Recent Scholarly Publications
Publications from the last three years are presented yearly, in alphabetical order by first author. Names of Monmouth University faculty are in bold font and names of undergraduate co-authors are asterisked.
Khamaiseh S.Y., Alsmadi I., Al-Alaj A., “Deceiving Machine Learning-Based Saturation Attack Detection Systems in SDN,” 2020, 2020 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), DOI: 10.1109/NFV-SDN50289.2020.9289908.
- Khamaiseh S., Al-Alaj A., Warner A., “FloodDetector: Detecting Unknown DoS Flooding Attacks in SDN,” 2020, 2020 International Conference on Internet of Things and Intelligent Applications (ITIA), DOI: 10.1109/ITIA50152.2020.9312310.
Khamaiseh S., Serra E., Xu D., “vSwitchGuard: Defending OpenFlow Switches Against Saturation Attacks,” 2020, 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC), 851-860, DOI: 10.1109/COMPSAC48688.2020.0-157.
Hu B.; Wang J., “Deep learning based hand gesture recognition and UAV flight controls,” 2020, International Journal of Automation and Computing, 17-29, DOI: 10.1007/s11633-019-1194-7.
Wang J., Wang J., Liu G., and Zeng Q., “Formal analysis of emergency department staffing based on stochastic timed Petri net models,” 15th IFAC International Workshop on Discrete Event Systems, Brazil, Nov. 2020.
Zheng L., Chen Y., Min H., Hildebrand P.L., Liu H., Halper M., Geller J., Coronado S., Perl Y., “Missing lateral relationships in top-level concepts of an ontology,” 2020, BMC Medical Informatics and Decision Making, 20, 305, DOI: 10.1186/s12911-020-01319-3.
Zheng L., Min H., Chen Y., Keloth V., Geller .J, Perl Y., Hripcsak G., “Outlier concepts auditing methodology for a large family of biomedical ontologies,” 2020, BMC Medical Informatics and Decision Making, 20, 296, DOI: 10.1186/s12911-020-01311-x.
Zheng L., He Z., Wei D., Keloth V., Fan J.W., Lindemann L., Zhu X., Cimino J.J., Perl Y., “A review of auditing techniques for the Unified Medical Language System,” 202, Journal of the American Medical Informatics Association, 27, 1625-1638, DOI: 10.1093/jamia/ocaa108.
Zheng L, Kapusnik-Uner J., “Can MED-RT Summarization Support Missing Adverse Drug Reactions Discovery?” 2020, 2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM), 2161-2166, DOI: 10.1109/BIBM49941.2020.9313523.
Catlett C., Cesario E., Talia D., Vinci A., “Spatio-temporal crime predictions in smart cities: A data-driven approach and experiments,” 2019, Pervasive and Mobile Computing, 53, 62-74, DOI: 10.1016/j.pmcj.2019.01.003
Cesario E., Vinci A., “A comparative analysis of classification and regression models for energy-efficient clouds,” 2019, Proceedings of the 2019 IEEE 16th International Conference on Networking, Sensing and Control, ICNSC 2019, DOI: 10.1109/ICNSC.2019.8743292
Eckert G., Cassidy S., Tian N., Shabana M., “Using Aerial Drone Photography to Construct 3D Models of Real World Objects in an Effort to Decrease Response Time and Repair Costs Following Natural Disasters,” 2019, Proceedings of the 2019 Computer Vision Conference DOI: 10.1007/978-3-030-17795-9_22
Hill R.K., Torres E., “Pinning down variables, and taking an agile approach,” 2019, Communications of the ACM, 62, 8-9, DOI: 10.1145/3358698
Du Y., Zhang T., Wang J., “Discrete spatial data reconstruction based on deep neural network,” 2019, Proceedings of the 2019 IEEE 16th International Conference on Networking, Sensing and Control, ICNSC 2019 403-408, DOI: 10.1109/ICNSC.2019.8743326
Hu B., Wang J., “Deep Learning Based Hand Gesture Recognition and UAV Flight Controls,” 2019, International Journal of Automation and Computing, DOI: 10.1007/s11633-019-1194-7
Wang J., Mohana Reddy G.R., Kamakshi Prasad V., Sivakumar Reddy V., “Preface,” 2019, Advances in Intelligent Systems and Computing, 898, xi-xii
Wang J., Ram Mohana Reddy G., Kamakshi Prasad V., Sivakumar Reddy V., “Preface,” 2019, Advances in Intelligent Systems and Computing, 900, xi-xii
Wang N., Wang J., Chen X., “A trust-based formal model for fault detection in wireless sensor networks,” 2019, Sensors (Switzerland), 19, 1916, DOI: 10.3390/s19081916
Zhang W., Wang J., “Dynamic hand gesture recognition based on 3D convolutional neural network models,” 2019, Proceedings of the 2019 IEEE 16th International Conference on Networking, Sensing and Control, ICNSC 2019, 224-229, DOI: 10.1109/ICNSC.2019.8743159
Zhang X., Song W., Wang J., Xing J., Zhou Q., “Measuring Business Process Consistency Across Different Abstraction Levels,” 2019, IEEE Transactions on Network and Service Management, 16, 294-307, DOI: 10.1109/TNSM.2018.2883362
Zhou J., Wang J., Wang J., “A simulation engine for stochastic timed petri nets and application to emergency healthcare systems,” 2019, IEEE/CAA Journal of Automatica Sinica, 6, 969-980, DOI: 10.1109/JAS.2019.1911576
Yu C., Lu A., Cassidy S., Zhang, W., “Action Time: App to Help Develop Execution Skill,” 2019, 5th IEEE International Conference on Collaboration and Internet Computing
Zhang W., Yan J., Yu C., “Smart Parking System Based on Convolutional Neural Network Models,” 2019, 6th International Conference on Information Science and Control Engineering
Yumak H., Zheng L., Chen L., Halper M., Perl Y., Owen G., “Quality assurance of complex ChEBI concepts based on number of relationship types,” 2019, Applied Ontology, 14, 199-214, DOI: 10.3233/AO-190211
Zheng L., Chen Y., Perl Y., Halper M., Geller J., De Coronado S., “Quality Assurance of Concept Roles in the National Cancer Institute thesaurus,” 2019, Proceedings – 2018 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2018, 2001-2008, DOI: 10.1109/BIBM.2018.8621277
Cesario E. “Big Data Analysis for Smart City Applications,” in Encyclopedia of Big Data Technologies, Sakr S., Zomaya A. (eds). Springer, 2018, DOI:10.1007/978-3-319-63962-8_140-1
Rosca D. “Acquiring professional software engineering skills through studio-based learning,” 2018, 2018 17th International Conference on Information Technology Based Higher Education and Training, ITHET 2018, DOI: 10.1109/ITHET.2018.8424773
Torres E., Saba W., “Commenting on code, considering data’s bottleneck,” 2018, Communications of the ACM, 61, 24-25, DOI: 10.1145/3193752
He Y., Liu G., Yan C., Jiang C., Wang J., “Locating and controlling unsound transitions in workflow systems based on workflow net with data constraints,” 2018, IEEE Access, 62622-62637, DOI: 10.1109/ACCESS.2018.2876904
Hu B., Wang J., “Deep learning based hand gesture recognition and UAV flight controls,” 2018, ICAC 2018 – 2018 24th IEEE International Conference on Automation and Computing: Improving Productivity through Automation and Computing, DOI: 10.23919/iconac.2018.8748953
Wang J., Tian J., Sun R., “Emergency healthcare resource requirement analysis: A stochastic timed Petri net approach,” 2018, ICNSC 2018 – 15th IEEE International Conference on Networking, Sensing and Control, DOI: 10.1109/ICNSC.2018.8361301
Zhang X., Wang J., Xing J., Song W., Yang Q., “Measuring Data-Aware Process Consistency Based on Activity Constraint Graphs,” 2018, IEEE Access, 6, 21005-21019, DOI: 10.1109/ACCESS.2018.2795701
Ginsberg A., Yu C., “Rapid homoglyph prediction and detection,” 2018, Proceedings – 2018 1st International Conference on Data Intelligence and Security, ICDIS 2018, DOI: 10.1109/ICDIS.2018.00010
Yu C., Ginsberg A., “Social Networking Without Sacrificing Privacy,” 2018, 2018 International Conference on System Science and Engineering, ICSSE 2018, DOI: 10.1109/ICSSE.2018.8520188
Zheng L., Liu H., Perl Y., Geller J., Ochs C., Case J.T., “Overlapping Complex Concepts Have More Commission Errors, Especially in Intensive Terminology Auditing,” 2018, AMIA Annual Symposium proceedings. AMIA Symposium, 1157-1166, (access)
For further faculty publications and presentations refer to the Meet Our Faculty and Staff’ Page of the CSSE Department