Recent Submissions

  • HOMER: An Interactive System for Home Based Stroke Rehabilitation 

    Kelliher, Aisling; Choi, Jinwoo; Huang, Jia-Bin; Rikakis, Thanassis; Kitani, Kris (ACM, 2017)
    Delivering long term, unsupervised stroke rehabilitation in the home is a complex challenge that requires robust, low cost, scalable, and engaging solutions. We present HOMER, an interactive system that uses novel therapy ...
  • Got the Flu (or Mumps)? Check the Eigenvalue! 

    Prakash, B. Aditya; Chakrabarti, Deepayan; Faloutsos, Michalis; Valler, Nicholas; Faloutsos, Christos (Virginia Tech, 2010-03-30)
    For a given, arbitrary graph, what is the epidemic threshold? That is, under what conditions will a virus result in an epidemic? We provide the super-model theorem, which generalizes older results in two important, orthogonal ...
  • Forecasting the Flu: Designing Social Network Sensors for Epidemics 

    Shao, Huijuan; Hossain, K.S.M. Tozammel; Wu, Hao; Khan, Maleq; Vullikanti, Anil; Prakash, B. Aditya; Marathe, Madhav; Ramakrishnan, Naren (Virginia Tech, 2016-03-08)
    Early detection and modeling of a contagious epidemic can provide important guidance about quelling the contagion, controlling its spread, or the effective design of countermeasures. A topic of recent interest has been to ...
  • Predicting Complications in Critical Care Using Heterogeneous Clinical Data 

    Huddar, Vijay; Desiraju, Bapu Koundinya; Rajan, Vaibhav; Bhattacharya, Sakyajit; Roy, Shourya; Reddy, Chandan K. (IEEE, 2016-10-19)
    Patients in hospitals, particularly in critical care, are susceptible to many complications affecting morbidity and mortality. Digitized clinical data in electronic medical records can be effectively used to develop machine ...
  • A large-scale RNA interference screen identifies genes that regulate autophagy at different stages 

    Guo, Sujuan; Pridham, Kevin J.; Virbasius, Ching-Man; He, Bin; Zhang, Liqing; Varmark, Hanne; Green, Michael R.; Sheng, Zhi (Nature Publishing Group, 2018-02-12)
    Dysregulated autophagy is central to the pathogenesis and therapeutic development of cancer. However, how autophagy is regulated in cancer is not well understood and genes that modulate cancer autophagy are not fully ...
  • Measuring the Insecurity of Mobile Deep Links of Android 

    Lui, Fang; Wang, Chun; Pico, Andres; Yao, Danfeng; Wang, Gang (USENIX, 2017-08)
    Mobile deep links are URIs that point to specific locations within apps, which are instrumental to web-to-app communications. Existing “scheme URLs” are known to have hijacking vulnerabilities where one app can freely ...
  • CCS 2017- Women in Cyber Security (CyberW) Workshop 

    Yao, Danfeng (Daphne); Bertino, Elisa (ACM, 2017)
    The CyberW workshop is motivated by the significant gender imbalance in all security conferences, in terms of the number of publishing authors, PC members, organizers, and attendees. What causes this gender imbalance remains ...
  • FastViromeExplorer: a pipeline for virus and phage identification and abundance profiling in metagenomics data 

    Tithi, Saima Sultana; Aylward, Frank O.; Jensen, Roderick V.; Zhang, Liqing (PeerJ, 2018-01-12)
    With the increase in the availability of metagenomic data generated by next generation sequencing, there is an urgent need for fast and accurate tools for identifying viruses in host-associated and environmental samples. ...
  • Herbicide injury induces DNA methylome alterations in Arabidopsis 

    Kim, G; Clarke, CR; Larose, H; Tran, HT; Haak, DC; Zhang, L; Askew, S; Barney, J; Westwood, JH (PEERJ INC, 2017-07-20)
    The emergence of herbicide-resistant weeds is a major threat facing modern agriculture. Over 470 weedy-plant populations have developed resistance to herbicides. Traditional evolutionary mechanisms are not always sufficient ...
  • UPS-indel: a Universal Positioning System for Indels 

    Hasan, Mohammad Shabbir; Wu, Xiaowei; Watson, Layne T.; Li, Zhiyi; Zhang, Liqing (Nature, 2017-10-26)
    Storing biologically equivalent indels as distinct entries in databases causes data redundancy, and misleads downstream analysis. It is thus desirable to have a unified system for identifying and representing equivalent ...
  • Cooperative Object Manipulation in Collaborative Virtual Environments 

    Pinho, Marcio S.; Bowman, Doug A.; Dal Sasso Freitas, Carla M. (Springer Nature, 2008-06-20)
    Cooperative manipulation refers to the simultaneous manipulation of a virtual object by multiple users in an immersive virtual environment (VE). In this work, we present techniques for cooperative manipulation based on ...
  • Enterprise data breach: causes, challenges, prevention, and future directions 

    Cheng, Long; Liu, Fang; Yao, Danfeng (Daphne) (Wiley, 2017)
    A data breach is the intentional or inadvertent exposure of confidential information to unauthorized parties. In the digital era, data has become one of the most critical components of an enterprise. Data leakage poses ...
  • Unearthing Stealthy Program Attacks Buried in Extremely Long Execution Paths 

    Shu, Xiaokui; Yao, Danfeng (Daphne); Ramakrishnan, Naren (ACM, 2015-10)
    Modern stealthy exploits can achieve attack goals without introducing illegal control flows, e.g., tampering with noncontrol data and waiting for the modified data to propagate and alter the control flow legally. Existing ...
  • Secure Coding Practices in Java: Challenges and Vulnerabilities 

    Meng, Na; Nagy, Stefan; Yao, Daphne; Zhuang, Wenjie; Argoty, Gustavo Arango (Virginia Tech, 2017-09-28)
    Java platform and third-party libraries provide various security features to facilitate secure coding. However, misusing these features can cost tremendous time and effort of developers or cause security vulnerabilities ...
  • A Modest Proposal for Open Market Risk Assessment to Solve the Cyber-Security Problem 

    O’Shea, Timothy J.; Mondl, Adam; Clancy, T. Charles (Virginia Tech, 2016-04-29)
    We introduce a model for a market based economic system of cyber-risk valuation to correct fundamental problems of incentives within the information technology and information processing industries. We assess the makeup ...
  • Intrusion Detection System for Applications using Linux Containers 

    Abed, Amr S.; Clancy, Charles; Levy, David S. (Springer, 2015-12-09)
    Linux containers are gaining increasing traction in both individual and industrial use, and as these containers get integrated into mission-critical systems, real-time detection of malicious cyber attacks becomes a critical ...
  • Towards Optimal Secure Distributed Storage Systems with Exact Repair 

    Tandon, Ravi; Amuru, SaiDhiraj; Clancy, T. Charles; Buehrer, R. Michael (IEEE, 2016-06)
    Distributed storage systems in the presence of a wiretapper are considered. A distributed storage system (DSS) is parameterized by three parameters (𝑛, 𝑘, 𝑑), in which a file stored across n distributed nodes, can be ...
  • Opinion: Mathematical models: A key tool for outbreak response 

    Lofgren, Eric T.; Halloran, M. Elizabeth; Rivers, Caitlin M.; Drake, John M.; Porco, Travis C.; Lewis, Bryan; Yang, Wan; Vespignani, Alessandro; Shaman, Jeffrey; Eisenberg, Joseph N.S.; Eisenberg, Marisa C.; Marathe, Madhav; Scarpino, Samuel V.; Alexander, Kathleen A.; Meza, Rafael; Ferrari, Matthew J.; Hyman, James M.; Meyers, Lauren A.; Eubank, Stephen (NAS, 2015-01-13)
    The 2014 outbreak of Ebola in West Africa is unprecedented in its size and geographic range, and demands swift, effective action from the international community. Understanding the dynamics and spread of Ebola is critical ...
  • Improving somatic variant identification through integration of genome and exome data 

    Vijayan, Vinaya; Yiu, Siu-Ming; Zhang, Liqing (2017-10-16)
  • Determining Relative Airport Threats from News and Social Media 

    Khandpur, Rupinder P.; Ji, Taoran; Ning, Yue; Zhao, Liang; Lu, Chang-Tien; Smith, Erik R.; Adams, Christopher; Ramakrishnan, Naren (AAAI, 2017)
    Airports are a prime target for terrorist organizations, drug traffickers, smugglers, and other nefarious groups. Traditional forms of security assessment are not real-time and often do not exist for each airport and port ...

View more