Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Engineering (2)
- Computer Sciences (2)
- Data Science (2)
- Other Electrical and Computer Engineering (2)
- Physical Sciences and Mathematics (2)
-
- Systems and Communications (2)
- Applied Mathematics (1)
- Artificial Intelligence and Robotics (1)
- Digital Communications and Networking (1)
- Electrical and Electronics (1)
- Electromagnetics and Photonics (1)
- Information Security (1)
- Other Applied Mathematics (1)
- Other Computer Engineering (1)
- Power and Energy (1)
- Theory and Algorithms (1)
- Institution
Articles 1 - 8 of 8
Full-Text Articles in Signal Processing
Analysis Of Deep Learning Methods For Wired Ethernet Physical Layer Security Of Operational Technology, Lucas Torlay
Analysis Of Deep Learning Methods For Wired Ethernet Physical Layer Security Of Operational Technology, Lucas Torlay
All Theses
The cybersecurity of power systems is jeopardized by the threat of spoofing and man-in-the-middle style attacks due to a lack of physical layer device authentication techniques for operational technology (OT) communication networks. OT networks cannot support the active probing cybersecurity methods that are popular in information technology (IT) networks. Furthermore, both active and passive scanning techniques are susceptible to medium access control (MAC) address spoofing when operating at Layer 2 of the Open Systems Interconnection (OSI) model. This thesis aims to analyze the role of deep learning in passively authenticating Ethernet devices by their communication signals. This method operates at …
Towards Secure Deep Neural Networks For Cyber-Physical Systems, Jiangnan Li
Towards Secure Deep Neural Networks For Cyber-Physical Systems, Jiangnan Li
Doctoral Dissertations
In recent years, deep neural networks (DNNs) are increasingly investigated in the literature to be employed in cyber-physical systems (CPSs). DNNs own inherent advantages in complex pattern identifying and achieve state-of-the-art performances in many important CPS applications. However, DNN-based systems usually require large datasets for model training, which introduces new data management issues. Meanwhile, research in the computer vision domain demonstrated that the DNNs are highly vulnerable to adversarial examples. Therefore, the security risks of employing DNNs in CPSs applications are of concern.
In this dissertation, we study the security of employing DNNs in CPSs from both the data domain …
Machine Learning With Topological Data Analysis, Ephraim Robert Love
Machine Learning With Topological Data Analysis, Ephraim Robert Love
Doctoral Dissertations
Topological Data Analysis (TDA) is a relatively new focus in the fields of statistics and machine learning. Methods of exploiting the geometry of data, such as clustering, have proven theoretically and empirically invaluable. TDA provides a general framework within which to study topological invariants (shapes) of data, which are more robust to noise and can recover information on higher dimensional features than immediately apparent in the data. A common tool for conducting TDA is persistence homology, which measures the significance of these invariants. Persistence homology has prominent realizations in methods of data visualization, statistics and machine learning. Extending ML with …
Source Localization With Machine Learning, Arjun Gupta
Source Localization With Machine Learning, Arjun Gupta
Electrical and Computer Engineering ETDs
Source localization with sensor arrays have found applications across domains beginning with radar and sonar, astronomy, acoustics, bio-medical devices and more recently in autonomous cars and adaptive communication systems. The knowledge of the spatial spectrum not only provide information about the source and interference but also assists in increasing signal integrity and avoid interference. This provides an added degree of freedom in the form of spatial diversity. This research investigates spatial spectrum estimation of waveforms from the signals sampled by arbitrarily distributed sensors. Conventional high resolution algorithms such as root-MuSiC fails to perform accurate source localization due to the reliance …
Artificial Intelligence Aided Receiver Design For Wireless Communication Systems, Wenjie Xu
Artificial Intelligence Aided Receiver Design For Wireless Communication Systems, Wenjie Xu
Theses, Dissertations and Capstones
Physical layer (PHY) design in the wireless communication field realizes gratifying achievements in the past few decades, especially in the emerging cellular communication systems starting from the first generation to the fifth generation (5G). With the gradual increase in technical requirements of large data processing and end-to-end system optimization, introducing artificial intelligence (AI) in PHY design has cautiously become a trend. A deep neural network (DNN), one of the population techniques of AI, enables the utilization of its ‘learnable’ feature to handle big data and establish a global system model. In this thesis, we exploited this characteristic of DNN as …
Vibro-Acoustic Codling Moth Larvae Infestation Detection In Apples, Chadwick A. Parrish
Vibro-Acoustic Codling Moth Larvae Infestation Detection In Apples, Chadwick A. Parrish
Theses and Dissertations--Electrical and Computer Engineering
Within recent years, the demand for organic produce has greatly increased due to many factors, including increasing knowledge about such things as dietary fiber and balanced gastrointestinal bacterial ecosystems. This increase in demand, coupled with the financial penalties for sending invasive species and pests across borders, presents a need for a scalable and accurate system to non-destructively detect infestation. The proposed work addresses this problem by testing the performance of a non-destructive vibro-acoustic method for detecting lava activity in apples. This involved 3 steps; design a mechanical data collection prototype for testing apples, a evaluate a set of features, and …
Integration Of Deep Hashing And Channel Coding For Biometric Security And Biometric Retrieval, Veeru Talreja
Integration Of Deep Hashing And Channel Coding For Biometric Security And Biometric Retrieval, Veeru Talreja
Graduate Theses, Dissertations, and Problem Reports
In the last few years, the research growth in many research and commercial fields are due to the adoption of state of the art deep learning techniques. The same applies to even biometrics and biometric security. Additionally, there has been a rise in the development of deep learning techniques used for approximate nearest neighbor (ANN) search for retrieval on multi-modal datasets. These deep learning techniques knows as deep hashing (DH) integrate feature learning and hash coding into an end-to-end trainable framework. Motivated by these factors, this dissertation considers the integration of deep hashing and channel coding for biometric security and …
Deep Models For Improving The Performance And Reliability Of Person Recognition, Sobhan Soleymani
Deep Models For Improving The Performance And Reliability Of Person Recognition, Sobhan Soleymani
Graduate Theses, Dissertations, and Problem Reports
Deep models have provided high accuracy for different applications such as person recognition, image segmentation, image captioning, scene description, and action recognition. In this dissertation, we study the deep learning models and their application in improving the performance and reliability of person recognition. This dissertation focuses on five aspects of person recognition: (1) multimodal person recognition, (2) quality-aware multi-sample person recognition, (3) text-independent speaker verification, (4) adversarial iris examples, and (5) morphed face images. First, we discuss the application of multimodal networks consisting of face, iris, fingerprint, and speech modalities in person recognition. We propose multi-stream convolutional neural network architectures …