| File Type |
File Name |
Attachment |
Description |
 |
NCAT SU Research Computer Science A Hybrid Federated Learning Architecture with Online Learning and Model Compression |
 |
|
 |
NCAT SU Research Computer Science A Hybrid Federated Learning Architecture with Online Learning and Model Compression |
 |
|
 |
NCAT SU Research Computer Science Explainable AI for Cyber-Physical Systems: Issues and Challenges |
 |
|
 |
NCAT SU Research Computer Science Explainable AI for Cyber-Physical Systems: Issues and Challenges |
 |
|
 |
NCAT SU Research Computer Science Network-Based Intrusion Detection for Industrial and Robotics Systems: A Comprehensive Survey |
 |
|
 |
NCAT SU Research Computer Science Network-Based Intrusion Detection for Industrial and Robotics Systems: A Comprehensive Survey |
 |
|
 |
NCAT SU Research Computer Science Byzantine-Resilient Federated Learning With Differential Privacy Using Online Mirror Descent |
 |
|
 |
NCAT SU Research Computer Science Identifying Fake and Real Images by Using Masked Face Periocular Region |
 |
|
 |
NCAT SU Research Computer Science Online Learning of Time-Varying Unbalanced Networks In Non-Convex Environments: A Multi-Armed Bandit Approach |
 |
|
 |
NCAT SU Research Computer Science Online Learning of Time-Varying Unbalanced Networks In Non-Convex Environments: A Multi-Armed Bandit Approach |
 |
|
 |
NCAT SU Research Computer Science Determining Phishing Emails using URL Domain Features |
 |
|
 |
NCAT SU Research Computer Science Developing and Assessing Educational Games to Enhance Cyber Security Learning in Computer Science |
 |
|
 |
NCAT SU Research Computer Science Differential Privacy in Social Networks Using Multi-Armed Bandit |
 |
|
 |
NCAT SU Research Computer Science Learn ARP Spoofing Attack in a Game |
 |
|
 |
NCAT SU Research Computer Science 1/Sigma Term Weighting Scheme for Sentiment Analysis |
 |
|
 |
NCAT SU Research Computer Science An Optimal Approach for Maximizing the Sum Rate |
 |
|
 |
NCAT SU Research Computer Science Autoencoder-based Anomaly Detection in Smart Farming Ecosystem |
 |
|
 |
NCAT SU Research Computer Science Differentially-Private Federated Learning with Long-Term Budget Constraints Using Online Lagrangian Descent |
 |
|
 |
NCAT SU Research Computer Science Differentially-Private Federated Learning with Long-Term Constraints Using Online Mirror Descent |
 |
|
 |
NCAT SU Research Computer Science Drone-based face recognition using deep learning |
 |
|
 |
NCAT SU Research Computer Science Learning LAN and ARP Spoofing Attack in a Game |
 |
|
 |
NCAT SU Research Computer Science Privacy-Preserving Online Mirror Descent for Federated Learning with Single-Sided Trust |
 |
|
 |
NCAT SU Research Computer Science Traffic sign recognition for self-driving cars with deep learning |
 |
|
 |
NCAT SU Research Computer Science An Investigation of Biometric Authentication in the Healthcare Environment |
 |
|
 |
NCAT SU Research Computer Science Increasing security of webids through biometrics |
 |
|
 |
NCAT SU Research Computer Science Learning the Truth by Weakly Connected Agents in Social Networks Using Multi-Armed Bandit |
 |
|
 |
NCAT SU Research Computer Science Learning the Truth in Social Networks Using Multi-Armed Bandit |
 |
|
 |
NCAT SU Research Computer Science Mitigating Jamming Attacks in Uncoordinated Frequency Hopping Using Multi-Armed Bandit |
 |
|
 |
NCAT SU Research Computer Science Time-Varying Truth Prediction in Social Networks Using Online Learning |
 |
|
 |
NCAT SU Research Computer Science Truth Prediction by Weakly Connected Agents in Social Networks Using Online Learning |
 |
|
 |
NCAT SU Research Computer Science A Framework to Identify People in Unstructured Environments Incorporating Biometrics |
 |
|
 |
NCAT SU Research Computer Science A Framework to Identify People in Unstructured Environments Incorporating Biometrics |
 |
|
 |
NCAT SU Research Computer Science Teaching cybersecurity using guided inquiry collaborative learning |
 |
|
 |
NCAT SU Research Computer Science Teaching Secure Program Design |
 |
|
 |
NCAT SU Research Computer Science Using a Long Short-Term Memory Recurrent Neural Network (LSTM-RNN) to Classify Network Attacks, |
 |
|
 |
NCAT SU Research Computer Science Adversarial authorship, interactive evolutionary hill-climbing, and author CAAT-III |
 |
|
 |
NCAT SU Research Computer Science An evaluation of user movement data |
 |
|
 |
NCAT SU Research Computer Science Authorship Attribution via Evolutionary Hybridization of Sentiment Analysis, LIWC, and Topic Modeling Features |
 |
|
 |
NCAT SU Research Computer Science Authorship Attribution vs. Adversarial Authorship from a LIWC and Sentiment Analysis Perspective |
 |
|
 |
NCAT SU Research Computer Science Evaluating Two Hands-On Tools for Teaching Local Area Network Vulnerabilities |
 |
|
 |
NCAT SU Research Computer Science Formalization of the responsive and formal design process using category theory |
 |
|
 |
NCAT SU Research Computer Science Learn DDoS Attacks with a Game |
 |
|
 |
NCAT SU Research Computer Science An Interactive Visualization Tool for Teaching ARP Spoofing Attack |
 |
|
 |
NCAT SU Research Computer Science Identifying Domain Reasoning to Support Computer Monitoring in Typed-Chat Problem Solving Dialogues |
 |
|
 |
NCAT SU Research Computer Science Marshalling situation-based evidence in identity cases |
 |
|
 |
NCAT SU Research Computer Science Ontologies for situation-based crime scene identities |
 |
|
 |
NCAT SU Research Computer Science Topic Modeling to Detect Student Expressions of Understanding in Collaborative Problem-Solving Dialogues |
 |
|
 |
NCAT SU Research Computer Science Detection of cyber attacks with access to partial data in power system using spy nodes |
 |
|
 |
NCAT SU Research Computer Science Identity judgments, situations, and semantic web representations |
 |
|
 |
NCAT SU Research Computer Science Requirements hierarchy in the responsive and formal design process |
 |
|
 |
NCAT SU Research Computer Science Teaching mobile computing and mobile security |
 |
|
 |
NCAT SU Research Computer Science COME LET US TALK TOGETHER: SIMULTANEOUS CHAT IN COMPUTER-SUPPORTED COLLABORATIVE DIALOGUE |
 |
|
 |
NCAT SU Research Computer Science Comparing dimensionality reduction techniques |
 |
|
 |
NCAT SU Research Computer Science Formal requirement management for the Responsive and Formal Design process |
 |
|
 |
NCAT SU Research Computer Science Systems engineering of inter-satellite communications for distributed systems of small satellites |
 |
|
 |
NCAT SU Research Computer Science Using spy node to identify cyber-attack in power systems as a novel approach |
 |
|
 |
NCAT SU Research Computer Science CINET 2.0: A cyberinfrastructure for network science |
 |
|
 |
NCAT SU Research Computer Science Toward measurement of conversational interactivity in comps computer mediated problem-solving dialogues |
 |
|
 |
NCAT SU Research Computer Science COMPS computer-mediated problem solving dialogues |
 |
|
 |
NCAT SU Research Computer Science Discovering Socio-behavioral Metrics in Mobile Ad-Hoc Systems |
 |
|
 |
NCAT SU Research Computer Science Using online components to facilitate program implementation: Impact of technological enhancements to all stars on ease and quality of program delivery |
 |
|
 |
NCAT SU Research Computer Science Using online components to facilitate program implementation: Impact of technological enhancements to all stars on ease and quality of program delivery |
 |
|
 |
NCAT SU Research Computer Science Hybrid evolutionary motion planning via visibility-based repair |
 |
|