Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Machine learning (2)
- Adversarial robustness (1)
- Alzheimer (1)
- Bayesian optimization (1)
- Biomarkers (1)
-
- Compression (1)
- Constrained random verification (1)
- Convolutional neural networks (1)
- Data augmentation (1)
- Deep learning (1)
- Deep neural networks (1)
- Functional coverage (1)
- Genomic (1)
- IC design verification (1)
- Image classification (1)
- Network (1)
- Neural networks (1)
- PCAP (1)
- Packets (1)
- Reinforcement learning (1)
- Stochastic weight averaging (1)
Articles 1 - 4 of 4
Full-Text Articles in Physical Sciences and Mathematics
Optimizing Constraint Selection In A Design Verification Environment For Efficient Coverage Closure, Vanessa Cooper
Optimizing Constraint Selection In A Design Verification Environment For Efficient Coverage Closure, Vanessa Cooper
CCE Theses and Dissertations
No abstract provided.
Integrating The Spatial Pyramid Pooling Into 3d Convolutional Neural Networks For Cerebral Microbleeds Detection, Andre Accioly Veira
Integrating The Spatial Pyramid Pooling Into 3d Convolutional Neural Networks For Cerebral Microbleeds Detection, Andre Accioly Veira
CCE Theses and Dissertations
Cerebral microbleeds (CMB) are small foci of chronic blood products in brain tissues that are critical markers for cerebral amyloid angiopathy. CMB increases the risk of symptomatic intracerebral hemorrhage and ischemic stroke. CMB can also cause structural damage to brain tissues resulting in neurologic dysfunction, cognitive impairment, and dementia. Due to the paramagnetic properties of blood degradation products, CMB can be better visualized via susceptibility-weighted imaging (SWI) than magnetic resonance imaging (MRI).CMB identification and classification have been based mainly on human visual identification of SWI features via shape, size, and intensity information. However, manual interpretation can be biased. Visual screening …
Adversarial Training Of Deep Neural Networks, Anabetsy Termini
Adversarial Training Of Deep Neural Networks, Anabetsy Termini
CCE Theses and Dissertations
Deep neural networks used for image classification are highly susceptible to adversarial attacks. The de facto method to increase adversarial robustness is to train neural networks with a mixture of adversarial images and unperturbed images. However, this method leads to robust overfitting, where the network primarily learns to recognize one specific type of attack used to generate the images while remaining vulnerable to others after training. In this dissertation, we performed a rigorous study to understand whether combinations of state of the art data augmentation methods with Stochastic Weight Averaging improve adversarial robustness and diminish adversarial overfitting across a wide …
Application Of Genomic Compression Techniques For Efficient Storage Of Captured Network Traffic Packets, James Alfred Loving
Application Of Genomic Compression Techniques For Efficient Storage Of Captured Network Traffic Packets, James Alfred Loving
CCE Theses and Dissertations
In cybersecurity, one of most important forensic tools are audit files; they contain a record of cyber events that occur on systems throughout the enterprise. Threats to an enterprise have become one of the top concerns of IT professionals world-wide. Although there are various approaches to detect anomalous insider behavior, these approaches are not always able to detect advanced persistent threats or even exfiltration of sensitive data by insiders. The issue is the volume of network data required to identify this anomalous activity. It has been estimated that an average corporate user creates a minimum of 1.5 MB audit data …