https://cis.temple.edu/~jiewu/research/publications/Publication_files/Paper%207432%20Camera%20Ready%20Version.pdf
Abstract Model inversion and adversarial attacks in se-mantic communication pose risks, such as con-tent leaks, alterations, and prediction inaccuracies, which threaten security and reliability. This pa-per introduces, from an attacker’s viewpoint, a novel framework called RepObE (Representation Learning-Enhanced Obfuscation Encryption Mod-ular Semantic Task Framework) to secure semantic ...
https://sites.temple.edu/vahid/2022/03/05/hackerrank-solutions-tree-huffman-decoding/
Problem Huffman coding assigns variable length codewords to fixed length input characters based on their frequencies. More frequent characters are assigned shorter codewords and less frequent characters are assigned longer codewords. All edges along the path to a character contain a code digit. If they are on the left side of the tree, they will be a 0 (zero). If on the right, they’ll be a 1 ...
https://sites.temple.edu/borguet/files/2025/01/structure-of-water-2014.pdf
ABSTRACT: The properties of water molecules located close to an interface deviate significantly from those observed in the homogeneous bulk liquid. The length scale over which this structural perturbation persists (the so-called interfacial depth) is the object of extensive investigations. The situation is particularly complicated in the presence of surface charges that can induce long-range ...
https://cis.temple.edu/~jiewu/research/publications/Publication_files/jiang_www_2020.pdf
ABSTRACT Serendipity recommendation has attracted more and more atten-tion in recent years; it is committed to providing recommendations which could not only cater to users’ demands but also broaden their horizons. However, existing approaches usually measure user-item relevance with a scalar instead of a vector, ignoring user preference direction, which increases the risk of unrelated ...
https://cphapps.temple.edu/wiki/it/student/bootcamp
Windows 10 is available for free to all Temple University students. In order for Mac users (with the exception of the M1 Mac) to run Windows 10 on their computers, they must run a program called Boot Camp, which is also free to Temple students, or a similar program. Windows 10 is available via the OnTheHub website. Before beginning this installation, it is highly recommended that you make a ...
https://www.fox.temple.edu/sites/fox/files/social-media-isr.pdf
Companies have increasingly advocated social media technologies to transform businesses and improve orga- nizational performance. This study scrutinizes the predictive relationships between social media and firm equity value, the relative effects of social media metrics compared with conventional online behavioral metrics, and the dynamics of these relationships. The results derived from ...
https://hope.temple.edu/sites/hope/files/media/document/SOH_Implementation.pdf
INTRODUCTION An estimated 1 in 2 college students experiences food insecurity while pursuing postsecondary credentials. Food insecurity is associated with compromised academic performance and lower rates of degree attainment. Many organizations around the country are seeking ways to address this problem. For ten years, a nonprofit organization called Swipe Out Hunger has been on a mission ...
https://cis.temple.edu/~apal/nfmi_comnet.pdf
Near Field Magnetic Induction (NFMI) based communication is an emerging technology that promises several advantages over the traditional radio frequency (RF) communication including low energy use, ability to work reliably in a variety of difficult propagation media (e.g., water, non-ferromagnetic metals, underground, tissue media of fresh produce & meats, etc.), and low leakage possibility ...
https://cis.temple.edu/~wu/research/publications/Publication_files/Social-Aware%20DT-Assisted%20Service%20Provisioning%20in%20Serverless%20Edge%20Computing.pdf
Social-Aware DT-Assisted Service Provisioning in Serverless Edge Computing Jing Li†, Jianping Wang†, Weifa Liang†, Jie Wu¶, Quan Chen§, and Zichuan Xu$ † Department of Computer Science, City University of Hong Kong, Hong Kong, P. R. China ¶ Department of Computer and Information Sciences, Temple University, Philadelphia, USA
https://cis.temple.edu/~latecki/Papers/SDM09_Final.pdf
Outlier detection techniques can be categorized into several groups: (1) statistical or distribution-based ap-proaches; (2) geometric-based approaches; (3) pro ̄ling methods; and (4) model-based approaches. In statisti-cal techniques [2, 3], the data points are typically mod-eled using a data distribution, and points are labeled as outliers depending on their relationship with the dis ...