Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
-
- Electronic Theses and Dissertations (2)
- Electronic Thesis and Dissertation Repository (2)
- Theses and Dissertations (2)
- All Graduate Theses and Dissertations, Fall 2023 to Present (1)
- Browse all Theses and Dissertations (1)
-
- CCE Theses and Dissertations (1)
- Computer Science and Computer Engineering Undergraduate Honors Theses (1)
- Graduate College Dissertations and Theses (1)
- Graduate Theses, Dissertations, and Problem Reports (1)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (1)
- USF Tampa Graduate Theses and Dissertations (1)
Articles 1 - 14 of 14
Full-Text Articles in Entire DC Network
Achieving Responsible Anomaly Detection, Xiao Han
Achieving Responsible Anomaly Detection, Xiao Han
All Graduate Theses and Dissertations, Fall 2023 to Present
In the digital transformation era, safeguarding online systems against anomalies – unusual patterns indicating potential threats or malfunctions – has become crucial. This dissertation embarks on enhancing the accuracy, explainability, and ethical integrity of anomaly detection systems. By integrating advanced machine learning techniques, it improves anomaly detection performance and incorporates fairness and explainability at its core.
The research tackles performance enhancement in anomaly detection by leveraging few-shot learning, demonstrating how systems can effectively identify anomalies with minimal training data. This approach overcomes data scarcity challenges. Reinforcement learning is employed to iteratively refine models, enhancing decision-making processes. Transfer learning enables the …
Railroad Condition Monitoring Using Distributed Acoustic Sensing And Deep Learning Techniques, Md Arifur Rahman
Railroad Condition Monitoring Using Distributed Acoustic Sensing And Deep Learning Techniques, Md Arifur Rahman
Electronic Theses and Dissertations
Proper condition monitoring has been a major issue among railroad administrations since it might cause catastrophic dilemmas that lead to fatalities or damage to the infrastructure. Although various aspects of train safety have been conducted by scholars, in-motion monitoring detection of defect occurrence, cause, and severity is still a big concern. Hence extensive studies are still required to enhance the accuracy of inspection methods for railroad condition monitoring (CM). Distributed acoustic sensing (DAS) has been recognized as a promising method because of its sensing capabilities over long distances and for massive structures. As DAS produces large datasets, algorithms for precise …
Weakly-Supervised Anomaly Detection In Surveillance Videos Based On Two-Stream I3d Convolution Network, Sareh Soltani Nejad
Weakly-Supervised Anomaly Detection In Surveillance Videos Based On Two-Stream I3d Convolution Network, Sareh Soltani Nejad
Electronic Thesis and Dissertation Repository
The widespread adoption of city surveillance systems has led to an increase in the use of surveillance videos for maintaining public safety and security. This thesis tackles the problem of detecting anomalous events in surveillance videos. The goal is to automatically identify abnormal events by learning from both normal and abnormal videos. Most of previous works consider any deviation from learned normal patterns as an anomaly, which may not always be valid since the same activity could be normal or abnormal under different circumstances. To address this issue, the thesis utilizes the Two-Stream Inflated 3D (I3D) Convolutional Networks to extract …
Real–Time Semantic Segmentation For Railway Anomalies Analysis, Paul Stanik Iii
Real–Time Semantic Segmentation For Railway Anomalies Analysis, Paul Stanik Iii
UNLV Theses, Dissertations, Professional Papers, and Capstones
In the past few years, computer vision has made huge jumps due to deep learning which leverages increased computational power and access to data. The computer vision community has also embraced transparency to accelerate research progress by sharing open datasets and open source code. Access to large scale datasets and benchmark challenges propelled and opened the field. The autonomous vehicle community is a prime example. While there has been significant growth in the automotive vision community, not much has been done in the rail domain. Traditional rail inspection methods require special trains that are run during down time, have sensitive …
Hybrid Machine And Deep Learning-Based Cyberattack Detection And Classification In Smart Grid Networks, Adedayo Aribisala
Hybrid Machine And Deep Learning-Based Cyberattack Detection And Classification In Smart Grid Networks, Adedayo Aribisala
Electronic Theses and Dissertations
Power grids have rapidly evolved into Smart grids and are heavily dependent on Supervisory Control and Data Acquisition (SCADA) systems for monitoring and control. However, this evolution increases the susceptibility of the remote (VMs, VPNs) and physical interfaces (sensors, PMUs LAN, WAN, sub-stations power lines, and smart meters) to sophisticated cyberattacks. The continuous supply of power is critical to power generation plants, power grids, industrial grids, and nuclear grids; the halt to global power could have a devastating effect on the economy's critical infrastructures and human life.
Machine Learning and Deep Learning-based cyberattack detection modeling have yielded promising results when …
Advanced Analytics In Smart Manufacturing: Anomaly Detection Using Machine Learning Algorithms And Parallel Machine Scheduling Using A Genetic Algorithm, Meiling He
Theses and Dissertations
Industry 4.0 offers great opportunities to utilize advanced data processing tools by generating Big Data from a more connected and efficient data collection system. Making good use of data processing technologies, such as machine learning and optimization algorithms, will significantly contribute to better quality control, automation, and job scheduling in Smart Manufacturing. This research aims to develop a new machine learning algorithm for solving highly imbalanced data processing problems, implement both supervised and unsupervised machine learning auto-selection frameworks for detecting anomalies in smart manufacturing, and develop a genetic algorithm for optimizing job schedules on unrelated parallel machines. This research also …
Semi-Supervised Spatial-Temporal Feature Learning On Anomaly-Based Network Intrusion Detection, Huy Mai
Semi-Supervised Spatial-Temporal Feature Learning On Anomaly-Based Network Intrusion Detection, Huy Mai
Computer Science and Computer Engineering Undergraduate Honors Theses
Due to a rapid increase in network traffic, it is growing more imperative to have systems that detect attacks that are both known and unknown to networks. Anomaly-based detection methods utilize deep learning techniques, including semi-supervised learning, in order to effectively detect these attacks. Semi-supervision is advantageous as it doesn't fully depend on the labelling of network traffic data points, which may be a daunting task especially considering the amount of traffic data collected. Even though deep learning models such as the convolutional neural network have been integrated into a number of proposed network intrusion detection systems in recent years, …
Establishing Behavioral Baselines For Computational Systems: Two Case Studies, John Henry Ring
Establishing Behavioral Baselines For Computational Systems: Two Case Studies, John Henry Ring
Graduate College Dissertations and Theses
The behavior of modern systems lives in a complex landscape that is unique to its particular application. In this work we describe and analyze the behavior of two modern computational systems: a Linux server and the National Market System (NMS). Though this work is diverse in both the type and scale of system under study, it is unified through the design and implementation of computationally tractable quantitative metrics aimed at defining the state of behavior of these systems. Understanding the behavior of these systems allows us to ensure their desired operation. In the case of a server we need to …
Automated Anomaly Detection And Localization System For A Microservices Based Cloud System, Priyanka Prakash Naikade
Automated Anomaly Detection And Localization System For A Microservices Based Cloud System, Priyanka Prakash Naikade
Electronic Thesis and Dissertation Repository
Context: With an increasing number of applications running on a microservices-based cloud system (such as AWS, GCP, IBM Cloud), it is challenging for the cloud providers to offer uninterrupted services with guaranteed Quality of Service (QoS) factors. Problem Statement: Existing monitoring frameworks often do not detect critical defects among a large volume of issues generated, thus affecting recovery response times and usage of maintenance human resource. Also, manually tracing the root causes of the issues requires a significant amount of time. Objective: The objective of this work is to: (i) detect performance anomalies, in real-time, through monitoring KPIs (Key Performance …
Next-Generation Self-Organizing Communications Networks: Synergistic Application Of Machine Learning And User-Centric Technologies, Chetana V. Murudkar
Next-Generation Self-Organizing Communications Networks: Synergistic Application Of Machine Learning And User-Centric Technologies, Chetana V. Murudkar
USF Tampa Graduate Theses and Dissertations
The telecommunications industry is going through a metamorphic journey where the 5G and 6G technologies will be deeply rooted in the society forever altering how people access and use information. In support of this transformation, this dissertation proposes a fundamental paradigm shift in the design, performance assessment, and optimization of wireless communications networks developing the next-generation self-organizing communications networks with the synergistic application of machine learning and user-centric technologies.
This dissertation gives an overview of the concept of self-organizing networks (SONs), provides insight into the “hot” technology of machine learning (ML), and offers an intuitive understanding of the user-centric (UC) …
Representation Learning With Adversarial Latent Autoencoders, Stanislav Pidhorskyi M.S.
Representation Learning With Adversarial Latent Autoencoders, Stanislav Pidhorskyi M.S.
Graduate Theses, Dissertations, and Problem Reports
A large number of deep learning methods applied to computer vision problems require encoder-decoder maps. These methods include, but are not limited to, self-representation learning, generalization, few-shot learning, and novelty detection. Encoder-decoder maps are also useful for photo manipulation, photo editing, superresolution, etc. Encoder-decoder maps are typically learned using autoencoder networks.
Traditionally, autoencoder reciprocity is achieved in the image-space using pixel-wise
similarity loss, which has a widely known flaw of producing non-realistic reconstructions. This flaw is typical for the Variational Autoencoder (VAE) family and is not only limited to pixel-wise similarity losses, but is common to all methods relying upon …
Probabilistic Clustering Ensemble Evaluation For Intrusion Detection, Steven M. Mcelwee
Probabilistic Clustering Ensemble Evaluation For Intrusion Detection, Steven M. Mcelwee
CCE Theses and Dissertations
Intrusion detection is the practice of examining information from computers and networks to identify cyberattacks. It is an important topic in practice, since the frequency and consequences of cyberattacks continues to increase and affect organizations. It is important for research, since many problems exist for intrusion detection systems. Intrusion detection systems monitor large volumes of data and frequently generate false positives. This results in additional effort for security analysts to review and interpret alerts. After long hours spent reviewing alerts, security analysts become fatigued and make bad decisions. There is currently no approach to intrusion detection that reduces the workload …
Using Self-Organizing Maps For Computer Network Intrusion Detection, Manuel R. Parrachavez
Using Self-Organizing Maps For Computer Network Intrusion Detection, Manuel R. Parrachavez
Theses and Dissertations
Anomaly detection in user access patterns using artificial neural networks is a novel way of combating the ever-present concern of computer network intrusion detection for many entities around the world. Anomaly detection is a technique in network security in which a profile is built around a user's normal daily actions. The data collected for these profiles can be as following: file access attempts; failed login attempts; file creations; file access failures; and countless others. This data is collected and used as training data for a neural network. There are many types of neural networks, such as multi-layer feed-forward network; recurrent …
Anomalies In Sensor Network Deployments: Analysis, Modeling, And Detection, Giovani Rimon Abuaitah
Anomalies In Sensor Network Deployments: Analysis, Modeling, And Detection, Giovani Rimon Abuaitah
Browse all Theses and Dissertations
A sensor network serves as a vital source for collecting raw sensory data. Sensor data are later processed, analyzed, visualized, and reasoned over with the help of several decision making tools. A decision making process can be disastrously misled by a small portion of anomalous sensor readings. Therefore, there has been a vast demand for mechanisms that identify and then eliminate such anomalies in order to ensure the quality, integrity, and/or trustworthiness of the raw sensory data before they can even be interpreted.
Prior to identifying anomalies, it is essential to understand the various anomalous behaviors prevalent in a sensor …