2025
COCOA: A Framework for Fine-scale Mapping of Cell-type-specific Chromatin Compartments Using Epigenomic Information.
Genom. Proteom. Bioinform., 2025
2024
SAGCN: Using Graph Convolutional Network With Subgraph-Aware for circRNA-Drug Sensitivity Identification.
IEEE ACM Trans. Comput. Biol. Bioinform., 2024
MNESEDA: A prior-guided subgraph representation learning framework for predicting disease-related enhancers.
Knowl. Based Syst., 2024
Funnel graph neural networks with multi-granularity cascaded fusing for protein-protein interaction prediction.
Expert Syst. Appl., 2024
2023
PDA-PRGCN: identification of Piwi-interacting RNA-disease associations through subgraph projection and residual scaling-based feature augmentation.
BMC Bioinform., December, 2023
iEnhance: a multi-scale spatial projection encoding network for enhancing chromatin interaction data resolution.
Briefings Bioinform., July, 2023
GA-ENs: A novel drug-target interactions prediction method by incorporating prior Knowledge Graph into dual Wasserstein Generative Adversarial Network with gradient penalty.
Appl. Soft Comput., May, 2023
Anomaly-Based Intrusion on IoT Networks Using AIGAN-a Generative Adversarial Network.
IEEE Access, 2023
2022
Determining Phishing Emails using URL Domain Features.
Proceedings of the 1st International Conference on AI in Cybersecurity, 2022
Learn ARP Spoofing Attack in a Game.
Proceedings of the IEEE Frontiers in Education Conference, 2022
2021
Learn Access Control Concepts in a Game.
Proceedings of the IEEE Frontiers in Education Conference, 2021
2020
Few-Mode Fibers With Uniform Differential Mode Group Delay for Microwave Photonic Signal Processing.
IEEE Access, 2020
Developing and Assessing an Educational Game for Teaching Access Control.
Proceedings of the ICER 2020: International Computing Education Research Conference, 2020
A New Term Weight Scheme and Ensemble Technique for Authorship Identification.
Proceedings of the ICCDA 2020: The 4th International Conference on Compute and Data Analysis, 2020
Developing and Assessing a Web-Based Interactive Visualization Tool to Teach Buffer Overflow Concepts.
Proceedings of the IEEE Frontiers in Education Conference, 2020
The Design and Implementation of Secure Program Design Education Tool.
Proceedings of the 12th International Conference on Computer Supported Education, 2020
2019
Teaching Cybersecurity Using Guided Inquiry Collaborative Learning.
Proceedings of the IEEE Frontiers in Education Conference, 2019
Developing and Assessing Educational Games to Enhance Cyber Security Learning in Computer Science.
Proceedings of the ACM Conference on Global Computing Education, 2019
2018
Authorship Attribution via Evolutionary Hybridization of Sentiment Analysis, LIWC, and Topic Modeling Features.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2018
Authorship Attribution vs. Adversarial Authorship from a LIWC and Sentiment Analysis Perspective.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2018
Performance Evaluation of Machine Learning Algorithms in Apache Spark for Intrusion Detection.
Proceedings of the 28th International Telecommunication Networks and Applications Conference, 2018
2017
Evaluating hands-on labs for teaching SQL injection: a comparative study.
J. Comput. Sci. Coll., 2017
Adversarial authorship, interactive evolutionary hill-climbing, and author CAAT-III.
Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence, 2017
Enhancing Cybersecurity Education Using POGIL (Abstract Only).
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017
An interactive visualization tool for teaching ARP spoofing attack.
Proceedings of the 2017 IEEE Frontiers in Education Conference, 2017
2016
Assessing the Effectiveness of Experiential-Learning-Based Teaching Tools in Cybersecurity Courses (Abstract Only).
Proceedings of the 47th ACM Technical Symposium on Computing Science Education, 2016
Design and Evaluation of a Course Module on Android Cipher Programming (Abstract Only).
Proceedings of the 47th ACM Technical Symposium on Computing Science Education, 2016
Teaching mobile computing and mobile security.
,
,
,
,
,
,
,
,
,
,
Proceedings of the 2016 IEEE Frontiers in Education Conference, 2016
Developing and evaluating a hands-on lab for teaching local area network vulnerabilities.
Proceedings of the 2016 IEEE Frontiers in Education Conference, 2016
Detection of cyber attacks with access to partial data in power system using spy nodes.
Proceedings of the 2016 IEEE International Conference on Electro Information Technology, 2016
2015
Integrating Mobile Computing and Security into a Computer Science Curriculum (Abstract Only).
Proceedings of the 46th ACM Technical Symposium on Computer Science Education, 2015
Developing a course module for teaching cryptography programming on Android.
Proceedings of the 2015 IEEE Frontiers in Education Conference, 2015
Using spy node to identify cyber-attack in power systems as a novel approach.
Proceedings of the IEEE International Conference on Electro/Information Technology, 2015
2014
Fabrication and Evaluation of a Micro(Bio)Sensor Array Chip for Multiple Parallel Measurements of Important Cell Biomarkers.
,
,
,
,
,
,
,
,
,
,
,
,
,
Sensors, 2014
Developing a course module on healthvault application development.
J. Comput. Sci. Coll., 2014
2013
A Survey of Security Standards Applicable to Health Information Systems.
Int. J. Inf. Secur. Priv., 2013
Analysis of a Single Hemodialysis on Phosphate Removal of the Internal Fistula Patients by Mathematical and Statistical Methods.
Comput. Math. Methods Medicine, 2013
Developing an interdisciplinary Health Informatics Security and privacy program.
Proceedings of the IEEE Frontiers in Education Conference, 2013
2012
A Survey of U.S. Laws for Health Information Security & Privacy.
Int. J. Inf. Secur. Priv., 2012
Developing an interdisciplinary health informatics security and privacy program (abstract only).
Proceedings of the 43rd ACM technical symposium on Computer science education, 2012
2010
Visualization Tools for Teaching Computer Security.
ACM Trans. Comput. Educ., 2010
Case studies for teaching physical security and security policy.
Proceedings of the Information Security Curriculum Development Conference, 2010
2009
Measuring Similarity of Interests for Clustering Taggers and Resources.
Int. J. Virtual Communities Soc. Netw., 2009
On the Effectiveness of Collaborative Tagging Systems for Describing Resources.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009
2008
Agent simulation of collaborative knowledge processing in Wikipedia.
Proceedings of the 2008 Spring Simulation Multiconference, 2008
A Study on Community Formation in Collaborative Tagging Systems.
Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2008
A Survey of Asynchronous Collaboration Tools.
Proceedings of the International Conference on Enterprise Information Systems and Web Technologies, 2008
A Real-Time Interactive Visualization System for DNS Amplification Attack Challenges.
Proceedings of the 7th IEEE/ACIS International Conference on Computer and Information Science, 2008
2007
An animated learning tool for Kerberos authentication architecture.
J. Comput. Sci. Coll., 2007
Octree-Based 3D Animation Compression with Motion Vector Sharing.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007
Using packet sniffer simulator in the class: experience and evaluation.
Proceedings of the 45th Annual Southeast Regional Conference, 2007
Bridge Information Assurance Education Gap between the Majority and Minority Universities through Collaboration.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007
2006
Teaching a web security course to practice information assurance.
Proceedings of the 37th SIGCSE Technical Symposium on Computer Science Education, 2006
LAN attacker: a visual education tool.
Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, 2006
A Hybrid Computer Supported Collaboration and Visualization System.
Proceedings of the 10th International Conference on CSCW in Design, 2006
Optimizing octree motion representation for 3D animation.
Proceedings of the 44st Annual Southeast Regional Conference, 2006
Efficiently unifying parallel simulation techniques.
Proceedings of the 44st Annual Southeast Regional Conference, 2006
Multi-Agent Testing Architecture for Monitoring and Analyzing the Performance of Web Applications.
Proceedings of the 5th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2006) and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering, 2006
2005
An overhead reducing technique for Time Warp.
J. Parallel Distributed Comput., 2005
2004
Predicting the Performance of Synchronous Discrete Event Simulation.
IEEE Trans. Parallel Distributed Syst., 2004
2001
Predicting the Performance of Synchronous Discrete Event Simulation Systems.
Proceedings of the 2001 IEEE/ACM International Conference on Computer-Aided Design, 2001