Articles, papers, presentations, and other materials authored by faculty from the Computer Science department of Loyola University Chicago's College of Arts & Sciences.
Submissions from 2024
SingleADV: Single-Class Target-Specific Attack Against Interpretable Deep Learning Systems, Eldor Abdukhamidov, Mohammed Abuhamad, George K. Thiruvathukal, Hyoungshick Kim, and Tamer Abuhmed
Hardening Interpretable Deep Learning Systems: Investigating Adversarial Threats and Defenses, Eldor Abdukhamidov, Mohammed Abuhamad, Simon S. Woo, Eric Chan-Tin, and Tamer Abuhmed
A Signal Injection Attack Against Zero Involvement Pairing and Authentication for the Internet of Things, Isaac Ahlgren, Jack West, Kyuin Lee, George K. Thiruvathukal, and Neil Klingensmith
Unveiling scientific articles from paper mills with provenance analysis, João Phillipe Cardenuto, Daniel Moreira, and Anderson Rocha
ReTexture 3D, Mikayla Cutler, Luke D. Baumel, Joseph Tocco, William Friebel, George K. Thiruvathukal, and Nicholas Baker Dr.
Crowdsourcing: A Roundtable Discussion, Joanna F. DeFranco, Nir Kshetri, George K. Thiruvathukal, and George F. Hurlburt
Containerization on a Self-Supervised Active Foveated Approach to Computer Vision, Dario Dematties, Silvio Rizzi, and George K. Thiruvathukal
Artificial Intelligence Employment Interviews: Examining Limitations, Biases, and Perceptions, Theresa Fister and George K. Thiruvathukal
Exploring Perceptions of Algorithmic Bias in Video Interviewing Software: The Importance of AI Hiring Education, Theresa Fister and George K. Thiruvathukal
Effective Wordle Heuristics, Ronald I. Greenberg
Assessing the Impact of an RPP on a Large Urban School District: The Case of CAFÉCS, Erin Henrick, Danny Schmidt, Steven McGee, Andrew M. Rasmussen, Lucia Dettori, Ronald I. Greenberg, Dale Reed, and Don Yanek
Establishing Metrics to Encourage Broader Use of Atomic Requirements – A Call for Exchange and Experimentation, William L. Honig
Robust Source Attribution of Synthetically Generated Western Blot Images, Matt Hyattt, George K. Thiruvathukal, and Daniel Moreira
Interoperability in Deep Learning: A User Survey and Failure Analysis of ONNX Model Converters, Purvish Jajal, Wenxin Jiang, Arav Tewari, Erik Kocinare, Joseph Woo, Anusha Sarraf, Yung-Hsiang Lu, George Thiruvathukal, and James C. Davis
Challenges and Practices of Deep Learning Model Reengineering: A Case Study on Computer Vision, Wenxin Jiang, Vishnu Banna, Naveen Vivek, Abhinav Goel, Nicholas Synovic, George K. Thiruvathukal, and James C. Davis
PeaTMOSS: A Dataset and Initial Analysis of Pre-Trained Models in Open-Source Software, Wenxin Jiang, Jerin Yasmin, Jason Jones, Nicholas Synovic, Jiashen Kuo, Nathaniel Bielanski, Yuan Tian, George K. Thiruvathukal, and James C. Davis
What Do We Know About Hugging Face? A Systematic Literature Review and Quantitative Validation of Qualitative Claims, Jason Jones, Wenxin Jiang, Nicholas Synovic, George K. Thiruvathukal, and James C. Davis
ActionPoint: An App to Combat Cyberbullying by Strengthening Parent-Teen Relationships, Maddie Juarez, Natali Barragan, Deborah Hall, George K. Thiruvathukal, and Yasin Silva
ActionPoint: An App to Combat Cyberbullying via the Strengthening of Parent-Teen Relationships, Maddie Juarez, Natali Barragan, Deborah Hall, George K. Thiruvathukal, and Yasin N. Silva
From Attack to Defense: Insights into Deep Learning Security Measures in Black-Box Settings, Firuz Juraev, Mohammed Abuhamad, Eric Chan-Tin, George K. Thiruvathukal, and Tamer Abuhmed
Impact of Architectural Modifications on Deep Learning Adversarial Robustness, Firuz Juraev, Mohammed Abuhamad, Simon S. Woo, George K. Thiruvathukal, and Tamer Abuhmed
Emoji Use in Social Media Posts: Relationships with Personality Traits and Word Usage, Shelia Kennison, Kameryn Fritz, Maria Andrea Hurtado Morales, and Eric Chan-Tin
Identification and Analysis of the Spread of {Mis}information on Social Media, Muhammad T. Khan, Rachel Gordon, Nimra Khan, Madeline Moran, Mohammed Abuhamad, Loretta Stalans, Jeffrey Huntsinger, Jennifer Forestal, and Eric Chan-Tin
Exploring Saliency Bias in Manipulation Detection, Joshua Krinsky, Alan Bettis, Qiuyu Tang, Daniel Moreira, and Aparna Bharati
WIP: An Engaging Undergraduate Intro to Model Checking in Software Engineering Using TLA+, Konstantin Laufer, Gunda Mertin, and George K. Thiruvathukal
Engaging More Students in Formal Methods Education: A Practical Approach Using Temporal Logic of Actions, Konstantin Läufer, Gunda Mertin, and George K. Thiruvathukal
Intermediate C Programming (2nd Edition) Supplemental Lecture Materials, Yung-Hsiang Lu and George K. Thiruvathukal
Deep Dive on Relationship between Personality and Password Creation, Madeline Moran, Arrianna Szymczak, Anna Hart, Shelia Kennison, and Eric Chan-Tin
Synthetic Realities and Artificial Intelligence-Generated Contents, Daniel Moreira, Sebastien Marcel, and Anderson Rocha
A Computer Vision Solution to Cross-cultural Food Image Classification and Nutrition Logging, Rohan Sethi and George K. Thiruvathukal
Artificial Intelligence and/or Machine Learning (AI &| ML), George K. Thiruvathukal
An Automated Approach for Improving The Inference Latency and Energy Efficiency of Pretrained CNNs by Removing Irrelevant Pixels with Focused Convolutions, Caleb Tung, Nick Eliopoulos, Purvish Jajal, Gowri Ramshankar, Chen-Yun Yang, Nicholas Synovic, Xuecen Zhang, Vipin Chaudhary, George K. Thiruvathukal, and Yung-Hsiang Lu
Terry Riley's "In C" for Mobile Ensemble, David B. Wetzel, Griffin Moe, and George K. Thiruvathukal
Submissions from 2023
Poster: Userland Containers for Mobile Systems, Isaac Ahlgren, Victor Rakotondranoro, Yasin N. Silva, Eric Chan-Tin, George K. Thiruvathukal, and Neil Klingensmith
SyncBleed: A Realistic Threat Model and Mitigation Strategy for Zero-Involvement Pairing and Authentication (ZIPA), Isaac Ahlgren, Jack West, Kyuin Lee, George K. Thiruvathukal, and Neil Klingensmith
Observing Human Mobility Internationally During COVID-19, Shane Allcroft, Mohammed Metwaly, Zachery Berg, Isha Ghodgaonkar, Fischer Bordwell, XinXin Zhao, Xinglei Liu, Jiahao Xu, Subhankar Chakraborty, Vishnu Banna, Akhil Chinnakotla, Abhinav Goel, Caleb Tung, Gore Kao, Wei Zakharov, David A. Shoham, George K. Thiruvathukal, and Yung-Hsiang Lu
Human Saliency-Driven Patch-based Matching for Interpretable Post-mortem Iris Recognition, Aidan Boyd, Daniel Moreira, Andrey Kuehlkamp, Kevin Bowyer, and Adam Czajka
Unveiling Scientic Articles from Paper Mills with Provenance Analysis, João Phillipe Cardenuto, Daniel Moreira, and Anderson Rocha
The Age of Synthetic Realities: Challenges and Opportunities, João Phillipe Cardenuto, Jing Yang, Rafael Padilha, Renjie Wan, Daniel Moreira, Haoliang Li, Shiqi Wang, Fernanda Andaló, Sébastien Marcel, and Anderson Rocha
Reusing Deep Learning Models: Challenges and Directions in Software Engineering, James C. Davis, Purvish Jajal, Wenxin Jiang, Taylor R. Schorlemmer, Nicholas Synovic, and George K. Thiruvathukal
Conversations with ChatGPT about C Programming: An Ongoing Study, James C. Davis, Yung-Hsiang Lu, and George K. Thiruvathukal
Tree-based Unidirectional Neural Networks for Low-Power Computer Vision, Abhinav Goel, Caleb Tung, Nick Eliopoulos, Amy Wang, Jamie C. Davis, George K. Thiruvathukal, and Yung-Hisang Lu
Assessing the Impact of a CSforALL Research-Practice Partnership Using the PROSPER Framework: A Case Study of the Chicago Alliance for Equity in Computer Science (CAFÉCS), Erin Henrick, Steven McGee, Ronald I. Greenberg, Dale Reed, Don Yanek, Lucia Dettori, and Haley Williamson
Evolution of Winning Solutions in the 2021 Low-Power Computer Vision Challenge, Xiao Hu, Ziteng Jiao, Ayden Kocher, Zhenyu Wu, Junjie Liu, James C. Davis, George K. Thiruvathukal, and Yung-Hsiang Lu
Exploring Naming Conventions (and Defects) of Pre-trained Deep Learning Models in Hugging Face and Other Model Hubs, Wenxin Jiang, Chingwo Cheung, George K. Thiruvathukal, and James C. Davis
PeaTMOSS: Mining Pre-Trained Models in Open-Source Software, Wenxin Jiang, Jason Jones, Jerin Yasmin, Nicholas Synovic, Rajiv Sashti, Sophie Chen, George K. Thiruvathukal, Yuan Tian, and James C. Davis
An Empirical Study of Pre-Trained Model Reuse in the Hugging Face Deep Learning Model Registry, Wenxin Jiang, Nicholas Synovic, Matt Hyattt, Taylor R. Schorlemmer, Rohan Sethi, Yung-Hisang Lu, George K. Thiruvathukal, and James C. Davis
PTMTorrent: A Dataset for Mining Open-source Pre-trained Model Packages, Wenxin Jiang, Nicholas Synovic, Purvish Jajal, Taylor R. Schorlemmer, Arav Tewari, Bhavesh Pareek, George K. Thiruvathukal, and James C. Davis
2023 Chairs’ Welcome, Daniel Moreira, Aparna Bharati, Cecilia Pasquini, and Yassine Yousfi
Using MPI For Distributed Hyper-Parameter Optimization andUncertainty Evaluation, Erik Pautsch, John Li, Silvio Rizzi, Maria Pantoja, and George K. Thiruvathukal
Evaluation of Novel AI Architectures for Uncertainty Estimation, Erik Pautsch, John Li, Silvio Rizzi, George K. Thiruvathukal, and Maria Pantoja
Optimized Uncertainty Estimation for Vision Transformers: Enhancing Adversarial Robustness and Performance Using Selective Classification, Erik Pautsch, John Li, Silvio Rizzi, George K. Thiruvathukal, and Maria Pantoja
Optimizing Uncertainty Quantification of Vision Transformers in Deep Learning on Novel AI Architectures, Erik Pautsch, John Li, Silvio Rizzi, George K. Thiruvathukal, and Maria Pantoja
WebTracker: Real Webbrowsing Behaviors, Daisy Reyes, Eno Dynowski, Taryn Chovan, John Mikos, Eric Chan-Tin, Mohammed Abuhamad, and Shelia Kennison
Lightweight and Effective Website Fingerprinting over Encrypted DNS, Yong Shao, Kenneth Hernandez, Kia Yang, Eric Chan-Tin, and Mohammed Abuhamad
Diversity Similarity Join for Big Data, Yasin N. Silva, Juan Martinez, Pedro Castro Cea, Humberto Razente, and Maria Camila N. Barioni
Predicting Phishing Victimization: Comparing Prior Victimization, Cognitive, and Emotional Styles, and Vulnerable or Protective E-mail Strategies, Loretta Stalans, Eric Chan-Tin, Anna Hart, Madeline Moran, and Shelia Kennison
Snapshot Metrics Are Not Enough: Analyzing Software Repositories with Longitudinal Metrics, Nicholas Synovic, Matt Hyattt, Rohan Sethi, Sohini Thota, Shilpika, Allan J. Miller, Wenxin Jiang, Emmanuel S. Amobi, Austin Pinderski, Konstantin Läufer, Nicholas J. Hayward, Neil Klingensmith, James C. Davis, and George K. Thiruvathukal
Motif Mining: Finding and Summarizing Remixed Image Content, William Theisen, Daniel Gonzalez Cedre, Zachariah Carmichael, Daniel Moreira, Tim Weninger, and Walter Scheirer
ACM/IEEE CS Curriculum Mapping Project - An Ongoing Study, George K. Thiruvathukal and Konstantin Laufer
On the Effectiveness of Image Manipulation Detection in the Age of Social Media, Rosaura VidalMata, Priscila Saboia, Daniel Moreira, Grant Jensen, Jason Schlessman, and Walter Scheirer
U.S. parents' intentions to use anti-bullying apps: Insights from a comprehensive model, Brittany Wheeler, Katie Baumel, Deborah Hall, and Yasin Silva
U.S. Parents’ Intentions to Use Anti-Bullying Apps: Insights from a Comprehensive Model, Brittany Wheeler, Katie Baumel, Deborah Hall, and Yasin N. Silva
Submissions from 2022
Predicting Phishing Victimization: Roles of Protective and Vulnerable Strategies and Decision-Making Styles, Eric Chan-Tin, Loretta Stalans, Spencer Johnston, Daisy Reyes, and Shelia Kennison
Bias Mitigation for Toxicity Detection via Sequential Decisions, Lu Cheng, Ahmadreza Mosallanezhad, Yasin N. Silva, Deborah Hall, and Huan Liu
Towards an Active Foveated Approach to Computer Vision, Dario Dematties, Silvio Rizzi, George K. Thiruvathukal, and Alejandro Javier Wainselboim
Directed Acyclic Graph-based Neural Networks for Tunable Low-Power Computer Vision, Abhinav Goel, Caleb Tung, Nick Eliopoulos, Xiao Hu, George K. Thiruvathukal, James C. Davis, and Yung-Hisang Lu
Efficient Computer Vision on Edge Devices with Pipeline-Parallel Hierarchical Neural Networks, Abhinav Goel, Caleb Tung, Xiao Hu, George K. Thiruvathukal, James C. Davis, and Yung-Hsiang Lu
Finding Approximate Pythagorean Triples (and Applications to LEGO Robot Building), Ronald I. Greenberg, Matthew Fahrenbacher, and George K. Thiruvathukal
Harnessing the Power of Interdisciplinary Research with Psychology-Informed Cyberbullying Detection Models, Deborah Hall, Yasin N. Silva, Brittany Wheeler, Lu Cheng, and Katie Baumel
A Labeled Dataset for Investigating Cyberbullying Content Patterns in Instagram, Mara Hamlett, Grace Powell, Yasin N. Silva, and Deborah Hall
SoftwareSystemsLaboratory/ssl-metrics, Matt Hyatt, Amy Kuhl, Jake Palmer, Rohan Sethi, Ethan Stoneman, Nicholas Synovic, Sohini Thota, and George K. Thiruvathukal
SoftwareSystemsLaboratory/ssl-metrics-git-bus-factor, Matt Hyatt, Nicholas Synovic, and George K. Thiruvathukal
SoftwareSystemsLaboratory/ssl-metrics-git-productivity, Matt Hyatt, Nicholas Synovic, and George K. Thiruvathukal
College teaching and AI, Leo Irakliotis
An Empirical Study of Artifacts and Security Risks in the Pre-trained Model Supply Chain, Wenxin Jiang, Nicholas Synovic, Rohan Sethi, Aryan Indarapu, Matt Hyattt, Taylor R. Schorlemmer, George K. Thiruvathukal, and James C. Davis
UnoAPI: Balancing Performance, Portability, and Productivity (P3) in HPC Education, Konstantin Laufer and George K. Thiruvathukal
AEROKEY: Using Ambient Electromagnetic Radiation for Secure and Usable Wireless Device Authentication, Kyuin Lee, Yucheng Yang, Omkar Prabhune, Aishwarya Lekshmi Chithra, Jack West, Kassem Fawaz, Neil Klingensmith, Uman Banerjee, and Younghyun Kim
Forensic Analysis of Synthetically Generated Western Blot Images, Sara Mandelli, Davide Cozzolino, Edoardo D. Cannas, João Phillipe Cardenuto, Daniel Moreira, Paolo Bestagini, Walter Scheirer, Anderson Rocha, Luisa Verdoliva, Stefano Tubaro, and Edward J. Delp
Chicago Alliance For Equity in Computer Science, Steven McGee, Lucia Dettori, Ronald I. Greenberg, Andrew M. Rasmussen, Dale F. Reed, and Don Yanek
Phishing for Fun, Madeline Moran, Anna Hart, Loretta Stalans, Eric Chan-Tin, and Shelia Kennison
SILA: A System for Scientific Image Analysis, Daniel Moreira, João Phillipe Cardenuto, Ruiting Shao, Sriram Baireddy, Davide Cozzolino, Diego Gragnaniello, Wael Abd-Almageed, Paolo Bestagini, Stefano Tubaro, Anderson Rocha, Walter Scheirer, Luisa Verdoliva, and Edward Delp
Image Provenance Analysis, Daniel Moreira, William Theisen, Walter Scheirer, Aparna Bharati, Joel Brogan, and Anderson Rocha
Storing Data Once in M-trees and PM-trees: Revisiting the Building Principles of Metric Access Methods, Humberto Razente, Maria Camila N. Barioni, and Yasin N. Silva
Using Magic to Teach Computer Programming, Dale F. Reed and Ronald I. Greenberg
DBSnap 2: New Features to Construct Database Queries by Snapping Blocks, Yasin N. Silva, Alexis Loza, and Humberto Razente
DBSnap-Eval: Identifying Database Query Construction Patterns, Yasin N. Silva, Alexis Loza, and Humberto Razente
Low-Power Computer Vision: Improve the Efficiency of Artificial Intelligence, George K. Thiruvathukal, Yung-Hisang Lu, Jaeyoun Kim, Yiran Chen, and Bo Chen
Efficient Computer Vision for Embedded Systems, George K. Thiruvathukal and Yung-Hsiang Lu
Irrelevant Pixels are Everywhere: Find and Exclude Them for More Efficient Computer Vision, Caleb Tung, Abhinav Goel, Xiao Hu, Nick Eliopoulos, Emmanuel Amobi, George K. Thiruvathukal, Vipin Chaudhary, and Yung-Hisang Lu
Establishing Trust in Vehicle-to-Vehicle Coordination: A Sensor Fusion Approach, Jakob Veselsky, Jack West, Isaac Ahlgren, George K. Thiruvathukal, Neil Klingensmith, Abhinav Goel, Wenxin Jiang, James C. Davis, Kyuin Lee, and Younghyun Kim
Establishing Trust in Vehicle-to-Vehicle Coordination: A Sensor Fusion Approach, Jakob Veselsky, Jack West, Isaac Ahlgren, George K. Thiruvathukal, Neil Klingensmith, Abhinav Goel, Wenxin Jiang, James C. Davis, Kyuin Lee, and Younghyun Kim
Comparing Online Surveys for Cybersecurity: SONA and Mturk, Anne Wagner, Anna Bakas, Shelia Kennison, and Eric Chan-Tin
The Personalities of Social Media Posts and Photos, Anne Wagner, Anna Bakas, Daisy Reyes, Shelia Kennison, and Eric Chan-Tin
Are You Really Muted?: A Privacy Analysis of Mute Buttons in Video Conferencing Apps, Yucheng Yang, Jack West, George K. Thiruvathukal, Neil Klingensmith, and Kassem Fawaz
Submissions from 2021
AdvEdge: Optimizing Adversarial Perturbations against Interpretable Deep Learning, Eldor Abdukhamidov, Mohammed Abuhamad, Firuz Juraev, Eric Chan-Tin, and Tamer Abuhmed
Impact of Personality Types and Matching Messaging on Password Strength, Anna Bakas, Anne Wagner, Spencer Johnston, Shelia Kennison, and Eric Chan-Tin
An Experience Report on Machine Learning Reproducibility: Guidance for Practitioners and TensorFlow Model Garden Contributors, Vishnu Banna, Akhil Chinnakotla, Zhengxin Yan, Anirudh Vegesana, Naveen Vivek, Kruthi Krishnappa, Wenxin Jiang, Yung-Hisang Lu, George Thiruvathukal, and James C. Davis
Automated Discovery of Network Cameras in Heterogeneous Web Pages, Ryan Dailey, Aniesh Chawla, Andrew Liu, Sripath Mishra, Ling Zhang, Josh Majors, Yung-Hisang Lu, and George K. Thiruvathukal
Research-Practice Partnership Strategies to Conduct and Use Research to Inform Practice, Erin Henrick, Steven McGee, Lucia Dettori, Troy Williams, Andrew M. Rasmussen, Don Yanek, Ronald I. Greenberg, and Dale Reed