Skip to main content

Showing 1–6 of 6 results for author: Mathews, J

Searching in archive cs. Search in all archives.
.
  1. Vis-SPLIT: Interactive Hierarchical Modeling for mRNA Expression Classification

    Authors: Braden Roper, James C. Mathews, Saad Nadeem, Ji Hwan Park

    Abstract: We propose an interactive visual analytics tool, Vis-SPLIT, for partitioning a population of individuals into groups with similar gene signatures. Vis-SPLIT allows users to interactively explore a dataset and exploit visual separations to build a classification model for specific cancers. The visualization components reveal gene expression and correlation to assist specific partitioning decisions,… ▽ More

    Submitted 8 September, 2023; originally announced September 2023.

    Comments: To be published in IEEE Visualization and Visual Analytics (VIS), 2023

  2. arXiv:2210.09433  [pdf

    cs.HC cs.CY

    Jo Wilder and the Capitol Case: A taxonomy of uses for a historical inquiry game in 4th grade Classrooms in Wisconsin

    Authors: Peter Wardrip, David Gagnon, James Mathews, Jen Scianna

    Abstract: In this paper, we study the various ways 3rd-5th grade educators in Wisconsin utilized Jo Wilder and the Capitol Case, a historical inquiry game, as part of their classroom instruction. The 15 educators involved in the study were all grade school teachers in Wisconsin who took part in the "Doing History Fellowship" program, a professional development opportunity offered by the authors, designed to… ▽ More

    Submitted 17 October, 2022; originally announced October 2022.

    Comments: Paper presented at Meaningful Play 2022. East Lansing, MI

  3. A Deep Learning Approach to Create DNS Amplification Attacks

    Authors: Jared Mathews, Prosenjit Chatterjee, Shankar Banik, Cory Nance

    Abstract: In recent years, deep learning has shown itself to be an incredibly valuable tool in cybersecurity as it helps network intrusion detection systems to classify attacks and detect new ones. Adversarial learning is the process of utilizing machine learning to generate a perturbed set of inputs to then feed to the neural network to misclassify it. Much of the current work in the field of adversarial l… ▽ More

    Submitted 28 June, 2022; originally announced June 2022.

    Comments: 12 pages, 6 figures, Conference: to 2022 4th International Conference on Management Science and Industrial Engineering (MSIE) (MSIE 2022), DOI: https://doi.org/10.1145/3535782.3535838, accepted to conference above, not yet published

  4. CoAP-DoS: An IoT Network Intrusion Dataset

    Authors: Jared Mathews, Prosenjit Chatterjee, Shankar Banik

    Abstract: The need for secure Internet of Things (IoT) devices is growing as IoT devices are becoming more integrated into vital networks. Many systems rely on these devices to remain available and provide reliable service. Denial of service attacks against IoT devices are a real threat due to the fact these low power devices are very susceptible to denial-of-service attacks. Machine learning enabled networ… ▽ More

    Submitted 28 June, 2022; originally announced June 2022.

    Comments: 6 pages, 8 figures, Publication Title: 2022 6th International Conference on Cryptography, Security and Privacy (CSP), eCF Paper Id: 1641864704381, accepted for publishing, not yet published

  5. arXiv:1710.10836  [pdf, other

    cs.DS

    An algorithmic approach to handle circular trading in commercial taxing system

    Authors: Jithin Mathews, Priya Mehta, S. V. Kasi Visweswara Rao, Ch. Sobhan Babu

    Abstract: Tax manipulation comes in a variety of forms with different motivations and of varying complexities. In this paper, we deal with a specific technique used by tax-evaders known as circular trading. In particular, we define algorithms for the detection and analysis of circular trade. To achieve this, we have modelled the whole system as a directed graph with the actors being vertices and the transac… ▽ More

    Submitted 5 November, 2017; v1 submitted 30 October, 2017; originally announced October 2017.

    Comments: 10 pages, 7 figures, 1 table, 3 algorithms

  6. arXiv:1504.01693  [pdf, other

    cs.CR cs.HC

    Security Toolbox for Detecting Novel and Sophisticated Android Malware

    Authors: Benjamin Holland, Tom Deering, Suresh Kothari, Jon Mathews, Nikhil Ranade

    Abstract: This paper presents a demo of our Security Toolbox to detect novel malware in Android apps. This Toolbox is developed through our recent research project funded by the DARPA Automated Program Analysis for Cybersecurity (APAC) project. The adversarial challenge ("Red") teams in the DARPA APAC program are tasked with designing sophisticated malware to test the bounds of malware detection technology… ▽ More

    Submitted 7 April, 2015; originally announced April 2015.

    Comments: 4 pages, 1 listing, 2 figures