Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (8)
- Information Security (5)
- Artificial Intelligence and Robotics (4)
- Engineering (3)
- Databases and Information Systems (2)
-
- Systems Architecture (2)
- Categorical Data Analysis (1)
- Computer Engineering (1)
- Computer-Aided Engineering and Design (1)
- Data Science (1)
- Data Storage Systems (1)
- Digital Communications and Networking (1)
- Electrical and Computer Engineering (1)
- Environmental Sciences (1)
- Geographic Information Sciences (1)
- Geography (1)
- Graphics and Human Computer Interfaces (1)
- Mechanical Engineering (1)
- Natural Resources and Conservation (1)
- Numerical Analysis and Scientific Computing (1)
- OS and Networks (1)
- Physical and Environmental Geography (1)
- Programming Languages and Compilers (1)
- Social and Behavioral Sciences (1)
- Software Engineering (1)
- Statistics and Probability (1)
- Systems and Communications (1)
Articles 1 - 9 of 9
Full-Text Articles in Physical Sciences and Mathematics
Divide-And-Conquer Distributed Learning: Privacy-Preserving Offloading Of Neural Network Computations, Lewis C.L. Brown
Divide-And-Conquer Distributed Learning: Privacy-Preserving Offloading Of Neural Network Computations, Lewis C.L. Brown
Graduate Theses and Dissertations
Machine learning has become a highly utilized technology to perform decision making on high dimensional data. As dataset sizes have become increasingly large so too have the neural networks to learn the complex patterns hidden within. This expansion has continued to the degree that it may be infeasible to train a model from a singular device due to computational or memory limitations of underlying hardware. Purpose built computing clusters for training large models are commonplace while access to networks of heterogeneous devices is still typically more accessible. In addition, with the rise of 5G networks, computation at the edge becoming …
Data-Driven Research On Engineering Design Thinking And Behaviors In Computer-Aided Systems Design: Analysis, Modeling, And Prediction, Molla Hafizur Rahman
Data-Driven Research On Engineering Design Thinking And Behaviors In Computer-Aided Systems Design: Analysis, Modeling, And Prediction, Molla Hafizur Rahman
Graduate Theses and Dissertations
Research on design thinking and design decision-making is vital for discovering and utilizing beneficial design patterns, strategies, and heuristics of human designers in solving engineering design problems. It is also essential for the development of new algorithms embedded with human intelligence and can facilitate human-computer interactions. However, modeling design thinking is challenging because it takes place in the designer’s mind, which is intricate, implicit, and tacit. For an in-depth understanding of design thinking, fine-grained design behavioral data are important because they are the critical link in studying the relationship between design thinking, design decisions, design actions, and design performance. Therefore, …
Privacy-Preserving Cloud-Assisted Data Analytics, Wei Bao
Privacy-Preserving Cloud-Assisted Data Analytics, Wei Bao
Graduate Theses and Dissertations
Nowadays industries are collecting a massive and exponentially growing amount of data that can be utilized to extract useful insights for improving various aspects of our life. Data analytics (e.g., via the use of machine learning) has been extensively applied to make important decisions in various real world applications. However, it is challenging for resource-limited clients to analyze their data in an efficient way when its scale is large. Additionally, the data resources are increasingly distributed among different owners. Nonetheless, users' data may contain private information that needs to be protected.
Cloud computing has become more and more popular in …
Achieving Differential Privacy And Fairness In Machine Learning, Depeng Xu
Achieving Differential Privacy And Fairness In Machine Learning, Depeng Xu
Graduate Theses and Dissertations
Machine learning algorithms are used to make decisions in various applications, such as recruiting, lending and policing. These algorithms rely on large amounts of sensitive individual information to work properly. Hence, there are sociological concerns about machine learning algorithms on matters like privacy and fairness. Currently, many studies only focus on protecting individual privacy or ensuring fairness of algorithms separately without taking consideration of their connection. However, there are new challenges arising in privacy preserving and fairness-aware machine learning. On one hand, there is fairness within the private model, i.e., how to meet both privacy and fairness requirements simultaneously in …
Countering Cybersecurity Vulnerabilities In The Power System, Fengli Zhang
Countering Cybersecurity Vulnerabilities In The Power System, Fengli Zhang
Graduate Theses and Dissertations
Security vulnerabilities in software pose an important threat to power grid security, which can be exploited by attackers if not properly addressed. Every month, many vulnerabilities are discovered and all the vulnerabilities must be remediated in a timely manner to reduce the chance of being exploited by attackers. In current practice, security operators have to manually analyze each vulnerability present in their assets and determine the remediation actions in a short time period, which involves a tremendous amount of human resources for electric utilities. To solve this problem, we propose a machine learning-based automation framework to automate vulnerability analysis and …
Parameterizing And Aggregating Activation Functions In Deep Neural Networks, Luke Benjamin Godfrey
Parameterizing And Aggregating Activation Functions In Deep Neural Networks, Luke Benjamin Godfrey
Graduate Theses and Dissertations
The nonlinear activation functions applied by each neuron in a neural network are essential for making neural networks powerful representational models. If these are omitted, even deep neural networks reduce to simple linear regression due to the fact that a linear combination of linear combinations is still a linear combination. In much of the existing literature on neural networks, just one or two activation functions are selected for the entire network, even though the use of heterogenous activation functions has been shown to produce superior results in some cases. Even less often employed are activation functions that can adapt their …
Lidar-Assisted Extraction Of Old Growth Baldcypress Stands Along The Black River Of North Carolina, Weston Pierce Murch
Lidar-Assisted Extraction Of Old Growth Baldcypress Stands Along The Black River Of North Carolina, Weston Pierce Murch
Graduate Theses and Dissertations
The remnants of ancient baldcypress forests continue to grow across the Southeastern United States. These long lived trees are invaluable for biodiversity along riverine ecosystems, provide habitat to a myriad of animal species, and augment the proxy climate record for North America. While extensive logging of the areas along the Black River in North Carolina has mostly decimated ancient forests of many species including the baldcypress, conservation efforts from The Nature Conservancy and other partners are under way. In order to more efficiently find and study these enduring stands of baldcypress, some of which are estimated to be more than …
Exploring Privacy Leakage From The Resource Usage Patterns Of Mobile Apps, Amin Rois Sinung Nugroho
Exploring Privacy Leakage From The Resource Usage Patterns Of Mobile Apps, Amin Rois Sinung Nugroho
Graduate Theses and Dissertations
Due to the popularity of smart phones and mobile apps, a potential privacy risk with the usage of mobile apps is that, from the usage information of mobile apps (e.g., how many hours a user plays mobile games in each day), private information about a user’s living habits and personal activities can be inferred. To assess this risk, this thesis answers the following research question: can the type of a mobile app (e.g., email, web browsing, mobile game, music streaming, etc.) used by a user be inferred from the resource (e.g., CPU, memory, network, etc.) usage patterns of the mobile …
Evaluating The Intrinsic Similarity Between Neural Networks, Stephen Charles Ashmore
Evaluating The Intrinsic Similarity Between Neural Networks, Stephen Charles Ashmore
Graduate Theses and Dissertations
We present Forward Bipartite Alignment (FBA), a method that aligns the topological structures of two neural networks. Neural networks are considered to be a black box, because neural networks contain complex model surface determined by their weights that combine attributes non-linearly. Two networks that make similar predictions on training data may still generalize differently. FBA enables a diversity of applications, including visualization and canonicalization of neural networks, ensembles, and cross-over between unrelated neural networks in evolutionary optimization. We describe the FBA algorithm, and describe implementations for three applications: genetic algorithms, visualization, and ensembles. We demonstrate FBA's usefulness by comparing a …