https://cis.temple.edu/~jiewu/research/publications/Publications_2025.html
2025 Publications (Jie Wu) Journal Publications W. Jiang, S. Li, X. Li, K. Li, and J. Wu, " Uncovering Recommendation Serendipity with Objective Data-driven Factor Investigation," accepted to appear in ACM Transactions on Information Systems (TOIS). Z. Yao, L. Lin, F. Xia, and J. Wu, " Load Balancing Heterogeneous Multipath Authentication Routing Selection for Endogenous Software-Defined ...
https://bulletin.temple.edu/undergraduate/science-technology/information-science-technology-minor/
Overview Offered by the Department of Computer and Information Sciences, the Minor in Information Science and Technology provides students with a choice of 5 courses that focus on programming, operating systems and database technologies that can be applicable for a technological foundation to complement any major. Students on both Main Campus and Temple University Japan Campus may declare this ...
https://www.temple.edu/academics/degree-programs/cyber-defense-information-assurance-psm-st-cdia-psm
Professional Science Master’s in Cyber Defense and Information Assurance Become an integral part of information protection and security measures with the Professional Science Master’s (PSM) in Cyber Defense and Information Assurance in Temple’s College of Science and Technology (CST). This 30-credit interdisciplinary graduate degree program is designed for aspiring technical ...
https://cis.temple.edu/~yu/wanglab/
About The W ireless and A dvanced N etworking G roup (WANG Lab) in the Department of Computer and Information Sciences at Temple University focuses on research that advances the way that people, devices and applications interact in emerging wireless networking, smart sensing, distributed computing, and artificial intelligence. Wang Lab was established in the University of North Carolina at ...
https://cis.temple.edu/~wangp/5603-AI/Project/2022S/pattersonblaker/Ward_Patterson_Final_Report.pdf
1 Abstract Minecraft has been the focus of much AI research in past years. Most recently, interest has risen in procedural generation of settlements in Minecraft, largely due to a annual competition established in 2018 called the Generative Design in Minecraft Competition. Inspired by this recent research, we aim to develop a set of algorithms that are capable of building a realistic ...
https://cis.temple.edu/~giorgio/cis587/readings/id3-c45.html
Introduction ID3 and C4.5 are algorithms introduced by Quinlan for inducing Classification Models, also called Decision Trees, from data.
https://careers.temple.edu/sites/careers/files/documents/FACULTY_VRIP_Plan_FAQ_2023.pdf
The following FAQs are intended to assist you in deciding whether to participate in the Temple University Voluntary Retirement Incentive Plan for Eligible Tenured Faculty (2023) (the “Plan”).
https://cis.temple.edu/~jiewu/research/publications/Publication_files/Paper%207432%20Camera%20Ready%20Version.pdf
Abstract Model inversion and adversarial attacks in se-mantic communication pose risks, such as con-tent leaks, alterations, and prediction inaccuracies, which threaten security and reliability. This pa-per introduces, from an attacker’s viewpoint, a novel framework called RepObE (Representation Learning-Enhanced Obfuscation Encryption Mod-ular Semantic Task Framework) to secure semantic ...
https://cis.temple.edu/~ingargio/cis587/readings/id3-c45.html
Introduction ID3 and C4.5 are algorithms introduced by Quinlan for inducing Classification Models, also called Decision Trees, from data.
https://scholarshare.temple.edu/server/api/core/bitstreams/d5d8ff3d-a246-44fa-ba1a-7ed48b4e6adf/content
Professor of Law, Temple University, Beasley School of Law. The author thanks Temple University, Beasley School of Law for research support, and Kristen Tiscione, Kirsten Davis, and Kristen Murray for the discussions and feedback that inspired this article. Many thanks also to Megan Albright and Emily Kowey for their able research assistance.