Selena He

Orcid: 0000-0002-2332-9816

Affiliations:
  • Kennesaw State University, Department of Computer Science, Marietta, GA, USA
  • Georgia State University, Department of Computer Science, Atlanta, GA, USA (former)


According to our database1, Selena He authored at least 88 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A fault-tolerant scheduling algorithm that minimizes the number of replicas in heterogeneous service-oriented cloud computing systems.
J. Supercomput., June, 2024

Vision Transformer-based overlay processor for Edge Computing.
Appl. Soft Comput., 2024

Living on the Electric Vehicle and Cloud Era: A Study of Cyber Vulnerabilities, Potential Impacts, and Possible Strategies.
Proceedings of the 2024 ACM Southeast Conference, 2024

A Systematic Investigation of Hardware and Software in Electric Vehicular Platform.
Proceedings of the 2024 ACM Southeast Conference, 2024

2023
Enhancing attention in autism spectrum disorder: comparative analysis of virtual reality-based training programs using physiological data.
Frontiers Comput. Sci., 2023

Designing an Empathy Training for Depression Prevention Using Virtual Reality and a Preliminary Study.
Proceedings of the IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops, 2023

An IoT-based System of Converting Handwritten Text to Editable Format via Gesture Recognition.
Proceedings of the 24th Annual Conference on Information Technology Education, 2023

Robust Efficient License Plate and Character Detection System Based on Simplified CNN.
Proceedings of the 2023 ACM Southeast Conference, 2023

2022
Optimization of Big Data Parallel Scheduling Based on Dynamic Clustering Scheduling Algorithm.
J. Signal Process. Syst., 2022

A Fully Authenticated Diffie-Hellman Protocol and Its Application in WSNs.
IEEE Trans. Inf. Forensics Secur., 2022

Efficient Embedding VNFs in 5G Network Slicing: A Deep Reinforcement Learning Approach.
CoRR, 2022

5G network slicing and drone-assisted applications: a deep reinforcement learning approach.
Proceedings of the 5th International ACM Mobicom Workshop on Drone Assisted Wireless Communications for 5G and Beyond, 2022

Keep Clear of the Edges : An Empirical Study of Artificial Intelligence Workload Performance and Resource Footprint on Edge Devices.
Proceedings of the IEEE International Performance, 2022

Energy Reduction Method by Compiler Optimization.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

DDG-Based Optimization Metrics for Defect Prediction.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

2021
TinyAKE: A More Practicable and Trustable Scheme for Authenticated Key Establishment in WSNs.
CoRR, 2021

2020
A Theory-Based Course Development Framework: A Case Study.
Proceedings of the SIGITE '20: The 21st Annual Conference on Information Technology Education, 2020

Seeking the Goals of K-12 Computing Education: A Text Analysis based Literature Review.
Proceedings of the 51st ACM Technical Symposium on Computer Science Education, 2020

Converting Handwritten Text to Editable Format via Gesture Recognition for Education.
Proceedings of the 51st ACM Technical Symposium on Computer Science Education, 2020

Abnormal Activity Detection in Edge Computing: A Transfer Learning Approach.
Proceedings of the International Conference on Computing, Networking and Communications, 2020

Lung Pattern Classification Via DCNN.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

Effects of and Defenses Against Adversarial Attacks on a Traffic Light Classification CNN.
Proceedings of the 2020 ACM Southeast Conference, 2020

Integrating Blockchain Technology into Healthcare.
Proceedings of the 2020 ACM Southeast Conference, 2020

A Chatbot-based Mobile Application to Predict and Early-prevent Human Mental Illness.
Proceedings of the 2020 ACM Southeast Conference, 2020

Long Range Iris Recognition a Reality or a Myth?: A Survey.
Proceedings of the 2020 ACM Southeast Conference, 2020

Implementing Capsule Neural Networks in Traffic Light Image Recognition.
Proceedings of the 2020 ACM Southeast Conference, 2020

2019
Spreading social influence with both positive and negative opinions in online networks.
Big Data Min. Anal., 2019

Untampered Electronic Voting in Entertainment Industry: A Blockchain-based Implementation.
Proceedings of the 20th Annual SIG Conference on Information Technology Education, 2019

Understand the Emerging Demands of Computing Education for Non-CS Major Students.
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019

A Community-based Computational and Engineering Sciences Initiative toward National Development (COESIND).
Proceedings of the IEEE Frontiers in Education Conference, 2019

What are the Non-majors Looking for in CS Classes?
Proceedings of the IEEE Frontiers in Education Conference, 2019

Idiopathic Interstitial Pneumonias Medical Image Detection Using Deep Learning Techniques: A Survey.
Proceedings of the 2019 ACM Southeast Conference, 2019

Voice and Motion-based Control System: Proof-of-Concept Implementation on Robotics via Internet-of-Things Technologies.
Proceedings of the 2019 ACM Southeast Conference, 2019

2018
An Energy-Efficient Secure Adaptive Cloud-of-Things (CoT) Framework to Facilitate Undergraduate STEM Education.
Proceedings of the 19th Annual SIG Conference on Information Technology Education, 2018

A Novel Blockchain-based Education Records Verification Solution.
Proceedings of the 19th Annual SIG Conference on Information Technology Education, 2018

Deep learning approach for cyberattack detection.
Proceedings of the IEEE INFOCOM 2018, 2018

2017
Blocking negative influential node set in social networks: from host perspective.
Trans. Emerg. Telecommun. Technol., 2017

Static Taint Analysis Method for Intent Injection Vulnerability in Android Applications.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Efficient Privacy-Preservation Multi-factor Ranking with Approximate Search over Encrypted Big Cloud Data.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Influence Spread in Social Networks with both Positive and Negative Influences.
Proceedings of the Computing and Combinatorics - 23rd International Conference, 2017

Internet of Things (IoT)-based Learning Framework to Facilitate STEM Undergraduate Education.
Proceedings of the 2017 ACM Southeast Regional Conference, 2017

2016
General Graph Data De-Anonymization: From Mobility Traces to Social Networks.
ACM Trans. Inf. Syst. Secur., 2016

The Paradox of Social Media Security: Users' Perceptions versus Behaviors.
Proceedings of the 5th Annual Conference on Research in Information Technology, 2016

Internet-of-Things Based Smart Resource Management System: A Case Study Intelligent Chair System.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

Multi-dimensional and customizable open-source labware for promoting big data analytical skills in STEM education.
Proceedings of the 2016 IEEE Frontiers in Education Conference, 2016

Integrating Internet of Things (IoT) into STEM undergraduate education: Case study of a modern technology infused courseware for embedded system course.
Proceedings of the 2016 IEEE Frontiers in Education Conference, 2016

Internet of Things-Based Framework to Facilitate Indoor Localization Education.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Visualization of big high dimensional data in a three dimensional space.
Proceedings of the 3rd IEEE/ACM International Conference on Big Data Computing, 2016

2015
Constructing load-balanced virtual backbones in probabilistic wireless sensor networks via multi-objective genetic algorithm.
Trans. Emerg. Telecommun. Technol., 2015

Primary social behavior aware routing and scheduling for Cognitive Radio Networks.
Proceedings of the 12th Annual IEEE International Conference on Sensing, 2015

Influence maximization in social networks: Considering both positive and negative relationships.
Proceedings of the 2015 International Conference on Collaboration Technologies and Systems, 2015

Get Twitter information: A collaborative Android application for big data analysis.
Proceedings of the 2015 International Conference on Collaboration Technologies and Systems, 2015

Blocking negative influential node set in social networks: From host perspective.
Proceedings of the 2015 International Conference on Collaboration Technologies and Systems, 2015

Internet of Things-Based Temperature Tracking System.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

2014
Multi-regional query scheduling in wireless sensor networks with minimum latency.
Wirel. Commun. Mob. Comput., 2014

Greedy construction of load-balanced virtual backbones in wireless sensor networks.
Wirel. Commun. Mob. Comput., 2014

Constructing Load-Balanced Data Aggregation Trees in Probabilistic Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2014

Distributed and Asynchronous Data Collection in Cognitive Radio Networks with Fairness Consideration.
IEEE Trans. Parallel Distributed Syst., 2014

A Genetic Algorithm with Immigrants Schemes for Constructing a σ-Reliable MCDS in Probabilistic Wireless Networks.
Ad Hoc Sens. Wirel. Networks, 2014

Minimum-sized influential node set selection for social networks under the independent cascade model.
Proceedings of the Fifteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2014

Structure Based Data De-Anonymization of Social Networks and Mobility Traces.
Proceedings of the Information Security - 17th International Conference, 2014

CS++: expanding CS curriculum via open cybersecurity courseware.
Proceedings of the 2014 ACM Southeast Regional Conference, Kennesaw, GA, USA, March 28, 2014

A survey of GPU accelerated SVM.
Proceedings of the 2014 ACM Southeast Regional Conference, Kennesaw, GA, USA, March 28, 2014

2013
Cell-based snapshot and continuous data collection in wireless sensor networks.
ACM Trans. Sens. Networks, 2013

Approximation algorithms for load-balanced virtual backbone construction in wireless sensor networks.
Theor. Comput. Sci., 2013

Continuous data aggregation and capacity in probabilistic wireless sensor networks.
J. Parallel Distributed Comput., 2013

Parallel Algorithm for Approximate String Matching with K Differences.
Proceedings of the IEEE Eighth International Conference on Networking, 2013

Minimum-sized Positive Influential Node Set selection for social networks: Considering both positive and negative influences.
Proceedings of the IEEE 32nd International Performance Computing and Communications Conference, 2013

Vision-Based Web Page Block Segmentation and Informative Block Detection.
Proceedings of the 2013 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology, 2013

A Multi-Objective Genetic Algorithm for constructing load-balanced virtual backbones in probabilistic Wireless Sensor Networks.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
Load-balanced CDS construction in wireless sensor networks via genetic algorithm.
Int. J. Sens. Networks, 2012

Implementing the Jacobi Algorithm for Solving Eigenvalues of Symmetric Matrices with CUDA.
Proceedings of the Seventh IEEE International Conference on Networking, 2012

Optimal Distributed Data Collection for Asynchronous Cognitive Radio Networks.
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012

Constructing a load-balanced virtual backbone in Wireless Sensor Networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2012

Load-Balanced Virtual Backbone Construction for Wireless Sensor Networks.
Proceedings of the Combinatorial Optimization and Applications, 2012

2011
A Genetic Algorithm for Constructing a Reliable MCDS in Probabilistic Wireless Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2011

Genetic-algorithm-based construction of Load-Balanced CDSs in Wireless Sensor Networks.
Proceedings of the MILCOM 2011, 2011

Minimum latency scheduling for Multi-Regional Query in Wireless Sensor Networks.
Proceedings of the 30th IEEE International Performance Computing and Communications Conference, 2011

2010
A Survey on Decentralized Flocking Schemes for a Set of Autonomous Mobile Robots (Invited Paper).
J. Commun., 2010

A Novel Clustering Topology Control for Reliable Multi-hop Routing in Wireless Sensor Networks.
J. Commun., 2010

A Reliable Energy Efficient Algorithm for Target Coverage in Wireless Sensor Networks.
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010

A Survey on Multimedia Communicating Technology Based on Spatial Audio Coding.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

2009
A Neural Network Based Vehicle Classification System for Pervasive Smart Road Security.
J. Univers. Comput. Sci., 2009

Design and analysis of an active predictive algorithm in wireless multicast networks.
Proceedings of the 23rd IEEE International Symposium on Parallel and Distributed Processing, 2009

A Survey on Fault-Tolerance in Distributed Network Systems.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Decentralized Flocking Algorithms for a Swarm of Mobile Robots: Problem, Current Research and Future Directions.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

2006
On designing QoS for congestion control service using neural network predictive techniques.
Proceedings of the 2006 IEEE International Conference on Granular Computing, 2006

2005
A Single-Pass Online Data Mining Algorithm Combined with Control Theory with Limited Memory in Dynamic Data Streams.
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005


  Loading...