Student Publications

David S. Na, Samuel E. Nathanson, Yung-Jun Yoo, Yinzhi Cao, and Lanier Watkins, “Showcasing the Threat of Scalable Generative AI Disinformation through Social Media Simulation”, In IEEE INFOCOM (Poster/Demo), May 2024.

Casey J. Richards, Nawal Valliani, Benjamin A. Johnson, Nelson K. Wong, Angelo Pennati, Amir K. Saeed, and Dr. Benjamin M. Rodriguez, “Multimodal Data Fusion using Signal/Image Processing Methods for Multi-Class Machine Learning”, Proc. SPIE 12547, Signal Processing, Sensor/Information Fusion, and Target Recognition XXXII, May 3, 2023, spie.org/defense-commercial-sensing/presentation/Multimodal-data-fusion-using-signal-image-processing-methods-for-multi/12547-25?SSO=1

Kasim, Samra. (2023). One True Pairing: Evaluating Effective Language Pairings for Fake News Detection Employing Zero-Shot Cross-Lingual Transfer. In: Patel, K.K., Santosh, K.C., Patel, A., Ghosh, A. (eds) Soft Computing and Its Engineering Applications. icSoftComp 2022. Communications in Computer and Information Science, vol 1788. Springer, Cham. https://doi.org/10.1007/978-3-031-27609-5_2

Ben Cohen, Ashley Hu, Deisy Patino, and Joel Coffman, “A Legal Analysis of Educational Data in the Cloud,” Proceedings of the 15th IEEE / ACM International Conference on Utility and Cloud Computing (UCC ’22), December 2022.

Cindy Gonzales, Benjamin M. Rodriguez, “An empirical study of digital signal filtering to improve Alzheimer’s disease detection,” Proc. SPIE 12227, Applications of Machine Learning 2022, 122270Q (3 October 2022); doi: 10.1117/12.2643563

Samra Kasim, Nawal Valliani, Nelson Ka Ki Wong, Shahin Samadi, Lanier Watkins and Aviel Rubin, “Cybersecurity as a Tic-Tac-Toe Game Using Autonomous Forwards (Attacking) And Backwards (Defending) Penetration Testing in a Cyber Adversarial Artificial Intelligence System” To Appear in IEEE International Conference of Computer Science and Information Technology (ICoSNIKOM), October, 2022.

C. Rouff and L. Watkins. Assured Autonomy Survey.Foundations and Trends® in Privacy and Security, vol. 4, no. 1, pp. 1–116, 2022.

Audrey Long, Daniel Choi, and Joel Coffman, “Using Amazon Managed Blockchain for ePHI: An Analysis of Hyperledger Fabric and Ethereum,” Proceedings of the 2022 IEEE World AI IoT Congress, AIIoT ’22, June 2022

Joel Coffman, Zachary Romano, Jennifer Windsor, and Mathew VanDerPol, “Using a CTF Activity to Teach Cloud and Web Security,” Proceedings of the 55th Hawaii International Conference on Systems Sciences (HICSS-55), January 2022

Andrew J. Newman, William A. Menner, Glenn E. Mitzel, and Mark D. LoPresto, “Winning Tactical Engagements in Contested Environments through C5ISRT Dominance,” JHUAPL Technical Digest, Vol. 36, No. 2 (2022).

Kaho Wan and Joel Coffman, “Game-Theoretic Modeling of DDoS Attacks in Cloud Computing,” Proceedings of the 14th IEEE/ACM International Conference on Utility and Cloud Computing (UCC ‘21), pp. 1–10, December 2021

Zachary Romano, Jennifer Windsor, and Mathew VanDerPol, and Joel Coffman, “Election Security in the Cloud: A CTF Activity to Teach Cloud and Web Security,” Proceedings of the 2021 IEEE Frontiers in Education Conference (FIE ‘21), pp. 1–5, October 2021

Chris Rouff, Lanier Watkins, Roy Sterritt, and Salim Hariri, “SoK: Autonomic Cybersecurity—Securing Future Disruptive Technologies”, To Appear in IEEE International Conference on Cyber Security and Resilience (IEEE-CSR), July 2021.

Anthony Kelly, Marc Anthony Johnson, “Investigating the Statistical Assumptions of Naive Bayes Classifiers,” In Proceedings of the 55th Annual Conference on Information Sciences and Systems, March 24-26, 2021.

Jamal Mahboob and Joel Coffman, “A Kubernetes CI/CD Pipeline with Asylo as a Trusted Execution Environment Abstraction Framework,” In Proceedings of the 11th Annual IEEE Computing and Communication Workshop and Conference (CCWC), January 2021.

Lauren Courtney, Xiang Li, Rongzuo Xu, and Joel Coffman, “Data Science Techniques to Detect Fraudulent Resource Consumption in the Cloud,” In Proceedings of the 11th Annual IEEE Computing and Communication Workshop and Conference (CCWC), January 2021.

Peter Cocoros, Matthew Sobocinski, Kyle Steiger, and Joel Coffman, “Evaluating Techniques for Practical Cloud-based Network Intrusion Detection,” In Proceedings of the 5th IEEE International Conference on Smart Cloud (SmartCloud ’20), November 2020.

Mandira Hegde, Gilles Kepnang, Mashaal Al Mazroei, Jeffrey S. Chavis, and Lanier Watkins, “Identification of Botnet Activity in IoT Network Traffic Using Machine Learning” In Proceedings of  IEEE International Conference on Intelligent Data Science Technologies and Applications (IDSTA), October 2020.

Sanchay Gupta, Robert Miceli, and Joel Coffman, “A Replication Study to Explore Co-Residency of Virtual Machines in the Cloud,” In Proceedings of the 2020 International Conference on Cloud Computing (CLOUD), August 2020.

Sumeet Shah and John Sheppard, “Evaluating Explanations of Convolutional Neural Network Classifications,” In Proceedings of the IEEE International Joint Conference on Neural Networks (IJCNN), July 2020.

Muhammad Ayub, Patrick Knowles, Brandon Phan, and Joel Coffman, “The Cost of a Macaroon,” In Proceedings of the 2020 IEEE Systems Security Symposium (SSS), April 2020.

Adrian Cartagena, Gerald Rimmer, Thomas Van Dalsen, Lanier Watkins, Avi Rubin and William H. Robinson, “Privacy Violating Opensource Intelligence Threat Evaluation Framework: A Security Assessment Framework for Critical Infrastructure Owners” In Proceedings of the 10th Annual IEEE Computing and Communication Workshop and Conference (CCWC), January 2020.

Kelly Brady, Seung Moon, Tuan Nguyen, Joel Coffman, “Docker Container Security in Cloud Computing” In Proceedings of the 10th Annual IEEE Computing and Communication Workshop and Conference (CCWC), January 2020.

Faculty Publications

Letzkus, L., Pulido, J.V., Adeyemo, A. et al. Machine learning approaches to evaluate infants’ general movements in the writhing stage—a pilot study. Sci Rep 14, 4522 (2024).
https://doi.org/10.1038/s41598-024-54297-1

Luis Rivas, Spencer Stevens, Andrew Zitter, Vinayak Khandelwal, Amodini Vardhan, Chinmay Lohani, Chris Rouff, and Lanier Watkins, “Assuring Safe Navigation and Network Operations of Autonomous Ships” To Appear In IEEE Computing and Communication Workshop and Conference (CCWC), January 2024.

Lanier Watkins, Denzel Hamilton, Tyler Young, Sebastian Zanlongo, Louis Whitcomb, Andrew Spielvogel, and Barbara Kobzik-Juul, “The Roles of Autonomy and Assurance In the Future of Unmanned Aircraft System (UAS) in Low-Altitude Airspace Operations” In IEEE the Computer Journal, 2023.

V. Manoj, S. Wenda, N. Sihan, C. Rouff, Lanier Watkins, and A. Rubin, “Explainable Autonomic Cybersecurity For Industrial Control Systems, In IEEE Computing and Communication Workshop and Conference (CCWC), March 2023.

McCulloh, I., Placona, A., Stewart, D., Gause, D., Kiernan, K., Cartwright, L. (Under Review). Improving clinical decision making for organ transplant with AI. In Proceedings, AAAI 2023. Washington, DC: AAAI.

James Schaffter, Aviel Rubin, Lanier Watkins, “A Containerization-Based Backfit Approach for Industrial Control System Resiliency”, In IEEE in Security & Privacy SafeThings Workshop, May 2021.

Hedin Beattie, Lanier Watkins, William H. Robinson, Avi Rubin, and Shari Watkins, “Measuring and Mitigating Bias in AI-Chatbots” In IEEE International Conference on Assured Autonomy, March 2022.

Lanier Watkins, Phillip Cho, John Hurley, and Avi Rubin, “Collaborative Global Impact Cloud Computing Risk Assessment Framework”, In IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), April 2021.

Lanier Watkins, Denzel Hamilton, Kevin Kornegay, and Aviel Rubin, “Triaging Autonomous Drone Faults By Simultaneously Assuring Autonomy and Security” In IEEE Conference on Information Sciences and Systems (CISS), March 2021.

Kent, T.G., Phillips, N.E., McCulloh, I., Pavon-Harr, V., Patsolic, H.G. (2021). Microscopic Markov Chain Approach for Measuring Mobility Driven SARS-CoV-2 Transmission, In Proceedings Complex Networks 2021. Springer.

Lanier Watkins, James Ballard, Kevin Hamilton, Jay Chow, Avi Rubin, William H. Robinson, and Cleon Davis, “Bio-Inspired, Host-based Firewall” In to IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), December 2020.

Lanier Watkins, Kevin D. Fairbanks, Chengyu Li, Mengdi Yang, William H. Robinson, and Aviel Rubin, “A Black Box Approach to Inferring, Characterizing, and Breaking Native Device Tracking Autonomy”, In IEEE Information Technology, Electronics and Mobile Communication Conference (IEMCON), October, 2020.

Lanier Watkins, Shane Sartalamacchia, Richard Bradt, Karan Dhareshwar, Harsimar Bagga, William H. Robinson, Aviel Rubin, “Defending Against Consumer Drone Privacy Attacks: A Blueprint For A Counter Autonomous Drone Tool”, In the Proceedings of Network and Distributed System Security Symposium (NDSS)  Workshop on Decentralized IoT Systems and Security (DISS 2020), (February, 2020).

Lanier Watkins, Yue Yu, Sifan Li, William H. Robinson, and Aviel Rubin, “Using Deep Learning to Identify Security Risks of Personal Mobile Devices in Enterprise Networks”, In IEEE Information Technology, Electronics and Mobile Communication Conference (IEMCON), October, 2020.

Jeffrey Chavis, Aaron Kunz, Lanier Watkins, Anna Buczak, Aviel Rubin, A Capability for Autonomous IoT System Security: Pushing IoT Assurance to the Edge, In IEEE Symposium on Security and Privacy (Oakland) Workshop on Assured Autonomous Systems (WAAS), May, 2020.

Karl Siil, Aviel Rubin, Matthew Elder, Anton Dahbura, Matthew Green, Lanier Watkins, “Mission Assurance for Autonomous Undersea Vehicles”, In IEEE Symposium on Security and Privacy (Oakland) Workshop on Assured Autonomous Systems (WAAS), May, 2020.

Zachary Birnbaum, Matthew Davis, Salman Salman, James Schaffter, Lanier Watkins, Saikiran Yamajala and Shruti Paul, “Cyber Resilient SCADA Systems via Secure State Restoration”, In International Conference on Critical Infrastructure Protection, March 2020.

Jeffery Chavis, Anna Buczak, Lanier Watkins, and Avi Rubin, “Connected Home Automated Security Monitor (CHASM): Protecting IoT Through Application of Machine Learning” In Proceedings of the 10th Annual IEEE Computing and Communication Workshop and Conference (CCWC), January 2020.