Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Physical Sciences and Mathematics

Divide-And-Conquer Distributed Learning: Privacy-Preserving Offloading Of Neural Network Computations, Lewis C.L. Brown Dec 2022

Divide-And-Conquer Distributed Learning: Privacy-Preserving Offloading Of Neural Network Computations, Lewis C.L. Brown

Graduate Theses and Dissertations

Machine learning has become a highly utilized technology to perform decision making on high dimensional data. As dataset sizes have become increasingly large so too have the neural networks to learn the complex patterns hidden within. This expansion has continued to the degree that it may be infeasible to train a model from a singular device due to computational or memory limitations of underlying hardware. Purpose built computing clusters for training large models are commonplace while access to networks of heterogeneous devices is still typically more accessible. In addition, with the rise of 5G networks, computation at the edge becoming …


Data-Driven Research On Engineering Design Thinking And Behaviors In Computer-Aided Systems Design: Analysis, Modeling, And Prediction, Molla Hafizur Rahman Aug 2022

Data-Driven Research On Engineering Design Thinking And Behaviors In Computer-Aided Systems Design: Analysis, Modeling, And Prediction, Molla Hafizur Rahman

Graduate Theses and Dissertations

Research on design thinking and design decision-making is vital for discovering and utilizing beneficial design patterns, strategies, and heuristics of human designers in solving engineering design problems. It is also essential for the development of new algorithms embedded with human intelligence and can facilitate human-computer interactions. However, modeling design thinking is challenging because it takes place in the designer’s mind, which is intricate, implicit, and tacit. For an in-depth understanding of design thinking, fine-grained design behavioral data are important because they are the critical link in studying the relationship between design thinking, design decisions, design actions, and design performance. Therefore, …


Privacy-Preserving Cloud-Assisted Data Analytics, Wei Bao Jul 2021

Privacy-Preserving Cloud-Assisted Data Analytics, Wei Bao

Graduate Theses and Dissertations

Nowadays industries are collecting a massive and exponentially growing amount of data that can be utilized to extract useful insights for improving various aspects of our life. Data analytics (e.g., via the use of machine learning) has been extensively applied to make important decisions in various real world applications. However, it is challenging for resource-limited clients to analyze their data in an efficient way when its scale is large. Additionally, the data resources are increasingly distributed among different owners. Nonetheless, users' data may contain private information that needs to be protected.

Cloud computing has become more and more popular in …


Achieving Differential Privacy And Fairness In Machine Learning, Depeng Xu May 2021

Achieving Differential Privacy And Fairness In Machine Learning, Depeng Xu

Graduate Theses and Dissertations

Machine learning algorithms are used to make decisions in various applications, such as recruiting, lending and policing. These algorithms rely on large amounts of sensitive individual information to work properly. Hence, there are sociological concerns about machine learning algorithms on matters like privacy and fairness. Currently, many studies only focus on protecting individual privacy or ensuring fairness of algorithms separately without taking consideration of their connection. However, there are new challenges arising in privacy preserving and fairness-aware machine learning. On one hand, there is fairness within the private model, i.e., how to meet both privacy and fairness requirements simultaneously in …


Countering Cybersecurity Vulnerabilities In The Power System, Fengli Zhang Dec 2019

Countering Cybersecurity Vulnerabilities In The Power System, Fengli Zhang

Graduate Theses and Dissertations

Security vulnerabilities in software pose an important threat to power grid security, which can be exploited by attackers if not properly addressed. Every month, many vulnerabilities are discovered and all the vulnerabilities must be remediated in a timely manner to reduce the chance of being exploited by attackers. In current practice, security operators have to manually analyze each vulnerability present in their assets and determine the remediation actions in a short time period, which involves a tremendous amount of human resources for electric utilities. To solve this problem, we propose a machine learning-based automation framework to automate vulnerability analysis and …


Parameterizing And Aggregating Activation Functions In Deep Neural Networks, Luke Benjamin Godfrey May 2018

Parameterizing And Aggregating Activation Functions In Deep Neural Networks, Luke Benjamin Godfrey

Graduate Theses and Dissertations

The nonlinear activation functions applied by each neuron in a neural network are essential for making neural networks powerful representational models. If these are omitted, even deep neural networks reduce to simple linear regression due to the fact that a linear combination of linear combinations is still a linear combination. In much of the existing literature on neural networks, just one or two activation functions are selected for the entire network, even though the use of heterogenous activation functions has been shown to produce superior results in some cases. Even less often employed are activation functions that can adapt their …


Lidar-Assisted Extraction Of Old Growth Baldcypress Stands Along The Black River Of North Carolina, Weston Pierce Murch Aug 2016

Lidar-Assisted Extraction Of Old Growth Baldcypress Stands Along The Black River Of North Carolina, Weston Pierce Murch

Graduate Theses and Dissertations

The remnants of ancient baldcypress forests continue to grow across the Southeastern United States. These long lived trees are invaluable for biodiversity along riverine ecosystems, provide habitat to a myriad of animal species, and augment the proxy climate record for North America. While extensive logging of the areas along the Black River in North Carolina has mostly decimated ancient forests of many species including the baldcypress, conservation efforts from The Nature Conservancy and other partners are under way. In order to more efficiently find and study these enduring stands of baldcypress, some of which are estimated to be more than …


Exploring Privacy Leakage From The Resource Usage Patterns Of Mobile Apps, Amin Rois Sinung Nugroho May 2016

Exploring Privacy Leakage From The Resource Usage Patterns Of Mobile Apps, Amin Rois Sinung Nugroho

Graduate Theses and Dissertations

Due to the popularity of smart phones and mobile apps, a potential privacy risk with the usage of mobile apps is that, from the usage information of mobile apps (e.g., how many hours a user plays mobile games in each day), private information about a user’s living habits and personal activities can be inferred. To assess this risk, this thesis answers the following research question: can the type of a mobile app (e.g., email, web browsing, mobile game, music streaming, etc.) used by a user be inferred from the resource (e.g., CPU, memory, network, etc.) usage patterns of the mobile …


Evaluating The Intrinsic Similarity Between Neural Networks, Stephen Charles Ashmore Dec 2015

Evaluating The Intrinsic Similarity Between Neural Networks, Stephen Charles Ashmore

Graduate Theses and Dissertations

We present Forward Bipartite Alignment (FBA), a method that aligns the topological structures of two neural networks. Neural networks are considered to be a black box, because neural networks contain complex model surface determined by their weights that combine attributes non-linearly. Two networks that make similar predictions on training data may still generalize differently. FBA enables a diversity of applications, including visualization and canonicalization of neural networks, ensembles, and cross-over between unrelated neural networks in evolutionary optimization. We describe the FBA algorithm, and describe implementations for three applications: genetic algorithms, visualization, and ensembles. We demonstrate FBA's usefulness by comparing a …