Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Engineering

Exploring And Expanding The One-Pixel Attack, Umairullah Khan, Walt Woods, Christof Teuscher May 2019

Exploring And Expanding The One-Pixel Attack, Umairullah Khan, Walt Woods, Christof Teuscher

Student Research Symposium

In machine learning research, adversarial examples are normal inputs to a classifier that have been specifically perturbed to cause the model to misclassify the input. These perturbations rarely affect the human readability of an input, even though the model’s output is drastically different. Recent work has demonstrated that image-classifying deep neural networks (DNNs) can be reliably fooled with the modification of a single pixel in the input image, without knowledge of a DNN’s internal parameters. This “one-pixel attack” utilizes an iterative evolutionary optimizer known as differential evolution (DE) to find the most effective pixel to perturb, via the evaluation of …


Using Reservoir Computing To Build A Robust Interface With Dna Circuits In Determining Genetic Similarities Between Pathogens, Christopher Neighbor, Christof Teuscher May 2018

Using Reservoir Computing To Build A Robust Interface With Dna Circuits In Determining Genetic Similarities Between Pathogens, Christopher Neighbor, Christof Teuscher

Student Research Symposium

As computational power increases, the field of neural networks has advanced exponentially. In particular recurrent neural networks (RNNs) are being utilized to simulate dynamic systems and to learn to predict time series data. Reservoir computing is an architecture which has the potential to increase training speed while reducing computational costs. Reservoir computing consists of a RNN with a fixed connections “reservoir” while only the output layer is trained. The purpose of this research is to explore the effective use of reservoir computing networks with the eventual application towards use in a DNA based molecular computing reservoir for use in pathogen …


Radiation Source Localization By Using Backpropagation Neural Network, Jian Meng, Christof Teuscher, Walt Woods May 2018

Radiation Source Localization By Using Backpropagation Neural Network, Jian Meng, Christof Teuscher, Walt Woods

Student Research Symposium

The most difficult part of the radiation localization is that we cannot use the traditional acoustic localization method to determine where the radiation source is. It’s mainly because the electromagnetic waves are totally different with the sound wave. From the expression of the radioactive intensity, we can tell that the intensity of radiation not only depend on the distance from the radiation but also related to the type of the nuclide. In general, the relationship between the intensity and the distance satisfy the inverse-square law, which is a non-linear relationship. In other words, if we can use the measurement and …


Computational Capabilities Of Leaky Integrate-And-Fire Neural Networks For Liquid State Machines, Amin Almassian, Christof Teuscher May 2013

Computational Capabilities Of Leaky Integrate-And-Fire Neural Networks For Liquid State Machines, Amin Almassian, Christof Teuscher

Student Research Symposium

We analyze the computational capability of Leaky Integrate-and-Fire (LIF) Neural Networks used as a reservoir (liquid) in the framework of Liquid State Machines (LSM). Maass et. al. investigated LIF neurons in LSM and their results showed that they are capable of noise-robust, parallel, and real-time computation. However, it still remains an open question how the network topology affects the computational capability of a reservoir. To address that question, we investigate the performance of the reservoir as a function of the average reservoir connectivity. We also show that the dynamics of the LIF reservoir is sensitive to changes in the average …