ASU Electronic Theses and Dissertations
This collection includes most of the ASU Theses and Dissertations from 2011 to present. ASU Theses and Dissertations are available in downloadable PDF format; however, a small percentage of items are under embargo. Information about the dissertations/theses includes degree information, committee members, an abstract, supporting data or media.
In addition to the electronic theses found in the ASU Digital Repository, ASU Theses and Dissertations can be found in the ASU Library Catalog.
Dissertations and Theses granted by Arizona State University are archived and made available through a joint effort of the ASU Graduate College and the ASU Libraries. For more information or questions about this collection contact or visit the Digital Repository ETD Library Guide or contact the ASU Graduate College at gradformat@asu.edu.
- Arizona State University
- Kambhampati, Subbarao
- 19 Liu, Huan
- 8 Baral, Chitta
- 6 Davulcu, Hasan
- 6 Lee, Joohyung
- 3 Smith, David E
- more
- 3 Zhang, Yu
- 2 Chen, Yi
- 2 Huang, Dijiang
- 2 Lifschitz, Vladimir
- 2 Manikonda, Lydia
- 2 Scheutz, Matthias
- 2 Sundaram, Hari
- 2 Talamadupula, Kartik
- 2 Tong, Hanghang
- 2 Xue, Guoliang
- 2 Ye, Jieping
- 1 Acharya, Anirudh
- 1 Balakrishnan, Raju
- 1 Bao, Tiffany (Youzhi)
- 1 Bao, Youzhi
- 1 Bartlett, Cade Earl
- 1 Beigi, Ghazaleh
- 1 Ben Amor, Hani
- 1 Ben Amor, Heni
- 1 Benton, J.
- 1 Candan, K. Selçuk
- 1 Cao Son, Tran
- 1 Carley, Kathleen M
- 1 Chakraborti, Tathagata
- 1 Chiou, Erin
- 1 Chowdhary, Ankur
- 1 Cooke, Nancy
- 1 Cooke, Nancy J
- 1 Cushing, William Albemarle
- 1 Davalcu, Hasan
- 1 De Choudhury, Munmun
- 1 De, Sushovan
- 1 Demakethepalli Venkateswara, Hemanth Kumar
- 1 Do, Minh
- 1 Do, Minh B.
- 1 Doan, Anhai
- 1 Doupe, Adam
- 1 Eliassi-Rad, Tina
- 1 Fainekos, Georgios
- 1 Faloutsos, Christos
- 1 Gelfond, Gregory
- 1 Gupta, Sandeep
- 1 Horvitz, Eric
- 1 Hu, Xia
- 1 Hu, Yuheng
- 1 Jain, Niharika
- 1 Jha, Manishkumar
- 1 Kamar, Ece
- 1 Krumm, John
- 1 Langley, Pat
- 1 Langley, Patrick W
- 1 Leskovec, Jure
- 1 Li, Baoxin
- 1 MIshra, Aditya Prasad
- 1 Maciejewski, Ross
- 1 Mallapura Umamaheshwar, Tejas
- 1 Morstatter, Fred
- 1 Moss, Larry
- 1 Narayanan, Vignesh
- 1 Natarajan, Sriraam
- 1 Nguyen, Tuan Anh
- 1 Palla, Ravi Kiran Reddy
- 1 Pon-Barry, Heather
- 1 Raghunathan, Rohit
- 1 Rajadesingan, Ashwin
- 1 Ravikumar, Srijith
- 1 Rihan, Preet Inder Singh
- 1 Sengupta, Sailik
- 1 Smith, David E.
- 1 Sreedharan, Sarath
- 1 Srivastava, Siddharth
- 1 Trivedi, Nishant H.
- 1 Vanlehn, Kurt
- 1 Varsamopoulos, Georgios
- 1 Vijayakumar, Manikandan
- 1 Wang, Xufei
- 1 Wang, Yi
- 1 Weld, Daniel S
- 1 White, Christopher
- 1 Wu, Bing
- 1 Zafarani, Reza
- 1 Zhao, Jicheng
- 26 Computer science
- 15 Artificial intelligence
- 6 Artificial Intelligence
- 5 Automated Planning
- 3 Computer Science
- 3 Robotics
- 2 Answer Set Programming
- more
- 2 Incompleteness
- 2 Information Retrieval
- 2 Knowledge Representation
- 2 Logic
- 2 Machine Learning
- 2 Social Computing
- 2 automated planning
- 2 bias
- 2 data mining
- 1 Action Languages
- 1 Advanced Persistent Threat (APT)
- 1 Agreement
- 1 Attack Graph
- 1 Automated Reasoning
- 1 Automated planning
- 1 Autonomous Databases
- 1 Autonomy
- 1 Bayes Networks
- 1 Bounded Model Checking
- 1 Cognitive Architectures
- 1 Cognitive Psychology
- 1 Cognitive psychology
- 1 Community Detection
- 1 Consistent Query Answering
- 1 Crew Scheduling
- 1 Cyber-security
- 1 Data Cleaning
- 1 Data Mining
- 1 Databases
- 1 Dec-POMDPs
- 1 Decision Support
- 1 Domain models
- 1 Engineering
- 1 Equilibrium Computation
- 1 Equilibrium Learning
- 1 Ethics
- 1 Explainable AI
- 1 False Positive
- 1 Game Theory
- 1 Goal Recognition
- 1 Group Profiling and Understanding
- 1 Hashtag Recommendation
- 1 Hashtag Rectification
- 1 Human Factors
- 1 Human Robot Teaming
- 1 Human-Aware AI
- 1 Human-Aware Planning
- 1 Human-in-the-loop
- 1 Information Spreader
- 1 Information science
- 1 Information technology
- 1 Knowledge Representation and Reasoning
- 1 Leader-Follower Games
- 1 Logic Programming
- 1 Markov Decision Processes
- 1 Markov Game
- 1 Mathematics
- 1 Means-Ends Analysis
- 1 Minimum Information
- 1 Mining across Sites
- 1 Modal Logic
- 1 Moving Target Defense
- 1 Moving Target Defense (MTD)
- 1 Multi-Agent Systems
- 1 Multi-agent planning
- 1 Natural Language
- 1 Natural Language Processing
- 1 Naturalistic Decision Making
- 1 Nonmonotonic Reasoning
- 1 Online Social Media
- 1 Plan Recognition
- 1 Popularity
- 1 Precision
- 1 Preferences
- 1 Privacy Protection
- 1 Probabilistic Database
- 1 Probabilistic Databases
- 1 Probabilistic Reasoning
- 1 Probabilistic data cleaning
- 1 Problem Solving
- 1 Reasoning about Actions
- 1 Recall
- 1 Reputation
- 1 Robots
- 1 Rules and Ontologies
- 1 Search
- 1 Search and Rescue
- 1 Situation Awareness
- 1 Social Media Mining
- 1 Social Network Analysis
- 1 Social Signatures
- 1 Social research
- 1 Sociology
- Language in Trauma: A Pilot Study of Pause Frequency as a Predictor of Cognitive Change Due to Post Traumatic Stress Disorder
- Subvert City: The Interventions of an Anarchist in Occupy Phoenix, 2011-2012
- Exploring the Impact of Augmented Reality on Collaborative Decision-Making in Small Teams
- Towards a National Cinema: An Analysis of Caliwood Films by Luis Ospina and Carlos Mayolo and Their Fundamental Contribution to Colombian Film
- 国家集中采购试点政策对制药企业和制药产业的影响评估
Generative Adversarial Networks are designed, in theory, to replicate the distribution of the data they are trained on. With real-world limitations, such as finite network capacity and training set size, they inevitably suffer a yet unavoidable technical failure: mode collapse. GAN-generated data is not nearly as diverse as the real-world data the network is trained on; this work shows that this effect is especially drastic when the training data is highly non-uniform. Specifically, GANs learn to exacerbate the social biases which exist in the training set along sensitive axes such as gender and race. In an age where many datasets …
- Contributors
- Jain, Niharika, Kambhampati, Subbarao, Liu, Huan, et al.
- Created Date
- 2020
The pervasive use of the Web has connected billions of people all around the globe and enabled them to obtain information at their fingertips. This results in tremendous amounts of user-generated data which makes users traceable and vulnerable to privacy leakage attacks. In general, there are two types of privacy leakage attacks for user-generated data, i.e., identity disclosure and private-attribute disclosure attacks. These attacks put users at potential risks ranging from persecution by governments to targeted frauds. Therefore, it is necessary for users to be able to safeguard their privacy without leaving their unnecessary traces of online activities. However, privacy …
- Contributors
- Beigi, Ghazaleh, Liu, Huan, Kambhampati, Subbarao, et al.
- Created Date
- 2020
The field of cyber-defenses has played catch-up in the cat-and-mouse game of finding vulnerabilities followed by the invention of patches to defend against them. With the complexity and scale of modern-day software, it is difficult to ensure that all known vulnerabilities are patched; moreover, the attacker, with reconnaissance on their side, will eventually discover and leverage them. To take away the attacker's inherent advantage of reconnaissance, researchers have proposed the notion of proactive defenses such as Moving Target Defense (MTD) in cyber-security. In this thesis, I make three key contributions that help to improve the effectiveness of MTD. First, I …
- Contributors
- Sengupta, Sailik, Kambhampati, Subbarao, Bao, Tiffany (Youzhi), et al.
- Created Date
- 2020
The use of reactive security mechanisms in enterprise networks can, at times, provide an asymmetric advantage to the attacker. Similarly, the use of a proactive security mechanism like Moving Target Defense (MTD), if performed without analyzing the effects of security countermeasures, can lead to security policy and service level agreement violations. In this thesis, I explore the research questions 1) how to model attacker-defender interactions for multi-stage attacks? 2) how to efficiently deploy proactive (MTD) security countermeasures in a software-defined environment for single and multi-stage attacks? 3) how to verify the effects of security and management policies on the network …
- Contributors
- Chowdhary, Ankur, Huang, Dijiang, Kambhampati, Subbarao, et al.
- Created Date
- 2020
Knowledge Representation (KR) is one of the prominent approaches to Artificial Intelligence (AI) that is concerned with representing knowledge in a form that computer systems can utilize to solve complex problems. Answer Set Programming (ASP), based on the stable model semantics, is a widely-used KR framework that facilitates elegant and efficient representations for many problem domains that require complex reasoning. However, while ASP is effective on deterministic problem domains, it is not suitable for applications involving quantitative uncertainty, for example, those that require probabilistic reasoning. Furthermore, it is hard to utilize information that can be statistically induced from data with …
- Contributors
- Wang, Yi, Lee, Joohyung, Baral, Chitta, et al.
- Created Date
- 2019
Allocating tasks for a day's or week's schedule is known to be a challenging and difficult problem. The problem intensifies by many folds in multi-agent settings. A planner or group of planners who decide such kind of task association schedule must have a comprehensive perspective on (1) the entire array of tasks to be scheduled (2) idea on constraints like importance cum order of tasks and (3) the individual abilities of the operators. One example of such kind of scheduling is the crew scheduling done for astronauts who will spend time at International Space Station (ISS). The schedule for the …
- Contributors
- MIshra, Aditya Prasad, Kambhampati, Subbarao, Chiou, Erin, et al.
- Created Date
- 2019
The rapid advancements of technology have greatly extended the ubiquitous nature of smartphones acting as a gateway to numerous social media applications. This brings an immense convenience to the users of these applications wishing to stay connected to other individuals through sharing their statuses, posting their opinions, experiences, suggestions, etc on online social networks (OSNs). Exploring and analyzing this data has a great potential to enable deep and fine-grained insights into the behavior, emotions, and language of individuals in a society. This proposed dissertation focuses on utilizing these online social footprints to research two main threads – 1) Analysis: to …
- Contributors
- Manikonda, Lydia, Kambhampati, Subbarao, Liu, Huan, et al.
- Created Date
- 2019
Reasoning about actions forms the basis of many tasks such as prediction, planning, and diagnosis in a dynamic domain. Within the reasoning about actions community, a broad class of languages, called action languages, has been developed together with a methodology for their use in representing and reasoning about dynamic domains. With a few notable exceptions, the focus of these efforts has largely centered around single-agent systems. Agents rarely operate in a vacuum however, and almost in parallel, substantial work has been done within the dynamic epistemic logic community towards understanding how the actions of an agent may effect not just …
- Contributors
- Gelfond, Gregory, Baral, Chitta, Kambhampati, Subbarao, et al.
- Created Date
- 2018
A critical challenge in the design of AI systems that operate with humans in the loop is to be able to model the intentions and capabilities of the humans, as well as their beliefs and expectations of the AI system itself. This allows the AI system to be "human- aware" -- i.e. the human task model enables it to envisage desired roles of the human in joint action, while the human mental model allows it to anticipate how its own actions are perceived from the point of view of the human. In my research, I explore how these concepts of …
- Contributors
- Chakraborti, Tathagata, Kambhampati, Subbarao, Talamadupula, Kartik, et al.
- Created Date
- 2018
Exabytes of data are created online every day. This deluge of data is no more apparent than it is on social media. Naturally, finding ways to leverage this unprecedented source of human information is an active area of research. Social media platforms have become laboratories for conducting experiments about people at scales thought unimaginable only a few years ago. Researchers and practitioners use social media to extract actionable patterns such as where aid should be distributed in a crisis. However, the validity of these patterns relies on having a representative dataset. As this dissertation shows, the data collected from social …
- Contributors
- Morstatter, Fred, Liu, Huan, Kambhampati, Subbarao, et al.
- Created Date
- 2017