https://cis.temple.edu/~jiewu/research/publications/Publication_files/Privacy-Preserving_Federated_Neural_Architecture_Search_With_Enhanced_Robustness_for_Edge_Computing.pdf
Abstract—With the development of large-scale artificial intelli-gence services, edge devices are becoming essential providers of data and computing power. However, these edge devices are not immune to malicious attacks. Federated learning (FL), while pro-tecting privacy of decentralized data through secure aggregation, struggles to trace adversaries and lacks optimization for hetero-geneity ...
https://sites.temple.edu/pcrs/2023/11/12/how-online-communication-platforms-facilitated-human-trafficking-and-rethinking-the-websites-as-hosts-theory/
By Aamy Kuldip (view PDF version) I. Introduction Human trafficking is a horrific crime that involves stealing one’s freedom for profit. [1] Victims of human trafficking may be tricked or forced into providing commercial sex or illegal labor, and are often left extremely traumatized. [2] Online communication platforms, such as Facebook, Twitter, and Craigslist, enable human trafficking ...
https://cst.temple.edu/sites/cst/files/theses9/yammine.pdf
The representation theory of (associative) algebras provides a useful setting in which to study many aspects of the two most classical flavors of representation theory under a common umbrella: representations of groups and of Lie algebras. However, it turns out that general algebras fail to capture certain features of group representations and the same can be said for representations of Lie ...
https://cis.temple.edu/~yu/research/mobicomPOS06-bo.pdf
ABSTRACT In this work, we present SilentSense, a framework to authenticate users silently and transparently by exploiting the user touch behav-ior biometrics and leveraging the integrated sensors to capture the micro-movement of the device caused by user’s screen-touch ac-tions. By tracking the fine-detailed touch actions of the user, we build a “touch-based biometrics” model of the ...
https://cis.temple.edu/~wu/research/publications/Publication_files/Social-Aware%20DT-Assisted%20Service%20Provisioning%20in%20Serverless%20Edge%20Computing.pdf
Social-Aware DT-Assisted Service Provisioning in Serverless Edge Computing Jing Li†, Jianping Wang†, Weifa Liang†, Jie Wu¶, Quan Chen§, and Zichuan Xu$ † Department of Computer Science, City University of Hong Kong, Hong Kong, P. R. China ¶ Department of Computer and Information Sciences, Temple University, Philadelphia, USA
https://news.temple.edu/news/2022-12-07/how-to-solve-American-gun-epidemic
Experts studying gun violence at Temple University explain how to eradicate the gun violence epidemic.
https://cis.temple.edu/~latecki/Courses/CIS2166-Fall16/StrangMatrixAlg/ila0601.pdf
The determinant test makes the product of the ’s equal to the product of the pivots (assuming no row exchanges). But the sum of the ’s is not the sum of the pivots—as the example showed. The individual ’s have almost nothing to do with the pivots. In this new part of linear algebra, the key equation is really nonlinear: multiplies x.
https://faculty.cst.temple.edu/~yury/LH4lam.pdf
We generalize the classical Legendre-Hadamard conditions by using quadratic extensions of the energy around a set of two configurations and obtain new algebraic necessary conditions for nonsmooth strong local minimizers. The implied bounds of stability are easily accessible as we illustrate on a nontrivial example where quasiconvexification is unknown.
https://sites.temple.edu/sserrano/files/2020/08/1-Propagation-of-Nonlinear-Flood-Waves-in-Rivers.pdf
Sergio E. Serrano1 Abstract: The propagation of flood waves in rivers is governed by the Saint Venant equations. Under certain simplifying assumptions, these nonlinear equations have been solved numerically via computationally intensive, specialized software. There is a cogent need for simple analytical solutions for preliminary analyses. In this paper, new approximate analytical solutions to ...
https://cis.temple.edu/~pwang/Publication/generic.pdf
A new logic is introduced, and applied to the generating, evaluating, using, and revising of generic sentences. This logic is designed for an adaptive system working with insufficient knowledge and resources. It is different from existing logics by using a term-oriented language, an experience-grounded semantics, and a set of syllogistic inference rules. It is argued that generic sentences ...