A secret sharing scheme allows a dealer to distribute a secret with a set of parties, such that only a certain subset of parties can collaborate and learn the shared secret. Traditional secret sharing schemes have been used as building blocks in various subdomains of cryptography. Recently, two new extensions...
SpotFinder is the mobile frontend of a parking system that helps drivers find a parking spot on campus. (The backend piece of the parking system was developed by others in the lab as part of a previous project.) Finding parking can be viewed as both a search problem and a...
Emerging research shows that individual differences in how people use technology sometimes cluster by socioeconomic status (SES) and that when technology is not socioeconomically inclusive, low-SES individuals may abandon it. To understand how to improve technology’s SES-inclusivity, we present a multi-phase case study on SocioEconomicMag (SESMag), an emerging inspection method...
RF data-driven device fingerprinting through the use of deep learning has recently surfaced as a possible method for secure device identification and authentication. Traditional approaches are commonly susceptible to the domain adaptation problem where a model trained on data from one domain performs badly when tested on data from a...
Additive manufacturing has become a promising method for the fabrication of inexpensive, green, flexible sensors and electronics. Printed electronics on low- temperature substrates are very appealing for the flexible hybrid electronics market for their use in disposable and biocompatible electronic applications and in areas like packaging, wearables, and consumer electronics....
Motivation: Many robots such as legged robots and prosthetic hands/arms are designed to interact with uncertain and time-varying environments to accomplish their tasks.
Observations on humans and animals during their daily tasks suggest that they adapt their leg compliance while traversing with different velocities on different grounds and adjust their...
Over time, Open Source Software (OSS) has become indispensable in the creation and upkeep of software products, serving as the fundamental building block for widely used solutions in our daily lives, including applications that enable communication, entertainment, and productivity. A sustainable OSS ecosystem is one that attracts and retains a...
While digital inclusivity researchers and software practitioners have been trying to address exclusion biases in Windows, Icons, Menus, and Pointers (WIMP) user interfaces (UIs) for a long time, little has been done to investigate if and how inclusive software design and its methods that have been devised for WIMP UIs...
The electric power grids of countries across the globe rely on load and generation forecasting to know when, where, and how much resources need to be dispatched to sustain proper grid operation. Because of this, forecasting needs to be highly accurate to avoid unnecessary resource dispatch which can be costly....
The understanding of Discipline-Specific Language is an important competency for students of any field to begin mastering early in their studies, since it serves as a prerequisite for both the analysis of expert text and precise communication. Therefore, an introductory curriculum should pay careful attention to how it incorporates, defines,...
In the ever-evolving field of computer science (CS) education, the significance of teachers and their backgrounds have often been overshadowed by the predominant focus on students. Teachers in the K-12 often lack the necessary expertise and have limited support provided by existing CS-based curricula. While research on CS education effectiveness...
Just off the coast of the Pacific Northwest lies the Cascadia Subduction Zone (CSZ); odds of a very large CSZ earthquake occurring in the next 50 years is estimated to be about 37%. A CSZ seismic event has the potential to cause wide scale damage not just to the power...
Secure Computation is a powerful tool that enables a set of parties to jointly compute any function over their private inputs, without a trusted third party. Private Set Intersection is a specific case of two-party Secure Computation, where Alice (with private set X) and Bob (with private set Y) specifically...
In an increasingly computation-driven world, algorithms and mathematical models significantly impact decision making across various fields. To foster trust and understanding, it is crucial to provide users with clear and concise explanations of the reasoning behind the results produced by computational tools, especially when recommendations appear counterintuitive. Legal frameworks in...
Generating abundant, renewable energy from Earth’s oceans is an attractive option for meeting increasing energy demand. Marine renewable energy also comes with the variability of renewable sources, which impact the reliability and power quality of the electrical grid. On a transmission-level, this dissertation looks at ensuring reliability of the power...
Compactness in deep learning can be critical to a model’s viability in low-resource applications, and a common approach to extreme model compression is quantization. We consider Iterative Product Quantization (iPQ) with Quant-Noise [Fan et al., 2020] to be state-of-the-art in this area, but this quantization framework suffers from preventable inference...
Voltage fault injection is a technique to disrupt power supply, such that the data or instruction flow in a microcontroller can be modified. Recently, a new class of voltage glitches was introduced termed arbitrary wave voltage glitches. Despite its demonstrated success in practical studies it comes with additional challenges, such...
The advancement of artificial intelligence (AI) has led to transformative developments across multiple sectors, fostering innovation and redefining our interactions with technology. As AI matures and becomes integrated into society, it offers numerous opportunities to address global challenges and revolutionize a wide array of human endeavors. These advances are driven...
This dissertation delves into understanding, characterizing, and addressing dataset shift in deep learning, a pervasive issue for deployed machine learning systems. Integral aspects of the problem are examined: We start with the use of counterfactual explanations in order to characterize the behavior of deep reinforcement learning agents in visual input...
Various natural language processing (NLP) tasks necessitate deep models that are fast, efficient, and small based on their ultimate application at the edge or elsewhere. While significant investigation has furthered the efficiency and reduced the size of these models, reducing their downstream latency without significant trade-offs remains a difficult task....