https://cis.temple.edu/~jiewu/research/publications/Publication_files/IEEE%20TMC-2025%EF%BC%88Forward_Legal_Anonymous_Group_Pairing-Onion_Routing_for_Mobile_Opportunistic_Networks%EF%BC%89.pdf
a group can potentially act as a relay. To ensure message authenticity, we employ the efficient SM2 signing algorithm to generate signatures for the message source. Furthermore, by incorporating parameters such as the public key validity period and master key validity period into the group pairing-onion routing protocol, we achieve forward security in message delivery. We conduct a thorough ...
https://cis.temple.edu/~ingargio/cis587/readings/id3-c45.html
Introduction ID3 and C4.5 are algorithms introduced by Quinlan for inducing Classification Models, also called Decision Trees, from data.
https://cis.temple.edu/~pwang/NARS-Intro.html
NARS (Non-Axiomatic Reasoning System) is a project aimed at the building of a general-purpose intelligent system, i.e., a "thinking machine" (also known as " AGI "), that follows the same principles as the human mind, and can solve problems in various domains.
https://scholarshare.temple.edu/bitstreams/1c1f1a6d-0f34-4234-8b39-41d9eeb397f0/download
of machine learning (ML) versus a traditional statistical model in predicting dental caries in
https://sites.temple.edu/xifanwu/files/2020/10/PhysRevLett.125.156803.pdf
We report a joint study using surface-specific sum-frequency vibrational spectroscopy and ab initio molecular dynamics simulations, respectively, on a pristine hydrophobic (sub)monolayer hexane-water interface, namely, the hexane/water interface with varied vapor pressures of hexane and different pHs in water.
https://sites.temple.edu/pcrs/2023/11/12/how-online-communication-platforms-facilitated-human-trafficking-and-rethinking-the-websites-as-hosts-theory/
By Aamy Kuldip (view PDF version) I. Introduction Human trafficking is a horrific crime that involves stealing one’s freedom for profit. [1] Victims of human trafficking may be tricked or forced into providing commercial sex or illegal labor, and are often left extremely traumatized. [2] Online communication platforms, such as Facebook, Twitter, and Craigslist, enable human trafficking ...
https://cis.temple.edu/~jiewu/research/publications/Publication_files/Privacy-Preserving_Federated_Neural_Architecture_Search_With_Enhanced_Robustness_for_Edge_Computing.pdf
Abstract—With the development of large-scale artificial intelli-gence services, edge devices are becoming essential providers of data and computing power. However, these edge devices are not immune to malicious attacks. Federated learning (FL), while pro-tecting privacy of decentralized data through secure aggregation, struggles to trace adversaries and lacks optimization for hetero-geneity ...
https://sites.temple.edu/xifanwu/files/2020/10/2017.PRB_.Comparative-first-principles-studies-of-prototypical-ferroelectric-materials-by-LDA-GGA-and-SCAN-meta-GGA.pdf
Comparative first-principles studies of prototypical ferroelectric materials by LDA, GGA, and SCAN meta-GGA Comparative first-principles studies of prototypical ferroelectric materials by LDA, GGA, and SCAN meta-GGA