Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Publication
- Publication Type
Articles 1 - 6 of 6
Full-Text Articles in Entire DC Network
Falcon: Framework For Anomaly Detection In Industrial Control Systems, Subin Sapkota, A.K.M. Nuhil Mehdy, Stephen Reese, Hoda Mehrpouyan
Falcon: Framework For Anomaly Detection In Industrial Control Systems, Subin Sapkota, A.K.M. Nuhil Mehdy, Stephen Reese, Hoda Mehrpouyan
Computer Science Faculty Publications and Presentations
Industrial Control Systems (ICS) are used to control physical processes in critical infrastructure. These systems are used in a wide variety of operations such as water treatment, power generation and distribution, and manufacturing. While the safety and security of these systems are of serious concern, recent reports have shown an increase in targeted attacks aimed at manipulating physical processes to cause catastrophic consequences. This trend emphasizes the need for algorithms and tools that provide resilient and smart attack detection mechanisms to protect ICS. In this paper, we propose an anomaly detection framework for ICS based on a deep neural network. …
Continuous Learning In A Single-Incremental-Task Scenario With Spike Features, Ruthvik Vaila, John Chiasson, Vishal Saxena
Continuous Learning In A Single-Incremental-Task Scenario With Spike Features, Ruthvik Vaila, John Chiasson, Vishal Saxena
Electrical and Computer Engineering Faculty Publications and Presentations
Deep Neural Networks (DNNs) have two key deficiencies, their dependence on high precision computing and their inability to perform sequential learning, that is, when a DNN is trained on a first task and the same DNN is trained on the next task it forgets the first task. This phenomenon of forgetting previous tasks is also referred to as catastrophic forgetting. On the other hand a mammalian brain outperforms DNNs in terms of energy efficiency and the ability to learn sequentially without catastrophically forgetting. Here, we use bio-inspired Spike Timing Dependent Plasticity (STDP) in the feature extraction layers of the network …
Improved Study Of Side-Channel Attacks Using Recurrent Neural Networks, Muhammad Abu Naser Rony Chowdhury
Improved Study Of Side-Channel Attacks Using Recurrent Neural Networks, Muhammad Abu Naser Rony Chowdhury
Boise State University Theses and Dissertations
Differential power analysis attacks are special kinds of side-channel attacks where power traces are considered as the side-channel information to launch the attack. These attacks are threatening and significant security issues for modern cryptographic devices such as smart cards, and Point of Sale (POS) machine; because after careful analysis of the power traces, the attacker can break any secured encryption algorithm and can steal sensitive information.
In our work, we study differential power analysis attack using two popular neural networks: Recurrent Neural Network (RNN) and Convolutional Neural Network (CNN). Our work seeks to answer three research questions(RQs):
RQ1: Is it …
Investigating Semantic Properties Of Images Generated From Natural Language Using Neural Networks, Samuel Ward Schrader
Investigating Semantic Properties Of Images Generated From Natural Language Using Neural Networks, Samuel Ward Schrader
Boise State University Theses and Dissertations
This work explores the attributes, properties, and potential uses of generative neural networks within the realm of encoding semantics. It works toward answering the questions of: If one uses generative neural networks to create a picture based on natural language, does the resultant picture encode the text's semantics in a way a computer system can process? Could such a system be more precise than current solutions at detecting, measuring, or comparing semantic properties of generated images, and thus their source text, or their source semantics?
This work is undertaken in the hope that detecting previously unknown properties, or better understanding …
Feature Extraction Using Spiking Convolutional Neural Networks, Ruthvik Vaila, John Chiasson, Vishal Saxena
Feature Extraction Using Spiking Convolutional Neural Networks, Ruthvik Vaila, John Chiasson, Vishal Saxena
Electrical and Computer Engineering Faculty Publications and Presentations
Spiking neural networks are biologically plausible counterparts of the artificial neural networks, artificial neural networks are usually trained with stochastic gradient descent and spiking neural networks are trained with spike timing dependant plasticity. Training deep convolutional neural networks is a memory and power intensive job. Spiking networks could potentially help in reducing the power usage. There is a large pool of tools for one to chose to train artificial neural networks of any size, on the other hand all the available tools to simulate spiking neural networks are geared towards computational neuroscience applications and they are not suitable for real …
Hand Gesture Recognition For Sign Language Transcription, Iker Vazquez Lopez
Hand Gesture Recognition For Sign Language Transcription, Iker Vazquez Lopez
Boise State University Theses and Dissertations
Sign Language is a language which allows mute people to communicate with other mute or non-mute people. The benefits provided by this language, however, disappear when one of the members of a group does not know Sign Language and a conversation starts using that language. In this document, I present a system that takes advantage of Convolutional Neural Networks to recognize hand letter and number gestures from American Sign Language based on depth images captured by the Kinect camera. In addition, as a byproduct of these research efforts, I collected a new dataset of depth images of American Sign Language …