Works Published in 2020

search works

Displaying works 81 - 100 of 222 in total

Sorted by most recent date added to the index first, which may not be the same as publication date order.

2020 article

LeakyPick: IoT Audio Spy Detector

36TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2020), pp. 694–705.

By: R. Mitev*, A. Pazii*, M. Miettinen*, W. Enck n & A. Sadeghi*

TL;DR: The LeakyPick architecture is presented, which enables the detection of the smart home devices that stream recorded audio to the Internet in response to observing a sound and provides a cost effective approach to help regular consumers monitor their homes for sound-triggered devices that unexpectedly transmitaudio to the cloud. (via Semantic Scholar)
Sources: Web Of Science, ORCID
Added: September 13, 2021

2020 article

CDL: Classified Distributed Learning for Detecting Security Attacks in Containerized Applications

36TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2020), pp. 179–188.

By: Y. Lin n, O. Tunde-Onadele n & X. Gu n

author keywords: Container Security; Anomaly Detection; Machine Learning
TL;DR: By introducing application classification into container behavior learning, CDL can improve the detection rate from catching 20 attacks to 31 attacks before those attacks succeed and reduce the false positive rate from over 12% to 0.24% compared to traditional anomaly detection schemes. (via Semantic Scholar)
Source: Web Of Science
Added: September 13, 2021

2020 conference paper

EARS: Enabling Private Feedback Updates in Anonymous Reputation Systems

2020 IEEE Conference on Communications and Network Security (CNS).

By: V. Kilari*, R. Yu n, S. Misra* & G. Xue*

TL;DR: EARS, an anonymous reputation system that ensures user anonymity while supporting all core functionalities (including feedback update) of a reputation system both efficiently and practically, and without the need of a fully trusted central authority is proposed. (via Semantic Scholar)
Source: ORCID
Added: August 27, 2021

2020 article

GVPRoF: A Value Profiler for GPU-Based Clusters

PROCEEDINGS OF SC20: THE INTERNATIONAL CONFERENCE FOR HIGH PERFORMANCE COMPUTING, NETWORKING, STORAGE AND ANALYSIS (SC20).

By: K. Zhou*, Y. Hao n, J. Mellor-Crummey*, X. Meng* & X. Liu n

Contributors: K. Zhou*, Y. Hao n, J. Mellor-Crummey*, X. Meng* & X. Liu n

author keywords: High performance computing; Performance analysis; Parallel programming; Supercomputers
TL;DR: The design and implementation of GVPROF is described, the first value profiler that pinpoints value-related inefficiencies in applications running on NVIDIA GPU-based clusters, which provides useful information to guide code optimization. (via Semantic Scholar)
Sources: Web Of Science, ORCID
Added: August 23, 2021

2020 article

SCALANA: Automating Scaling Loss Detection with Graph Analysis

PROCEEDINGS OF SC20: THE INTERNATIONAL CONFERENCE FOR HIGH PERFORMANCE COMPUTING, NETWORKING, STORAGE AND ANALYSIS (SC20).

By: Y. Jin*, H. Wang*, T. Yu*, X. Tang*, T. Hoefler*, X. Liu n, J. Zhai*

author keywords: Performance Analysis; Scalability Bottleneck; Root-Cause Defection; Static Analysis
TL;DR: A novel approach, called backtracking root cause detection, which can automatically and efficiently detect the root cause of scaling loss and achieve up to 11.11parcent performance improvement by fixing the root causes detected by SCALANA on 2,048 processes. (via Semantic Scholar)
Source: Web Of Science
Added: August 16, 2021

2020 article

ZeroSpy: Exploring Software Inefficiency with Redundant Zeros

PROCEEDINGS OF SC20: THE INTERNATIONAL CONFERENCE FOR HIGH PERFORMANCE COMPUTING, NETWORKING, STORAGE AND ANALYSIS (SC20).

author keywords: Redundant Zero; Software Inefficiency; Performance Profiling and Optimization
TL;DR: This paper proposes ZeroSpy - a fine-grained profiler to identify redundant zeros caused by both inappropriate use of data structures and useless computation and provides intuitive optimization guidance by revealing the locations where the redundantZeros happen in source lines and calling contexts. (via Semantic Scholar)
Source: Web Of Science
Added: August 16, 2021

2020 article

DRCCTPROF: A Fine-Grained Call Path Profiler for ARM-Based Clusters

PROCEEDINGS OF SC20: THE INTERNATIONAL CONFERENCE FOR HIGH PERFORMANCE COMPUTING, NETWORKING, STORAGE AND ANALYSIS (SC20).

author keywords: Fine-grained analysis; ARM; performance analysis; debugging; high-performance computing
TL;DR: The unique ability of DRCCTPROF is to obtain full calling context at any and every machine instruction that executes, which provides more detailed diagnostic feedback for performance optimization and correctness tools. (via Semantic Scholar)
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Source: Web Of Science
Added: August 16, 2021

2020 article

A Blockchain-based Vehicle-trust Management Framework Under a Crowdsourcing Environment

2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), pp. 1950–1955.

author keywords: Vehicular crowdsourcing networks; trust management; blockchain; trusted execution environment
TL;DR: A blockchain-based trust management scheme for VCNs to provide a decentralized and trusted service management and introduces TEM-based Proof of Trust to support blockchain maintenance, which works together with an efficient consensus algorithm Zyzzyva for improved scalability. (via Semantic Scholar)
Sources: Web Of Science, ORCID
Added: August 16, 2021

2020 article

A Review of Geospatial Content in IEEE Visualization Publications

2020 IEEE VISUALIZATION CONFERENCE - SHORT PAPERS (VIS 2020), pp. 51–55.

By: A. Yoshizumi n, M. Coffer n, E. Collins n, M. Gaines n, X. Gao n, K. Jones n, I. McGregor n, K. McQuillan n ...

author keywords: Human-centered computing; Visualization; Visualization application domains; Geographic visualization
TL;DR: An understanding of the quantity and role of geospatial subject matter in recent IEEE VIS publications is provided and supplies a foundation for future meta-analytical work around geosp spatial analytics and geovisualization that may shed light on opportunities for innovation. (via Semantic Scholar)
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Source: Web Of Science
Added: August 16, 2021

2020 article

VCFC: Structural and Semantic Compression and Indexing of Genetic Variant Data

2020 IEEE INTERNATIONAL CONFERENCE ON BIOINFORMATICS AND BIOMEDICINE, pp. 200–203.

TL;DR: The evaluation over genomic datasets indicates compression at a comparable size for the data representation while resulting in speedup of ˇ2X in indexed queries compared to the industry standard, underlines that the representation could replace existing standards resulting in reduced computational cost at equivalent storage size. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: August 16, 2021

2020 article

Assessing Practitioner Beliefs about Software Defect Prediction

2020 IEEE/ACM 42ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: SOFTWARE ENGINEERING IN PRACTICE (ICSE-SEIP), pp. 182–190.

By: N. Shrikanth n & T. Menzies n

author keywords: defects; beliefs; practitioner; empirical software engineering
TL;DR: The conclusion will be that the nature of the debate with Software Engineering needs to change, while it is important to report the effects that hold right now, it is also important to reports on what effects change over time. (via Semantic Scholar)
Sources: Web Of Science, ORCID
Added: August 16, 2021

2020 article

Distributed and Privacy Preserving Routing of Connected Vehicles to Minimize Congestion

2020 IEEE 17TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SMART SYSTEMS (MASS 2020), pp. 220–228.

By: S. Boob n, S. Mahmood* & M. Shahzad n

TL;DR: A distributed and privacy preserving routing protocol, namely DPR, which the connected vehicles collaboratively and repeatedly execute to calculate fast routes to their destinations such that the overall congestion on the road network is significantly reduced and at the same time the privacy of the vehicles is preserved. (via Semantic Scholar)
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Source: Web Of Science
Added: August 9, 2021

2020 article

A WiFi-based Home Security System

2020 IEEE 17TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SMART SYSTEMS (MASS 2020), pp. 129–137.

TL;DR: A Wi Fi based security system that uses commodity WiFi devices, which most modern households already have, to perform the three primary tasks of typical home security systems, detected intrusions with over 95% accuracy and identified the exact door/window that moved with just 4.5% average error. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: August 9, 2021

2020 article

Efficient Constrained Subgraph Extraction for Exploratory Discovery in Large Knowledge Graphs

2020 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), pp. 623–630.

By: S. Gao, N. Korchiev n, V. Samatova n & K. Anyanwu n

author keywords: Exploratory Querying; RDF; Knowledge Graphs; Set Constrained Path Queries
TL;DR: This paper proposes a class of constrained subgraph connection structure discovery queries whose specification is only partially structured, which allows more effective querying than using the traditional graph traversal style algorithms, demonstrated by a comparative evaluation. (via Semantic Scholar)
Sources: Web Of Science, ORCID
Added: July 26, 2021

2020 article

MuLan: Multilevel Language-based Representation Learning for Disease Progression Modeling

2020 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), pp. 1246–1255.

By: H. Sohn n, K. Park n & M. Chi n

author keywords: Electronic health records; disease progression modeling; interpretability; representation learning
TL;DR: This work presents MuLan: a Multilevel Language-based representation learning framework that can automatically learn a hierarchical representation for EHRs at entry, event, and visit levels and demonstrates that these unified multilevel representations can be utilized for interpreting and visualizing the latent mechanism of patients’ septic shock progressions. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: July 26, 2021

2020 article

An Adversarial Domain Separation Framework for Septic Shock Early Prediction Across EHR Systems

2020 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), pp. 64–73.

By: F. Khoshnevisan n & M. Chi n

author keywords: adversarial domain adaptation variational RNN; Electronic health Record; septic shock; early prediction
TL;DR: By separating globally-shared from domain-specific representations, this framework significantly improves septic shock early prediction performance in both EHRs and outperforms the current state-of-the-art DA models. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: July 26, 2021

2020 article

Characterizing the Impact of TCP Coexistence in Data Center Networks

2020 IEEE 40TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), pp. 388–398.

TL;DR: An extensive set of experiments with coexisting TCP variants on Leaf-Spine and Fat-Tree switch fabrics results in a large set of network traces that have important implications in ensuring optimal utilization of data center switch fabric and in meeting the network performance needs of application layer workloads. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: July 26, 2021

2020 article

A Literature Review on Mining Cyberthreat Intelligence from Unstructured Texts

20TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW 2020), pp. 516–525.

TL;DR: It is found that the most prominent sources of unstructured threat data are the threat reports, Twitter feeds, and posts from hackers and security experts, and natural language processing (NLP) based approaches: topic classification; keyword identification; and semantic relationship extraction among the keywords are mostly availed in the selected studies to mine CTI information from un Structured threat sources. (via Semantic Scholar)
Source: Web Of Science
Added: July 12, 2021

2020 article

Gang of Eight: A Defect Taxonomy for Infrastructure as Code Scripts

2020 ACM/IEEE 42ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2020), pp. 752–764.

author keywords: bug; category; configuration as code; configuration scripts; defect; devops; infrastructure as code; puppet; software quality; taxonomy
TL;DR: A taxonomy of IaC defects is developed by applying qualitative analysis on 1,448 defect-related commits collected from open source software (OSS) repositories of the Openstack organization and the quantified frequency of the defect categories may help in advancing the science of IAC script quality. (via Semantic Scholar)
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Source: Web Of Science
Added: June 21, 2021

2020 article

HARP: Holistic Analysis for Refactoring Python-Based Analytics Programs

2020 ACM/IEEE 42ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2020), pp. 506–517.

author keywords: machine learning program; computation graph; dynamic language; program analysis
TL;DR: HARP enables holistic analysis that spans across computation graphs and their hosting Python code and achieves it through a set of novel techniques: analytics-conscious speculative analysis to circumvent Python complexities, a unified representation augmented computation graphs to capture all dimensions of knowledge related with the holistic analysis, and conditioned feedback mechanism to allow risk-controlled aggressive analysis. (via Semantic Scholar)
Sources: Web Of Science, ORCID
Added: June 21, 2021

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.