Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Computer Engineering

Machine Learning For Unmanned Aerial System (Uas) Networking, Jian Wang Dec 2021

Machine Learning For Unmanned Aerial System (Uas) Networking, Jian Wang

Doctoral Dissertations and Master's Theses

Fueled by the advancement of 5G new radio (5G NR), rapid development has occurred in many fields. Compared with the conventional approaches, beamforming and network slicing enable 5G NR to have ten times decrease in latency, connection density, and experienced throughput than 4G long term evolution (4G LTE). These advantages pave the way for the evolution of Cyber-physical Systems (CPS) on a large scale. The reduction of consumption, the advancement of control engineering, and the simplification of Unmanned Aircraft System (UAS) enable the UAS networking deployment on a large scale to become feasible. The UAS networking can finish multiple complex …


Rf Fingerprinting Unmanned Aerial Vehicles, Norah Ondus Oct 2021

Rf Fingerprinting Unmanned Aerial Vehicles, Norah Ondus

Doctoral Dissertations and Master's Theses

As unmanned aerial vehicles (UAVs) continue to become more readily available, their use in civil, military, and commercial applications is growing significantly. From aerial surveillance to search-and-rescue to package delivery the use cases of UAVs are accelerating. This accelerating popularity gives rise to numerous attack possibilities for example impersonation attacks in drone-based delivery, in a UAV swarm, etc. In order to ensure drone security, in this project we propose an authentication system based on RF fingerprinting. Specifically, we extract and use the device-specific hardware impairments embedded in the transmitted RF signal to separate the identity of each UAV. To achieve …


A Framework To Detect The Susceptibility Of Employees To Social Engineering Attacks, Hashim H. Alneami May 2021

A Framework To Detect The Susceptibility Of Employees To Social Engineering Attacks, Hashim H. Alneami

Doctoral Dissertations and Master's Theses

Social engineering attacks (SE-attacks) in enterprises are hastily growing and are becoming increasingly sophisticated. Generally, SE-attacks involve the psychological manipulation of employees into revealing confidential and valuable company data to cybercriminals. The ramifications could bring devastating financial and irreparable reputation loss to the companies. Because SE-attacks involve a human element, preventing these attacks can be tricky and challenging and has become a topic of interest for many researchers and security experts. While methods exist for detecting SE-attacks, our literature review of existing methods identified many crucial factors such as the national cultural, organizational, and personality traits of employees that enable …


Data-Efficient Machine Learning With Focus On Transfer Learning, Shuteng Niu Apr 2021

Data-Efficient Machine Learning With Focus On Transfer Learning, Shuteng Niu

Doctoral Dissertations and Master's Theses

Machine learning (ML) has attracted a significant amount of attention from the artifi- cial intelligence community. ML has shown state-of-art performance in various fields, such as signal processing, healthcare system, and natural language processing (NLP). However, most conventional ML algorithms suffer from three significant difficulties: 1) insufficient high-quality training data, 2) costly training process, and 3) domain dis- crepancy. Therefore, it is important to develop solutions for these problems, so the future of ML will be more sustainable. Recently, a new concept, data-efficient ma- chine learning (DEML), has been proposed to deal with the current bottlenecks of ML. Moreover, transfer …


Differential Privacy For Industrial Internet Of Things: Opportunities, Applications And Challenges, Bin Jiang, Houbing Song, Jianqiang Li, Guanghui Yue Feb 2021

Differential Privacy For Industrial Internet Of Things: Opportunities, Applications And Challenges, Bin Jiang, Houbing Song, Jianqiang Li, Guanghui Yue

Publications

The development of Internet of Things (IoT) brings new changes to various fields. Particularly, industrial Internet of Things (IIoT) is promoting a new round of industrial revolution. With more applications of IIoT, privacy protection issues are emerging. Specially, some common algorithms in IIoT technology such as deep models strongly rely on data collection, which leads to the risk of privacy disclosure. Recently, differential privacy has been used to protect user-terminal privacy in IIoT, so it is necessary to make in-depth research on this topic. In this paper, we conduct a comprehensive survey on the opportunities, applications and challenges of differential …


Testing And Validation Framework For Autonomous Aerial Vehicles, Mustafa I. Akbas Jan 2021

Testing And Validation Framework For Autonomous Aerial Vehicles, Mustafa I. Akbas

Journal of Aviation/Aerospace Education & Research

Autonomous aerial vehicles (AAV) have the potential to have market disruptions for various industries such as ground delivery and aerial transportation. Hence, the USAF has called for increased level of autonomy. There has been a significant progress in artificial intelligence engines, complex and non-deterministic system components, which are at the core of the autonomous aerial platforms. Traditional testing and validation methods fall short of satisfying the requirement of testing such complex systems. Therefore, to achieve highly or fully autonomous capabilities, a major leap forward in the validation is required. The key challenges are the localization of problems, development of object …