeling to Detect Student Expressions of Understanding in Collaborative Problem-Solving Dialogues NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science Detection of cyber attacks with access to partial data in power system using spy nodes NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science Identity judgments, situations, and semantic web representations NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science Requirements hierarchy in the responsive and formal design process NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science Teaching mobile computing and mobile security NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science COME LET US TALK TOGETHER: SIMULTANEOUS CHAT IN COMPUTER-SUPPORTED COLLABORATIVE DIALOGUE NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science Comparing dimensionality reduction techniques NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science Formal requirement management for the Responsive and Formal Design process NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science Systems engineering of inter-satellite communications for distributed systems of small satellites NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science Using spy node to identify cyber-attack in power systems as a novel approach NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science CINET 2.0: A cyberinfrastructure for network science NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science Toward measurement of conversational interactivity in comps computer mediated problem-solving dialogues NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science COMPS computer-mediated problem solving dialogues NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science Discovering Socio-behavioral Metrics in Mobile Ad-Hoc Systems NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science Using online components to facilitate program implementation: Impact of technological enhancements to all stars on ease and quality of program delivery NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science Using online components to facilitate program implementation: Impact of technological enhancements to all stars on ease and quality of program delivery NCAT State University Sfric 12/03/2025
link NCAT SU Research Computer Science Hybrid evolutionary motion planning via visibility-based repair NCAT State University Sfric 12/03/2025


Step: N.C. A&T Research Collection - Computer Science_Attach Resources

Directions for Step: Add resources. Click save to maintain your progress and publish when you’re ready to have it approved.
Directions for Form: Please complete for each set of resources

Step 1: Attach Resources

This is view format
[[Title]]
[[Description]]
[[Knowledges]]
[[Skills]]
[[Purposes]]
[[Results]]
[[Sponsers]]

Resource Contact Info

[[Contact.FirstName]]
[[Contact.LastName]]
[[Contact.Email]]
[[Contact.PhoneNumber]]
[[Contact.Organization]]

Addresses

[[Contact.Street1]]
[[Contact.Street2]]
[[Contact.City]]
[[Contact.Province]]
[[Contact.StateName]]
[[Contact.ZipCode]]
[[Contact.TimeZone]]
[[Contact.District]]
[[Contact.Altitude]]
[[Contact.CountryName]]

Map Location

Latitude: [[Contact.Latitude]], Longitude : [[Contact.Longitude]]

Connect

[[Contact.facebookWebsiteUrl]]
[[Contact.instagramWebsiteUrl]]
[[Contact.twitterWebsiteUrl]]
[[Contact.linkedInWebsiteUrl]]
[[Contact.normalWebsiteUrl]]

Description

[[GroupData.Description]]
[[IsPublic]]

Collaborators

[[Collaborators]]
Attach Resources
File Type File Name Attachment Description
NCAT SU Research Computer Science A Hybrid Federated Learning Architecture with Online Learning and Model Compression
NCAT SU Research Computer Science A Hybrid Federated Learning Architecture with Online Learning and Model Compression
NCAT SU Research Computer Science Explainable AI for Cyber-Physical Systems: Issues and Challenges
NCAT SU Research Computer Science Explainable AI for Cyber-Physical Systems: Issues and Challenges
NCAT SU Research Computer Science Network-Based Intrusion Detection for Industrial and Robotics Systems: A Comprehensive Survey
NCAT SU Research Computer Science Network-Based Intrusion Detection for Industrial and Robotics Systems: A Comprehensive Survey
NCAT SU Research Computer Science Byzantine-Resilient Federated Learning With Differential Privacy Using Online Mirror Descent
NCAT SU Research Computer Science Identifying Fake and Real Images by Using Masked Face Periocular Region
NCAT SU Research Computer Science Online Learning of Time-Varying Unbalanced Networks In Non-Convex Environments: A Multi-Armed Bandit Approach
NCAT SU Research Computer Science Online Learning of Time-Varying Unbalanced Networks In Non-Convex Environments: A Multi-Armed Bandit Approach
NCAT SU Research Computer Science Determining Phishing Emails using URL Domain Features
NCAT SU Research Computer Science Developing and Assessing Educational Games to Enhance Cyber Security Learning in Computer Science
NCAT SU Research Computer Science Differential Privacy in Social Networks Using Multi-Armed Bandit
NCAT SU Research Computer Science Learn ARP Spoofing Attack in a Game
NCAT SU Research Computer Science 1/Sigma Term Weighting Scheme for Sentiment Analysis
NCAT SU Research Computer Science An Optimal Approach for Maximizing the Sum Rate
NCAT SU Research Computer Science Autoencoder-based Anomaly Detection in Smart Farming Ecosystem
NCAT SU Research Computer Science Differentially-Private Federated Learning with Long-Term Budget Constraints Using Online Lagrangian Descent
NCAT SU Research Computer Science Differentially-Private Federated Learning with Long-Term Constraints Using Online Mirror Descent
NCAT SU Research Computer Science Drone-based face recognition using deep learning
NCAT SU Research Computer Science Learning LAN and ARP Spoofing Attack in a Game
NCAT SU Research Computer Science Privacy-Preserving Online Mirror Descent for Federated Learning with Single-Sided Trust
NCAT SU Research Computer Science Traffic sign recognition for self-driving cars with deep learning
NCAT SU Research Computer Science An Investigation of Biometric Authentication in the Healthcare Environment
NCAT SU Research Computer Science Increasing security of webids through biometrics
NCAT SU Research Computer Science Learning the Truth by Weakly Connected Agents in Social Networks Using Multi-Armed Bandit
NCAT SU Research Computer Science Learning the Truth in Social Networks Using Multi-Armed Bandit
NCAT SU Research Computer Science Mitigating Jamming Attacks in Uncoordinated Frequency Hopping Using Multi-Armed Bandit
NCAT SU Research Computer Science Time-Varying Truth Prediction in Social Networks Using Online Learning
NCAT SU Research Computer Science Truth Prediction by Weakly Connected Agents in Social Networks Using Online Learning
NCAT SU Research Computer Science A Framework to Identify People in Unstructured Environments Incorporating Biometrics
NCAT SU Research Computer Science A Framework to Identify People in Unstructured Environments Incorporating Biometrics
NCAT SU Research Computer Science Teaching cybersecurity using guided inquiry collaborative learning
NCAT SU Research Computer Science Teaching Secure Program Design
NCAT SU Research Computer Science Using a Long Short-Term Memory Recurrent Neural Network (LSTM-RNN) to Classify Network Attacks,
NCAT SU Research Computer Science Adversarial authorship, interactive evolutionary hill-climbing, and author CAAT-III
NCAT SU Research Computer Science An evaluation of user movement data
NCAT SU Research Computer Science Authorship Attribution via Evolutionary Hybridization of Sentiment Analysis, LIWC, and Topic Modeling Features
NCAT SU Research Computer Science Authorship Attribution vs. Adversarial Authorship from a LIWC and Sentiment Analysis Perspective
NCAT SU Research Computer Science Evaluating Two Hands-On Tools for Teaching Local Area Network Vulnerabilities
NCAT SU Research Computer Science Formalization of the responsive and formal design process using category theory
NCAT SU Research Computer Science Learn DDoS Attacks with a Game
NCAT SU Research Computer Science An Interactive Visualization Tool for Teaching ARP Spoofing Attack
NCAT SU Research Computer Science Identifying Domain Reasoning to Support Computer Monitoring in Typed-Chat Problem Solving Dialogues
NCAT SU Research Computer Science Marshalling situation-based evidence in identity cases
NCAT SU Research Computer Science Ontologies for situation-based crime scene identities
NCAT SU Research Computer Science Topic Modeling to Detect Student Expressions of Understanding in Collaborative Problem-Solving Dialogues
NCAT SU Research Computer Science Detection of cyber attacks with access to partial data in power system using spy nodes
NCAT SU Research Computer Science Identity judgments, situations, and semantic web representations
NCAT SU Research Computer Science Requirements hierarchy in the responsive and formal design process
NCAT SU Research Computer Science Teaching mobile computing and mobile security
NCAT SU Research Computer Science COME LET US TALK TOGETHER: SIMULTANEOUS CHAT IN COMPUTER-SUPPORTED COLLABORATIVE DIALOGUE
NCAT SU Research Computer Science Comparing dimensionality reduction techniques
NCAT SU Research Computer Science Formal requirement management for the Responsive and Formal Design process
NCAT SU Research Computer Science Systems engineering of inter-satellite communications for distributed systems of small satellites
NCAT SU Research Computer Science Using spy node to identify cyber-attack in power systems as a novel approach
NCAT SU Research Computer Science CINET 2.0: A cyberinfrastructure for network science
NCAT SU Research Computer Science Toward measurement of conversational interactivity in comps computer mediated problem-solving dialogues
NCAT SU Research Computer Science COMPS computer-mediated problem solving dialogues
NCAT SU Research Computer Science Discovering Socio-behavioral Metrics in Mobile Ad-Hoc Systems
NCAT SU Research Computer Science Using online components to facilitate program implementation: Impact of technological enhancements to all stars on ease and quality of program delivery
NCAT SU Research Computer Science Using online components to facilitate program implementation: Impact of technological enhancements to all stars on ease and quality of program delivery
NCAT SU Research Computer Science Hybrid evolutionary motion planning via visibility-based repair

In-kind Value
 dollars
Additional Notes
 
Describe the resources attached 
Link to resource origination 
Attach Resources