Open Access. Powered by Scholars. Published by Universities.®
Electrical and Computer Engineering Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Engineering (34)
- Computer Sciences (32)
- Physical Sciences and Mathematics (32)
- Artificial Intelligence and Robotics (23)
- Signal Processing (21)
-
- Other Electrical and Computer Engineering (18)
- Electrical and Electronics (12)
- Systems and Communications (12)
- Other Computer Engineering (9)
- Digital Communications and Networking (8)
- Software Engineering (8)
- Data Science (7)
- Power and Energy (7)
- Biomedical (6)
- Biomedical Engineering and Bioengineering (5)
- Computer and Systems Architecture (4)
- Applied Mathematics (3)
- Computational Engineering (3)
- Controls and Control Theory (3)
- Library and Information Science (3)
- Medicine and Health Sciences (3)
- Robotics (3)
- Social and Behavioral Sciences (3)
- Statistics and Probability (3)
- Systems Architecture (3)
- Aviation (2)
- Bioinformatics (2)
- Business (2)
- Institution
-
- Western University (12)
- West Virginia University (9)
- University of Tennessee, Knoxville (6)
- Clemson University (4)
- Embry-Riddle Aeronautical University (4)
-
- Missouri University of Science and Technology (4)
- University of Nebraska - Lincoln (4)
- California Polytechnic State University, San Luis Obispo (3)
- University of New Mexico (3)
- University of South Florida (3)
- University of Texas at El Paso (3)
- Florida International University (2)
- Georgia Southern University (2)
- Rowan University (2)
- South Dakota State University (2)
- Syracuse University (2)
- University of Kentucky (2)
- University of Nevada, Las Vegas (2)
- Utah State University (2)
- Virginia Commonwealth University (2)
- Wayne State University (2)
- American University in Cairo (1)
- Bard College (1)
- Marshall University (1)
- Michigan Technological University (1)
- Mississippi State University (1)
- Old Dominion University (1)
- Purdue University (1)
- Rose-Hulman Institute of Technology (1)
- Santa Clara University (1)
- Publication Year
- Publication
-
- Graduate Theses, Dissertations, and Problem Reports (9)
- Electronic Thesis and Dissertation Repository (8)
- Doctoral Dissertations (7)
- Theses and Dissertations (7)
- Electrical and Computer Engineering Publications (4)
-
- Publications (4)
- All Theses (3)
- Electrical and Computer Engineering ETDs (3)
- Electronic Theses and Dissertations (3)
- Master's Theses (3)
- Open Access Theses & Dissertations (3)
- USF Tampa Graduate Theses and Dissertations (3)
- All Graduate Theses and Dissertations, Spring 1920 to Summer 2023 (2)
- Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research (2)
- Dissertations - ALL (2)
- Electrical and Computer Engineering Faculty Research & Creative Works (2)
- FIU Electronic Theses and Dissertations (2)
- Library Philosophy and Practice (e-journal) (2)
- Masters Theses (2)
- Theses and Dissertations--Electrical and Computer Engineering (2)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (2)
- Wayne State University Dissertations (2)
- All Dissertations (1)
- Conference papers (1)
- Dissertations, Master's Theses and Master's Reports (1)
- Doctoral Dissertations and Master's Theses (1)
- Electrical & Computer Engineering Theses & Dissertations (1)
- Electrical and Computer Engineering Senior Theses (1)
- Graduate Theses - Electrical and Computer Engineering (1)
- Honors College Theses (1)
- Publication Type
Articles 31 - 60 of 89
Full-Text Articles in Electrical and Computer Engineering
An Analysis On Adversarial Machine Learning: Methods And Applications, Ali Dabouei
An Analysis On Adversarial Machine Learning: Methods And Applications, Ali Dabouei
Graduate Theses, Dissertations, and Problem Reports
Deep learning has witnessed astonishing advancement in the last decade and revolutionized many fields ranging from computer vision to natural language processing. A prominent field of research that enabled such achievements is adversarial learning, investigating the behavior and functionality of a learning model in presence of an adversary. Adversarial learning consists of two major trends. The first trend analyzes the susceptibility of machine learning models to manipulation in the decision-making process and aims to improve the robustness to such manipulations. The second trend exploits adversarial games between components of the model to enhance the learning process. This dissertation aims to …
Landmark Enforcement And Principal Component Analysis For Improving Gan-Based Morphing, Samuel W. Price
Landmark Enforcement And Principal Component Analysis For Improving Gan-Based Morphing, Samuel W. Price
Graduate Theses, Dissertations, and Problem Reports
Facial Recognition Systems (FRSs) are a key target for adversaries determined to circumvent security checkpoints. Morph images threaten FRS by presenting as multiple individuals, allowing an adversary to swap identities with another subject. Although morph generation using generative adversarial networks (GANs) results in high-quality morphs without possessing the spatial artifacts caused by landmarkbased methods, there is an apparent loss in identity with standard GAN-based morphing methods. In this thesis, we examine landmark-based and GAN-based morphing methods to fuse the advantages of both methodologies. We propose a novel StyleGAN2 morph generation technique by introducing a landmark enforcement method. Considering this method, …
Smart City Management Using Machine Learning Techniques, Mostafa Zaman
Smart City Management Using Machine Learning Techniques, Mostafa Zaman
Theses and Dissertations
In response to the growing urban population, "smart cities" are designed to improve people's quality of life by implementing cutting-edge technologies. The concept of a "smart city" refers to an effort to enhance a city's residents' economic and environmental well-being via implementing a centralized management system. With the use of sensors and actuators, smart cities can collect massive amounts of data, which can improve people's quality of life and design cities' services. Although smart cities contain vast amounts of data, only a percentage is used due to the noise and variety of the data sources. Information and communication technology (ICT) …
A Deep Recurrent Neural Network With Iterative Optimization For Inverse Image Processing Applications, Masaki Ikuta
A Deep Recurrent Neural Network With Iterative Optimization For Inverse Image Processing Applications, Masaki Ikuta
Theses and Dissertations
Many algorithms and methods have been proposed for inverse image processing applications, such as super-resolution, image de-noising, and image reconstruction, particularly with the recent surge of interest in machine learning and deep learning methods.
As for Computed Tomography (CT) image reconstruction, the most recently proposed methods are limited to image domain processing, where deep learning is used to learn the mapping between a true image data set and a noisy image data set in the image domain. While deep learning-based methods can produce higher quality images than conventional model-based algorithms, these methods have a limitation. Deep learning-based methods used in …
Evaluation Of Robust Deep Learning Pipelines Targeting Low Swap Edge Deployment, David Carter Cornett
Evaluation Of Robust Deep Learning Pipelines Targeting Low Swap Edge Deployment, David Carter Cornett
Masters Theses
The deep learning technique of convolutional neural networks (CNNs) has greatly advanced the state-of-the-art for computer vision tasks such as image classification and object detection. These solutions rely on large systems leveraging wattage-hungry GPUs to provide the computational power to achieve such performance. However, the size, weight and power (SWaP) requirements of these conventional GPU-based deep learning systems are not suitable when a solution requires deployment to so called "Edge" environments such as autonomous vehicles, unmanned aerial vehicles (UAVs) and smart security cameras.
The objective of this work is to benchmark FPGA-based alternatives to conventional GPU systems that have the …
Machine Learning For Unmanned Aerial System (Uas) Networking, Jian Wang
Machine Learning For Unmanned Aerial System (Uas) Networking, Jian Wang
Doctoral Dissertations and Master's Theses
Fueled by the advancement of 5G new radio (5G NR), rapid development has occurred in many fields. Compared with the conventional approaches, beamforming and network slicing enable 5G NR to have ten times decrease in latency, connection density, and experienced throughput than 4G long term evolution (4G LTE). These advantages pave the way for the evolution of Cyber-physical Systems (CPS) on a large scale. The reduction of consumption, the advancement of control engineering, and the simplification of Unmanned Aircraft System (UAS) enable the UAS networking deployment on a large scale to become feasible. The UAS networking can finish multiple complex …
Analysis Of Deep Learning Methods For Wired Ethernet Physical Layer Security Of Operational Technology, Lucas Torlay
Analysis Of Deep Learning Methods For Wired Ethernet Physical Layer Security Of Operational Technology, Lucas Torlay
All Theses
The cybersecurity of power systems is jeopardized by the threat of spoofing and man-in-the-middle style attacks due to a lack of physical layer device authentication techniques for operational technology (OT) communication networks. OT networks cannot support the active probing cybersecurity methods that are popular in information technology (IT) networks. Furthermore, both active and passive scanning techniques are susceptible to medium access control (MAC) address spoofing when operating at Layer 2 of the Open Systems Interconnection (OSI) model. This thesis aims to analyze the role of deep learning in passively authenticating Ethernet devices by their communication signals. This method operates at …
Deep Learning For High-Impedance Fault Detection And Classification, Khushwant Rai
Deep Learning For High-Impedance Fault Detection And Classification, Khushwant Rai
Electronic Thesis and Dissertation Repository
High-Impedance Faults (HIFs) are a hazard to public safety but are difficult to detect because of their low current amplitude and diverse characteristics. Supervised machine learning techniques have shown great success in HIF detection; however, these approaches rely on resource-intensive signal processing techniques and fail in presence of non-HIF disturbances and even for scenarios not included in training data. This thesis leverages unsupervised learning and proposes a Convolutional Autoencoder framework for HIF Detection (CAE-HIFD). In CAE-HIFD, Convolutional Autoencoder learns only from HIF signals by employing cross-correlation; consequently, eliminating the need for diverse non-HIF scenarios in training. Furthermore, this thesis proposes …
Forecasting Pedestrian Trajectory Using Deep Learning, Arsal Syed
Forecasting Pedestrian Trajectory Using Deep Learning, Arsal Syed
UNLV Theses, Dissertations, Professional Papers, and Capstones
In this dissertation we develop different methods for forecasting pedestrian trajectories. Complete understanding of pedestrian motion is essential for autonomous agents and social robots to make realistic and safe decisions. Current trajectory prediction methods rely on incorporating historic motion, scene features and social interaction to model pedestrian behaviors. Our focus is to accurately understand scene semantics to better forecast trajectories. In order to do so, we leverage semantic segmentation to encode static scene features such as walkable paths, entry/exits, static obstacles etc. We further evaluate the effectiveness of using semantic maps on different datasets and compare its performance with already …
Hardware For Quantized Mixed-Precision Deep Neural Networks, Andres Rios
Hardware For Quantized Mixed-Precision Deep Neural Networks, Andres Rios
Open Access Theses & Dissertations
Recently, there has been a push to perform deep learning (DL) computations on the edge rather than the cloud due to latency, network connectivity, energy consumption, and privacy issues. However, state-of-the-art deep neural networks (DNNs) require vast amounts of computational power, data, and energyâ??resources that are limited on edge devices. This limitation has brought the need to design domain-specific architectures (DSAs) that implement DL-specific hardware optimizations. Traditionally DNNs have run on 32-bit floating-point numbers; however, a body of research has shown that DNNs are surprisingly robust and do not require all 32 bits. Instead, using quantization, networks can run on …
Multi-Label/Multi-Class Deep Learning Classification Of Spatiotemporal Data, Natalie Sommer
Multi-Label/Multi-Class Deep Learning Classification Of Spatiotemporal Data, Natalie Sommer
Dissertations - ALL
Human senses allow for the detection of simultaneous changes in our environments. An unobstructed field of view allows us to notice concurrent variations in different parts of what we are looking at. For example, when playing a video game, a player, oftentimes, needs to be aware of what is happening in the entire scene. Likewise, our hearing makes us aware of various simultaneous sounds occurring around us. Human perception can be affected by the cognitive ability of the brain and acuity of the senses. This is not a factor with machines. As long as a system is given a signal …
Multi-Label/Multi-Class Deep Learning Classification Of Spatiotemporal Data, Natalie Sommer
Multi-Label/Multi-Class Deep Learning Classification Of Spatiotemporal Data, Natalie Sommer
Dissertations - ALL
Human senses allow for the detection of simultaneous changes in our environments. An unobstructed field of view allows us to notice concurrent variations in different parts of what we are looking at. For example, when playing a video game, a player, oftentimes, needs to be aware of what is happening in the entire scene. Likewise, our hearing makes us aware of various simultaneous sounds occurring around us. Human perception can be affected by the cognitive ability of the brain and acuity of the senses. This is not a factor with machines. As long as a system is given a signal …
Class-Incremental Learning For Wireless Device Identification In Iot, Yongxin Liu, Jian Wang, Jianqiang Li, Shuteng Niu, Houbing Song
Class-Incremental Learning For Wireless Device Identification In Iot, Yongxin Liu, Jian Wang, Jianqiang Li, Shuteng Niu, Houbing Song
Publications
Deep Learning (DL) has been utilized pervasively in the Internet of Things (IoT). One typical application of DL in IoT is device identification from wireless signals, namely Noncryptographic Device Identification (NDI). However, learning components in NDI systems have to evolve to adapt to operational variations, such a paradigm is termed as Incremental Learning (IL). Various IL algorithms have been proposed and many of them require dedicated space to store the increasing amount of historical data, and therefore, they are not suitable for IoT or mobile applications. However, conventional IL schemes can not provide satisfying performance when historical data are not …
Towards Secure Deep Neural Networks For Cyber-Physical Systems, Jiangnan Li
Towards Secure Deep Neural Networks For Cyber-Physical Systems, Jiangnan Li
Doctoral Dissertations
In recent years, deep neural networks (DNNs) are increasingly investigated in the literature to be employed in cyber-physical systems (CPSs). DNNs own inherent advantages in complex pattern identifying and achieve state-of-the-art performances in many important CPS applications. However, DNN-based systems usually require large datasets for model training, which introduces new data management issues. Meanwhile, research in the computer vision domain demonstrated that the DNNs are highly vulnerable to adversarial examples. Therefore, the security risks of employing DNNs in CPSs applications are of concern.
In this dissertation, we study the security of employing DNNs in CPSs from both the data domain …
Machine Learning With Topological Data Analysis, Ephraim Robert Love
Machine Learning With Topological Data Analysis, Ephraim Robert Love
Doctoral Dissertations
Topological Data Analysis (TDA) is a relatively new focus in the fields of statistics and machine learning. Methods of exploiting the geometry of data, such as clustering, have proven theoretically and empirically invaluable. TDA provides a general framework within which to study topological invariants (shapes) of data, which are more robust to noise and can recover information on higher dimensional features than immediately apparent in the data. A common tool for conducting TDA is persistence homology, which measures the significance of these invariants. Persistence homology has prominent realizations in methods of data visualization, statistics and machine learning. Extending ML with …
Raw Depth Image Enhancement Using A Neural Network, Xuan Xie
Raw Depth Image Enhancement Using A Neural Network, Xuan Xie
All Graduate Theses and Dissertations, Spring 1920 to Summer 2023
The term image is often used to denote a data format that records information about a scene’s color. This dissertation object focuses on a similar format for recording distance information about a scene, “depth images”. Depth images have been used extensively in consumer-level applications, such as Apple’s Face ID, based on depth images for face recognition.
However, depth images suffer from low precision and high errors, and some post-processing techniques need to be utilized to improve their quality. Deep learning, or neural networks, are frameworks that use a series of hierarchically arranged nonlinear networks to process input data. Although each …
Zero-Bias Deep Learning Enabled Quick And Reliable Abnormality Detection In Iot, Yongxin Liu, Jian Wang, Jianqiang Li, Shuteng Niu, Houbing Song
Zero-Bias Deep Learning Enabled Quick And Reliable Abnormality Detection In Iot, Yongxin Liu, Jian Wang, Jianqiang Li, Shuteng Niu, Houbing Song
Publications
Abnormality detection is essential to the performance of safety-critical and latency-constrained systems. However, as systems are becoming increasingly complicated with a large quantity of heterogeneous data, conventional statistical change point detection methods are becoming less effective and efficient. Although Deep Learning (DL) and Deep Neural Networks (DNNs) are increasingly employed to handle heterogeneous data, they still lack theoretic assurable performance and explainability. This paper integrates zero-bias DNN and Quickest Event Detection algorithms to provide a holistic framework for quick and reliable detection of both abnormalities and time-dependent abnormal events in Internet of Things (IoT).We first use the zero bias dense …
Pneumonia Radiograph Diagnosis Utilizing Deep Learning Network, Wesley O'Quinn
Pneumonia Radiograph Diagnosis Utilizing Deep Learning Network, Wesley O'Quinn
Honors College Theses
Pneumonia is a life-threatening respiratory disease caused by bacterial infection. The goal of this study is to develop an algorithm using Convolutional Neural Networks (CNNs) to detect visual signals for pneumonia in medical images and make a diagnosis. Although Pneumonia is prevalent, detection and diagnosis are challenging. The deep learning network AlexNet was utilized through transfer learning. A dataset consisting of 11,318 images was used for training, and a preliminary diagnosis accuracy of 72% was achieved.
Strategies In Botnet Detection And Privacy Preserving Machine Learning, Di Zhuang
Strategies In Botnet Detection And Privacy Preserving Machine Learning, Di Zhuang
USF Tampa Graduate Theses and Dissertations
Peer-to-peer (P2P) botnets have become one of the major threats in network security for serving as the infrastructure that responsible for various of cyber-crimes. Though a few existing work claimed to detect traditional botnets effectively, the problem of detecting P2P botnets involves more challenges. In this dissertation, we present two P2P botnet detection systems, PeerHunter and Enhanced PeerHunter. PeerHunter starts from a P2P hosts detection component. Then, it uses mutual contacts as the main feature to cluster bots into communities. Finally, it uses community behavior analysis to detect potential botnet communities and further identify bot candidates. Enhanced PeerHunter is an …
Bibliometric Survey On Multipurpose Face Recognition System Using Deep Learning, Priyanka Tupe-Waghmare, Rahul Raghvendra Joshi Prof.
Bibliometric Survey On Multipurpose Face Recognition System Using Deep Learning, Priyanka Tupe-Waghmare, Rahul Raghvendra Joshi Prof.
Library Philosophy and Practice (e-journal)
Face recognition is a new concept coming up lately and flourishing in the field of network access and multimedia information systems. Since humans are at the focus of attention in variety of applications containing videos, the concept of face recognition is rising in popularity. Several areas involving network security, retrieval and indexing of the content, and compression of videos gain a lot of benefit from the face recognition systems and related technology. Controlling the access of the networks with the help of facial recognition not only makes it difficult for the hackers to steal the information but also makes the …
Source Localization With Machine Learning, Arjun Gupta
Source Localization With Machine Learning, Arjun Gupta
Electrical and Computer Engineering ETDs
Source localization with sensor arrays have found applications across domains beginning with radar and sonar, astronomy, acoustics, bio-medical devices and more recently in autonomous cars and adaptive communication systems. The knowledge of the spatial spectrum not only provide information about the source and interference but also assists in increasing signal integrity and avoid interference. This provides an added degree of freedom in the form of spatial diversity. This research investigates spatial spectrum estimation of waveforms from the signals sampled by arbitrarily distributed sensors. Conventional high resolution algorithms such as root-MuSiC fails to perform accurate source localization due to the reliance …
Cascaded Deep Learning Network For Postearthquake Bridge Serviceability Assessment, Youjeong Jang
Cascaded Deep Learning Network For Postearthquake Bridge Serviceability Assessment, Youjeong Jang
Electronic Theses and Dissertations
Damages assessment of bridges is important to derive immediate response after severe events to decide serviceability. Especially, past earthquakes have proven the vulnerability of bridges with insufficient detailing. Due to lack of a national and unified post-earthquake inspection procedure for bridges, conventional damage assessments are performed by sending professional personnel to the onsite, detecting visually and measuring the damage state. To get accurate and fast damage result of bridge condition is important to save not only lives but also costs.
There have been studies using image processing techniques to assess damage of bridge column without sending individual to onsite. Convolutional …
Artificial Intelligence Aided Receiver Design For Wireless Communication Systems, Wenjie Xu
Artificial Intelligence Aided Receiver Design For Wireless Communication Systems, Wenjie Xu
Theses, Dissertations and Capstones
Physical layer (PHY) design in the wireless communication field realizes gratifying achievements in the past few decades, especially in the emerging cellular communication systems starting from the first generation to the fifth generation (5G). With the gradual increase in technical requirements of large data processing and end-to-end system optimization, introducing artificial intelligence (AI) in PHY design has cautiously become a trend. A deep neural network (DNN), one of the population techniques of AI, enables the utilization of its ‘learnable’ feature to handle big data and establish a global system model. In this thesis, we exploited this characteristic of DNN as …
Integration Of Deep Hashing And Channel Coding For Biometric Security And Biometric Retrieval, Veeru Talreja
Integration Of Deep Hashing And Channel Coding For Biometric Security And Biometric Retrieval, Veeru Talreja
Graduate Theses, Dissertations, and Problem Reports
In the last few years, the research growth in many research and commercial fields are due to the adoption of state of the art deep learning techniques. The same applies to even biometrics and biometric security. Additionally, there has been a rise in the development of deep learning techniques used for approximate nearest neighbor (ANN) search for retrieval on multi-modal datasets. These deep learning techniques knows as deep hashing (DH) integrate feature learning and hash coding into an end-to-end trainable framework. Motivated by these factors, this dissertation considers the integration of deep hashing and channel coding for biometric security and …
Deep Models For Improving The Performance And Reliability Of Person Recognition, Sobhan Soleymani
Deep Models For Improving The Performance And Reliability Of Person Recognition, Sobhan Soleymani
Graduate Theses, Dissertations, and Problem Reports
Deep models have provided high accuracy for different applications such as person recognition, image segmentation, image captioning, scene description, and action recognition. In this dissertation, we study the deep learning models and their application in improving the performance and reliability of person recognition. This dissertation focuses on five aspects of person recognition: (1) multimodal person recognition, (2) quality-aware multi-sample person recognition, (3) text-independent speaker verification, (4) adversarial iris examples, and (5) morphed face images. First, we discuss the application of multimodal networks consisting of face, iris, fingerprint, and speech modalities in person recognition. We propose multi-stream convolutional neural network architectures …
A New Distributed Anomaly Detection Approach For Log Ids Management Based Ondeep Learning, Murat Koca, Muhammed Ali̇ Aydin, Ahmet Sertbaş, Abdül Hali̇m Zai̇m
A New Distributed Anomaly Detection Approach For Log Ids Management Based Ondeep Learning, Murat Koca, Muhammed Ali̇ Aydin, Ahmet Sertbaş, Abdül Hali̇m Zai̇m
Turkish Journal of Electrical Engineering and Computer Sciences
Today, with the rapid increase of data, the security of big data has become more important than ever for managers. However, traditional infrastructure systems cannot cope with increasingly big data that is created like an avalanche. In addition, as the existing database systems increase licensing costs per transaction, organizations using information technologies are shifting to free and open source solutions. For this reason, we propose an anomaly attack detection model on Apache Hadoop distributed file system (HDFS), which stands out in open source big data analytics, and Apache Spark, which stands out with its speed performance in analysis to reduce …
Vibro-Acoustic Codling Moth Larvae Infestation Detection In Apples, Chadwick A. Parrish
Vibro-Acoustic Codling Moth Larvae Infestation Detection In Apples, Chadwick A. Parrish
Theses and Dissertations--Electrical and Computer Engineering
Within recent years, the demand for organic produce has greatly increased due to many factors, including increasing knowledge about such things as dietary fiber and balanced gastrointestinal bacterial ecosystems. This increase in demand, coupled with the financial penalties for sending invasive species and pests across borders, presents a need for a scalable and accurate system to non-destructively detect infestation. The proposed work addresses this problem by testing the performance of a non-destructive vibro-acoustic method for detecting lava activity in apples. This involved 3 steps; design a mechanical data collection prototype for testing apples, a evaluate a set of features, and …
Integrating Deep Learning And Augmented Reality To Enhance Situational Awareness In Firefighting Environments, Manish Bhattarai
Integrating Deep Learning And Augmented Reality To Enhance Situational Awareness In Firefighting Environments, Manish Bhattarai
Electrical and Computer Engineering ETDs
We present a new four-pronged approach to build firefighter's situational awareness for the first time in the literature. We construct a series of deep learning frameworks built on top of one another to enhance the safety, efficiency, and successful completion of rescue missions conducted by firefighters in emergency first response settings. First, we used a deep Convolutional Neural Network (CNN) system to classify and identify objects of interest from thermal imagery in real-time. Next, we extended this CNN framework for object detection, tracking, segmentation with a Mask RCNN framework, and scene description with a multimodal natural language processing(NLP) framework. Third, …
Artificial Intelligence For Helicopter Safety: Head Pose Estimation In The Cockpit, Eric William Feuerstein
Artificial Intelligence For Helicopter Safety: Head Pose Estimation In The Cockpit, Eric William Feuerstein
Theses and Dissertations
The recent impact of deep learning algorithms and their major breakthroughs on various aspects of our lives has led to the idea to investigate the application of these algorithms in different problem spaces. One of the novel areas of investigation is the aviation and air traffic control domain; as it offers a prime opportunity to enhance safety within the aviation community. Of particular importance to this community is improving the safety of rotorcraft operations, as this segment of the aviation industry is subject to a higher fatal accident rate than other segments of the industry. The improvement of safety for …
Zero-Bias Deep Learning For Accurate Identification Of Internet Of Things (Iot) Devices, Yongxin Liu, Houbing Song, Thomas Yang, Jian Wang, Jianqiang Li, Shuteng Niu, Zhong Ming
Zero-Bias Deep Learning For Accurate Identification Of Internet Of Things (Iot) Devices, Yongxin Liu, Houbing Song, Thomas Yang, Jian Wang, Jianqiang Li, Shuteng Niu, Zhong Ming
Publications
The Internet of Things (IoT) provides applications and services that would otherwise not be possible. However, the open nature of IoT makes it vulnerable to cybersecurity threats. Especially, identity spoofing attacks, where an adversary passively listens to the existing radio communications and then mimic the identity of legitimate devices to conduct malicious activities. Existing solutions employ cryptographic signatures to verify the trustworthiness of received information. In prevalent IoT, secret keys for cryptography can potentially be disclosed and disable the verification mechanism. Noncryptographic device verification is needed to ensure trustworthy IoT. In this article, we propose an enhanced deep learning framework …