Explore a selection of works produced by the Department of Computer Science at Michigan Technological University.

Follow

Works from 2023

Link

Privacy-Preserving Federated Learning with Malicious Clients and Honest-but-Curious Servers, Junqing Le, Di Zhang, Xinyu Lei, Long Jiao, Kai Zeng, and Xiaofeng Liao

PDF

Multi-modal knowledge graph inference via media convergence and logic rule, Feng Lin, Dongmei Li, Wenbin Zhang, Dongsheng Shi, Yuanzhou Jiao, Qianzhong Chen, Yiying Lin, and Wentao Zhu

Link

Graph Neural Networks Based Memory Inefficiency Detection Using Selective Sampling, Pengcheng Li, Yixin Guo, Yingwei Luo, Xiaolin Wang, Zhenlin Wang, and Xu Liu

Link

A Scalable Real-time Semantic Segmentation Network for Autonomous Driving, Jun Liu, Chao Wu, Geng Yuan, Wei Niu, Wenbin Zhang, and Houbing Herbert Song

Link

Towards Inference of Original Graph Data Information from Graph Embeddings, Xinyang Li, Xinyu Lei, Yantao Li, Huafeng Qin, and Yiwen Hu

Link

Cluster Validity for Fuzzy Text Segmentation, Evan Lucas and Timothy C. Havens

Link

Facilitating the Bootstrapping of a New ISA, Abigail Mortensen, Scott Pomerville, David Whalley, Soner Onder, and Gang Ryung Uh

Link

Formal Specification, Verification and Repair of Contiki's Scheduler, Hassan Mousavi, Ali Ebnenasir, and Elham Mahmoudzadeh

Link

4D Range Reporting in the Pointer Machine Model in Almost-Optimal Time, Yakov Nekrich and Saladi Rahul

Link

Programming by Voice: Exploring User Preferences and Speaking Styles, Sadia Nowrin and Keith Vertanen

Link

LMNglyPred: prediction of human N-linked glycosylation sites using embeddings from a pre-trained protein language model, Subash C. Pakhrin, Suresh Pokharel, Kiyoko F. Aoki-Kinoshita, Moriah R. Beck, Tarun K. Dam, Doina Caragea, and Dukka KC

Link

LMPhosSite: A Deep Learning-Based Approach for General Protein Phosphorylation Site Prediction Using Embeddings from the Local Window Sequence and Pretrained Protein Language Model, Subash C. Pakhrin, Suresh Pokharel, Pawel Pratyush, Meenal Chaudhari, Hamid D. Ismail, and Dukka KC

PDF

DFT-aided machine learning-based discovery of magnetism in Fe-based bimetallic chalcogenides, Dharmendra Pant, Suresh Pokharel, Subhasish Mandal, Dukka KC, and Ranjit Pati

Link

HIL Demonstration of Energy Management Strategy for Real World Extreme Fast Charging Stations with Local Battery Energy Storage Systems, Yugandhara Yuvraj Patil, Daniel Dobrzynski, Bryan Nystrom, Zhouquan Wu, and Bo Chen

PDF

Integrating Embeddings from Multiple Protein Language Models to Improve Protein O-GlcNAc Site Prediction, Suresh Pokharel, Pawel Pratyush, Hamid D. Ismail, Junfeng Ma, and Dukka KC

PDF

Hydrogen peroxide-dependent oxidation of ERK2 within its D-recruitment site alters its substrate selection, Anthony E. Postiglione, Laquaundra L. Adams, Ese S. Ekhator, Anuoluwapo E. Odelade, Supriya Patwardhan, Meenal Chaudhari, Avery S. Pardue, Anjali Kumari, William A. LeFever, Olivia P. Tornow, Tamer S. Kaoud, Johnathan Neiswinger, Jun Seop Jeong, Derek Parsonage, Kimberly J. Nelson, Dukka KC, Cristina M. Furdui, Heng Zhu, Andrew J. Wommack, Kevin N. Dalby, Ming Dong, Leslie B. Poole, Jeremiah D. Keyes, and Robert H. Newman

PDF

pLMSNOSite: an ensemble-based approach for predicting protein S-nitrosylation sites by integrating supervised word embedding and embedding from pre-trained protein language model, Pawel Pratyush, Suresh Pokharel, Hiroto Saigo, and Dukka KC

Link

Exploring Scalable Parallelization for Edit Distance-Based Motif Search, Junqiao Qiu and Ali Ebnenasir

Link

MEMORIAL ENTREPRENEURSHIP AND THE POLITICAL ECONOMIES OF FOOD-BASED LIVING MEMORY, Mark Rhodes and Julianna Bartoszek

PDF

A Non-Reference Evaluation of Underwater Image Enhancement Methods Using a New Underwater Image Dataset, Ashraf Saleem, Sidike Paheding, Nathir Rawashdeh, Ali Awad, and Navjot Kaur

Link

vTMM: Tiered Memory Management for Virtual Machines, Sai Sha, Chuandong Li, Yingwei Luo, Xiaolin Wang, and Zhenlin Wang

Link

vTMM: Tiered Memory Management for Virtual Machines, Sai Sha, Chuandong Li, Yingwei Luo, Xiaoying Lin Wang, and Zhenlin Wang

Link

When Good Turns Evil: Encrypted 5G/4G Voice Calls Can Leak Your Identities, Jingwen Shi, Tian Xie, Guan Hua Tu, Chunyi Peng, Chi Yu Li, Andrew Hou, Sihan Wang, Yiwen Hu, Xinyu Lei, Min Yue Chen, Li Xiao, and Xiaoming Liu

Link

Analysis of image filtering based on different types of rank filters, Ahmad Al Turk, Saif Najdawi, Mohammad Otair, and Serein Al-Ratrout

Link

Dissecting Operational Cellular IoT Service Security: Attacks and Defenses, Sihan Wang, Tian Xie, Min Yue Chen, Guan Hua Tu, Chi Yu Li, Xinyu Lei, Po Yi Chou, Fucheng Hsieh, Yiwen Hu, Li Xiao, and Chunyi Peng

Link

Multi-Tenant In-memory Key-Value Cache Partitioning Using Efficient Random Sampling-Based LRU Model, Yuchen Wang, Junyao Yang, and Zhenlin Wang

Link

Preventing Discriminatory Decision-making in Evolving Data Streams, Zichong Wang, Nripsuta Saxena, Tongjia Yu, Sneha Karki, Tyler Zetty, Israat Haque, Shan Zhou, Dukka KC, Ian Stockwell, Xuyu Wang, Albert Bifet, and Wenbin Zhang

Link

FG2 AN: Fairness-Aware Graph Generative Adversarial Networks, Zichong Wang, Charles Wallace, Albert Bifet, Xin Yao, and Wenbin Zhang

PDF

Towards Fair Machine Learning Software: Understanding and Addressing Model Bias Through Counterfactual Thinking, Zichong Wang, Yang Zhou, Meikang Qiu, Israat Haque, Laura Brown, Yi He, Wenbin Zhang, and et al.

Link

FLORIA: A Fast and Featherlight Approach for Predicting Cache Performance, Jun Xiao, Yaocheng Xiang, Xiaolin Wang, Yingwei Luo, Andy Pimentel, and Zhenlin Wang

Link

Enabling Accurate Data Recovery for Mobile Devices Against Malware Attacks, Wen Xie, Niusen Chen, and Bo Chen

PDF

RACE: An Efficient Redundancy-aware Accelerator for Dynamic Graph Neural Network, Hui Yu, Yu Zhang, Jin Zhao, Yujian Liao, Zhiying Huang, Donghao He, Lin Gu, Hai Jin, Xiaofei Liao, Haikun Liu, Bingsheng He, and Jianhui Yue

Link

Secure Redactable Blockchain With Dynamic Support, Di Zhang, Junqing Le, Xinyu Lei, Tao Xiang, and Xiaofeng Liao

Link

Federated Learning for IoT Devices with Domain Generalization, Liling Zhang, Xinyu Lei, Yichun Shi, Hongyu Huang, and Chao Chen

Link

Fairness with censorship and group constraints, Wenbin Zhang and Jeremy C. Weiss

Link

Object Fingerprint Cache for Heterogeneous Memory System, Fang Zhou, Song Wu, Jianhui Yue, Hai Jin, and Jiangqiu Shen

Link

Handling Data Heterogeneity for IoT Devices in Federated Learning: A Knowledge Fusion Approach, Xu Zhou, Xinyu Lei, Cong Yang, Yichun Shi, Xiao Zhang, and Jingwen Shi

Link

A new method incorporating deep learning with shape priors for left ventricular segmentation in myocardial perfusion SPECT images, Fubao Zhu, Longxi Li, Jinyu Zhao, Chen Zhao, Shaojie Tang, Jiaofen Nan, Yanting Li, Zhongqiang Zhao, Jianzhou Shi, Zenghong Chen, Chuang Han, Zhixin Jiang, and Weihua Zhou

Works from 2022

Link

Bioinformatic Analyses of Peroxiredoxins and RF-Prx: A Random Forest-Based Predictor and Classifier for Prxs, Hussam AL-Barakati, Robert H. Newman, Dukka KC, and Leslie B. Poole

Link

Convolution neural network for identification of obstructive sleep apnea, Serein Al-Ratrout and Abdulnasir Hossen

Link

Preparing First-Year Engineering Students to Think About Code: A Guided Inquiry Approach, Briana Christina Bettin, Michelle E. Jarvie-Eggart, Kelly S. Steelman, and Charles Wallace

Link

Identifying and Addressing Risks in the Early Design of a Sociotechnical System through Premortem, Briana Christina Bettin, Kelly S. Steelman, Charles Wallace, Dana Pontious, and Elizabeth Veinott

Link

A Performance Evaluation of Nomon: A Flexible Interface for Noisy Single-Switch Users, Nicholas Ryan Bonaker, Emli Mari Nel, Keith Vertanen, and Tamara Broderick

Link

A Performance Evaluation of Nomon: A Flexible Interface for Noisy Single-Switch Users, Nicholas Ryan Bonaker, Emli Mari Nel, Keith Vertanen, and Tamara Broderick

Link

Demonstrating Nomon: A Flexible Interface for Noisy Single-Switch Users, Nicholas Ryan Bonaker, Emli Mari Nel, Keith Vertanen, and Tamara Broderick

Link

Design and Use of a Visualization for Teaching Integer Coercion, Steven Carr, Yu Chin Cheng, Yu Hsiang Hu, Jean Mayo, Ahmed Radwan, Ching-Kuang Shene, and James Walker

PDF

ORTHOGONAL POINT LOCATION AND RECTANGLE STABBING QUERIES IN 3-D, Timothy M. Chan, Yakov Nekrich, Saladi Rahul, and Konstantinos Tsakalidis

Link

Pay "Attention" to Adverse Weather: Weather-aware Attention-based Object Detection, Saket S. Chaturvedi, Lan Zhang, and Xiaoyong Yuan

Link

Duplicates also Matter! Towards Secure Deletion on Flash-based Storage Media by Removing Duplicates, Niusen Chen and Bo Chen

Link

The Block-Based Mobile PDE Systems are Not Secure - Experimental Attacks, Niusen Chen, Bo Chen, and Weisong Shi

Link

Poster: Data Recovery from Ransomware Attacks via File System Forensics and Flash Translation Layer Data Extraction, Niusen Chen, Josh Dafoe, and Bo Chen

PDF

External-Memory Dictionaries with Worst-Case Update Cost, Rathish Das, John Iacono, and Yakov Nekrich

Link

The Life and Work of Vera Stepen Pless, Steven T. Dougherty, Gretchen Mathews, Jay A. Wood, Janet Beissinger, Richard Brualdi, Nick Crews, Vladimir Tonchev, and et. al.

PDF

Synthesizing Self-Stabilizing Parameterized Protocols with Unbounded Variables, Ali Ebnenasir

Link

Verification and Synthesis of Responsive Symmetric Uni-Rings, Ali Ebnenasir

Link

TPGen: A Self-Stablizing GPU-Based Method for Prime and Test Paths Generation, Ebrahim Fazli and Ali Ebnenasir

Link

Statistical Keyboard Decoding, Dylan Gaines, John J. Dudley, Per Ola Kristensson, and Keith Vertanen

Link

Understanding How People with Visual Impairments Take Selfies: Experiences and Challenges, Ricardo E. Gonzalez Penuela, Paul Vermette, Zihan Yan, Cheng Zhang, Keith Vertanen, and Shiri Azenkot

Link

Testing and Development of the Tethered-Permanently Shadowed Region EXplorer: A Rover Designed to Lay Superconducting Tether into Lunar Permanently Shaded Regions, Marcello C. Guadagno, Travis Wavrunek, Paul van Susante, Austen Goddu, Elijah Cobb, Hunter McGillivray, Collin Miller, Erik Vanhorn, and Ted Gronda

Link

Exploring GNN Based Program Embedding Technologies for Binary Related Tasks, Yixin Guo, Pengcheng Li, Yingwei Luo, Xiaolin Wang, and Zhenlin Wang

Link

Monofacial vs bifacial solar photovoltaic systems in snowy environments, Koami Soulemane Hayibo, Aliaksei Petsiuk, Pierce Mayville, Laura Brown, and Joshua M. Pearce

Link

FEPS: A Tool for Feature Extraction from Protein Sequence, Hamid Ismail, Clarence White, Hussam AL-Barakati, Robert H. Newman, and Dukka KC

Link

Effects of repeated implicit bias training in a North American university, Betsy Lehman, Karen Colbert, Sonia Goltz, Audrey L. Mayer, and Mark Rouleau

PDF

A Few-shot Learning Model based on a Triplet Network for the Prediction of Energy Coincident Peak Days, Jinxiang Liu and Laura Brown

Link

Accelerate Hardware Logging for Efficient Crash Consistency in Persistent Memory, Zhiyuan Lu, Jianhui Yue, Yifu Deng, and Yifeng Zhu

Link

GPU-I-TASSER: a GPU accelerated I-TASSER protein structure prediction tool, Elijah A. MacCarthy, Chengxin Zhang, Yang Zhang, and Dukka KC

Link

Making It Strange: Disrupting Assumptions About Technology and Ethics in Engineering and Computing Education, Alexandra Morrison and Charles Wallace

Link

FlashWalker: An In-Storage Accelerator for Graph Random Walks, Fuping Niu, Jianhui Yue, Jiangqiu Shen, Xiaofei Liao, Haikun Liu, and Hai Jin

Link

Exploring Motor-impaired Programmers' Use of Speech Recognition, Sadia Nowrin, Patricia Ordóñez, and Keith Vertanen

Link

Deep Learning–Based Advances In Protein Posttranslational Modification Site and Protein Cleavage Prediction, Subash C. Pakhrin, Suresh Pokharel, Hiroto Saigo, and Dukka KC

PDF

Improving protein succinylation sites prediction using embeddings from protein language model, Suresh Pokharel, Pawel Pratyush, Michael Heinzinger, Robert H. Newman, and Dukka KC

Link

Camera–Lidar sensor fusion for drivable area detection in winter weather using convolutional neural networks, Nathir Rawashdeh, Jeremy Bos, and Nader J. Abu-Alrub

PDF

Einstein-Roscoe regression for the slag viscosity prediction problem in steelmaking, Hiroto Saigo, Dukka KC, and Noritaka Saito

Link

Towards Sustainable Smart Cities: A Contextual Study on Digital Participatory Planning Policies and Readiness Assessment in Oman, Nibras Sameer, Chaham Alalouch, Mohamed S. Saleh, Saleh Al-Saadi, and Ashraf Saleem

Link

VR Distance Judgments are Affected by the Amount of Pre-Experiment Blind Walking, Soheil Sepahyar and Scott A. Kuhl

Link

Software-Based Flat Nested Page Table in Sunway Architecture, Sai Sha, Hanlin Du, Yingwei Luo, Xiaolin Wang, and Zhenlin Wang

Link

Accelerating Address Translation for Virtualization by Leveraging Hardware Mode, Sai Sha, Yi Zhang, Yingwei Luo, Xiaolin Wang, and Zhenlin Wang

Link

ThreadMentor: a system for teaching multithreaded programming, Ching-Kuang Shene

Link

Modular Grammatical Evolution for the Generation of Artificial Neural Networks (Hot-off-the-Press Track at GECCO 2022), Khabat Soltanian, Ali Ebnenasir, and Mohsen Afsharchi

Link

Environment Sound Classification (ESC) with Choquet Integral Fusion, Yilin Wang, Timothy C. Havens, and Andrew Barnard

Link

GSpecPal: Speculation-Centric Finite State Machine Parallelization on GPUs, Yuguang Wang, Robbie Watling, Junqiao Qiu, and Zhenlin Wang

Link

Ice anthropogenic classification with acoustic vector sensors using transformer neural networks, Steven Whitaker, Andrew Barnard, George D. Anderson, and Timothy C. Havens

Link

MPKIX: Towards More Accountable and Secure Internet Application Services via Mobile Networked Systems, Tian Xie, Sihan Wang, Xinyu Lei, Jingwen Shi, Guan Hua Tu, and Chi Yu Li

PDF

Integrating Deep Learning and Hydrodynamic Modeling to Improve the Great Lakes Forecast, Pengfei Xue, Aditya Wagh, Gangfeng Ma, Yilin Wang, Yongchao Yang, Tao Liu, and Chenfu Huang

Link

Tear Up the Bubble Boom: Lessons Learned From a Deep Learning Research and Development Cluster, Zehua Yang, Zhisheng Ye, Tianhao Fu, Jing Luo, Xiong Wei, Yingwei Luo, Zhenlin Wang, and et al.

Link

Cocktail: Mixing data with different characteristics to reduce Read Reclaims for NAND Flash Memory, Genxiong Zhang, Yuhui Deng, Yi Zhou, Shujie Pang, Jianhui Yue, and Yifeng Zhu

Link

Efficient Hardware Redo Logging for Secure Persistent Memory, Zhan Zhang, Jianhui Yue, Xiaofei Liao, and Hai Jin

Link

Frequency Spectrum Modification Process-Based Anti-Collusion Mechanism for Audio Signals, Juan Zhao, Tianrui Zong, Yong Xiang, Guang Hua, Xinyu Lei, Longxiang Gao, and Gleb Beliakov

Works from 2021

Link

Deep Learning Classification of High-Resolution Drone Images Using the ArcGIS Pro Software: FOR374/FR444,, Amr Abd-Elrahman, Katie Britt, and Tao Liu

Link

Performance Evaluation of Convolutional Neural Network Using Synthetic Medical Data Augmentation Generated by GAN, Ramesh Adhikari and Suresh Pokharel

Link

Accelerating Text Communication via Abbreviated Sentence Input, Jiban Krishna Adhikary, Jamie Berger, and Keith Vertanen

Link

Text Entry in Virtual Environments using Speech and a Midair Keyboard, Jiban Krishna Adhikary and Keith Vertanen

Link

Typing on Midair Virtual Keyboards: Exploring Visual Designs and Interaction Styles, Jiban Krishna Adhikary and Keith Vertanen

Link

Admonita: A recommendation-based trust model for dynamic data integrity, Wassnaa Al-Mawee, Steve Carr, and Jean Mayo

Link

GIS-Integrated Optimization for Locating Food Waste and Manure Anaerobic Co-digestion Facilities, Sharath Kumar Ankathi, David Watkins, Prathyusha Sreedhara, Jacob Zuhlke, and David Shonnard

Link

Range Majorities and Minorities in Arrays, Djamal Belazzougui, Travis Gagie, J. Ian Munro, Gonzalo Navarro, and Yakov Nekrich

Link

Developing a Comic-Creation Assignment and Rubric for Teaching and Assessing Algorithmic Concepts, Briana Christina Bettin, Michelle E. Jarvie-Eggart, Kelly S. Steelman, and Charles Wallace

Link

Frozen in the Past: When it Comes to Analogy Fears, It's Time for Us to "let it Go", Briana Christina Bettin and Linda Ott

Link

Applied Cryptography in Computer and Communications, Bo Chen and Xinyi Huang

Link

Combating the OS-Level Malware in Mobile Devices by Leveraging Isolation and Steganography, Niusen Chen, Wen Xie, and Bo Chen