Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Entire DC Network

Falcon: Framework For Anomaly Detection In Industrial Control Systems, Subin Sapkota, A.K.M. Nuhil Mehdy, Stephen Reese, Hoda Mehrpouyan Aug 2020

Falcon: Framework For Anomaly Detection In Industrial Control Systems, Subin Sapkota, A.K.M. Nuhil Mehdy, Stephen Reese, Hoda Mehrpouyan

Computer Science Faculty Publications and Presentations

Industrial Control Systems (ICS) are used to control physical processes in critical infrastructure. These systems are used in a wide variety of operations such as water treatment, power generation and distribution, and manufacturing. While the safety and security of these systems are of serious concern, recent reports have shown an increase in targeted attacks aimed at manipulating physical processes to cause catastrophic consequences. This trend emphasizes the need for algorithms and tools that provide resilient and smart attack detection mechanisms to protect ICS. In this paper, we propose an anomaly detection framework for ICS based on a deep neural network. …


Continuous Learning In A Single-Incremental-Task Scenario With Spike Features, Ruthvik Vaila, John Chiasson, Vishal Saxena Jul 2020

Continuous Learning In A Single-Incremental-Task Scenario With Spike Features, Ruthvik Vaila, John Chiasson, Vishal Saxena

Electrical and Computer Engineering Faculty Publications and Presentations

Deep Neural Networks (DNNs) have two key deficiencies, their dependence on high precision computing and their inability to perform sequential learning, that is, when a DNN is trained on a first task and the same DNN is trained on the next task it forgets the first task. This phenomenon of forgetting previous tasks is also referred to as catastrophic forgetting. On the other hand a mammalian brain outperforms DNNs in terms of energy efficiency and the ability to learn sequentially without catastrophically forgetting. Here, we use bio-inspired Spike Timing Dependent Plasticity (STDP) in the feature extraction layers of the network …


Improved Study Of Side-Channel Attacks Using Recurrent Neural Networks, Muhammad Abu Naser Rony Chowdhury Dec 2019

Improved Study Of Side-Channel Attacks Using Recurrent Neural Networks, Muhammad Abu Naser Rony Chowdhury

Boise State University Theses and Dissertations

Differential power analysis attacks are special kinds of side-channel attacks where power traces are considered as the side-channel information to launch the attack. These attacks are threatening and significant security issues for modern cryptographic devices such as smart cards, and Point of Sale (POS) machine; because after careful analysis of the power traces, the attacker can break any secured encryption algorithm and can steal sensitive information.

In our work, we study differential power analysis attack using two popular neural networks: Recurrent Neural Network (RNN) and Convolutional Neural Network (CNN). Our work seeks to answer three research questions(RQs):

RQ1: Is it …


Investigating Semantic Properties Of Images Generated From Natural Language Using Neural Networks, Samuel Ward Schrader Aug 2019

Investigating Semantic Properties Of Images Generated From Natural Language Using Neural Networks, Samuel Ward Schrader

Boise State University Theses and Dissertations

This work explores the attributes, properties, and potential uses of generative neural networks within the realm of encoding semantics. It works toward answering the questions of: If one uses generative neural networks to create a picture based on natural language, does the resultant picture encode the text's semantics in a way a computer system can process? Could such a system be more precise than current solutions at detecting, measuring, or comparing semantic properties of generated images, and thus their source text, or their source semantics?

This work is undertaken in the hope that detecting previously unknown properties, or better understanding …


Feature Extraction Using Spiking Convolutional Neural Networks, Ruthvik Vaila, John Chiasson, Vishal Saxena Jan 2019

Feature Extraction Using Spiking Convolutional Neural Networks, Ruthvik Vaila, John Chiasson, Vishal Saxena

Electrical and Computer Engineering Faculty Publications and Presentations

Spiking neural networks are biologically plausible counterparts of the artificial neural networks, artificial neural networks are usually trained with stochastic gradient descent and spiking neural networks are trained with spike timing dependant plasticity. Training deep convolutional neural networks is a memory and power intensive job. Spiking networks could potentially help in reducing the power usage. There is a large pool of tools for one to chose to train artificial neural networks of any size, on the other hand all the available tools to simulate spiking neural networks are geared towards computational neuroscience applications and they are not suitable for real …


Hand Gesture Recognition For Sign Language Transcription, Iker Vazquez Lopez May 2017

Hand Gesture Recognition For Sign Language Transcription, Iker Vazquez Lopez

Boise State University Theses and Dissertations

Sign Language is a language which allows mute people to communicate with other mute or non-mute people. The benefits provided by this language, however, disappear when one of the members of a group does not know Sign Language and a conversation starts using that language. In this document, I present a system that takes advantage of Convolutional Neural Networks to recognize hand letter and number gestures from American Sign Language based on depth images captured by the Kinect camera. In addition, as a byproduct of these research efforts, I collected a new dataset of depth images of American Sign Language …