Follow

Creative Components from 2109

PDF

Synthesizing Adversarial Examples for Neural Networks, Hasitha Rasineni

Creative Components from 2020

PDF

Log Analysis in Cyber Threat Detection, Oluwaseun Awotipe

PDF

A Systematic Approach to Compute All Cyclic Quorum Sets, Yiming Bian

Link

Hackerville: Social Networking and Social Engineering, Alec Birmingham

PDF

Testing the Robustness of Electric Transmission Expansion Plans of an Independent System Operator, Joe Eilers

PDF

Analysis of jitter control using real time scheduling, FNU Geetika-Singh

PDF

DevT: Let the Device Talk, Chander Bhushan Gupta

Link

Hackerville: An interactive security education tool, Joshua Hasstedt

PDF

Splunk Software Platform Data Transformation, Shanell Hurst

PDF

Shape detection of physical objects with Intel 5300 and the 802.11n CSI Tool, Andrew Lopez

PDF

Sphere decoding based on Deep Neural Network, Yangyue Ma

PDF

Cloud infrastructure for multi-sensor remote data acquisition system for precision agriculture (CSR-DAQ), Aditi Mishra

PDF

Developing a Distribution-Level Microgrid with Limited Data, Shelby Pickering

PDF

Evaluating Crash Consistency for PM Software using Intel Pin, Satya Prakash

PDF

Control of Physical Objects Utilizing Brain Computer Interfaces, Nick Schmidt

PDF

Designing a multi-cycle approach to empathetic electrical engineering courses, Rachel Shannon

PDF

Distributed Intrusion Detection System for Modbus Protocol, Abhinav Singh

PDF

A Survey of Smartphone-based Fluorescence Microscopy Technology, Chang Sun

PDF

Automated Field Boundary Detection Using Modern Machine Learning Techniques, Rishikumar Suresh kumar

PDF

Benchmarking AssemblyScript for Faster Web Applications, Nischay Venkatram

PDF

Mathematical modeling for sustainable aphid control in agriculture, Patricia S. Williams

PDF

Human Avtivity Recognition Using Smartphones, Chenhang Xu

PDF

Analyzing social media data and performance comparison with traditional database, data warehouse, and MapReduce approaches, Wei Xu

Creative Components from 2019

PDF

Hyperparameter Optimization on Neural Machine Translation, Souparni Agnihotri

PDF

Implementation of image quality assessment algorithms for descriptive statistics and deep learning on StegoAppDB, Venkata Bhanu Chowdary Allada

PDF

Frequency Control of Laser Generated Ultrasonic Waves, Roberto Alva

PDF

Internet of Things, Vismayashree Balakrishna Rao

PDF

Aggregation, indexing and visualization using the ELK Stack, Bradlee Beadle

PDF

COST OPTIMIZATION OF ALLOCATING VIRTUAL NETWORK FUNCTIONS WITH PRECEDENCE IN MULTICAST NETWORKS, Ramcharan Chalamalasetty

PDF

Final Report for Creative Component, Minsu Cho

PDF

Android third-party library detection, Brody Concannon

PDF

Subspace tracking from missing and corrupted data using NORST and its heuristic extensions, Vahid Daneshpajooh

PDF

Utilizing Cloud Computing Log Events for Security Automation, Khalid Farrag

PDF

Feature-Rich Models and Feature Reduction for Malicious URLs Classification and Prediction, Shivika Garg

PDF

A cyber focused table top exercise for Iowa State University, Christopher Garrison

PDF

Using Reinforcement Learning to Tackle the Autonomous Recharging Problem, Nathaniel Gilbert

PDF

Thermo-plasmonic arrays for solar desalination applications, Gurlyn Grewal

PDF

Storming the Kasa? Security analysis of TP-Link Kasa smart home devices, Andrew Halterman

PDF

Stock Prediction with Random Forests and Long Short-term Memory, Shangxuan Han

PDF

Vapor deposited perovskites solar cells, Jiayan Huo

PDF

Algorithmic Guarantees for Inverse Imaging with Untrained Neural Network Priors, Gauri Bhagawantrao Jagatap and Chinmay Hegde

PDF

Validity of Manual Architecture-based Threat Modeling -- the Case of Apollo Auto Software, Shifa Khan

PDF

Designing a cost-effective high-performance data acquisition system for measuring electronic systems, Thomas Kimler

PDF

Abnormality Management in Spatial Crowdsourcing for Multi-skilled Workers Assignment, Srinandan Kota

PDF

Overview of Sepsis and Sepsis Biomarker Detection, Souvik Kundu

PDF

Anodic Stripping Voltammetry using EVAL-ADICUP 3029, Ranjitha Lakshmi Narayanan

PDF

New heuristic algorithm to improve the Minimax for Gomoku artificial intelligence, Han Liao

PDF

A configurable general purpose graphics processing unit for power, performance, and area analysis, Garrett Lies

PDF

Cyber Defense Competition Card Game, Ryan Luckinbill

PDF

Modeling of OpenFlow based software defined networks using Mininet, Aishwarya kamal Maddala

PDF

Literature Survey on IPv6 over low power personal area networks., Roshan Mathew

PDF

Upgrades to ISEFlow: Offloading ARP and supporting IPv6, Joel May

PDF

Semantic Domain Adaptation for Deep Networks via GAN-based Data Augmentation for Autonomous Driving, Amitangshu Mukherjee

PDF

MFAProxy: A reverse proxy for multi-factor authentication, Alan Schmitz

PDF

Analyzing driving behavior from CAN data using context-specific information, Ashraf Shaikh Mohammed

PDF

Deep learning for image classification on very small datasets using transfer learning, Mengying Shu

PDF

Analysis of vehicle driving behavior on special road segments using context-specific information, Shankar Sridhar

PDF

An analysis of the evolution of botnets, Cole Stephan

PDF

E-STRSAGA: an ensemble learning method to handle concept drift, Ashraf Tahmasbi

PDF

Compact Spectrometer by Unitizing Thin Film Interference, Yalun Tang

PDF

Persitent Memory Test Framework, Caleb Toney

PDF

Security Analysis of Vehicle to Vehicle Arada Locomate On Board Unit, Ramanni J Veeraraghava

PDF

Assessing Coexistence of IEEE 802.15.4 Networks and IEEE 802.11b/g/n Networks - A Study of Interference Effects, Resy Verma

PDF

An Investigative Study on Android Verified Boot Process, Brett Weiss

PDF

Ads searching service, ming wu

PDF

Evaluation of antenna design and energy harvesting system of passive tag in UHF RFID applications, Chengrui Yang

PDF

Modified Kuijk Bandgap Reference with VGO Extraction, Mounica Yatam

PDF

Modelling of concrete composite material with phase-centered cell, Yeap Seng Jonathan Yeoh

PDF

Evaluation of CNN Models with Fashion MNIST Data, Yue Zhang

PDF

A brief literature review on recent progress in nanopore thin film-based optical sensors, Guantong Zhou

PDF

Self-configured Elastic Database with Deep Q-Learning Approach, Yifu Zhou

Creative Components from 2018

PDF

Scalable and Modular Implementation of Scenario-based Cyber Attacks and Defense Methodologies on CPS Security SCADA Testbed, Subramanian Arunachalam

PDF

New Memory Technologies, Nishtha Bhatnagar

PDF

Continuous User Authentication via Random Forest, Ting-wei Chang

PDF

Study on OPAL-RT Simulation System Hardware in Loop and Simulation on Microgrid Black Start, Jin Cui

PDF

Multicasting in Network Function Virtualization (NFV) Environment, Manika Dhingra

PDF

Hardware Trojan Attack and Defense Techniques, Aman Gupta

PDF

OLEDs on Flexible Substrates, Chamika M. Hippola

PDF

Building Blocks of Commercial Crypto-Technologies Solutions, William Kincaid

PDF

Continuous Time Control for Bilateral Telemetry Application, Madhura Kulkarni

PDF

An On-Chip Sensor for High-Throughput Profiling of Antimicrobial Resistance, Zhihao Liao

PDF

Exploration of Audio Synthesizers, Timothy Lindquist

PDF

ISEMan: A management and deployment interface for lab-based activities within ISERink, Alex Luehm

PDF

Simulation of Any-to-One Communication Protocol for WSN in Cooja Simulator of Contiki OS, Nirupana Naregudam

PDF

Existence of Dependency-Based Attacks in NodeJS Environment, Prachi R. Patel

PDF

Creating a Malware Analysis Lab and Basic Malware Analysis, Joseph Peppers

PDF

Practical SIEM tools for SCADA environment, Steven Perez

PDF

Exploration of real-time quadcopter controls, Kirk Rudolph

PDF

Dynamic and System Agnostic Malware Detection Via Machine Learning, Michael Sgroi and Doug Jacobson

PDF

CHIP: Clustering hotspots in layout using integer programming, Rohit Reddy Takkala

PDF

Implementation of an Information Security Program for a City Government, Minh Tran

PDF

A simple moving target defense for power grid security using network address translation, Jacob Ulrich

PDF

Row hammer exploit in cloud environment, Adithya Venkataraman

PDF

A Risk Assessment on Raspberry PI using NIST Standards, Michael Williams