2022 |
Baron JD; Darling RWR. “Empirical complexity of comparator-based nearest neighbor descent.” 2022. Cornell University Library. Available at: https://doi.org/10.48550/arXiv.2202.00517. |
2022 |
Bluher A. “A new identity of Dickson polynomials.” Finite Fields and Their Applications. 2022;80(102012). Available at: https://doi.org/10.1016/j.ffa.2022.102012. |
2022 |
Bluher A. “Explicit Artin maps into PGL2.” Expositiones Mathematicae. 2022;40(1):45–93. Available at: https://doi.org/10.1016/j.exmath.2021.07.003. |
2022 |
Brewster RA, Goldhar J, Morris M, Baumgartner G, Chembo Y. “Estimation of the CHSH parameter using HOM interference.” IEEE Transactions on Quantum Engineering. 2022;3(4100310):1–10. Available at: https://doi.org/10.1109/TQE.2022.3152170. |
2022 |
Darling RWR. “Hidden ancestor graphs with assortative vertex attributes.” Scaling limits: From statistical mechanics to manifolds. A workshop in honor of James Norris' 60th birthday. 2022. Available at: http://dx.doi.org/10.13140/RG.2.2.14978.56006. |
2022 |
Darling RWR, Emanuello JA, Purvine E, Ridley A (eds). Proceedings of TDA: Applications of Topological Data Analysis to Data Science, Artificial Intelligence, and Machine Learning Workshop at SDM 2022. Cornell University Library. Available at: https://doi.org/10.48550/arXiv.2204.01142. |
2022 |
Gerstner CR, Farid H. "Detecting real-time deep-fake videos using active illumination." In: 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), 2022, pp. 53–60. Available at: https://doi.org/10.1109/CVPRW56347.2022.00015. |
2022 |
Johnson C, Ferguson-Walter K, Gutzwiller R, Scott D, Cook N. “Investigating cyber attacker team cognition.” Proceedings of the Human Factors and Ergonomics Society Annual Meeting. 2022;66(1):105–109. Available at: https://doi.org/10.1177/1071181322661132. |
2022 |
Medak A. "Hardening the hardware supply chain: Standardized artifacts enable automated accountability." The Next Wave. 2022;23(2):40–49. ISSN 2640-1789. Available at: https://www.nsa.gov/thenextwave. |
2022 |
Pellicone A, Ketelhut D, Shokeen E, Weintrop D, Cukier M, Plane J. “Designing a game to promote equity in cybersecurity.” Proceedings of the 16th European Conference on Games Based Learning. 2022;16(1). Available at: https://doi.org/10.34190/ecgbl.16.1.825. |
2022 |
Pellicone A, Shokeen E, Moon P, Weintrop D, Ketelhut D, Cukier M, Plane J. "It just felt more like a pyramid—Narrative and concept in game-based learning puzzles.” 2022 International Conference of Meaningful Play. Abstract available at: https://meaningfulplay.msu.edu/proceedings2022/. |
2022 |
Shokeen E, Pellicone A, Weintrop D, Moon P, Cukier M, Ketelhut D, Plane J. "The game was designed to learn to think—Player perception of learning in an educational game.” In: Proceedings of the 16th International Conference of the Learning Sciences (ICLS) 2022. Available at: https://2022.isls.org/proceedings/. |
2021 |
Baron JD, Darling RWR, Davis JL, Pettit R. "Partitioned K-nearest neighbor local depth for scalable comparison-based learning." 2021. Cornell University Library. Available at: https://doi.org/10.48550/arXiv.2108.08864. |
2021 |
Bhandary P, Zieglar E, Nicholas C. "Searching for selfie in TLS 1.3 with the cryptographic protocol shapes analyzer." 2021. In: Dougherty D, Meseguer J, Mödersheim SA, Rowe P (eds), Protocols, Strands, and Logic. Lecture Notes in Computer Science, vol 13066. Springer, Cham. Available at: https://doi.org/10.1007/978-3-030-91631-2_3. |
2021 |
Bilinski M, diVita J, Ferguson-Walter K, Fugate S, Gabrys R, Mauger J, Souza B. (2021). "No time to lie: Bounds on the learning rate of a defender for inferring attacker target preferences." 2021. In: Bošanský B, Gonzalez C, Rass S, Sinha A (eds), Decision and Game Theory for Security. GameSec 2021. Lecture Notes in Computer Science, vol 13061. Springer, Cham. Available at: https://doi.org/10.1007/978-3-030-90370-1_8. |
2021 |
Bluher A. "New Wilson-like theorems arising from Dickson polynomials." Finite Fields and Their Application. 2021;72(101819). Available at: https://doi.org/10.1016/j.ffa.2021.101819. |
2021 |
Bluher A. "Permutation properties of Dickson and Chebyshev polynomials with connections to number theory." Finite Fields and Their Application. 2021;76(101899). Available at: https://doi.org/10.1016/j.ffa.2021.101899. |
2021 |
Burkhardt P. "Graph connectivity in log steps using label propagation." Parallel Processing Letters. 2021;31(4):1–23. Available at: https://doi.org/10.1142/S0129626421500213. |
2021 |
Burkhardt P. "Optimal algebraic breadth-first search for sparse graphs." ACM Transactions on Knowledge Discovery from Data. 2021;15(5):1–19. Available at: https://doi.org/10.1145/3446216. |
2021 |
Comar B. “Decoding and equalization of a joint Alamouti-WPM system.” In: IEEE International Symposium on Networks, Computers, and Communications (ISNCC), 2021. Available at: https://doi.org/10.1109/ISNCC52172.2021.9615704. |
2021 |
Comar B. “Detection of sinusoids with frequency drift in white Gaussian noise.” IEEE International Conference on Information and Communication Technology (ICoICT), 2021. Available at: https://doi.org/10.1109/ICoICT52021.2021.9527437. |
2021 |
Comar B. “Implementation of a QPSK symbol synchronizer in Xilinx system generator,” In: 2021 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2021, pp. 396–401. Available at: https://doi.org/10.1109/ISVLSI51109.2021.00078. |
2021 |
Comar B. “Method of combining cryptography and LDPC coding for enhanced privacy.” IGI Global: International Journal of Interdisciplinary Telecommunications & Networking (IJITN). 2021;13(4). Available at: https://doi.org/10.4018/IJITN.2021100105. |
2021 |
Comar B. “Tone detection system design for targets with frequency drift.” IEEE International Conference on Information and Communication Technology (ICoICT), 2021. Available at: https://doi.org/10.1109/ICoICT52021.2021.9527412. |
2021 |
Comar B, Frazier S. “Design of a joint alamouti-MIMO and wavelet packet modulation system.” In: IEEE International Symposium on Networks, Computers, and Communications (ISNCC), 2021. Available at: https://doi.org/10.1109/ISNCC52172.2021.9615650. |
2021 |
Darling RWR. "Hidden ancestor graphs with assortative vertex attributes" 2021. Cornell University Library. Available at: https://doi.org/10.48550/arXiv.2102.09581. |
2021 |
Edwards CA, Goyal A, Rusheen AE, Kouzani AZ, Lee KH. "DeepNavNet: Automated landmark localization for neuronavigation." Frontiers in Neuroscience. 2021;15. Available at: https://doi.org/10.3389/fnins.2021.670287. |
2021 |
Ferguson-Walter KJ, Major MM, Johnson CK, Muhleman DH. "Examining the efficacy of decoy-based and psychological cyber deception." In: Proceedings of the 30th USENIX Security Symposium; 2021 Aug 11–13. Available at: https://usenix.org/system/files/sec21-ferguson-walter.pdf. |
2021 |
Golczynski A, Emanuello J. "End-to-end anomaly detection for identifying malicious cyber behavior through NLP-based log embeddings." 2021. Paper presented at the International Joint Conference on Artificial Intelligence (IJCAI) First International Conference on Adaptive Cyber Defense. Available at: https://doi.org/10.48550/arXiv.2108.12276. |
2021 |
Khan A, Fleming E, Schofield N, Bishop M, Andrews N. 2021. “A deep metric learning approach to account linking.” In: Proceedings of the 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2021, pp. 5275–5287. Available at: http://dx.doi.org/10.18653/v1/2021.naacl-main.415. |
2021 |
Laird B, Tran T. "Data-informed CRLB derivations for indoor emitter localization." In: 2021 55th Asilomar Conference on Signals, Systems, and Computers, 2021, pp 509–516. Available at: https://doi.org/10.1109/IEEECONF53345.2021.9723413. |
2021 |
Laird B, Tran T. "Quasi-norm kernel-based emitter localization." In: 2021 55th Asilomar Conference on Signals, Systems, and Computers, 2021, pp 534–538. Available at: https://doi.org/10.1109/IEEECONF53345.2021.9723416. |
2021 |
Major MM, Souza BJ, DiVita J, Ferguson-Walter KJ. "Informing autonomous deception systems with cyber expert performance data." 2021. Paper presented at the International Joint Conference on Artificial Intelligence (IJCAI) First International Conference on Adaptive Cyber Defense. Available at: https://doi.org/10.48550/arXiv.2109.00066. |
2021 |
Molina-Markham A, Miniter C, Powell B, Ridley A. "Network environment design for autonomous cyberdefense." 2021. Cornell University Library. Available at: https://doi.org/10.48550/arXiv.2103.07583. |
2021 |
Molina-Markham A, Winder RK, Ridley A. "Network defense is not a game." 2021. Paper presented at 2021 SIAM International Conference on Data Mining Workshop on AI/ML for Cybersecurity: Challenges, Solutions and Novel Ideas. Available at: https://doi.org/10.48550/arXiv.2104.10262. |
2021 |
Nguyen AT, Raff E, Nicholas C, Holt J. "Leveraging uncertainty for improved static malware detection under extreme false positive constraints." 2021. Paper presented at the International Joint Conference on Artificial Intelligence (IJCAI) First International Conference on Adaptive Cyber Defense. Available at: https://doi.org/10.48550/arXiv.2108.04081. |
2021 |
Rivera-Soto RA, Miano OE, Ordonez J, Chen BY, Khan A, Bishop M, Andrews N. “Learning universal authorship representations.” In: Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing, pp. 913–919, Online and Punta Cana, Dominican Republic, November 2021. Association for Computational Linguistics. Available at: http://dx.doi.org/10.18653/v1/2021.emnlp-main.70. |
2021 |
Rolinger TB, Krieger CD, Sussman A. "Optimizing memory-compute colocation for irregular applications on a migratory thread architecture." In: 2021 IEEE International Parallel and Distributed Processing Symposium (IPDPS), 2021, pp. 58–67. Available at: https://doi.org/10.1109/IPDPS49936.2021.00015. |
2021 |
Rolinger TB, Krieger CD, Sussman A. "Runtime optimizations for irregular applications in Chapel." In: 8th Annual Chapel Implementers and Users Workshop (CHIUW), 2021. Available at: https://chapel-lang.org/CHIUW/2021/RolingerSlides.pdf. |
2021 |
Walter EC, Ferguson-Walter KJ, Ridley AD. "Incorporating deception into CyberBattleSim for autonomous defense." 2021. Paper presented at the International Joint Conference on Artificial Intelligence (IJCAI) First International Conference on Adaptive Cyber Defense. Available at: https://doi.org/10.48550/arXiv.2108.13980. |
2021 |
Wong V, Emanuello J. "Robustness of ML-enhanced IDS to stealthy adversaries." 2021. Paper presented at 2021 SIAM International Conference on Data Mining Workshop on AI/ML for Cybersecurity: Challenges, Solutions and Novel Ideas. Available at: https://doi.org/10.48550/arXiv.2104.10742. |