Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 21 of 21

Full-Text Articles in Computer Sciences

Reducing Model Memorization To Mitigate Membership Inference Attacks, Sheikhjaberi Jan 2023

Reducing Model Memorization To Mitigate Membership Inference Attacks, Sheikhjaberi

Electronic Theses and Dissertations

Given a machine learning model and a record, membership inference attacks determine whether this record was used as part of the model’s training dataset. This can raise privacy issues.

There is a desideratum to providing robust mitigation techniques against this attack that will not affect utility. One of the state-of-the-art frameworks in this area is SELENA, which has two phases: Split-AI and Distillation to train a protected model, which by giving non-members behavior to members tries to mitigate membership inference attacks.

In this thesis, we introduce a novel approach to the Split-AI phase, which tries to weaken the membership inference …


Performance Enhancement Of Hyperspectral Semantic Segmentation Leveraging Ensemble Networks, Nicholas Soucy Dec 2022

Performance Enhancement Of Hyperspectral Semantic Segmentation Leveraging Ensemble Networks, Nicholas Soucy

Electronic Theses and Dissertations

Hyperspectral image (HSI) semantic segmentation is a growing field within computer vision, machine learning, and forestry. Due to the separate nature of these communities, research applying deep learning techniques to ground-type semantic segmentation needs improvement, along with working to bring the research and expectations of these three communities together. Semantic segmentation consists of classifying individual pixels within the image based on the features present. Many issues need to be resolved in HSI semantic segmentation including data preprocessing, feature reduction, semantic segmentation techniques, and adversarial training. In this thesis, we tackle these challenges by employing ensemble methods for HSI semantic segmentation. …


Mathematical Models Yield Insights Into Cnns: Applications In Natural Image Restoration And Population Genetics, Ryan Cecil Aug 2022

Mathematical Models Yield Insights Into Cnns: Applications In Natural Image Restoration And Population Genetics, Ryan Cecil

Electronic Theses and Dissertations

Due to a rise in computational power, machine learning (ML) methods have become the state-of-the-art in a variety of fields. Known to be black-box approaches, however, these methods are oftentimes not well understood. In this work, we utilize our understanding of model-based approaches to derive insights into Convolutional Neural Networks (CNNs). In the field of Natural Image Restoration, we focus on the image denoising problem. Recent work have demonstrated the potential of mathematically motivated CNN architectures that learn both `geometric' and nonlinear higher order features and corresponding regularizers. We extend this work by showing that not only can geometric features …


Hybrid Machine And Deep Learning-Based Cyberattack Detection And Classification In Smart Grid Networks, Adedayo Aribisala May 2022

Hybrid Machine And Deep Learning-Based Cyberattack Detection And Classification In Smart Grid Networks, Adedayo Aribisala

Electronic Theses and Dissertations

Power grids have rapidly evolved into Smart grids and are heavily dependent on Supervisory Control and Data Acquisition (SCADA) systems for monitoring and control. However, this evolution increases the susceptibility of the remote (VMs, VPNs) and physical interfaces (sensors, PMUs LAN, WAN, sub-stations power lines, and smart meters) to sophisticated cyberattacks. The continuous supply of power is critical to power generation plants, power grids, industrial grids, and nuclear grids; the halt to global power could have a devastating effect on the economy's critical infrastructures and human life.

Machine Learning and Deep Learning-based cyberattack detection modeling have yielded promising results when …


A Machine Learning Approach For Reconnaissance Detection To Enhance Network Security, Rachel Bakaletz May 2022

A Machine Learning Approach For Reconnaissance Detection To Enhance Network Security, Rachel Bakaletz

Electronic Theses and Dissertations

Before cyber-crime can happen, attackers must research the targeted organization to collect vital information about the target and pave the way for the subsequent attack phases. This cyber-attack phase is called reconnaissance or enumeration. This malicious phase allows attackers to discover information about a target to be leveraged and used in an exploit. Information such as the version of the operating system and installed applications, open ports can be detected using various tools during the reconnaissance phase. By knowing such information cyber attackers can exploit vulnerabilities that are often unique to a specific version.

In this work, we develop an …


Reinforcement Learning: Low Discrepancy Action Selection For Continuous States And Actions, Jedidiah Lindborg Jan 2022

Reinforcement Learning: Low Discrepancy Action Selection For Continuous States And Actions, Jedidiah Lindborg

Electronic Theses and Dissertations

In reinforcement learning the process of selecting an action during the exploration or exploitation stage is difficult to optimize. The purpose of this thesis is to create an action selection process for an agent by employing a low discrepancy action selection (LDAS) method. This should allow the agent to quickly determine the utility of its actions by prioritizing actions that are dissimilar to ones that it has already picked. In this way the learning process should be faster for the agent and result in more optimal policies.


Transferability Of Intrusion Detection Systems Using Machine Learning Between Networks, William Peter Mati Oct 2021

Transferability Of Intrusion Detection Systems Using Machine Learning Between Networks, William Peter Mati

Electronic Theses and Dissertations

Intrusion detection systems (IDS) using machine learning is a next generation tool to strengthen the cyber security of networks. Such systems possess the potential to detect zero-day attacks, attacks that are unknown to researchers and are occurring for the first time in history. This thesis tackles novel ideas in this research domain and solves foreseeable issues of a practical deployment of such tool.

The main issue addressed in this thesis are situations where an entity intends to implement an IDS using machine learning onto their network, but do not have attack data available from their own network to train the …


Reaction Wheels Fault Isolation Onboard 3-Axis Controlled Satellite Using Enhanced Random Forest With Multidomain Features, Mofiyinoluwa Oluwatobi Folami Oct 2021

Reaction Wheels Fault Isolation Onboard 3-Axis Controlled Satellite Using Enhanced Random Forest With Multidomain Features, Mofiyinoluwa Oluwatobi Folami

Electronic Theses and Dissertations

With the increasing number of satellite launches throughout the years, it is only natural that an interest in the safety and monitoring of these systems would increase as well. However, as a system becomes more complex it becomes difficult to generate a high-fidelity model that accurately describes all the system components. With such constraints using data-driven approaches becomes a more feasible option. One of the most commonly used actuators in spacecraft is known as the reaction wheel. If these reaction wheels are not maintained or monitored, it could result in mission failure and unwarranted costs. That is why fault detection …


Active Community Opinion Network Mining And Maximization Through Social Networks Posts, Mayank Semwal Oct 2021

Active Community Opinion Network Mining And Maximization Through Social Networks Posts, Mayank Semwal

Electronic Theses and Dissertations

Existing OM systems like CONE take a partial historical rating of users on multiple products and perform opinion estimation to maximizes overall positive opinions using OM. However, CONE does not consider actual user opinions from social posts where users provide opinions through comments, likes and sharing about a product. OBIN mines users' low-frequency features from comments to create a community preference influence network utilizing user response on posts and relationships between them. However, OBIN only performs feature-level opinion mining and does not consider a joint approach that combines sentence-level and feature-level to remove subjective reviews and includes slang words and …


Social Network Analysis: A Machine Learning Approach, Bonaventure Chidube Molokwu Aug 2021

Social Network Analysis: A Machine Learning Approach, Bonaventure Chidube Molokwu

Electronic Theses and Dissertations

Social Network Analysis (SNA) is an appealing research topic, within the domain of Artificial Intelligence (AI), owing to its widespread application in the real world. In this dissertation, we have proposed effective Machine Learning (ML) and Deep Learning (DL) approaches toward resolving these open problems with regard to SNA, viz: Breakup Prediction, Link Prediction, Node Classification, Event-based Analysis, and Trend/Pattern Analysis. SNA can be employed toward resolving several real-world problems; and ML as well as DL have proven to be very effective methodologies for accomplishing Artificial Intelligence (AI)- related goals. Existing literature have focused on studying the apparent and latent …


Machine Learning Approaches To Dribble Hand-Off Action Classification With Sportvu Nba Player Coordinate Data, Dembe Stephanos May 2021

Machine Learning Approaches To Dribble Hand-Off Action Classification With Sportvu Nba Player Coordinate Data, Dembe Stephanos

Electronic Theses and Dissertations

Recently, strategies of National Basketball Association teams have evolved with the skillsets of players and the emergence of advanced analytics. One of the most effective actions in dynamic offensive strategies in basketball is the dribble hand-off (DHO). This thesis proposes an architecture for a classification pipeline for detecting DHOs in an accurate and automated manner. This pipeline consists of a combination of player tracking data and event labels, a rule set to identify candidate actions, manually reviewing game recordings to label the candidates, and embedding player trajectories into hexbin cell paths before passing the completed training set to the classification …


Cascaded Deep Learning Network For Postearthquake Bridge Serviceability Assessment, Youjeong Jang Jan 2021

Cascaded Deep Learning Network For Postearthquake Bridge Serviceability Assessment, Youjeong Jang

Electronic Theses and Dissertations

Damages assessment of bridges is important to derive immediate response after severe events to decide serviceability. Especially, past earthquakes have proven the vulnerability of bridges with insufficient detailing. Due to lack of a national and unified post-earthquake inspection procedure for bridges, conventional damage assessments are performed by sending professional personnel to the onsite, detecting visually and measuring the damage state. To get accurate and fast damage result of bridge condition is important to save not only lives but also costs.
There have been studies using image processing techniques to assess damage of bridge column without sending individual to onsite. Convolutional …


Knot Flow Classification And Its Applications In Vehicular Ad-Hoc Networks (Vanet), David Schmidt May 2020

Knot Flow Classification And Its Applications In Vehicular Ad-Hoc Networks (Vanet), David Schmidt

Electronic Theses and Dissertations

Intrusion detection systems (IDSs) play a crucial role in the identification and mitigation for attacks on host systems. Of these systems, vehicular ad hoc networks (VANETs) are difficult to protect due to the dynamic nature of their clients and their necessity for constant interaction with their respective cyber-physical systems. Currently, there is a need for a VANET-specific IDS that meets this criterion. To this end, a spline-based intrusion detection system has been pioneered as a solution. By combining clustering with spline-based general linear model classification, this knot flow classification method (KFC) allows for robust intrusion detection to occur. Due its …


Artificial Neural Network Models For Pattern Discovery From Ecg Time Series, Mehakpreet Kaur Jan 2020

Artificial Neural Network Models For Pattern Discovery From Ecg Time Series, Mehakpreet Kaur

Electronic Theses and Dissertations

Artificial Neural Network (ANN) models have recently become de facto models for deep learning with a wide range of applications spanning from scientific fields such as computer vision, physics, biology, medicine to social life (suggesting preferred movies, shopping lists, etc.). Due to advancements in computer technology and the increased practice of Artificial Intelligence (AI) in medicine and biological research, ANNs have been extensively applied not only to provide quick information about diseases, but also to make diagnostics accurate and cost-effective. We propose an ANN-based model to analyze a patient's electrocardiogram (ECG) data and produce accurate diagnostics regarding possible heart diseases …


Machine Learning And Natural Language Methods For Detecting Psychopathy In Textual Data, Andrew Stephen Henning Jan 2017

Machine Learning And Natural Language Methods For Detecting Psychopathy In Textual Data, Andrew Stephen Henning

Electronic Theses and Dissertations

Among the myriad of mental conditions permeating through society, psychopathy is perhaps the most elusive to diagnose and treat. With the advent of natural language processing and machine learning, however, we have ushered in a new age of technology that provides a fresh toolkit for analyzing text and context. Because text remains the medium of choice for most personal and professional interactions, it may be possible to use textual samples from psychopaths as a means for understanding and ultimately classifying similar individuals based on the content of their language usage. This paper aims to investigate natural language processing and supervised …


Optimized Multilayer Perceptron With Dynamic Learning Rate To Classify Breast Microwave Tomography Image, Chulwoo Pack Jan 2017

Optimized Multilayer Perceptron With Dynamic Learning Rate To Classify Breast Microwave Tomography Image, Chulwoo Pack

Electronic Theses and Dissertations

Most recently developed Computer Aided Diagnosis (CAD) systems and their related research is based on medical images that are usually obtained through conventional imaging techniques such as Magnetic Resonance Imaging (MRI), x-ray mammography, and ultrasound. With the development of a new imaging technology called Microwave Tomography Imaging (MTI), it has become inevitable to develop a CAD system that can show promising performance using new format of data. The platform can have a flexibility on its input by adopting Artificial Neural Network (ANN) as a classifier. Among the various phases of CAD system, we have focused on optimizing the classification phase …


Email Similarity Matching And Automatic Reply Generation Using Statistical Topic Modeling And Machine Learning, Zachery L. Schiller Dec 2015

Email Similarity Matching And Automatic Reply Generation Using Statistical Topic Modeling And Machine Learning, Zachery L. Schiller

Electronic Theses and Dissertations

Responding to email is a time-consuming task that is a requirement for most professions. Many people find themselves answering the same questions over and over, repeatedly replying with answers they have written previously either in whole or in part. In this thesis, the Automatic Mail Reply (AMR) system is implemented to help with repeated email response creation. The system uses past email interactions and, through unsupervised statistical learning, attempts to recover relevant information to give to the user to assist in writing their reply.

Three statistical learning models, term frequency-inverse document frequency (tf-idf), Latent Semantic Analysis (LSA), and Latent Dirichlet …


Predicting Intraday Financial Market Dynamics Using Takens' Vectors; Incorporating Causality Testing And Machine Learning Techniques, Abubakar-Sadiq Bouda Abdulai Dec 2015

Predicting Intraday Financial Market Dynamics Using Takens' Vectors; Incorporating Causality Testing And Machine Learning Techniques, Abubakar-Sadiq Bouda Abdulai

Electronic Theses and Dissertations

Traditional approaches to predicting financial market dynamics tend to be linear and stationary, whereas financial time series data is increasingly nonlinear and non-stationary. Lately, advances in dynamical systems theory have enabled the extraction of complex dynamics from time series data. These developments include theory of time delay embedding and phase space reconstruction of dynamical systems from a scalar time series. In this thesis, a time delay embedding approach for predicting intraday stock or stock index movement is developed. The approach combines methods of nonlinear time series analysis with those of causality testing, theory of dynamical systems and machine learning (artificial …


Random Forests Based Rule Learning And Feature Elimination, Sheng Liu Jan 2014

Random Forests Based Rule Learning And Feature Elimination, Sheng Liu

Electronic Theses and Dissertations

Much research combines data from multiple sources in an effort to understand the underlying problems. It is important to find and interpret the most important information from these sources. Thus it will be beneficial to have an effective algorithm that can simultaneously extract decision rules and select critical features for good interpretation while preserving the prediction performance. We propose an efficient approach, combining rule extraction and feature elimination, based on 1-norm regularized random forests. This approach simultaneously extracts a small number of rules generated by random forests and selects important features. To evaluate this approach, we have applied it to …


An Ssvep Brain-Computer Interface: A Machine Learning Approach, Fei Teng Jan 2012

An Ssvep Brain-Computer Interface: A Machine Learning Approach, Fei Teng

Electronic Theses and Dissertations

A Brain-Computer Interface (BCI) provides a bidirectional communication path for a human to control an external device using brain signals. Among neurophysiological features in BCI systems, steady state visually evoked potentials (SSVEP), natural responses to visual stimulation at specific frequencies, has increasingly drawn attentions because of its high temporal resolution and minimal user training, which are two important parameters in evaluating a BCI system. The performance of a BCI can be improved by a properly selected neurophysiological signal, or by the introduction of machine learning techniques. With the help of machine learning methods, a BCI system can adapt to the …


Multizoom Activity Recognition Using Machine Learning, Raymond Smith Jan 2005

Multizoom Activity Recognition Using Machine Learning, Raymond Smith

Electronic Theses and Dissertations

In this thesis we present a system for detection of events in video. First a multiview approach to automatically detect and track heads and hands in a scene is described. Then, by making use of epipolar, spatial, trajectory, and appearance constraints, objects are labeled consistently across cameras (zooms). Finally, we demonstrate a new machine learning paradigm, TemporalBoost, that can recognize events in video. One aspect of any machine learning algorithm is in the feature set used. The approach taken here is to build a large set of activity features, though TemporalBoost itself is able to work with any feature set …