Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Machine Learning (2)
- Alexnet (1)
- Autonomous Aerial Vehicles (1)
- Blockchain (1)
- Cybersecurity (1)
-
- Deep Learning (1)
- Deep models (1)
- Differential privacy (1)
- Formal Methods (1)
- Framework (1)
- Graph Theory (1)
- Industrial Internet of things (1)
- Modeling and Simulation (1)
- National Culture (1)
- Networking (1)
- Organizational Culture (1)
- Personality Traits (1)
- Privacy disclosure (1)
- Privacy metrics (1)
- Psychological Triggers (1)
- RF fingerprint (1)
- SE (1)
- Social Engineering (1)
- Susceptibility (1)
- Testing (1)
- UAV (1)
- Unmanned Aerial System (1)
- Validation (1)
- Publication
- Publication Type
Articles 1 - 6 of 6
Full-Text Articles in Computer Engineering
Machine Learning For Unmanned Aerial System (Uas) Networking, Jian Wang
Machine Learning For Unmanned Aerial System (Uas) Networking, Jian Wang
Doctoral Dissertations and Master's Theses
Fueled by the advancement of 5G new radio (5G NR), rapid development has occurred in many fields. Compared with the conventional approaches, beamforming and network slicing enable 5G NR to have ten times decrease in latency, connection density, and experienced throughput than 4G long term evolution (4G LTE). These advantages pave the way for the evolution of Cyber-physical Systems (CPS) on a large scale. The reduction of consumption, the advancement of control engineering, and the simplification of Unmanned Aircraft System (UAS) enable the UAS networking deployment on a large scale to become feasible. The UAS networking can finish multiple complex …
Rf Fingerprinting Unmanned Aerial Vehicles, Norah Ondus
Rf Fingerprinting Unmanned Aerial Vehicles, Norah Ondus
Doctoral Dissertations and Master's Theses
As unmanned aerial vehicles (UAVs) continue to become more readily available, their use in civil, military, and commercial applications is growing significantly. From aerial surveillance to search-and-rescue to package delivery the use cases of UAVs are accelerating. This accelerating popularity gives rise to numerous attack possibilities for example impersonation attacks in drone-based delivery, in a UAV swarm, etc. In order to ensure drone security, in this project we propose an authentication system based on RF fingerprinting. Specifically, we extract and use the device-specific hardware impairments embedded in the transmitted RF signal to separate the identity of each UAV. To achieve …
A Framework To Detect The Susceptibility Of Employees To Social Engineering Attacks, Hashim H. Alneami
A Framework To Detect The Susceptibility Of Employees To Social Engineering Attacks, Hashim H. Alneami
Doctoral Dissertations and Master's Theses
Social engineering attacks (SE-attacks) in enterprises are hastily growing and are becoming increasingly sophisticated. Generally, SE-attacks involve the psychological manipulation of employees into revealing confidential and valuable company data to cybercriminals. The ramifications could bring devastating financial and irreparable reputation loss to the companies. Because SE-attacks involve a human element, preventing these attacks can be tricky and challenging and has become a topic of interest for many researchers and security experts. While methods exist for detecting SE-attacks, our literature review of existing methods identified many crucial factors such as the national cultural, organizational, and personality traits of employees that enable …
Data-Efficient Machine Learning With Focus On Transfer Learning, Shuteng Niu
Data-Efficient Machine Learning With Focus On Transfer Learning, Shuteng Niu
Doctoral Dissertations and Master's Theses
Machine learning (ML) has attracted a significant amount of attention from the artifi- cial intelligence community. ML has shown state-of-art performance in various fields, such as signal processing, healthcare system, and natural language processing (NLP). However, most conventional ML algorithms suffer from three significant difficulties: 1) insufficient high-quality training data, 2) costly training process, and 3) domain dis- crepancy. Therefore, it is important to develop solutions for these problems, so the future of ML will be more sustainable. Recently, a new concept, data-efficient ma- chine learning (DEML), has been proposed to deal with the current bottlenecks of ML. Moreover, transfer …
Differential Privacy For Industrial Internet Of Things: Opportunities, Applications And Challenges, Bin Jiang, Houbing Song, Jianqiang Li, Guanghui Yue
Differential Privacy For Industrial Internet Of Things: Opportunities, Applications And Challenges, Bin Jiang, Houbing Song, Jianqiang Li, Guanghui Yue
Publications
The development of Internet of Things (IoT) brings new changes to various fields. Particularly, industrial Internet of Things (IIoT) is promoting a new round of industrial revolution. With more applications of IIoT, privacy protection issues are emerging. Specially, some common algorithms in IIoT technology such as deep models strongly rely on data collection, which leads to the risk of privacy disclosure. Recently, differential privacy has been used to protect user-terminal privacy in IIoT, so it is necessary to make in-depth research on this topic. In this paper, we conduct a comprehensive survey on the opportunities, applications and challenges of differential …
Testing And Validation Framework For Autonomous Aerial Vehicles, Mustafa I. Akbas
Testing And Validation Framework For Autonomous Aerial Vehicles, Mustafa I. Akbas
Journal of Aviation/Aerospace Education & Research
Autonomous aerial vehicles (AAV) have the potential to have market disruptions for various industries such as ground delivery and aerial transportation. Hence, the USAF has called for increased level of autonomy. There has been a significant progress in artificial intelligence engines, complex and non-deterministic system components, which are at the core of the autonomous aerial platforms. Traditional testing and validation methods fall short of satisfying the requirement of testing such complex systems. Therefore, to achieve highly or fully autonomous capabilities, a major leap forward in the validation is required. The key challenges are the localization of problems, development of object …