Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Machine learning

Physical Sciences and Mathematics

Institution
Publication Year
Publication
Publication Type

Articles 1 - 30 of 156

Full-Text Articles in Computer Engineering

Preprocessing Of Astronomical Images From The Neowise Survey For Near-Earth Asteroid Detection With Machine Learning, Rachel Meyer Mar 2024

Preprocessing Of Astronomical Images From The Neowise Survey For Near-Earth Asteroid Detection With Machine Learning, Rachel Meyer

ELAIA

Asteroid detection is a common field in astronomy for planetary defense, requiring observations from survey telescopes to detect and classify different objects. The amount of data collected each night is continually increasing as new and better-designed telescopes begin collecting information each year. This amount of data is quickly becoming unmanageable, and researchers are looking for ways to better process this data. The most feasible current solution is to implement computer algorithms to automatically detect these sources and then use machine learning to create a more efficient and accurate method of classification. Implementation of such methods has previously focused on larger …


Accelerating Machine Learning Inference For Satellite Component Feature Extraction Using Fpgas., Andrew Ekblad Dec 2023

Accelerating Machine Learning Inference For Satellite Component Feature Extraction Using Fpgas., Andrew Ekblad

Theses and Dissertations

Running computer vision algorithms requires complex devices with lots of computing power, these types of devices are not well suited for space deployment. The harsh radiation environment and limited power budgets have hindered the ability of running advanced computer vision algorithms in space. This problem makes running an on-orbit servicing detection algorithm very difficult. This work proposes using a low powered FPGA to accelerate the computer vision algorithms that enable satellite component feature extraction. This work uses AMD/Xilinx’s Zynq SoC and DPU IP to run model inference. Experiments in this work centered around improving model post processing by creating implementations …


Machine Learning Based Bioinformatics Analysis Of Intron Usage Alterations And Metabolic Regulation In Adipose Browning, Hamza Umut Karakurt, Pinar Pi̇r Nov 2023

Machine Learning Based Bioinformatics Analysis Of Intron Usage Alterations And Metabolic Regulation In Adipose Browning, Hamza Umut Karakurt, Pinar Pi̇r

Turkish Journal of Electrical Engineering and Computer Sciences

Adipose tissue is the major energy depot of the body and is considered an endocrine organ. Adipose tissue involves many different cell types, first and foremost, the adipocytes. White adipose cells that store fat and brown adipocytes that take part in lipid oxidation and heat generation are the most common cell types in adipose tissue. Even though brown adipocytes which have a high number of mitochondria and high fat-burning capacity are rare in adults, they are abundant in newborns and rodents. White adipocytes can gain a temporal brown-like character with a process called browning, which can be induced with cold …


Learning-Based Ant Colony Optimization Algorithm For Solving A Kind Of Complex 2-Echelon Vehicle Routing Problem, Xue Chen, Rong Hu, Hui Wang, Zuocheng Li, Bin Qian, Yixu Li Nov 2023

Learning-Based Ant Colony Optimization Algorithm For Solving A Kind Of Complex 2-Echelon Vehicle Routing Problem, Xue Chen, Rong Hu, Hui Wang, Zuocheng Li, Bin Qian, Yixu Li

Journal of System Simulation

Abstract: Aiming at green 2-echelon vehicle routing problem with simultaneous pick-up and delivery, a learning-based ant colony optimization algorithm combined with clustering decomposition is proposed. The objective function to be minimized is total transportation cost wherein carbon emission cost is specially considered. Associated with the mutual coupling features of the 2-echelon vehicle routing problem, we propose a distance-based clustering method to decompose the original problem into a set of sub-problems. Then, a learning-based ant colony optimization algorithm is presented to find the solutions of the sub-problems based on which the solution of the original problem can be obtained. In the …


Fuzzycsampling: A Hybrid Fuzzy C-Means Clustering Sampling Strategy For Imbalanced Datasets, Abdullah Maraş, Çi̇ğdem Erol Nov 2023

Fuzzycsampling: A Hybrid Fuzzy C-Means Clustering Sampling Strategy For Imbalanced Datasets, Abdullah Maraş, Çi̇ğdem Erol

Turkish Journal of Electrical Engineering and Computer Sciences

Classification model with imbalanced datasets is recently one of the most researched areas in machine learning applications since they induce to the emergence of low-performing machine learning models. The imbalanced datasets occur if target variables have an uneven number of examples in a dataset. The most prevalent solutions to imbalanced datasets can be categorized as data preprocessing, ensemble techniques, and cost-sensitive learning. In this article, we propose a new hybrid approach for binary classification, named FuzzyCSampling, which aims to increase model performance by ensembling fuzzy c-means clustering and data sampling solutions. This article compares the proposed approaches' results not only …


Data Provenance Via Differential Auditing, Xin Mu, Ming Pang, Feida Zhu Nov 2023

Data Provenance Via Differential Auditing, Xin Mu, Ming Pang, Feida Zhu

Research Collection School Of Computing and Information Systems

With the rising awareness of data assets, data governance, which is to understand where data comes from, how it is collected, and how it is used, has been assuming evergrowing importance. One critical component of data governance gaining increasing attention is auditing machine learning models to determine if specific data has been used for training. Existing auditing techniques, like shadow auditing methods, have shown feasibility under specific conditions such as having access to label information and knowledge of training protocols. However, these conditions are often not met in most real-world applications. In this paper, we introduce a practical framework for …


Classification Of Chronic Pain Using Fmri Data: Unveiling Brain Activity Patterns For Diagnosis, Rejula V, Anitha J, Belfin Robinson Oct 2023

Classification Of Chronic Pain Using Fmri Data: Unveiling Brain Activity Patterns For Diagnosis, Rejula V, Anitha J, Belfin Robinson

Turkish Journal of Electrical Engineering and Computer Sciences

Millions of people throughout the world suffer from the complicated and crippling condition of chronic pain. It can be brought on by several underlying disorders or injuries and is defined by chronic pain that lasts for a period exceeding three months. To better understand the brain processes behind pain and create prediction models for pain-related outcomes, machine learning is a potent technology that may be applied in Functional magnetic resonance imaging (fMRI) chronic pain research. Data (fMRI and T1-weighted images) from 76 participants has been included (30 chronic pain and 46 healthy controls). The raw data were preprocessed using fMRIprep …


Stepwise Dynamic Nearest Neighbor (Sdnn): A New Algorithm For Classification, Deni̇z Karabaş, Derya Bi̇rant, Peli̇n Yildirim Taşer Sep 2023

Stepwise Dynamic Nearest Neighbor (Sdnn): A New Algorithm For Classification, Deni̇z Karabaş, Derya Bi̇rant, Peli̇n Yildirim Taşer

Turkish Journal of Electrical Engineering and Computer Sciences

Although the standard k-nearest neighbor (KNN) algorithm has been used widely for classification in many different fields, it suffers from various limitations that abate its classification ability, such as being influenced by the distribution of instances, ignoring distances between the test instance and its neighbors during classification, and building a single/weak learner. This paper proposes a novel algorithm, called stepwise dynamic nearest neighbor (SDNN), which can effectively handle these problems. Instead of using a fixed parameter k like KNN, it uses a dynamic neighborhood strategy according to the data distribution and implements a new voting mechanism, called stepwise voting. Experimental …


A Machine Learning Approach For Dyslexia Detection Using Turkish Audio Records, Tuğberk Taş, Muhammed Abdullah Bülbül, Abas Haşi̇moğlu, Yavuz Meral, Yasi̇n Çalişkan, Gunay Budagova, Mücahi̇d Kutlu Sep 2023

A Machine Learning Approach For Dyslexia Detection Using Turkish Audio Records, Tuğberk Taş, Muhammed Abdullah Bülbül, Abas Haşi̇moğlu, Yavuz Meral, Yasi̇n Çalişkan, Gunay Budagova, Mücahi̇d Kutlu

Turkish Journal of Electrical Engineering and Computer Sciences

Dyslexia is a learning disorder, characterized by impairment in the ability to read, spell, and decode letters. It is vital to detect dyslexia in earlier stages to reduce its effects. However, diagnosing dyslexia is a time-consuming and costly process. In this paper, we propose a machine-learning model that predicts whether a Turkish-speaking child has dyslexia using his/her audio records. Therefore, our model can be easily used by smart phones and work as a warning system such that children who are likely to be dyslexic according to our model can seek an examination by experts. In order to train and evaluate, …


Cognitive Load Detection Using Ci-Ssa For Eeg Signal Decomposition And Nature-Inspired Feature Selection, Jammisetty Yedukondalu, Lakhan Dev Sharma Sep 2023

Cognitive Load Detection Using Ci-Ssa For Eeg Signal Decomposition And Nature-Inspired Feature Selection, Jammisetty Yedukondalu, Lakhan Dev Sharma

Turkish Journal of Electrical Engineering and Computer Sciences

Cognitive load detection is eminent during the mental assignment of neural activity because it indicates how the brain reacts to stimuli. The level of cognitive load experienced during mental arithmetic tasks can be determined using an electroencephalogram (EEG). The EEG data were collected from publicly available datasets, namely, mental arithmetic task (MAT) and simultaneous task workload (STEW). The first phase comprises decomposing the electroencephalogram (EEG) signal into intrinsic mode functions (IMFs) using circulant singular spectrum analysis (Ci-SSA). In the second phase, entropy-based features were evaluated using IMFs. After that, the extracted features were fed to nature-inspired feature selection algorithms: genetic …


Compatibility Of Clique Clustering Algorithm With Dimensionality Reduction, Ug ̆Ur Madran, Duygu Soyog ̆Lu Sep 2023

Compatibility Of Clique Clustering Algorithm With Dimensionality Reduction, Ug ̆Ur Madran, Duygu Soyog ̆Lu

Applied Mathematics & Information Sciences

In our previous work, we introduced a clustering algorithm based on clique formation. Cliques, the obtained clusters, are constructed by choosing the most dense complete subgraphs by using similarity values between instances. The clique algorithm successfully reduces the number of instances in a data set without substantially changing the accuracy rate. In this current work, we focused on reducing the number of features. For this purpose, the effect of the clique clustering algorithm on dimensionality reduction has been analyzed. We propose a novel algorithm for support vector machine classification by combining these two techniques and applying different strategies by differentiating …


Autonomous Shipwreck Detection & Mapping, William Ard Aug 2023

Autonomous Shipwreck Detection & Mapping, William Ard

LSU Master's Theses

This thesis presents the development and testing of Bruce, a low-cost hybrid Remote Operated Vehicle (ROV) / Autonomous Underwater Vehicle (AUV) system for the optical survey of marine archaeological sites, as well as a novel sonar image augmentation strategy for semantic segmentation of shipwrecks. This approach takes side-scan sonar and bathymetry data collected using an EdgeTech 2205 AUV sensor integrated with an Harris Iver3, and generates augmented image data to be used for the semantic segmentation of shipwrecks. It is shown that, due to the feature enhancement capabilities of the proposed shipwreck detection strategy, correctly identified areas have a 15% …


An Ml Based Digital Forensics Software For Triage Analysis Through Face Recognition, Gaurav Gogia, Parag H. Rughani Jul 2023

An Ml Based Digital Forensics Software For Triage Analysis Through Face Recognition, Gaurav Gogia, Parag H. Rughani

Journal of Digital Forensics, Security and Law

Since the past few years, the complexity and heterogeneity of digital crimes has increased exponentially, which has made the digital evidence & digital forensics paramount for both criminal investigation and civil litigation cases. Some of the routine digital forensic analysis tasks are cumbersome and can increase the number of pending cases especially when there is a shortage of domain experts. While the work is not very complex, the sheer scale can be taxing. With the current scenarios and future predictions, crimes are only going to become more complex and the precedent of collecting and examining digital evidence is only going …


A Practical Framework For Early Detection Of Diabetes Using Ensemble Machine Learning Models, Qusay Saihood, Emrullah Sonuç Jul 2023

A Practical Framework For Early Detection Of Diabetes Using Ensemble Machine Learning Models, Qusay Saihood, Emrullah Sonuç

Turkish Journal of Electrical Engineering and Computer Sciences

The diagnosis of diabetes, a prevalent global health condition, is crucial for preventing severe complications. In recent years, there has been a growing effort to develop intelligent diagnostic systems for diabetes utilizing machine learning (ML) algorithms. Despite these efforts, achieving high accuracy rates using such systems remains a significant challenge. Recent advancements in ensemble ML methods offer promising opportunities for early detection of diabetes, as they are known to be faster and more cost-effective than traditional approaches. Therefore, this study proposes a practical framework for diagnosing diabetes that involves three stages. The data preprocessing stage encompasses several crucial tasks, including …


An Efficient Deep Learning Architecture For Turkish Lira Recognition And Counterfeit Detection, Burak İyi̇kesi̇ci̇, Ergun Erçelebi̇ May 2023

An Efficient Deep Learning Architecture For Turkish Lira Recognition And Counterfeit Detection, Burak İyi̇kesi̇ci̇, Ergun Erçelebi̇

Turkish Journal of Electrical Engineering and Computer Sciences

Banknote counterfeiting is a common practice worldwide. Due to the recent developments in technology, banknote imitation has become easier than before. There are different kinds of algorithms developed for the detection of counterfeit banknotes for different countries in the literature. The earlier algorithms utilized classical image processing techniques where the implementations of machine learning and deep learning algorithms appeared with the developments in the artificial intelligence field as well as the computer hardware. In this study, a novel convolutional neural networks-based deep learning algorithm has been developed that detects counterfeit Turkish Lira banknotes and their denominations using the banknote images …


Information-Theoretic Model Diagnostics (Infomod), Armin Esmaeilzadeh May 2023

Information-Theoretic Model Diagnostics (Infomod), Armin Esmaeilzadeh

UNLV Theses, Dissertations, Professional Papers, and Capstones

Model validation is a critical step in the development, deployment, and governance of machine learning models. During the validation process, the predictive power of a model is measured on unseen datasets with a variety of metrics such as Accuracy and F1-Scores for classification tasks. Although the most used metrics are easy to implement and understand, they are aggregate measures over all the segments of heterogeneous datasets, and therefore, they do not identify the performance variation of a model among different data segments. The lack of insight into how the model performs over segments of unseen datasets has raised significant challenges …


Wearable Sensor Gait Analysis For Fall Detection Using Deep Learning Methods, Haben Girmay Yhdego May 2023

Wearable Sensor Gait Analysis For Fall Detection Using Deep Learning Methods, Haben Girmay Yhdego

Electrical & Computer Engineering Theses & Dissertations

World Health Organization (WHO) data show that around 684,000 people die from falls yearly, making it the second-highest mortality rate after traffic accidents [1]. Early detection of falls, followed by pneumatic protection, is one of the most effective means of ensuring the safety of the elderly. In light of the recent widespread adoption of wearable sensors, it has become increasingly critical that fall detection models are developed that can effectively process large and sequential sensor signal data. Several researchers have recently developed fall detection algorithms based on wearable sensor data. However, real-time fall detection remains challenging because of the wide …


Gpu Utilization: Predictive Sarimax Time Series Analysis, Dorothy Dorie Parry Apr 2023

Gpu Utilization: Predictive Sarimax Time Series Analysis, Dorothy Dorie Parry

Modeling, Simulation and Visualization Student Capstone Conference

This work explores collecting performance metrics and leveraging the output for prediction on a memory-intensive parallel image classification algorithm - Inception v3 (or "Inception3"). Experimental results were collected by nvidia-smi on a computational node DGX-1, equipped with eight Tesla V100 Graphic Processing Units (GPUs). Time series analysis was performed on the GPU utilization data taken, for multiple runs, of Inception3’s image classification algorithm (see Figure 1). The time series model applied was Seasonal Autoregressive Integrated Moving Average Exogenous (SARIMAX).


Lidar Buoy Detection For Autonomous Marine Vessel Using Pointnet Classification, Christopher Adolphi, Dorothy Dorie Parry, Yaohang Li, Masha Sosonkina, Ahmet Saglam, Yiannis E. Papelis Apr 2023

Lidar Buoy Detection For Autonomous Marine Vessel Using Pointnet Classification, Christopher Adolphi, Dorothy Dorie Parry, Yaohang Li, Masha Sosonkina, Ahmet Saglam, Yiannis E. Papelis

Modeling, Simulation and Visualization Student Capstone Conference

Maritime autonomy, specifically the use of autonomous and semi-autonomous maritime vessels, is a key enabling technology supporting a set of diverse and critical research areas, including coastal and environmental resilience, assessment of waterway health, ecosystem/asset monitoring and maritime port security. Critical to the safe, efficient and reliable operation of an autonomous maritime vessel is its ability to perceive on-the-fly the external environment through onboard sensors. In this paper, buoy detection for LiDAR images is explored by using several tools and techniques: machine learning methods, Unity Game Engine (herein referred to as Unity) simulation, and traditional image processing. The Unity Game …


Design, Determination, And Evaluation Of Gender-Based Bias Mitigation Techniques For Music Recommender Systems, Sunny Shrestha Mar 2023

Design, Determination, And Evaluation Of Gender-Based Bias Mitigation Techniques For Music Recommender Systems, Sunny Shrestha

Electronic Theses and Dissertations

The majority of smartphone users engage with a recommender system on a daily basis. Many rely on these recommendations to make their next purchase, download the next game, listen to the new music or find the next healthcare provider. Although there are plenty of evidence backed research that demonstrates presence of gender bias in Machine Learning (ML) models like recommender systems, the issue is viewed as a frivolous cause that doesn’t merit much action. However, gender bias poses to effect more than half of the population as by default ML systems are designed to cater to a cisgender man. This …


Towards Machine Learning-Based Fpga Backend Flow: Challenges And Opportunities, Imran Taj, Umer Farooq Feb 2023

Towards Machine Learning-Based Fpga Backend Flow: Challenges And Opportunities, Imran Taj, Umer Farooq

All Works

Field-Programmable Gate Array (FPGA) is at the core of System on Chip (SoC) design across various Industry 5.0 digital systems—healthcare devices, farming equipment, autonomous vehicles and aerospace gear to name a few. Given that pre-silicon verification using Computer Aided Design (CAD) accounts for about 70% of the time and money spent on the design of modern digital systems, this paper summarizes the machine learning (ML)-oriented efforts in different FPGA CAD design steps. With the recent breakthrough of machine learning, FPGA CAD tasks—high-level synthesis (HLS), logic synthesis, placement and routing—are seeing a renewed interest in their respective decision-making steps. We focus …


Adversarial Training Of Deep Neural Networks, Anabetsy Termini Jan 2023

Adversarial Training Of Deep Neural Networks, Anabetsy Termini

CCE Theses and Dissertations

Deep neural networks used for image classification are highly susceptible to adversarial attacks. The de facto method to increase adversarial robustness is to train neural networks with a mixture of adversarial images and unperturbed images. However, this method leads to robust overfitting, where the network primarily learns to recognize one specific type of attack used to generate the images while remaining vulnerable to others after training. In this dissertation, we performed a rigorous study to understand whether combinations of state of the art data augmentation methods with Stochastic Weight Averaging improve adversarial robustness and diminish adversarial overfitting across a wide …


An Empirical Study Of Pre-Trained Model Reuse In The Hugging Face Deep Learning Model Registry, Wenxin Jiang, Nicholas Synovic, Matt Hyatt, Taylor R. Schorlemmer, Rohan Sethi, Yung-Hsiang Lu, George K. Thiruvathukal, James C. Davis Jan 2023

An Empirical Study Of Pre-Trained Model Reuse In The Hugging Face Deep Learning Model Registry, Wenxin Jiang, Nicholas Synovic, Matt Hyatt, Taylor R. Schorlemmer, Rohan Sethi, Yung-Hsiang Lu, George K. Thiruvathukal, James C. Davis

Department of Electrical and Computer Engineering Faculty Publications

Deep Neural Networks (DNNs) are being adopted as components in software systems. Creating and specializing DNNs from scratch has grown increasingly difficult as state-of-the-art architectures grow more complex. Following the path of traditional software engineering, machine learning engineers have begun to reuse large-scale pre-trained models (PTMs) and fine-tune these models for downstream tasks. Prior works have studied reuse practices for traditional software packages to guide software engineers towards better package maintenance and dependency management. We lack a similar foundation of knowledge to guide behaviors in pre-trained model ecosystems.

In this work, we present the first empirical investigation of PTM reuse. …


Quantum Computing And Its Applications In Healthcare, Vu Giang Jan 2023

Quantum Computing And Its Applications In Healthcare, Vu Giang

OUR Journal: ODU Undergraduate Research Journal

This paper serves as a review of the state of quantum computing and its application in healthcare. The various avenues for how quantum computing can be applied to healthcare is discussed here along with the conversation about the limitations of the technology. With more and more efforts put into the development of these computers, its future is promising with the endeavors of furthering healthcare and various other industries.


Security Of Internet Of Things (Iot) Using Federated Learning And Deep Learning — Recent Advancements, Issues And Prospects, Vinay Gugueoth, Sunitha Safavat, Sachin Shetty Jan 2023

Security Of Internet Of Things (Iot) Using Federated Learning And Deep Learning — Recent Advancements, Issues And Prospects, Vinay Gugueoth, Sunitha Safavat, Sachin Shetty

Electrical & Computer Engineering Faculty Publications

There is a great demand for an efficient security framework which can secure IoT systems from potential adversarial attacks. However, it is challenging to design a suitable security model for IoT considering the dynamic and distributed nature of IoT. This motivates the researchers to focus more on investigating the role of machine learning (ML) in the designing of security models. A brief analysis of different ML algorithms for IoT security is discussed along with the advantages and limitations of ML algorithms. Existing studies state that ML algorithms suffer from the problem of high computational overhead and risk of privacy leakage. …


An Optimized And Scalable Blockchain-Based Distributed Learning Platform For Consumer Iot, Zhaocheng Wang, Xueying Liu, Xinming Shao, Abdullah Alghamdi, Md. Shirajum Munir, Sujit Biswas Jan 2023

An Optimized And Scalable Blockchain-Based Distributed Learning Platform For Consumer Iot, Zhaocheng Wang, Xueying Liu, Xinming Shao, Abdullah Alghamdi, Md. Shirajum Munir, Sujit Biswas

School of Cybersecurity Faculty Publications

Consumer Internet of Things (CIoT) manufacturers seek customer feedback to enhance their products and services, creating a smart ecosystem, like a smart home. Due to security and privacy concerns, blockchain-based federated learning (BCFL) ecosystems can let CIoT manufacturers update their machine learning (ML) models using end-user data. Federated learning (FL) uses privacy-preserving ML techniques to forecast customers' needs and consumption habits, and blockchain replaces the centralized aggregator to safeguard the ecosystem. However, blockchain technology (BCT) struggles with scalability and quick ledger expansion. In BCFL, local model generation and secure aggregation are other issues. This research introduces a novel architecture, emphasizing …


Early Diagnosis Of Pancreatic Cancer By Machine Learning Methods Using Urine Biomarker Combinations, İrem Acer, Firat Orhan Bulucu, Semra İçer, Fatma Lati̇foğlu Jan 2023

Early Diagnosis Of Pancreatic Cancer By Machine Learning Methods Using Urine Biomarker Combinations, İrem Acer, Firat Orhan Bulucu, Semra İçer, Fatma Lati̇foğlu

Turkish Journal of Electrical Engineering and Computer Sciences

The most common type of pancreatic cancer is pancreatic ductal adenocarcinoma (PDAC), which accounts for the vast majority of pancreatic cancers. The five-year survival rate for PDAC due to late diagnosis is 9%. Early diagnosed PDAC patients survive longer than patients diagnosed at a more advanced stage. Biomarkers can play an essential role in the early detection of PDAC to assist the health professional. Machine learning and deep learning methods are used with biomarkers obtained in recent studies for diagnostic purposes. In order to increase the survival rates of PDAC patients, early diagnosis of the disease with a noninvasive test …


A Survey And Evaluation Of Android-Based Malware Evasion Techniques And Detection Frameworks, Parvez Faruki, Rhati Bhan, Vinesh Jain, Sajal Bhatia, Nour El Madhoun, Rajendra Pamula Jan 2023

A Survey And Evaluation Of Android-Based Malware Evasion Techniques And Detection Frameworks, Parvez Faruki, Rhati Bhan, Vinesh Jain, Sajal Bhatia, Nour El Madhoun, Rajendra Pamula

School of Computer Science & Engineering Faculty Publications

Android platform security is an active area of research where malware detection techniques continuously evolve to identify novel malware and improve the timely and accurate detection of existing malware. Adversaries are constantly in charge of employing innovative techniques to avoid or prolong malware detection effectively. Past studies have shown that malware detection systems are susceptible to evasion attacks where adversaries can successfully bypass the existing security defenses and deliver the malware to the target system without being detected. The evolution of escape-resistant systems is an open research problem. This paper presents a detailed taxonomy and evaluation of Android-based malware evasion …


Cyber Resilience Analytics For Cyber-Physical Systems, Md Ariful Haque Dec 2022

Cyber Resilience Analytics For Cyber-Physical Systems, Md Ariful Haque

Electrical & Computer Engineering Theses & Dissertations

Cyber-physical systems (CPSs) are complex systems that evolve from the integrations of components dealing with physical processes and real-time computations, along with networking. CPSs often incorporate approaches merging from different scientific fields such as embedded systems, control systems, operational technology, information technology systems (ITS), and cybernetics. Today critical infrastructures (CIs) (e.g., energy systems, electric grids, etc.) and other CPSs (e.g., manufacturing industries, autonomous transportation systems, etc.) are experiencing challenges in dealing with cyberattacks. Major cybersecurity concerns are rising around CPSs because of their ever-growing use of information technology based automation. Often the security concerns are limited to probability-based possible attack …


Design Of Secure Communication Schemes To Provide Authentication And Integrity Among The Iot Devices, Vidya Rao Dr. Nov 2022

Design Of Secure Communication Schemes To Provide Authentication And Integrity Among The Iot Devices, Vidya Rao Dr.

Technical Collection

The fast growth in Internet-of-Things (IoT) based applications, has increased the number of end-devices communicating over the Internet. The end devices are made with fewer resources and are low battery-powered. These resource-constrained devices are exposed to various security and privacy concerns over publicly available Internet communication. Thus, it becomes essential to provide lightweight security solutions to safeguard data and user privacy. Elliptic Curve Cryptography (ECC) can be used to generate the digital signature and also encrypt the data. The method can be evaluated on a real-time testbed deployed using Raspberry Pi3 devices and every message transmitted is subjected to ECC. …