Close Close

Faculty Publications – CSSE Department

Recent Scholarly Publications

Publications from the last three years are presented yearly, in alphabetical order by first author. Names of Monmouth University faculty are in bold font and names of undergraduate co-authors are asterisked.

2020

Khamaiseh S.Y., Alsmadi I., Al-Alaj A., “Deceiving Machine Learning-Based Saturation Attack Detection Systems in SDN,” 2020, 2020 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), DOI: 10.1109/NFV-SDN50289.2020.9289908.

  1. Khamaiseh S., Al-Alaj A., Warner A., “FloodDetector: Detecting Unknown DoS Flooding Attacks in SDN,” 2020, 2020 International Conference on Internet of Things and Intelligent Applications (ITIA), DOI: 10.1109/ITIA50152.2020.9312310.

Khamaiseh S., Serra E., Xu D., “vSwitchGuard: Defending OpenFlow Switches Against Saturation Attacks,” 2020, 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC), 851-860, DOI: 10.1109/COMPSAC48688.2020.0-157.

Hu B.; Wang J., “Deep learning based hand gesture recognition and UAV flight controls,” 2020, International Journal of Automation and Computing, 17-29, DOI: 10.1007/s11633-019-1194-7.

Wang J., Wang J., Liu G., and Zeng Q., “Formal analysis of emergency department staffing based on stochastic timed Petri net models,” 15th IFAC International Workshop on Discrete Event Systems, Brazil, Nov. 2020.

Zheng L., Chen Y., Min H., Hildebrand P.L., Liu H., Halper M., Geller J., Coronado S., Perl Y., “Missing lateral relationships in top-level concepts of an ontology,” 2020, BMC Medical Informatics and Decision Making, 20, 305, DOI: 10.1186/s12911-020-01319-3.

Zheng L., Min H., Chen Y., Keloth V., Geller .J, Perl Y., Hripcsak G., “Outlier concepts auditing methodology for a large family of biomedical ontologies,” 2020, BMC Medical Informatics and Decision Making, 20, 296, DOI: 10.1186/s12911-020-01311-x.

Zheng L., He Z., Wei D., Keloth V., Fan J.W., Lindemann L., Zhu X., Cimino J.J., Perl Y., “A review of auditing techniques for the Unified Medical Language System,” 202, Journal of the American Medical Informatics Association, 27, 1625-1638, DOI: 10.1093/jamia/ocaa108.

Zheng L, Kapusnik-Uner J., “Can MED-RT Summarization Support Missing Adverse Drug Reactions Discovery?” 2020, 2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM), 2161-2166, DOI: 10.1109/BIBM49941.2020.9313523.

2019

Catlett C., Cesario E., Talia D., Vinci A., “Spatio-temporal crime predictions in smart cities: A data-driven approach and experiments,” 2019, Pervasive and Mobile Computing, 53, 62-74, DOI: 10.1016/j.pmcj.2019.01.003

Cesario E., Vinci A., “A comparative analysis of classification and regression models for energy-efficient clouds,” 2019, Proceedings of the 2019 IEEE 16th International Conference on Networking, Sensing and Control, ICNSC 2019, DOI: 10.1109/ICNSC.2019.8743292

Eckert G., Cassidy S., Tian N., Shabana M., “Using Aerial Drone Photography to Construct 3D Models of Real World Objects in an Effort to Decrease Response Time and Repair Costs Following Natural Disasters,” 2019, Proceedings of the 2019 Computer Vision Conference DOI: 10.1007/978-3-030-17795-9_22

Hill R.K., Torres E., “Pinning down variables, and taking an agile approach,” 2019, Communications of the ACM, 62, 8-9, DOI: 10.1145/3358698

Du Y., Zhang T., Wang J., “Discrete spatial data reconstruction based on deep neural network,” 2019, Proceedings of the 2019 IEEE 16th International Conference on Networking, Sensing and Control, ICNSC 2019 403-408, DOI: 10.1109/ICNSC.2019.8743326

Hu B., Wang J., “Deep Learning Based Hand Gesture Recognition and UAV Flight Controls,” 2019, International Journal of Automation and Computing, DOI: 10.1007/s11633-019-1194-7

Wang J., Mohana Reddy G.R., Kamakshi Prasad V., Sivakumar Reddy V., “Preface,” 2019, Advances in Intelligent Systems and Computing, 898, xi-xii

Wang J., Ram Mohana Reddy G., Kamakshi Prasad V., Sivakumar Reddy V., “Preface,” 2019, Advances in Intelligent Systems and Computing, 900, xi-xii

Wang N., Wang J., Chen X., “A trust-based formal model for fault detection in wireless sensor networks,” 2019, Sensors (Switzerland), 19, 1916, DOI: 10.3390/s19081916

Zhang W., Wang J., “Dynamic hand gesture recognition based on 3D convolutional neural network models,” 2019, Proceedings of the 2019 IEEE 16th International Conference on Networking, Sensing and Control, ICNSC 2019, 224-229, DOI: 10.1109/ICNSC.2019.8743159

Zhang X., Song W., Wang J., Xing J., Zhou Q., “Measuring Business Process Consistency Across Different Abstraction Levels,” 2019, IEEE Transactions on Network and Service Management, 16, 294-307, DOI: 10.1109/TNSM.2018.2883362

Zhou J., Wang J., Wang J., “A simulation engine for stochastic timed petri nets and application to emergency healthcare systems,” 2019, IEEE/CAA Journal of Automatica Sinica, 6, 969-980, DOI: 10.1109/JAS.2019.1911576

Yu C., Lu A., Cassidy S., Zhang, W., “Action Time: App to Help Develop Execution Skill,” 2019, 5th IEEE International Conference on Collaboration and Internet Computing

Zhang W., Yan J., Yu C., “Smart Parking System Based on Convolutional Neural Network Models,” 2019, 6th International Conference on Information Science and Control Engineering

Yumak H., Zheng L., Chen L., Halper M., Perl Y., Owen G., “Quality assurance of complex ChEBI concepts based on number of relationship types,” 2019, Applied Ontology, 14, 199-214, DOI: 10.3233/AO-190211

Zheng L., Chen Y., Perl Y., Halper M., Geller J., De Coronado S., “Quality Assurance of Concept Roles in the National Cancer Institute thesaurus,” 2019, Proceedings – 2018 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2018, 2001-2008, DOI: 10.1109/BIBM.2018.8621277

2018

Cesario E. “Big Data Analysis for Smart City Applications,” in Encyclopedia of Big Data Technologies, Sakr S., Zomaya A. (eds). Springer, 2018, DOI:10.1007/978-3-319-63962-8_140-1

Rosca D. “Acquiring professional software engineering skills through studio-based learning,” 2018, 2018 17th International Conference on Information Technology Based Higher Education and Training, ITHET 2018, DOI: 10.1109/ITHET.2018.8424773

Torres E., Saba W., “Commenting on code, considering data’s bottleneck,” 2018, Communications of the ACM, 61, 24-25, DOI: 10.1145/3193752

He Y., Liu G., Yan C., Jiang C., Wang J., “Locating and controlling unsound transitions in workflow systems based on workflow net with data constraints,” 2018, IEEE Access, 62622-62637, DOI: 10.1109/ACCESS.2018.2876904

Hu B., Wang J., “Deep learning based hand gesture recognition and UAV flight controls,” 2018, ICAC 2018 – 2018 24th IEEE International Conference on Automation and Computing: Improving Productivity through Automation and Computing, DOI: 10.23919/iconac.2018.8748953

Wang J., Tian J., Sun R., “Emergency healthcare resource requirement analysis: A stochastic timed Petri net approach,” 2018, ICNSC 2018 – 15th IEEE International Conference on Networking, Sensing and Control, DOI: 10.1109/ICNSC.2018.8361301

Zhang X., Wang J., Xing J., Song W., Yang Q., “Measuring Data-Aware Process Consistency Based on Activity Constraint Graphs,” 2018, IEEE Access, 6, 21005-21019, DOI: 10.1109/ACCESS.2018.2795701

Ginsberg A., Yu C., “Rapid homoglyph prediction and detection,” 2018, Proceedings – 2018 1st International Conference on Data Intelligence and Security, ICDIS 2018, DOI: 10.1109/ICDIS.2018.00010

Yu C., Ginsberg A., “Social Networking Without Sacrificing Privacy,” 2018, 2018 International Conference on System Science and Engineering, ICSSE 2018, DOI: 10.1109/ICSSE.2018.8520188

Zheng L., Liu H., Perl Y., Geller J., Ochs C., Case J.T., “Overlapping Complex Concepts Have More Commission Errors, Especially in Intensive Terminology Auditing,” 2018, AMIA Annual Symposium proceedings. AMIA Symposium, 1157-1166, (access)


For further faculty publications and presentations refer to the Meet Our Faculty and Staff’ Page of the CSSE Department