A collection of published articles from members of the Department of Computer Science at Kennesaw State University.

Visit the full list of Faculty Publications to view the work from other departments on campus.

KSU Faculty can send a current list of their publications to the administrator for inclusion in this series.

Follow


Abstracts/Papers from 2020

PDF

Incentivizing Better Writing: The Fatal Flaw Policy, Kirsten Passyn and Michael Weeks

Collaborative Online Learning for Information Security: A SunTrust Project Summary, Xin Tian and Zhigang Li

Submissions from 2018

PDF

A Course Project Designed to Aid Students’ Understanding of the Structure of Advertisements: An Application of the Who Says What to Whom over What Channel with What Effect Model, Paul J. Costanzo

Link

Using a Contrast Illusion to Teach Principles of Neural Processing, Ebony M. Glover

Acknowledging Doctoral Students’ Reading Experiences, Rosemary Green

Link

A Multi-objective hybrid filter-wrapper evolutionary approach for feature selection, Marwa Hammami, Slim Bechikh, Chih-Cheng Hung, and Lamjed Ben Said

PDF

PASNet: Pathway-associated Sparse Deepneural Network for Prognosis Prediction From High-throughput Data, Jie Hao, Youngsoon Kim, Tae-Kyung Kim, and Mingon Kang

An Image-guided Endoscope System for the Ureter Detection, Enmin Song, Feng Yu, Yunlong Li, and Chih-Cheng Hung

PDF

Effects of Class Size on Selected Program Outcomes for a First-Year Seminar, David L. Strickland Jr.

PDF

Student Misconceptions about Cybersecurity Concepts: Analysis of Think-Aloud Interviews, Julia D. Thompson, Geoffrey L. Herman, Travis Scheponik, Linda Oliva, Alan Sherman, Ennis Golaszewski, Dhananjay Phatak, and Kostantinos Patsourakos

Preparing Humanities PhDs for Academic and Professional Success, Chella Vaidyanathan, Erica Bruchko, Scott Libson, and Louis Fagnan

PDF

Study of Physical Layer Security and Teaching Methods in Wireless Communications, Zhijian Xie and Christopher Horne

Link

Automatic brain tissue segmentation in MR images using hybrid atlas forest based on confidence‐weighted probability matrix, Lijun Xu, Hong Liu, Enmin Song, and Chih-Cheng Hung

An Augmented Reality Endoscope System for Ureter Position Detection, Feng Yu, Enmin Song, Hong Liu, and Chih-Cheng Hung

Submissions from 2016

Link

Blocking Negative Influential Node Set in Social Networks: From Host Perspective, Harneet Kaur and Jing (Selena) He

PDF

Integrative Approach for Inference of Gene Regulatory Networks using Lasso-Based Random Featuring and Application to Psychiatric Disorders, Dongchul Kim, Mingon Kang, Ashis Biswas, and Chunyu Liu

Link

A New Comprehensive RSU Installation Strategy for Cost-Efficient VANET Deployment, Donghyun Kim, Yesenia Velasco, Wei Wang, and R. Uma

Link

Maximum Lifetime Combined Barrier-coverage of Weak Static Sensors and Strong Mobile Sensors, Donghyun Kim, Wei Wang, Junggab Son, and Wonjun Lee

Link

On Cost-Aware Biased Respondent Group Selection for Minority Opinion Survey, Wonjun Lee, Wei Wang, Donghyun Kim, and Matthew Tetteh

Link

Contour Propagation Using Non-Uniform Cubic B-Splines for Lung Tumor Delineation in 4D-CT, Yongchuan Liu, Renchao Jin, Mi Chen, and Chih-Cheng Hung

Link

Cascade Classification with Adaptive Feature Extraction for Arrhythmia Detection, Juyoung Park, Mingon Kang, Jean Gao, and Younghoon Kim

Link

A Novel Endoscope system for Position Detection and Depth Estimation of the Ureter, Enmin Song, Feng Yu, Hong Liu, and Chih-Cheng Hung

Link

Security in Fog Computing through Encryption, Akhilesh Vishwanath, Ramya Peruri, and Jing (Selena) He

Link

A New Constant Factor Approximation to Construct Highly Fault-Tolerant Connected Dominating Set in Unit Disk Graph, Wei Wang, Bei Liu, Donghyun Kim, and Deying Li

PDF

Can Library Research Be Fun? Using Games for Information Literacy Instruction in Higher Education, Jennifer Young

Submissions from 2015

PDF

A Comparative Study of Email Forensic Tools, Vamshee Krishna Devendran, Hossain Shahriar, and Victor Clincy

PDF

Advanced Techniques for Computational and Information Sciences, William Guo, Chih-Cheng Hung, Paul Scheunders, and Bor-Chen Kuo

Link

Constructing Load-Balanced Virtual Backbones in Probabilistic Wireless Sensor Networks Via Multi-Objective Genetic Algorithm, Jing (Selena) He, Shouling Ji, Raheem Beyah, and Ying Xie

Link

Myocardial Motion Estimation of Tagged Cardiac Magnetic Resonance Images Using Tag Motion Constraints and Multi-level B-splines Interpolation, Hong Liu, Meng Yan, Enmin Song, Jie Wang, Qian Wang, and Chih-Cheng Hung

Link

Automating Trade-Off Analysis of Security Requirements, Liliana Pasquale, Paola Spoletini, Mazeiar Salehie, and Luca Cavallaro

PDF

Mobile Phishing Attacks and Mitigation Techniques, Hossain Shahriar, Tulin Klintic, and Victor Clincy

Submissions from 2014

Link

Greedy Construction of Load-Balanced Virtual Backbones in Wireless Sensor Networks, Jing (Selena) He, Shouling Ji, and Yingshu Li

Link

A Genetic Algorithm with Immigrants Schemes for Constructing a σ-Reliable MCDS in Probabilistic Wireless Networks, Jing (Selena) He, Shouling Ji, Yi Pan, and Zhipeng Cai

PDF

Hardware Components in Cybersecurity Education, Dan Chia-Tien Lo, Max North, and Sarah North

PDF

DRIP - Data Rich, Information Poor: A Concise Synopsis of Data Mining, Muhammad Obeidat, Max North, Lloyd Burgess, and Sarah North

Link

Classification of Clickjacking Attacks and Detection Techniques, Hossain Shahriar and Vamshee Krishna Devendran

Link

Information Theoretic XSS Attack Detection in Web Applications, Hossain Shahriar, Sarah North, Wei-Chuen Chen, and Edward Mawangi

Link

Server-Side Code Injection Attack Detection Based on Kullback-Leibler Distance, Hossain Shahriar, Sarah M. North, Yoonji Lee, and Roger Hu

PDF

Effective Detection of Vulnerable and Malicious Browser Extensions, Hossain Shahriar, Komminist Weldemariam, Mohammad Zulkernine, and Thibaud Lutellier

Link

Multi-Regional Query Scheduling in Wireless Sensor Networks with Minimum Latency, Minggyuan Yan, Jing (Selena) He, Shouling Ji, and Yingshu Li

Link

OpenFlow Security Threat Detection and Defense Services, Wanqing You, Kai Qian, Xi He, and Ying Qian

Link

Hierarchical Queue-Based Task Scheduling, Wanqing You, Kai Qian, and Ying Qian

PDF

Developing Health Information Technology (HIT) Programs and HIT Curriculum: The Southern Polytechnic State University Experience, Chi Zhang, Han Reichgelt, Rebecca H. Rutherfoord, and Andy Ju An Wang

Link

Assessment Metrics, Challenges, and Strategies for Mobile Health Apps, Chi Zhang, Xihui Zhang, and Richard Halstead-Nussloch

Submissions from 2013

Link

Qualitative Evaluation of Latency and Packet Loss in a Cloud-based Games, Victor Clincy and Brandon Wilgor

Link

Constructing Load-Balanced Data Aggregation Trees in Probabilistic Wireless Sensor Networks, Jing He, Shouling Ji, Yi Pan, and Yingshu Li

Link

Approximation Algorithms for Load-Balanced Virtual Backbone Construction in Wireless Sensor Networks, Jing Selena He, Shouling Ji, Yi Pan, and Zhipeng Cai

Link

Constructing Data Aggregation and Capacity in Probabilistic Wireless Sensor Networks, Shouling Ji, Jing (Selena) He, Yi Pan, and Yingshu Li

Link

Continuous Data Aggregation and Capacity in Probabilistic Wireless Sensor Networks, Shouling Ji, Jing Selena He, Yi Pan, and Yingshu Li

Link

Cell-Based Snapshot and Continuous Data Collection in Wireless Sensor Networks, Shouling Ji, Jing (Selena) He, A. Selcuk Uluagac, and Raheem Beyah

Link

Scalable Matrix Decompositions with Multiple Cores on FPGAs, Yi-Gang Tai, Dan Chia-Tien Lo, and Kleanthis Psarris

Link

Energy-Efficient Task Scheduling Algorithms on Heterogenous Computers with Continuous and Discrete Speeds, Luna Mingyi Zhang, Keqin Li, Dan Chia-Tien Lo, and Yanqing Zhang

Submissions from 2012

PDF

Area Query Processing Based on Gray Code in Wireless Sensor Networks, Chunyu Ai, Yueming Duan, Mingyuan Yan, and Jing He

Link

Load-Balanced CDS Construction in Wireless Sensor Networks Via Genetic Algorithm, Jing (Selena) He, Shouling Ji, Mingyuan Yan, and Yi Pan

PDF

Hypotheses Generation as Supervised Link Discovery with Automated Class Labeling on Large-scale Biomedical Concept Networks, Jayasimha R. Katukuri, Ying Xie, Vijay Raghavan, and Ashish Gupta

Link

Android-Based Hands-on Labware for Computing Education, Kai Qian, Dan Lo, Yi Pan, and Yanqing Zhang

Link

Accelerating Matrix Operations with Improved Deeply Pipelined Vector Reduction, Yi-Gang Tai, Dan Chia-Tien Lo, and Kleanthis Psarris