Please use this identifier to cite or link to this collection:


Recent Submissions

  • SMILE: Simulator for Maryland Imitation Learning Environment 

    Huang, Di-Wei; Katz, Garrett E.; Gentili, Rodolphe J.; Reggia, James A. (2016-05-19)
    As robot imitation learning is beginning to replace conventional hand-coded approaches in programming robot behaviors, much work is focusing on learning from the actions of demonstrators. We hypothesize that in many ...
  • I Think They're Trying To Tell Me Something: Advice Sources and Selection for Digital Security 

    Redmiles, Elissa M.; Malone, Amelia; Mazurek, Michelle L. (2015-11-30)
    Users receive a multitude of digital- and physical-security advice every day. Indeed, if we implemented all the security advice we received, we would never leave our houses or use the Internet. Instead, users selectively ...
  • Cybersecurity - What's Language got to do with it? 

    Klavans, Judith L. (2015-09-18)
    A new opportunity to explore and leverage the power of computational linguistic methods and analysis in ensuring effective Cybersecurity is presented. This White Paper discusses some of the specific emerging research ...
  • Democratizing Facial Recognition with Google Glass 

    Krach, Jeremy (2015-09-14)
    Lightweight and camera-equipped wearable devices such as Android-backed Google Glass— with their potential for wide-spread and mobile data capture—have piqued the imagination of technologists and privacy advocates alike. ...
  • Checking Interaction-Based Declassification Policies for Android Using Symbolic Execution 

    Micinski, Kristopher; Fetter-Degges, Jonathan; Jeon, Jinseong; Foster, Jeffrey S.; Clarkson, Michael R. (2015-07-01)
    Mobile apps can access a wide variety of secure information, such as contacts and location. However, current mobile platforms include only coarse access control mechanisms to protect such data. In this paper, we introduce ...

View more