Search

Search Constraints

Start Over You searched for: Graduate Program Information Sciences and Technology (PHD) Remove constraint Graduate Program: Information Sciences and Technology (PHD) Committee Member Mary Beth Rosson Remove constraint Committee Member: Mary Beth Rosson

Search Results

1. A Representation-based Approach to Connect Regular Grammar and Deep Learning

open_access
Open Access

2. The Good, the Bad and the Ugly: Exploring the Robustness and Applicability of Adversarial Machine Learning

open_access
Open Access

3. Solidarity not Charity! Empowering Local Communities for Disaster Relief during COVID-19 through Grassroots Support

open_access
Open Access

4. Geometry Inspired Deep Neural Networks for 3D reconstruction

open_access
Open Access

5. Trustworthy Machine Learning: Learning under Security, Explainability and Uncertainty Constraints

open_access
Open Access

6. Mining users' self-privacy violations in online public discourse using data science techniques

open_access
Open Access

7. Precise and Scalable Side-Channel Analysis

open_access
Open Access

8. Towards Network Level Moving Target Defense with Software Defined Networking

open_access
Open Access

9. Understanding and Detecting Online Misinformation with Auxiliary Data

open_access
Open Access

10. Towards automated recognition of bodily expression of emotion in the wild

open_access
Open Access

11. Organizations security management in different problem domains: Empirical Evidence and game-theoretic modeling

open_access
Open Access

12. Assessing the Design Needs to Support Longitudinal Stability and Wellbeing for Individuals with Serious Mental Illness

open_access
Open Access

13. From Silos to Synergy: Enabling Distributed Collaboration in Citizen Science Water Quality Monitoring

open_access
Open Access

14. Understanding the dynamical patterns and hot streaks for creative careers

restricted_to_institution
Restricted (Penn State Only)

15. Denoising and Integrating Complex Networks for Big Data Analysis

restricted_to_institution
Restricted (Penn State Only)

16. Resource-efficient Deep Learning: Democratizing AI at Scale

open_access
Open Access

17. Investigating Exploitable Design Patterns for More Advanced Protection Design

open_access
Open Access

18. Introducing and Testing the Benefits of Videorecording for the Analysis of Tasks and Jobs

restricted_to_institution
Restricted (Penn State Only)

19. Explainable AI Techniques for Security

open_access
Open Access

20. The Logic of End-user Responsibility for Cyber-governance: A Paradigm Shift from Macro-decentralized Governance to Micro-distributed Governance

restricted_to_institution
Restricted (Penn State Only)

21. Theoretically deriving computational limits of Artificial Neural Networks with bounded precision and time

restricted_to_institution
Restricted (Penn State Only)

22. Fast Local Graph Node Proximity Ranking

restricted_to_institution
Restricted (Penn State Only)

23. Leveraging Security Patterns To Address Security Vulnerabilities In Software Systems

open_access
Open Access

24. Deep Models for Detecting Sleep-Related Problems

open_access
Open Access