Open Access. Powered by Scholars. Published by Universities.®

Electrical and Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Electrical and Computer Engineering

Deep Learning-Guided Prediction Of Material’S Microstructures And Applications To Advanced Manufacturing, Jianan Tang Dec 2021

Deep Learning-Guided Prediction Of Material’S Microstructures And Applications To Advanced Manufacturing, Jianan Tang

All Dissertations

Material microstructure prediction based on processing conditions is very useful in advanced manufacturing. Trial-and-error experiments are very time-consuming to exhaust numerous combinations of processing parameters and characterize the resulting microstructures. To accelerate process development and optimization, researchers have explored microstructure prediction methods, including physical-based modeling and feature-based machine learning. Nevertheless, they both have limitations. Physical-based modeling consumes too much computational power. And in feature-based machine learning, low-dimensional microstructural features are manually extracted to represent high-dimensional microstructures, which leads to information loss.

In this dissertation, a deep learning-guided microstructure prediction framework is established. It uses a conditional generative adversarial network (CGAN) …


Analysis Of Deep Learning Methods For Wired Ethernet Physical Layer Security Of Operational Technology, Lucas Torlay Dec 2021

Analysis Of Deep Learning Methods For Wired Ethernet Physical Layer Security Of Operational Technology, Lucas Torlay

All Theses

The cybersecurity of power systems is jeopardized by the threat of spoofing and man-in-the-middle style attacks due to a lack of physical layer device authentication techniques for operational technology (OT) communication networks. OT networks cannot support the active probing cybersecurity methods that are popular in information technology (IT) networks. Furthermore, both active and passive scanning techniques are susceptible to medium access control (MAC) address spoofing when operating at Layer 2 of the Open Systems Interconnection (OSI) model. This thesis aims to analyze the role of deep learning in passively authenticating Ethernet devices by their communication signals. This method operates at …