Search Results - "Cotton, Chase"
-
1
A novel LSTM–CNN–grid search-based deep neural network for sentiment analysis
Published in The Journal of supercomputing (2021)“…As the number of users getting acquainted with the Internet is escalating rapidly, there is more user-generated content on the web. Comprehending hidden…”
Get full text
Journal Article -
2
Interfacial bonding strength of short carbon fiber/acrylonitrile-butadiene-styrene composites fabricated by fused deposition modeling
Published in Composites. Part B, Engineering (15-03-2018)“…This work aims to characterize the interfacial bonding strength between printed wires of acrylonitrile-butadiene-styrene (ABS), carbon nanotube reinforced ABS…”
Get full text
Journal Article -
3
Shape memory behavior and recovery force of 4D printed textile functional composites
Published in Composites science and technology (26-05-2018)“…Four-dimensional (4D) printing of multi-directionally reinforced preforms has tremendous potential for the development of next generation functional composites…”
Get full text
Journal Article -
4
Shape memory behavior and recovery force of 4D printed laminated Miura-origami structures subjected to compressive loading
Published in Composites. Part B, Engineering (15-11-2018)“…Four-dimensionally (4D) printed origami structures have great potential for applications in actuators and reconfigurable devices by taking the advantages of 3D…”
Get full text
Journal Article -
5
Synergistic effect enhanced shape recovery behavior of metal-4D printed shape memory polymer hybrid composites
Published in Composites. Part B, Engineering (15-12-2019)“…The four-dimensional (4D) printing technology enables the convergence of three-dimensional (3D) printing and shape memory polymer (SMP). The aim of this…”
Get full text
Journal Article -
6
Remotely and Sequentially Controlled Actuation of Electroactivated Carbon Nanotube/Shape Memory Polymer Composites
Published in Advanced materials technologies (01-12-2019)“…4D printing technology is known as the combination of 3D printing technology and stimulus‐responsive materials. 4D printed conductive filler/shape memory…”
Get full text
Journal Article -
7
Intelligence in cyberspace: the road to cyber singularity
Published in Journal of experimental & theoretical artificial intelligence (04-07-2021)“…Intelligence has been defined in many ways like logic, awareness, reasoning, critical thinking, etc. Many researchers insist on the possibility of a…”
Get full text
Journal Article -
8
Shining a light on dark places: A comprehensive analysis of open proxy ecosystem
Published in Computer networks (Amsterdam, Netherlands : 1999) (08-05-2022)“…Open proxies provide free relay services and are widely used to anonymously browse the Internet, avoid geographic restrictions, and circumvent censorship. To…”
Get full text
Journal Article -
9
Microstructural design for enhanced shape memory behavior of 4D printed composites based on carbon nanotube/polylactic acid filament
Published in Composites science and technology (08-09-2019)“…Four-dimensional (4D) printing technology, combining 3D printing with stimuli-responsive materials, has attracted extensive attention for smart additive…”
Get full text
Journal Article -
10
Characterization of residual stress and deformation in additively manufactured ABS polymer and composite specimens
Published in Composites science and technology (29-09-2017)“…Residual stresses induced in the layer-by-layer fabrication process of additively manufactured parts have significant impact on their mechanical properties and…”
Get full text
Journal Article -
11
Printing direction dependence of mechanical behavior of additively manufactured 3D preforms and composites
Published in Composite structures (15-01-2018)“…Among the processing parameters of additive manufacturing, printing direction is of critical importance. While studies on effects of printing direction have so…”
Get full text
Journal Article -
12
Detection of Encrypted Malicious Network Traffic using Machine Learning
Published in MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM) (01-11-2019)“…The proliferation of encrypted network traffic necessitates an innovative machine learning traffic analysis approach which does not rely on pattern matching or…”
Get full text
Conference Proceeding -
13
Silent Observers Make a Difference: A Large-scale Analysis of Transparent Proxies on the Internet
Published in IEEE INFOCOM 2024 - IEEE Conference on Computer Communications (20-05-2024)“…Transparent web proxies have been widely deployed on the Internet, bridging the communications between clients and servers and providing desirable benefits to…”
Get full text
Conference Proceeding -
14
DNSonChain: Delegating Privacy-Preserved DNS Resolution to Blockchain
Published in 2021 IEEE 29th International Conference on Network Protocols (ICNP) (01-11-2021)“…Domain Name System (DNS) is known to present privacy concerns. To this end, decentralized blockchains have been used to host DNS records, so that users can…”
Get full text
Conference Proceeding -
15
Time-Print: Authenticating USB Flash Drives with Novel Timing Fingerprints
Published in 2022 IEEE Symposium on Security and Privacy (SP) (01-05-2022)“…Universal Serial Bus (USB) ports are a ubiquitous feature in computer systems and offer a cheap and efficient way to provide power and data connectivity…”
Get full text
Conference Proceeding -
16
A Comprehensive, Longitudinal Study of Government DNS Deployment at Global Scale
Published in 2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (01-06-2022)“…Within the Domain Name System (DNS), government domains form a particularly valuable part of the names-pace, representing trusted sources of information, vital…”
Get full text
Conference Proceeding -
17
Your Remnant Tells Secret: Residual Resolution in DDoS Protection Services
Published in 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (01-06-2018)“…The increasing prevalence of Distributed Denial of Service (DDoS) attacks on the Internet has led to the wide adoption of DDoS Protection Service (DPS), which…”
Get full text
Conference Proceeding -
18
Unveil the Hidden Presence: Characterizing the Backend Interface of Content Delivery Networks
Published in 2019 IEEE 27th International Conference on Network Protocols (ICNP) (01-10-2019)“…Content Delivery Networks (CDNs) are critical to today's Internet ecosystem for delivering rich content to end-users. CDNs augment the Internet infrastructure…”
Get full text
Conference Proceeding -
19
A Comprehensive Measurement-based Investigation of DNS Hijacking
Published in 2021 40th International Symposium on Reliable Distributed Systems (SRDS) (01-09-2021)“…Attacks against the domain name system (DNS) have long plagued the Internet, requiring continual investigation and vigilance to prevent the abuse of this…”
Get full text
Conference Proceeding -
20
Packet-level traffic measurements from the Sprint IP backbone
Published in IEEE network (01-11-2003)“…Network traffic measurements provide essential data for networking research and network management. In this article we describe a passive monitoring system…”
Get full text
Journal Article