Articles, papers, presentations, and other materials authored by faculty from the Computer Science department of Loyola University Chicago's College of Arts & Sciences.

Follow

Submissions from 2024

PDF

SingleADV: Single-Class Target-Specific Attack Against Interpretable Deep Learning Systems, Eldor Abdukhamidov, Mohammed Abuhamad, George K. Thiruvathukal, Hyoungshick Kim, and Tamer Abuhmed

PDF

Hardening Interpretable Deep Learning Systems: Investigating Adversarial Threats and Defenses, Eldor Abdukhamidov, Mohammed Abuhamad, Simon S. Woo, Eric Chan-Tin, and Tamer Abuhmed

Link

A Signal Injection Attack Against Zero Involvement Pairing and Authentication for the Internet of Things, Isaac Ahlgren, Jack West, Kyuin Lee, George K. Thiruvathukal, and Neil Klingensmith

PDF

Unveiling scientific articles from paper mills with provenance analysis, João Phillipe Cardenuto, Daniel Moreira, and Anderson Rocha

Link

ReTexture 3D, Mikayla Cutler, Luke D. Baumel, Joseph Tocco, William Friebel, George K. Thiruvathukal, and Nicholas Baker Dr.

Link

Crowdsourcing: A Roundtable Discussion, Joanna F. DeFranco, Nir Kshetri, George K. Thiruvathukal, and George F. Hurlburt

PDF

Containerization on a Self-Supervised Active Foveated Approach to Computer Vision, Dario Dematties, Silvio Rizzi, and George K. Thiruvathukal

Link

Artificial Intelligence Employment Interviews: Examining Limitations, Biases, and Perceptions, Theresa Fister and George K. Thiruvathukal

PDF

Exploring Perceptions of Algorithmic Bias in Video Interviewing Software: The Importance of AI Hiring Education, Theresa Fister and George K. Thiruvathukal

PDF

Effective Wordle Heuristics, Ronald I. Greenberg

PDF

Assessing the Impact of an RPP on a Large Urban School District: The Case of CAFÉCS, Erin Henrick, Danny Schmidt, Steven McGee, Andrew M. Rasmussen, Lucia Dettori, Ronald I. Greenberg, Dale Reed, and Don Yanek

PDF

Establishing Metrics to Encourage Broader Use of Atomic Requirements – A Call for Exchange and Experimentation, William L. Honig

Link

Robust Source Attribution of Synthetically Generated Western Blot Images, Matt Hyattt, George K. Thiruvathukal, and Daniel Moreira

PDF

Interoperability in Deep Learning: A User Survey and Failure Analysis of ONNX Model Converters, Purvish Jajal, Wenxin Jiang, Arav Tewari, Erik Kocinare, Joseph Woo, Anusha Sarraf, Yung-Hsiang Lu, George Thiruvathukal, and James C. Davis

PDF

Challenges and Practices of Deep Learning Model Reengineering: A Case Study on Computer Vision, Wenxin Jiang, Vishnu Banna, Naveen Vivek, Abhinav Goel, Nicholas Synovic, George K. Thiruvathukal, and James C. Davis

PDF

PeaTMOSS: A Dataset and Initial Analysis of Pre-Trained Models in Open-Source Software, Wenxin Jiang, Jerin Yasmin, Jason Jones, Nicholas Synovic, Jiashen Kuo, Nathaniel Bielanski, Yuan Tian, George K. Thiruvathukal, and James C. Davis

PDF

What Do We Know About Hugging Face? A Systematic Literature Review and Quantitative Validation of Qualitative Claims, Jason Jones, Wenxin Jiang, Nicholas Synovic, George K. Thiruvathukal, and James C. Davis

PDF

ActionPoint: An App to Combat Cyberbullying by Strengthening Parent-Teen Relationships, Maddie Juarez, Natali Barragan, Deborah Hall, George K. Thiruvathukal, and Yasin Silva

PDF

ActionPoint: An App to Combat Cyberbullying via the Strengthening of Parent-Teen Relationships, Maddie Juarez, Natali Barragan, Deborah Hall, George K. Thiruvathukal, and Yasin N. Silva

Link

From Attack to Defense: Insights into Deep Learning Security Measures in Black-Box Settings, Firuz Juraev, Mohammed Abuhamad, Eric Chan-Tin, George K. Thiruvathukal, and Tamer Abuhmed

Link

Impact of Architectural Modifications on Deep Learning Adversarial Robustness, Firuz Juraev, Mohammed Abuhamad, Simon S. Woo, George K. Thiruvathukal, and Tamer Abuhmed

PDF

Emoji Use in Social Media Posts: Relationships with Personality Traits and Word Usage, Shelia Kennison, Kameryn Fritz, Maria Andrea Hurtado Morales, and Eric Chan-Tin

Link

Identification and Analysis of the Spread of {Mis}information on Social Media, Muhammad T. Khan, Rachel Gordon, Nimra Khan, Madeline Moran, Mohammed Abuhamad, Loretta Stalans, Jeffrey Huntsinger, Jennifer Forestal, and Eric Chan-Tin

PDF

Exploring Saliency Bias in Manipulation Detection, Joshua Krinsky, Alan Bettis, Qiuyu Tang, Daniel Moreira, and Aparna Bharati

Link

WIP: An Engaging Undergraduate Intro to Model Checking in Software Engineering Using TLA+, Konstantin Laufer, Gunda Mertin, and George K. Thiruvathukal

Link

Engaging More Students in Formal Methods Education: A Practical Approach Using Temporal Logic of Actions, Konstantin Läufer, Gunda Mertin, and George K. Thiruvathukal

Link

Intermediate C Programming (2nd Edition) Supplemental Lecture Materials, Yung-Hsiang Lu and George K. Thiruvathukal

Link

Deep Dive on Relationship between Personality and Password Creation, Madeline Moran, Arrianna Szymczak, Anna Hart, Shelia Kennison, and Eric Chan-Tin

PDF

Synthetic Realities and Artificial Intelligence-Generated Contents, Daniel Moreira, Sebastien Marcel, and Anderson Rocha

PDF

A Computer Vision Solution to Cross-cultural Food Image Classification and Nutrition Logging​, Rohan Sethi and George K. Thiruvathukal

PDF

Artificial Intelligence and/or Machine Learning (AI &| ML), George K. Thiruvathukal

PDF

An Automated Approach for Improving The Inference Latency and Energy Efficiency of Pretrained CNNs by Removing Irrelevant Pixels with Focused Convolutions, Caleb Tung, Nick Eliopoulos, Purvish Jajal, Gowri Ramshankar, Chen-Yun Yang, Nicholas Synovic, Xuecen Zhang, Vipin Chaudhary, George K. Thiruvathukal, and Yung-Hsiang Lu

PDF

Terry Riley's "In C" for Mobile Ensemble, David B. Wetzel, Griffin Moe, and George K. Thiruvathukal

Submissions from 2023

PDF

Poster: Userland Containers for Mobile Systems, Isaac Ahlgren, Victor Rakotondranoro, Yasin N. Silva, Eric Chan-Tin, George K. Thiruvathukal, and Neil Klingensmith

Link

SyncBleed: A Realistic Threat Model and Mitigation Strategy for Zero-Involvement Pairing and Authentication (ZIPA), Isaac Ahlgren, Jack West, Kyuin Lee, George K. Thiruvathukal, and Neil Klingensmith

PDF

Observing Human Mobility Internationally During COVID-19, Shane Allcroft, Mohammed Metwaly, Zachery Berg, Isha Ghodgaonkar, Fischer Bordwell, XinXin Zhao, Xinglei Liu, Jiahao Xu, Subhankar Chakraborty, Vishnu Banna, Akhil Chinnakotla, Abhinav Goel, Caleb Tung, Gore Kao, Wei Zakharov, David A. Shoham, George K. Thiruvathukal, and Yung-Hsiang Lu

PDF

Human Saliency-Driven Patch-based Matching for Interpretable Post-mortem Iris Recognition, Aidan Boyd, Daniel Moreira, Andrey Kuehlkamp, Kevin Bowyer, and Adam Czajka

PDF

Unveiling Scientic Articles from Paper Mills with Provenance Analysis, João Phillipe Cardenuto, Daniel Moreira, and Anderson Rocha

PDF

The Age of Synthetic Realities: Challenges and Opportunities, João Phillipe Cardenuto, Jing Yang, Rafael Padilha, Renjie Wan, Daniel Moreira, Haoliang Li, Shiqi Wang, Fernanda Andaló, Sébastien Marcel, and Anderson Rocha

PDF

Reusing Deep Learning Models: Challenges and Directions in Software Engineering, James C. Davis, Purvish Jajal, Wenxin Jiang, Taylor R. Schorlemmer, Nicholas Synovic, and George K. Thiruvathukal

PDF

Conversations with ChatGPT about C Programming: An Ongoing Study, James C. Davis, Yung-Hsiang Lu, and George K. Thiruvathukal

PDF

Tree-based Unidirectional Neural Networks for Low-Power Computer Vision, Abhinav Goel, Caleb Tung, Nick Eliopoulos, Amy Wang, Jamie C. Davis, George K. Thiruvathukal, and Yung-Hisang Lu

PDF

Assessing the Impact of a CSforALL Research-Practice Partnership Using the PROSPER Framework: A Case Study of the Chicago Alliance for Equity in Computer Science (CAFÉCS), Erin Henrick, Steven McGee, Ronald I. Greenberg, Dale Reed, Don Yanek, Lucia Dettori, and Haley Williamson

PDF

Evolution of Winning Solutions in the 2021 Low-Power Computer Vision Challenge, Xiao Hu, Ziteng Jiao, Ayden Kocher, Zhenyu Wu, Junjie Liu, James C. Davis, George K. Thiruvathukal, and Yung-Hsiang Lu

Link

Exploring Naming Conventions (and Defects) of Pre-trained Deep Learning Models in Hugging Face and Other Model Hubs, Wenxin Jiang, Chingwo Cheung, George K. Thiruvathukal, and James C. Davis

PDF

PeaTMOSS: Mining Pre-Trained Models in Open-Source Software, Wenxin Jiang, Jason Jones, Jerin Yasmin, Nicholas Synovic, Rajiv Sashti, Sophie Chen, George K. Thiruvathukal, Yuan Tian, and James C. Davis

PDF

An Empirical Study of Pre-Trained Model Reuse in the Hugging Face Deep Learning Model Registry, Wenxin Jiang, Nicholas Synovic, Matt Hyattt, Taylor R. Schorlemmer, Rohan Sethi, Yung-Hisang Lu, George K. Thiruvathukal, and James C. Davis

PDF

PTMTorrent: A Dataset for Mining Open-source Pre-trained Model Packages, Wenxin Jiang, Nicholas Synovic, Purvish Jajal, Taylor R. Schorlemmer, Arav Tewari, Bhavesh Pareek, George K. Thiruvathukal, and James C. Davis

PDF

2023 Chairs’ Welcome, Daniel Moreira, Aparna Bharati, Cecilia Pasquini, and Yassine Yousfi

Link

Using MPI For Distributed Hyper-Parameter Optimization andUncertainty Evaluation, Erik Pautsch, John Li, Silvio Rizzi, Maria Pantoja, and George K. Thiruvathukal

PDF

Evaluation of Novel AI Architectures for Uncertainty Estimation, Erik Pautsch, John Li, Silvio Rizzi, George K. Thiruvathukal, and Maria Pantoja

PDF

Optimized Uncertainty Estimation for Vision Transformers: Enhancing Adversarial Robustness and Performance Using Selective Classification, Erik Pautsch, John Li, Silvio Rizzi, George K. Thiruvathukal, and Maria Pantoja

PDF

Optimizing Uncertainty Quantification of Vision Transformers in Deep Learning on Novel AI Architectures, Erik Pautsch, John Li, Silvio Rizzi, George K. Thiruvathukal, and Maria Pantoja

PDF

WebTracker: Real Webbrowsing Behaviors, Daisy Reyes, Eno Dynowski, Taryn Chovan, John Mikos, Eric Chan-Tin, Mohammed Abuhamad, and Shelia Kennison

PDF

Lightweight and Effective Website Fingerprinting over Encrypted DNS, Yong Shao, Kenneth Hernandez, Kia Yang, Eric Chan-Tin, and Mohammed Abuhamad

PDF

Diversity Similarity Join for Big Data, Yasin N. Silva, Juan Martinez, Pedro Castro Cea, Humberto Razente, and Maria Camila N. Barioni

PDF

Predicting Phishing Victimization: Comparing Prior Victimization, Cognitive, and Emotional Styles, and Vulnerable or Protective E-mail Strategies, Loretta Stalans, Eric Chan-Tin, Anna Hart, Madeline Moran, and Shelia Kennison

PDF

Snapshot Metrics Are Not Enough: Analyzing Software Repositories with Longitudinal Metrics, Nicholas Synovic, Matt Hyattt, Rohan Sethi, Sohini Thota, Shilpika, Allan J. Miller, Wenxin Jiang, Emmanuel S. Amobi, Austin Pinderski, Konstantin Läufer, Nicholas J. Hayward, Neil Klingensmith, James C. Davis, and George K. Thiruvathukal

PDF

Motif Mining: Finding and Summarizing Remixed Image Content, William Theisen, Daniel Gonzalez Cedre, Zachariah Carmichael, Daniel Moreira, Tim Weninger, and Walter Scheirer

Link

ACM/IEEE CS Curriculum Mapping Project - An Ongoing Study, George K. Thiruvathukal and Konstantin Laufer

On the Effectiveness of Image Manipulation Detection in the Age of Social Media, Rosaura VidalMata, Priscila Saboia, Daniel Moreira, Grant Jensen, Jason Schlessman, and Walter Scheirer

PDF

U.S. parents' intentions to use anti-bullying apps: Insights from a comprehensive model, Brittany Wheeler, Katie Baumel, Deborah Hall, and Yasin Silva

PDF

U.S. Parents’ Intentions to Use Anti-Bullying Apps: Insights from a Comprehensive Model, Brittany Wheeler, Katie Baumel, Deborah Hall, and Yasin N. Silva

Submissions from 2022

Link

Predicting Phishing Victimization: Roles of Protective and Vulnerable Strategies and Decision-Making Styles, Eric Chan-Tin, Loretta Stalans, Spencer Johnston, Daisy Reyes, and Shelia Kennison

PDF

Bias Mitigation for Toxicity Detection via Sequential Decisions, Lu Cheng, Ahmadreza Mosallanezhad, Yasin N. Silva, Deborah Hall, and Huan Liu

PDF

Towards an Active Foveated Approach to Computer Vision, Dario Dematties, Silvio Rizzi, George K. Thiruvathukal, and Alejandro Javier Wainselboim

PDF

Directed Acyclic Graph-based Neural Networks for Tunable Low-Power Computer Vision, Abhinav Goel, Caleb Tung, Nick Eliopoulos, Xiao Hu, George K. Thiruvathukal, James C. Davis, and Yung-Hisang Lu

Link

Efficient Computer Vision on Edge Devices with Pipeline-Parallel Hierarchical Neural Networks, Abhinav Goel, Caleb Tung, Xiao Hu, George K. Thiruvathukal, James C. Davis, and Yung-Hsiang Lu

PDF

Finding Approximate Pythagorean Triples (and Applications to LEGO Robot Building), Ronald I. Greenberg, Matthew Fahrenbacher, and George K. Thiruvathukal

PDF

Harnessing the Power of Interdisciplinary Research with Psychology-Informed Cyberbullying Detection Models, Deborah Hall, Yasin N. Silva, Brittany Wheeler, Lu Cheng, and Katie Baumel

PDF

A Labeled Dataset for Investigating Cyberbullying Content Patterns in Instagram, Mara Hamlett, Grace Powell, Yasin N. Silva, and Deborah Hall

Link

SoftwareSystemsLaboratory/ssl-metrics, Matt Hyatt, Amy Kuhl, Jake Palmer, Rohan Sethi, Ethan Stoneman, Nicholas Synovic, Sohini Thota, and George K. Thiruvathukal

Link

SoftwareSystemsLaboratory/ssl-metrics-git-bus-factor, Matt Hyatt, Nicholas Synovic, and George K. Thiruvathukal

Link

SoftwareSystemsLaboratory/ssl-metrics-git-productivity, Matt Hyatt, Nicholas Synovic, and George K. Thiruvathukal

PDF

College teaching and AI, Leo Irakliotis

PDF

An Empirical Study of Artifacts and Security Risks in the Pre-trained Model Supply Chain, Wenxin Jiang, Nicholas Synovic, Rohan Sethi, Aryan Indarapu, Matt Hyattt, Taylor R. Schorlemmer, George K. Thiruvathukal, and James C. Davis

PDF

UnoAPI: Balancing Performance, Portability, and Productivity (P3) in HPC Education, Konstantin Laufer and George K. Thiruvathukal

PDF

AEROKEY: Using Ambient Electromagnetic Radiation for Secure and Usable Wireless Device Authentication, Kyuin Lee, Yucheng Yang, Omkar Prabhune, Aishwarya Lekshmi Chithra, Jack West, Kassem Fawaz, Neil Klingensmith, Uman Banerjee, and Younghyun Kim

PDF

Forensic Analysis of Synthetically Generated Western Blot Images, Sara Mandelli, Davide Cozzolino, Edoardo D. Cannas, João Phillipe Cardenuto, Daniel Moreira, Paolo Bestagini, Walter Scheirer, Anderson Rocha, Luisa Verdoliva, Stefano Tubaro, and Edward J. Delp

PDF

Chicago Alliance For Equity in Computer Science, Steven McGee, Lucia Dettori, Ronald I. Greenberg, Andrew M. Rasmussen, Dale F. Reed, and Don Yanek

PDF

Phishing for Fun, Madeline Moran, Anna Hart, Loretta Stalans, Eric Chan-Tin, and Shelia Kennison

PDF

SILA: A System for Scientific Image Analysis, Daniel Moreira, João Phillipe Cardenuto, Ruiting Shao, Sriram Baireddy, Davide Cozzolino, Diego Gragnaniello, Wael Abd-Almageed, Paolo Bestagini, Stefano Tubaro, Anderson Rocha, Walter Scheirer, Luisa Verdoliva, and Edward Delp

PDF

Image Provenance Analysis, Daniel Moreira, William Theisen, Walter Scheirer, Aparna Bharati, Joel Brogan, and Anderson Rocha

PDF

Storing Data Once in M-trees and PM-trees: Revisiting the Building Principles of Metric Access Methods, Humberto Razente, Maria Camila N. Barioni, and Yasin N. Silva

PDF

Using Magic to Teach Computer Programming, Dale F. Reed and Ronald I. Greenberg

PDF

DBSnap 2: New Features to Construct Database Queries by Snapping Blocks, Yasin N. Silva, Alexis Loza, and Humberto Razente

PDF

DBSnap-Eval: Identifying Database Query Construction Patterns, Yasin N. Silva, Alexis Loza, and Humberto Razente

PDF

Low-Power Computer Vision: Improve the Efficiency of Artificial Intelligence, George K. Thiruvathukal, Yung-Hisang Lu, Jaeyoun Kim, Yiran Chen, and Bo Chen

Link

Efficient Computer Vision for Embedded Systems, George K. Thiruvathukal and Yung-Hsiang Lu

PDF

Irrelevant Pixels are Everywhere: Find and Exclude Them for More Efficient Computer Vision, Caleb Tung, Abhinav Goel, Xiao Hu, Nick Eliopoulos, Emmanuel Amobi, George K. Thiruvathukal, Vipin Chaudhary, and Yung-Hisang Lu

PDF

Establishing Trust in Vehicle-to-Vehicle Coordination: A Sensor Fusion Approach, Jakob Veselsky, Jack West, Isaac Ahlgren, George K. Thiruvathukal, Neil Klingensmith, Abhinav Goel, Wenxin Jiang, James C. Davis, Kyuin Lee, and Younghyun Kim

PDF

Establishing Trust in Vehicle-to-Vehicle Coordination: A Sensor Fusion Approach, Jakob Veselsky, Jack West, Isaac Ahlgren, George K. Thiruvathukal, Neil Klingensmith, Abhinav Goel, Wenxin Jiang, James C. Davis, Kyuin Lee, and Younghyun Kim

PDF

Comparing Online Surveys for Cybersecurity: SONA and Mturk, Anne Wagner, Anna Bakas, Shelia Kennison, and Eric Chan-Tin

Link

The Personalities of Social Media Posts and Photos, Anne Wagner, Anna Bakas, Daisy Reyes, Shelia Kennison, and Eric Chan-Tin

PDF

Are You Really Muted?: A Privacy Analysis of Mute Buttons in Video Conferencing Apps, Yucheng Yang, Jack West, George K. Thiruvathukal, Neil Klingensmith, and Kassem Fawaz

Submissions from 2021

Link

AdvEdge: Optimizing Adversarial Perturbations against Interpretable Deep Learning, Eldor Abdukhamidov, Mohammed Abuhamad, Firuz Juraev, Eric Chan-Tin, and Tamer Abuhmed

PDF

Impact of Personality Types and Matching Messaging on Password Strength, Anna Bakas, Anne Wagner, Spencer Johnston, Shelia Kennison, and Eric Chan-Tin

Link

An Experience Report on Machine Learning Reproducibility: Guidance for Practitioners and TensorFlow Model Garden Contributors, Vishnu Banna, Akhil Chinnakotla, Zhengxin Yan, Anirudh Vegesana, Naveen Vivek, Kruthi Krishnappa, Wenxin Jiang, Yung-Hisang Lu, George Thiruvathukal, and James C. Davis

PDF

Automated Discovery of Network Cameras in Heterogeneous Web Pages, Ryan Dailey, Aniesh Chawla, Andrew Liu, Sripath Mishra, Ling Zhang, Josh Majors, Yung-Hisang Lu, and George K. Thiruvathukal

PDF

Research-Practice Partnership Strategies to Conduct and Use Research to Inform Practice, Erin Henrick, Steven McGee, Lucia Dettori, Troy Williams, Andrew M. Rasmussen, Don Yanek, Ronald I. Greenberg, and Dale Reed