Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Engineering

Exploring And Expanding The One-Pixel Attack, Umairullah Khan, Walt Woods, Christof Teuscher May 2019

Exploring And Expanding The One-Pixel Attack, Umairullah Khan, Walt Woods, Christof Teuscher

Student Research Symposium

In machine learning research, adversarial examples are normal inputs to a classifier that have been specifically perturbed to cause the model to misclassify the input. These perturbations rarely affect the human readability of an input, even though the model’s output is drastically different. Recent work has demonstrated that image-classifying deep neural networks (DNNs) can be reliably fooled with the modification of a single pixel in the input image, without knowledge of a DNN’s internal parameters. This “one-pixel attack” utilizes an iterative evolutionary optimizer known as differential evolution (DE) to find the most effective pixel to perturb, via the ...


Explanation Methods For Neural Networks, Jack H. Chen, Christof Teuscher May 2019

Explanation Methods For Neural Networks, Jack H. Chen, Christof Teuscher

Student Research Symposium

Neural Networks (NNs) have become a basis of almost all state-of-the-art machine learning algorithms and classifiers. While NNs have been shown to generalize well to real-world examples, researchers have struggled to show why they work on an intuitive level. We designed several methods to explain the decisions of two state-of-the-art NN classifiers, ResNet and an All-CNN, in the context of the Japanese Society of Radiological Technology (JSRT) lung nodule dataset and the CIFAR-10 image dataset. Leading explanation methods LIME and Grad-CAM generate variations of heat maps which represent the regions of the input determined salient by the NN. We analyze ...


Reliable Explanations Via Adversarial Examples On Robust Networks, Walt Woods, Jack H. Chen, Christof Teuscher May 2019

Reliable Explanations Via Adversarial Examples On Robust Networks, Walt Woods, Jack H. Chen, Christof Teuscher

Student Research Symposium

Neural Networks (NNs) are increasingly used as the basis of advanced machine learning techniques in sensitive fields such as autonomous vehicles and medical imaging. However, NNs have been found vulnerable to a class of imperceptible attacks, called adversarial examples, which arbitrarily alter the output of the network. To close the schism between needing reliability in real-world applications and the fragility of NNs, we propose a new method for stabilizing networks, and show that as an added bonus, our technique results in reliable, high-fidelity explanations for the NN's decision. Compared to the state-of-the-art, this technique increased the area under the ...


Diagnostic Imaging Of Structural Concrete Using Ground Penetrating Radar And Ultrasonic Array, Sina Mehdinia, Thomas Schumacher, Eric Wan, Xubo Song May 2019

Diagnostic Imaging Of Structural Concrete Using Ground Penetrating Radar And Ultrasonic Array, Sina Mehdinia, Thomas Schumacher, Eric Wan, Xubo Song

Student Research Symposium

Structural concrete is the most widely used construction material in the world. Many structures critical to a society such as bridges, hospitals, and airports are built with concrete. While this material is well understood from a mechanical design point of view, still no accurate quantitative tools exist to assess it for damage and deterioration. This is of particular concern for an urban area like Portland with a mega-thrust earthquake waiting to occur. Non-destructive evaluation tools that can quickly and accurately give a full picture of the integrity of structural concrete elements will be key to help plan effective and safe ...


Spectral Clustering For Electrical Phase Identification Using Advanced Metering Infrastructure Voltage Time Series, Logan Blakely Jan 2019

Spectral Clustering For Electrical Phase Identification Using Advanced Metering Infrastructure Voltage Time Series, Logan Blakely

Dissertations and Theses

The increasing demand for and prevalence of distributed energy resources (DER) such as solar power, electric vehicles, and energy storage, present a unique set of challenges for integration into a legacy power grid, and accurate models of the low-voltage distribution systems are critical for accurate simulations of DER. Accurate labeling of the phase connections for each customer in a utility model is one area of grid topology that is known to have errors and has implications for the safety, efficiency, and hosting capacity of a distribution system. This research presents a methodology for the phase identification of customers solely using ...


Exploring And Expanding The One-Pixel Attack, Umairullah Khan, Walt Woods Jan 2019

Exploring And Expanding The One-Pixel Attack, Umairullah Khan, Walt Woods

Undergraduate Research & Mentoring Program

In machine learning research, adversarial examples are normal inputs to a classifier that have been specifically perturbed to cause the model to misclassify the input. These perturbations rarely affect the human readability of an input, even though the model’s output is drastically different. Recent work has demonstrated that image-classifying deep neural networks (DNNs) can be reliably fooled with the modification of a single pixel in the input image, without knowledge of a DNN’s internal parameters. This “one-pixel attack” utilizes an iterative evolutionary optimizer known as differential evolution (DE) to find the most effective pixel to perturb, via the ...