While digital inclusivity researchers and software practitioners have been trying to address exclusion biases in Windows, Icons, Menus, and Pointers (WIMP) user interfaces (UIs) for a long time, little has been done to investigate if and how inclusive software design and its methods that have been devised for WIMP UIs...
Voltage fault injection is a technique to disrupt power supply, such that the data or instruction flow in a microcontroller can be modified. Recently, a new class of voltage glitches was introduced termed arbitrary wave voltage glitches. Despite its demonstrated success in practical studies it comes with additional challenges, such...
This dissertation delves into understanding, characterizing, and addressing dataset shift in deep learning, a pervasive issue for deployed machine learning systems. Integral aspects of the problem are examined: We start with the use of counterfactual explanations in order to characterize the behavior of deep reinforcement learning agents in visual input...
Secure Computation is a powerful tool that enables a set of parties to jointly compute any function over their private inputs, without a trusted third party. Private Set Intersection is a specific case of two-party Secure Computation, where Alice (with private set X) and Bob (with private set Y) specifically...
Hand detection is a fundamental step for many hand-related computer vision tasks, such as gesture recognition, hand pose estimation, hand sign language translation, and so on. However, robustly detecting hands is a challenging task because of drastic changes in appearance based on finger articulation and changes in lighting conditions, camera...
Ph.D. candidate Qi Wei's thesis consists of two projects: Chemotherapy Project: a study based on the research paper "Predicting chemotherapy response of various cancer types using a variational auto-encoder approach" submitted to the bioRxiv preprint archive and accepted by the BMC bioinformatics; and Wound Monitor Project: implementing and assessing analytics...
RNAs play important roles in the central dogma of molecular biology, and are involved in multiple biology processes such as chromatin modification, transcriptional interference and translation initiation. The functions of RNAs, especially non-coding RNAs, are highly related to its secondary structures, therefore computational methods for RNA structure prediction are of...
Deep learning is becoming the latest trend in sensitive applications, such as healthcare, criminal justice, and finance. As these new applications emerge, adversaries are circumventing them.
Further, there have been concerns about the possibility of bias and discrimination in predictive applications.
In order to address these issues, we propose an...
Ecological domains seeking to understand the environment and the behavior of species have received little attention in machine learning (ML), despite the fact that environmental changes have a significant impact on humans as well as ecosystems. Some ecological problems can be formulated similarly to other common ML applications, but there...
The Machine Learning (ML) algorithms are increasingly explored in varies of fields including designing and optimizing computer systems. Recent research, such as optimizing memory/cache prefetching by ML training or predicting traffic pattern in throughput processors, also exhibits a promising future of introducing ML into computer system design and optimization. Throughput...