2018 Research Exposition Posters

April 11, 2018, 8:30am - 4:30pm

UNB Fredericton, Wu Conference Centre


Authors
Title
Gerhard Dueck, Kenneth B. Kent, Mark Thom, Daryl Maier, Mark Stoodley Generic Ahead-of-Time Compilation for Eclipse OMR
Hao Hu, Maria Patrou, Kenneth B. Kent, Michael Dawson Utilize Underlying Hardware Features for Node.js
Taees Eimouri, Kenneth B.Kent, Aleksandar Micic Optimizing the JVM Object Model Using Object Splitting
Panagiotis Patros, Kenneth B. Kent, Michael Dawson Reducing Garbage Collection Interference on Clouds
Aaron G. Graham, Jean-Philippe Legault, Dr. Kenneth B. Kent, Daryl Maier, James Kingdon Language Runtimes on Embedded Architectures
Scott Young, Kenneth B. Kent, Gerhard Dueck, Charlie Gracie Cold Object Segregation
Maxim Uzun, Kenneth B. Kent, Michael Dawson Post-mortem Debugging with Promises for Node.js
Ratinder Kaur, Yan Li, Junaid Iqbal, Hugo Gonzalez, Natalia Stakhanova Security Assessment of HCE-NFC enabled E-Wallet Banking Android Apps
Michael Flawn, Scott Young, Kenneth Kent, Gerhard Dueck, Charlie Gracie Implementing a Heap over Multiple Virtual Memory Areas in OMR
Abhijit Taware, Gerhard Dueck, Kenneth Kent, Charlie Gracie Garbage collection of cold regions
J. Zhu, P. Patros, K.B. Kent, M. Dawson, S.A. MacKay Node.js Scalability Investigation in Clouds
Konstantin Nasartschuk, Kenneth B. Kent, Aleksandar Micic Feasibility of Internal Object Pools for Reduced Memory Management
Beibei Li, Rongxing Lu, Raymond Choo, Wei Wang, Sheng Luo On Reliability Analysis of Smart Grids under Topology Attacks: A Stochastic Petri Net Approach
Jun Shao, Rongxing Lu, Yunguo Guan, Guiyi Wei Achieve Efficient and Verifiable Conjunctive and Fuzzy Queries over Encrypted Data in Cloud
Nafiseh Izadi Yekta, Rongxing Lu Achieving Communication-Efficient Privacy-Preserving Query for Fog-Enhanced IoT
Wei Guo, Jun Shao, Rongxing Lu, Yining Liu, Ali Ghorbani A Privacy-Preserving Online Medical Pre-diagnostic Scheme in Cloud Environment
Xue Yang, Rongxing Lu, Jun Shao, Xiaohu Tang, Ali A. Ghorbani Achieving Efficient and Privacy-Preserving Multi-Domain Big Data Deduplication in Cloud
Deepigha Shree Vittal Babu, Rongxing Lu Achieve Efficient and Privacy Preserving Range Query over Encrypted Data in Cloud
Puya Memarzia, Virendra Bhavsar, Suprio Ray Dataset Skew Resilience in Main Memory Parallel Hash Joins
Deepigha Shree Vittal Babu and Rongxing Lu Achieve Efficient and Privacy Preserving Range Query over Encrypted Data in Cloud
Arash Habibi Lashkari, Andi Fitriah A. Kadir, Laya Taheri, Ali A. Ghorbani Toward Developing a Systematic Approach to Generate Benchmark Android Malware Datasets and Classification
Hassan Mahdikhani, Rongxing Lu iHOM: How to Enrich SQL Queries in CryptDB
Saeed Shafiee Hasanabadi, Arash Habibi Lashkari, Ali A. Ghorbani The Next Generation of Robust Linux Memory Acquisition Techniques via Consequential Timestamp Dumps
Mahsa Kiani, Virendrakumar C. Bhavsar, Harold Boley Quantifying Simplicity of Generalized Trees
Xi Tao, Wei Song Efficient Task Allocation for Mobile Crowdsensing Based on Evolutionary Computing
Andi Fitriah A. Kadir, Natalia Stakhanova, Ali A. Ghorbani Android Financial Malware Detection Through Network Flow Analysis
Junaid Iqbal, Ratinder Kaur, Natalia Stakhanova Detection and Prevention of Changes in the DOM Tree
Ratinder Kaur, Hugo Gonzalez, Ghazale Amel Zendehdel, Alina Matyukhina, Natalia Stakhanova Security Vulnerabilities in E-Health Devices
Rasoul Shahsavarifar, David Bremner Novel Approximation for Halfspace depth
Milton King, Paul Cook Leveraging distributed representations and lexico-syntactic fixedness for token-level prediction of the idiomaticity of English verb-noun combinations
Puya Memarzia, Virendra Bhavsar, Suprio Ray Dataset Skew Resilience in Main Memory Parallel Hash Joins
Iman Sharafaldin, Arash Habibi Lashkari, and Ali A. Ghorbani Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization
Samaneh Mahdavifar, Mohammad Rasool Fatemi, Dima Alhadidi, Ali A. Ghorbani Android Malware Categorization Using a Semi-Supervised Deep Learning Architecture Based on Ladder Networks
Andi Fitriah A. Kadir, Natalia Stakhanova, Ali A. Ghorbani Android Financial Malware Detection Through Network Flow Analysis
Alina Matyukhina, Mila Dalla Preda, Celine Perley , Natalia Stakhanova Attacking developer’s identity in open-source projects
Alina Matyukhina, Shlomi Linoy, Nguyen Cong Van, Rongxing Lu, Natalia Stakhanova Identifying smart contract users by analyzing their coding style
Samaneh Mahdavifar, Ali A. Ghorbani Towards a Deep Learning-Based Expert System for Detecting Phishing Attacks
Rasoul Shahsavarifar, David Bremner Novel Approximation for Halfspace depth
Ali Hakimi Parizi, Paul Cook Do Character-level Language Models Capture knowledge of Multiword Expression Compositionality?
Yoann S.M. Arseneau, Suprio Ray, Bradford G. Nickerson Memory Efficient Spatio-Textual Search with Concurrent Updates
Samaneh Mahdavifar, Mohammad Rasool Fatemi, Dima Alhadidi Android Malware Categorization Using a Semi-Supervised Deep Learning Architecture Based on Ladder Networks
Naghmeh Shahverdi, David Bremner Symmetry in Integer Linear Programming
Ali Hakimi Parizi, Paul Cook Do Character-level Language Models Capture Knowledge of Multiword Expression Compositionality?