Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Security (2)
- Adaptive beamformer (ABF) (1)
- Array signal processing (1)
- Authentication (1)
- Autonomous Vehicles Cloud Computing (1)
-
- Botnet Detection (1)
- Contextual Word Embeddings (1)
- Cybersecurity (1)
- Dark patterns (1)
- Data Mining (1)
- Deep learning (1)
- Dominant mode rejection (DMR) (1)
- Eigendecomposition (1)
- Fairness Evaluation (1)
- HCI (1)
- Information theory (1)
- Internet of Things (1)
- Machine learning (1)
- Manipulative design (1)
- Natural Language Processing (1)
- Neuromorphic computing (1)
- Privacy (1)
- Probabilistic inference (1)
- Random matrix theory (RMT) (1)
- ResNet (1)
- Sample covariance matrix (SCM) (1)
- Self-attention (1)
- Sentence Embeddings (1)
- Signal processing (1)
- Site revisitation (1)
- Publication Type
Articles 1 - 7 of 7
Full-Text Articles in Computer Engineering
Software Protection And Secure Authentication For Autonomous Vehicular Cloud Computing, Muhammad Hataba
Software Protection And Secure Authentication For Autonomous Vehicular Cloud Computing, Muhammad Hataba
Dissertations
Artificial Intelligence (AI) is changing every technology we deal with. Autonomy has been a sought-after goal in vehicles, and now more than ever we are very close to that goal. Vehicles before were dumb mechanical devices, now they are becoming smart, computerized, and connected coined as Autonomous Vehicles (AVs). Moreover, researchers found a way to make more use of these enormous capabilities and introduced Autonomous Vehicles Cloud Computing (AVCC). In these platforms, vehicles can lend their unused resources and sensory data to join AVCC.
In this dissertation, we investigate security and privacy issues in AVCC. As background, we built our …
Performance Analysis Of The Dominant Mode Rejection Beamformer, Enlong Hu
Performance Analysis Of The Dominant Mode Rejection Beamformer, Enlong Hu
Dissertations
In array signal processing over challenging environments, due to the non-stationarity nature of data, it is difficult to obtain enough number of data snapshots to construct an adaptive beamformer (ABF) for detecting weak signal embedded in strong interferences. One type of adaptive method targeting for such applications is the dominant mode rejection (DMR) method, which uses a reshaped eigen-decomposition of sample covariance matrix (SCM) to define a subspace containing the dominant interferers to be rejected, thereby allowing it to detect weak signal in the presence of strong interferences. The DMR weight vector takes a form similar to the adaptive minimum …
Local Learning Algorithms For Stochastic Spiking Neural Networks, Bleema Rosenfeld
Local Learning Algorithms For Stochastic Spiking Neural Networks, Bleema Rosenfeld
Dissertations
This dissertation focuses on the development of machine learning algorithms for spiking neural networks, with an emphasis on local three-factor learning rules that are in keeping with the constraints imposed by current neuromorphic hardware. Spiking neural networks (SNNs) are an alternative to artificial neural networks (ANNs) that follow a similar graphical structure but use a processing paradigm more closely modeled after the biological brain in an effort to harness its low power processing capability. SNNs use an event based processing scheme which leads to significant power savings when implemented in dedicated neuromorphic hardware such as Intel’s Loihi chip.
This work …
Dark Patterns: Effect On Overall User Experience And Site Revisitation, Deon Soul Calawen
Dark Patterns: Effect On Overall User Experience And Site Revisitation, Deon Soul Calawen
Dissertations
Dark patterns are user interfaces purposefully designed to manipulate users into doing something they might not otherwise do for the benefit of an online service. This study investigates the impact of dark patterns on overall user experience and site revisitation in the context of airline websites. In order to assess potential dark pattern effects, two versions of the same airline website were compared: a dark version containing dark pattern elements and a bright version free of manipulative interfaces. User experience for both websites were assessed quantitatively through a survey containing a User Experience Questionnaire (UEQ) and a System Usability Scale …
An Analysis On Network Flow-Based Iot Botnet Detection Using Weka, Cian Porteous
An Analysis On Network Flow-Based Iot Botnet Detection Using Weka, Cian Porteous
Dissertations
Botnets pose a significant and growing risk to modern networks. Detection of botnets remains an important area of open research in order to prevent the proliferation of botnets and to mitigate the damage that can be caused by botnets that have already been established. Botnet detection can be broadly categorised into two main categories: signature-based detection and anomaly-based detection. This paper sets out to measure the accuracy, false-positive rate, and false-negative rate of four algorithms that are available in Weka for anomaly-based detection of a dataset of HTTP and IRC botnet data. The algorithms that were selected to detect botnets …
Evaluating The Performance Of Vision Transformer Architecture For Deepfake Image Classification, Devesan Govindasamy
Evaluating The Performance Of Vision Transformer Architecture For Deepfake Image Classification, Devesan Govindasamy
Dissertations
Deepfake classification has seen some impressive results lately, with the experimentation of various deep learning methodologies, researchers were able to design some state-of-the art techniques. This study attempts to use an existing technology “Transformers” in the field of Natural Language Processing (NLP) which has been a de-facto standard in text processing for the purposes of Computer Vision. Transformers use a mechanism called “self-attention”, which is different from CNN and LSTM. This study uses a novel technique that considers images as 16x16 words (Dosovitskiy et al., 2021) to train a deep neural network with “self-attention” blocks to detect deepfakes. It creates …
Measuring And Comparing Social Bias In Static And Contextual Word Embeddings, Alan Cueva Mora
Measuring And Comparing Social Bias In Static And Contextual Word Embeddings, Alan Cueva Mora
Dissertations
Word embeddings have been considered one of the biggest breakthroughs of deep learning for natural language processing. They are learned numerical vector representations of words where similar words have similar representations. Contextual word embeddings are the promising second-generation of word embeddings assigning a representation to a word based on its context. This can result in different representations for the same word depending on the context (e.g. river bank and commercial bank). There is evidence of social bias (human-like implicit biases based on gender, race, and other social constructs) in word embeddings. While detecting bias in static (classical or non-contextual) word …