A sample of articles, each co-authored by our students and faculty.
Generating and Attacking Passwords
Shiva Houshmand, Smita Ghosh, Jared Maeyama
Smita Ghosh, Xiaochen Luo, Jared Maeyama, Shiv Jhalani, CJ Oshiro, Tharun Venkatesh, Rushil Patel
Counting Subgraphs of Coloring Graphs using Shadow Graphs
Simon MacLean
RELINK: Edge Activation for Closed Network Influence Maximization via Deep
S Arya, S Ghosh, B Maruyama, V Srinivasan, Proceedings of CIKM '25, 2025
Hack for the homeless: A humanitarian technology hackathon
N Linnell, S Figueira, N Chintala, L Falzarano, V Ciancio - IEEE Global Humanitarian Technology Conference 2014 (GHTC), 2014 IEEE, 2014 - ieeexplore.ieee.org
Polyhedral Painting with Group Averaging
FA Farris, R Tsao - PRIMUS, 2016 - Taylor & Francis
On groups with Cayley graph isomorphic to a cube
C Hagemeyer, R Scott - Communications in Algebra, 2014 - Taylor & Francis
A simplified AES algorithm and its linear and differential cryptanalyses
MA Musa, EF Schaefer, S Wedig - Cryptologia, 2003 - Taylor & Francis
Numerical shape-from-shading for discontinuous photographic images
J Kain, DN Ostrov - International Journal of Computer Vision, 2001 - Springer
RELINK: Edge Activation for Closed Network Influence Maximization via Deep