Publication

(REU Student authors are listed in Bold.)

2018

  • Gal Egozi and R. Verma: "Phishing Email Detection Using Robust NLP Techniques," 2018 IEEE International Conference on Data Mining Workshops (ICDMW), Singapore, Singapore, 2018, pp. 7-12. Publisher | PDF
  • Thalia Vazquez and Ioannis Kakadiaris: "Geolocation and Face Liveness Spoofing with a Mobile Application," 30th Great Minds in STEM (GMiS) HENAAC Conference Poster Competition, Pasadena, CA, October 2018.

2016

  • E. L. Leiss and Gerard Vanloo: "Efficient Parallel Strategies for Hanoi Games," 48th Southeastern International Conference on Combinatorics, Graph Theory, and Computing, 2017. Publisher | PDF

2015

  • Priscilla Lee, M. Awad, and E. Leiss: "A Practical, Almost Zero-knowledge Watermark Verification Algorithm," International Journal of Engineering and Technology, Volume 8, Issue 1, 1 February 2016, Pages 9-16. Publisher | PDF
  • E. L. Leiss and I. Mackey: "Parallel Moves in Hanoi Games on Graphs: Every Parallel Hanoi Graph is a Sequential Hanoi Graph", Presented at 47th Southeastern International Conference on Combinatorics, Graph Theory, and Computing, Boca Raton, Florida, March 2016. Publisher | PDF

2014

  • Z. Gao, Nicholas DeSalvo, P. Khoa, S. Kim, L. Xu, W. Ro, R. Verma, W. Shi: "Integrity Protection for Big Data Processing with Dynamic Redundancy Computation" IEEE International Conference on Autonomic Computing (ICAC), 2015: pp. 159 - 160. Publisher | PDF
  • T. Feng, X. Zhao, Nicholas DeSalvo, T. Liu, Z. Gao, X. Wang and W. Shi: "Security after login: Identity change detection on smartphones using sensor fusion," IEEE International Symposium on Technologies for Homeland Security (HST), 2015: pp.1 - 6. Publisher | PDF
  • T. Feng, X. Zhao, Nicholas DeSalvo, T. Liu, Z. Gao, X. Wang and W. Shi: "An investigation on touch biometrics: Behavioral factors on screen size, physical context and application context," IEEE International Symposium on Technologies for Homeland Security (HST), 2015: pp.1 - 6. Publisher | PDF
  • T. Feng, Z. Gao, D. Boumber, T. Liu,Nicholas DeSalvo, X. Zhao and W. Shi: "USR: Enabling identity awareness and usable app access control during hand-free mobile interactions," 6th International Conference on Mobile Computing, Applications and Services (MobiCASE), 2014: pp.225 - 234. Publisher | PDF
  • T. Feng, Nicholas DeSalvo, L. Xu, X. Zhao, X. Wang and W. Shi: "Secure Session on Mobile: An Exploration on
    Combining Biometric, TrustZone, and User Behavior,"6th International Conference on Mobile Computing, Applications and Services (MobiCASE), 2014: pp.206 - 215. Publisher | PDF
  • X. Wang, Nicholas DeSalvo, X. Zhao, T. Feng, K. Loveland, O. Gnawali1, W. Shi: "Eye Contact Reminder System for People with Autism," 6th International Conference on Mobile Computing, Applications and Services (MobiCASE), 2014: pp.160 - 163. Publisher | PDF
  • L. Xu, W. Shi, Nicholas DeSalvo: "Seasoning effect based side channel attacks to AES implementation with phase change memory," Proceedings of the Third Workshop on Hardware and Architectural Support for Security and Privacy (HASP), 2014. Publisher | PDF
  • Alisa Turchaninova, Ashik R. Khatri, I. Uyanik, and I. Pavlidis: "Role Model in Human Physical Activity," Proceedings of the Wireless Health 2015 on National Institutes of Health, Bethesda, Maryland, October 14-16, 2015. Publisher | PDF

2013

  • Kevaughn Gordon, E. Ford, K. John: "Hamiltonian Walks of Phylogenetic Treespaces," IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB), 2013: Volume 10 Issue 4, pp. 1076-1079. Publisher | PDF
  • S. Huang, H. Zhang, Michael Phay: "Detecting Stepping-Stone Intruders by Identifying Crossover Packets in SSH Connections" 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA), Crans-Montana, Switzerland, March 23-25, 2016. Publisher | PDF

2012

  • Teja Shah, Xuqing Wu, J. Chen, Ioannis A. Kakadiaris, Shishir K. Shah, and Fatima A. Merchant:"Semi-automated Segmentation of Branching Patterns from Optical Projection Tomography Images of the Bronchial Tree," Annual Meeting of the Biomedical Engineering Society. Atlanta, GA. October 2012. [Conference]
  • Rakesh Verma and Ekene Sibeudu: "Robust and Effective Feature Selection for Opinion Spam Detection." Poster presented at the 28th Annual Computer Security Applications Conference (ACSAC). Orlando, FL. December 2012. [PDF]

2011

  • Rakesh Verma, Narasimha Shashidhar and Nabil Hossain: "Natural Language Approaches to Phishing Email Detection" Poster presented on Atlantic Student Colloquium on Speech, Language and Learning, October 2012: pp. 824-841. [Conference]
  • Rakesh Verma, Narasimha Shashidhar and Nabil Hossain: "Two-Pronged Phish Snagging,'' with N. Shashidhar and N. Hossain", IEEE Availability, Reliability and Security Symposium (ARES 2012), August 2012: pp. 174-179. [PDF]
  • Rakesh Verma, Narasimha Shashidhar and Nabil Hossain: "Detecting Phishing Emails the Natural Language Way", European Symposium on Research in Computer Security, (ESORICS 2012), September 2012. [PDF]
  • Wei Ding, Khoa Le and Shou-Hsuan Stephen Huang: "Detecting Stepping-Stones under the Influence of Packet Jittering", 9th International Conference on Information Assurance and Security (IAS 2013). Tunisia, December 2013. [Conference]

2010

  • Dvijesh Shastri, Yuichi Fujiki, Ross Buffington, Panagiotis Tsiamyrtzis, and Ioannis Pavlidis: "O job, can you return my mojo? Improving human engagement and enjoyment in routine activities," 2010 ACM Conference on Human Factors in Computing Systems (CHI). Atlanta, GA. 2010: pp. 2491-2498.[PDF]
  • Avinash Wesley, Pradeep Buddharaju, Robert Pienta, Ioannis Pavlidis: "A comparative analysis of thermal and visual modalities for automated facial expression recognition" , Proceedings of the 8th International Symposium on Visual Computing (ISVC 12), Crete, Greece, July 2012: 00. 51-60. [PDF]
  • Ryan Tanner,"Mapping Wikipedia: Constructing a Temporal-Spatial Properties Map from Large Corpora: " NCUR 2012 (National Conference on Undergraduate Research). Weber State University, Ogden, UT. 2012.
  • Walter Garcia, Carlos Ordonez, Kai Zhao and Ping Chen, "Efficient Algorithms based on Relational Queries to Mine Frequent Graphs," PIKM 2010, PhD workshop of ACM CIKM, 2010: pp. 17-23. [PDF]
  • Rajat Khanda, Jonathan Hall, Rong Zheng and Gangbing Song, "An Emulation Framework for Structure Health Monitoring", Earth and Space, 2010.

2009

  • Jose Luis Garcia, Jeff Wilder and Ernst L. Leiss: "Inference Control in Statistical Databases: An Improved Randomization Approach", CLEI 20109 – Conferencia Latinoamerica de Informatica, Oct. 18-22, 2010, Asuncion, Paraguay.
  • Heather Smith: "Graduation Management tool for Undergraduate Students," 83rd Annual Meeting of The Louisiana Academy of Sciences. Hammond, LA. March 2009. [Conference]
  • Heather Smith and Yenumula B. Reddy: "Node Clustering in Wireless Sensor Networks," 84th Annual Meeting of The Louisiana Academy of Sciences. Alexandria, LA. February 2010. [Conference]
  • Yenumula B. Reddy, Heather Smith, and Michael Terrell: "Congestion Game Models for Capacity and Bandwidth Relation in Dynamic Spectrum Access," ITNG Conference (International Conference on Information Technology: New Generations). Las Vegas, NA. 2010: pp.897-902. [PDF]
  • Brett A. Sims, Heather Smith and Tariq Scott: "Computational Results of an Ion Flux Model," JAGR (Journal of Applied Global Research). 2008, (1)3: pp. 27-33. [PDF]
  • Yenumula B. Reddy and Heather Smith: "Congestion Game Model for Efficient Utilization of Spectrum," SPIE 2010, 7707-9(1): pp. 1-12. [PDF]
  • Sam Blackshear and Rakesh Verma: "R-LEAP+: Randomizing LEAP+ Key Distribution to Resist Replay and Jamming Attacks," Association for Computing Machinery: Symposium on Applied Computing (SAC). New York, NY. 2010: pp. 1985-1992. [PDF]
  • Sam Blackshear, Bor-Yuh Evan Chang, Sriram Sankaranarayanan, and Manu Sridharan: "The Flow-Insensitive Precision of Andersen's Analysis in Practice," SAS 2011 (International Static Analysis Symposium). Venice, Italy. 2011. [PDF]
  • Ping Chen, Araly Barrera, and Chris Rhodes: "Semantic Analysis of Free Text and its Application on Automatically Assigning ICD-9-CM Codes to Patient Records," The 9th IEEE International Conference on Cognitive Informatics. Beijing, China. 2010. [PDF]
  • Araly Barrera and Rakesh Verma: "Automatic Extractive Single-document Summarization: Beating the Baselines with a New Approach," The Association for Computing Machinery (ACM) Symposium on Applied Computing. 2011: pp. 268-269. [PDF]
  • Araly Barrera and Rakesh Verma: "Combining Syntax and Semantics for Automatic Extractive Single-document Summarization," Computational Linguistics and Intelligent Text Processing: 13th International Conference on Intelligent Text Processing and Computational Linguistics (CICLING. LNCS). New Delhi, India. Springer LNCS 7182, March 2012: pp. 366-377. [PDF]
  • Ying-Wei Kuo, Shou-Hsuan Stephen Huang, and Christopher Hill: "Detect Multi-Hop Stepping-Stone Pairs with Clock Skew," Sixth International Conference on Information Assurance and Security (IAS). Atlanta, GA. IEEE IAS, August 2010: pp.74-79. [PDF]
  • Ying-Wei Kuo, Shou-Hsuan Stephen Huang, Wei Ding, Rebecca Kern and Jianhua Yang: "Using Dynamic Programming Algorithms to Detect Multi-Hop Stepping-Stone Connection Pairs in a Long Chain," International Conference on Advanced Information Networking and Applications (AINA). Perth, Australia. IEEE AINA, April 2010: pp. 198-205. [PDF]
  • Araly Barrera and Rakesh Verma: "A Ranking-based Approach for Information Extraction from Documents" Proc. Text Analysis Conference, November 2010. [PDF]
  • Carlos Colon and and Ernst L. Leiss: "Industrial Affiliates Program Fall Meeting," September 30, 2009.

2008

  • Rakesh Verma, David Kent, and Ping Chen: "Semantic Multi-document Update Summarization Techniques", Proc. Text Analysis Conference, Nov. 2008. [PDF]
  • Rakesh Verma and Bailey Basile: "Modeling and Analysis of LEAP, a Key Management Protocol for Wireless Sensor Networks," Technical Report UH-CS-08-12. Department of Computer Science, University of Houston. 2008. [PDF]
  • Wei Ding, Matthew J. Hausknecht, Shou-Hsuan Stephen Huang, and Zach Riggle: "Detecting Stepping-Stone Intruders with Long Connection Chains," Fifth International Conference on Information Assurance and Security (IAS). Xian, China, IEEE IAS 2, August 2009: pp. 665-669. [PDF]
  • Shou-Hsuan Stephen Huang, Wei Ding, Matthew J. Hausknecht, and Zach Riggle: "Detecting Stepping-Stone Intruders with Long Connection Chains," Journal of Information Assurance and Security 5(5), 2010: pp. 500-507. [PDF]
  • Q. Xu, R. Prithivathi, J. Subhlok, Rong Zheng, and Sara Voss:"Logicalization of communication traces from parallel execution", IEEE International Symposium on Workload Characterization, Austin, TX, 2009. [PDF]
  • Carlos Colon and and Ernst L. Leiss: "Industrial Affiliates Program Fall Meeting," September 30, 2009.

2007

  • Rakesh Verma and Felix Filozov: "Document Map and WN-SUM: A New Framework for Automatic Text Summarization and a First Implementation, Computer Science Dept." University of Houston Technical Report No., UH-CS-10-03, April 2010. [PDF]

2006

  • Alicia F. Guidry, James F. Brinkley, Nicholas R. Anderson, Peter Tarczy-Hornoch: "Concept mapping to develop a framework for characterizing Electronic Data Capture (EDC) Systems,"  AMIA Annu Symp Proc. 2008 Nov 6:960. [PDF]
  • Alicia F. Guidry, M. Lugo, Y. Yang, J. Dickerson: "Improving Interactions with Simulations in the C6 Environment,"  ABRCMS Annu Symp Proc. 2005 Nov. [Conference]
  • Alicia F. Guidry, M.Lugo., Y. Yang, J. Dickerson: " Visualizing Complex Metabolic Interactions Using Three-Dimensional Graph Models," University of Iowa/Iowa State University 5th Annual Joint Bioinformatics Workshop. 2005 Jul. [Conference]
  • Alicia F Guidry, Neil F Abernethy, and Judd L Walson: "Lessons Learned: Meeting the Needs of Clinical Researchers in Rural Kenya," NLM Informatics Training Conference 2010. Denver, CO. June 2010. [PDF]
  • Shou-Hsuan Stephen Huang, Robert Lychev, and Jianhua Yang: "Stepping-Stone Detection via Request-Response Traffic Analysis," 4th International Conference on Autonomic and Trusted Computing, Hong Kong, Springer LNCS 4610, pp. 276-285, July 2007. [PDF]
  • Rakesh Verma, P. Chen and Wei Lu: "A Semantic Free-text Summarization System Using Ontology Knowledge," Proc. Document Understanding Conference (DUC), April 2007. [PDF]
  • Rakesh Verma and Mykyta Fastovets: ''Meta-Searching: Should Search Engine Rankings be Aggregated?'' Technical Report Number UH-CS-10-09. Department of Computer Science, University of Houston. 2010. [PDF]

2005

  • Cheng-Fang Yang, Natasha Simon, and Ernst L. Leiss: "Payload in Time-Variant Watermarks of MPEG Videos: An Empirical Study" South Central Information Security Symposium (SCISS 06), April 22, 2006
  • Laura Castro, Cheng-Fang Yang, Natasha Simon, and Ernst L. Leiss: "Digital Watermarking of MPEG Videos: Empirical Studies and Open Source Tools," CLEI 2007 - Conferencia Latinoamerica de Informatica, Oct. 9 – 12, 2007, San Jose, Costa Rica. [PDF]
  • Ioannis A. Kakadiaris, George Passalis, George Toderici, Yunliang Lu, Nikos Karampatziakis, Najam Murtuza, and Theoharis Theoharis: "Expression-invariant multispectral face recognition: you can smile now!", Proc. SPIE Vol. 6202, 620204, 2006. [PDF]
  • Ioannis A. Kakadiaris, Georgios Passalis, George Toderici, Mohammed N. Murtuza, Yunliang Lu, Nikolaos Karampatziakis, Theoharis Theoharis: "Three-Dimensional Face Recognition in the Presence of Facial Expressions: An Annotated Deformable Model Approach,"IEEE Trans. Pattern Anal. Mach. Intell. 29(4): 640-649, 2007. [PDF]
Acknowledgement: This project is sponsored by NSF under awards NSF-0453498, NSF-0755500, NSF-1062954, NSF-1359199 and NSF-1659755. Special thanks to the following UH offices for providing financial support to the project: Department of Computer Science; College of Natural Sciences and Mathematics; Dean of Graduate and Professional Studies; VP for Research; and the Provost's Office. The University of Houston is an equal opportunity/affirmative action institution. Women and underrepresented minority students are strongly encouraged to apply.