Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 84

Full-Text Articles in Engineering

Light Auditor: Power Measurement Can Tell Private Data Leakage Through Iot Covert Channels, Woosub Jung, Kailai Cui, Kenneth Koltermann, Junjie Wang, Chunsheng Xin, Gang Zhou Jan 2023

Light Auditor: Power Measurement Can Tell Private Data Leakage Through Iot Covert Channels, Woosub Jung, Kailai Cui, Kenneth Koltermann, Junjie Wang, Chunsheng Xin, Gang Zhou

Electrical & Computer Engineering Faculty Publications

Despite many conveniences of using IoT devices, they have suffered from various attacks due to their weak security. Besides well-known botnet attacks, IoT devices are vulnerable to recent covert-channel attacks. However, no study to date has considered these IoT covert-channel attacks. Among these attacks, researchers have demonstrated exfiltrating users' private data by exploiting the smart bulb's capability of infrared emission.

In this paper, we propose a power-auditing-based system that defends the data exfiltration attack on the smart bulb as a case study. We first implement this infrared-based attack in a lab environment. With a newly-collected power consumption dataset, we pre-process …


Transfer Learning Using Infrared And Optical Full Motion Video Data For Gender Classification, Alexander M. Glandon, Joe Zalameda, Khan M. Iftekharuddin, Gabor F. Fulop (Ed.), David Z. Ting (Ed.), Lucy L. Zheng (Ed.) Jan 2023

Transfer Learning Using Infrared And Optical Full Motion Video Data For Gender Classification, Alexander M. Glandon, Joe Zalameda, Khan M. Iftekharuddin, Gabor F. Fulop (Ed.), David Z. Ting (Ed.), Lucy L. Zheng (Ed.)

Electrical & Computer Engineering Faculty Publications

This work is a review and extension of our ongoing research in human recognition analysis using multimodality motion sensor data. We review our work on hand crafted feature engineering for motion capture skeleton (MoCap) data, from the Air Force Research Lab for human gender followed by depth scan based skeleton extraction using LIDAR data from the Army Night Vision Lab for person identification. We then build on these works to demonstrate a transfer learning sensor fusion approach for using the larger MoCap and smaller LIDAR data for gender classification.


A Review Of Iot Security And Privacy Using Decentralized Blockchain Techniques, Vinay Gugueoth, Sunitha Safavat, Sachin Shetty, Danda Rawat Jan 2023

A Review Of Iot Security And Privacy Using Decentralized Blockchain Techniques, Vinay Gugueoth, Sunitha Safavat, Sachin Shetty, Danda Rawat

Electrical & Computer Engineering Faculty Publications

IoT security is one of the prominent issues that has gained significant attention among the researchers in recent times. The recent advancements in IoT introduces various critical security issues and increases the risk of privacy leakage of IoT data. Implementation of Blockchain can be a potential solution for the security issues in IoT. This review deeply investigates the security threats and issues in IoT which deteriorates the effectiveness of IoT systems. This paper presents a perceptible description of the security threats, Blockchain based solutions, security characteristics and challenges introduced during the integration of Blockchain with IoT. An analysis of different …


Toward Real-Time, Robust Wearable Sensor Fall Detection Using Deep Learning Methods: A Feasibility Study, Haben Yhdego, Christopher Paolini, Michel Audette Jan 2023

Toward Real-Time, Robust Wearable Sensor Fall Detection Using Deep Learning Methods: A Feasibility Study, Haben Yhdego, Christopher Paolini, Michel Audette

Electrical & Computer Engineering Faculty Publications

Real-time fall detection using a wearable sensor remains a challenging problem due to high gait variability. Furthermore, finding the type of sensor to use and the optimal location of the sensors are also essential factors for real-time fall-detection systems. This work presents real-time fall-detection methods using deep learning models. Early detection of falls, followed by pneumatic protection, is one of the most effective means of ensuring the safety of the elderly. First, we developed and compared different data-segmentation techniques for sliding windows. Next, we implemented various techniques to balance the datasets because collecting fall datasets in the real-time setting has …


Mwirgan: Unsupervised Visible-To Mwir Image Translation With Generative Adversarial Network, Mohammad Shahab Uddin, Chiman Kwan, Jiang Li Jan 2023

Mwirgan: Unsupervised Visible-To Mwir Image Translation With Generative Adversarial Network, Mohammad Shahab Uddin, Chiman Kwan, Jiang Li

Electrical & Computer Engineering Faculty Publications

Unsupervised image-to-image translation techniques have been used in many applications, including visible-to-Long-Wave Infrared (visible-to-LWIR) image translation, but very few papers have explored visible-to-Mid-Wave Infrared (visible-to-MWIR) image translation. In this paper, we investigated unsupervised visible-to-MWIR image translation using generative adversarial networks (GANs). We proposed a new model named MWIRGAN for visible-to-MWIR image translation in a fully unsupervised manner. We utilized a perceptual loss to leverage shape identification and location changes of the objects in the translation. The experimental results showed that MWIRGAN was capable of visible-to-MWIR image translation while preserving the object’s shape with proper enhancement in the translated images and …


The Effect Of The Width Of The Incident Pulse To The Dielectric Transition Layer In The Scattering Of An Electromagnetic Pulse — A Qubit Lattice Algorithm Simulation, George Vahala, Linda Vahala, Abhay K. Ram, Min Soe Jan 2023

The Effect Of The Width Of The Incident Pulse To The Dielectric Transition Layer In The Scattering Of An Electromagnetic Pulse — A Qubit Lattice Algorithm Simulation, George Vahala, Linda Vahala, Abhay K. Ram, Min Soe

Electrical & Computer Engineering Faculty Publications

The effect of the thickness of the dielectric boundary layer that connects a material of refractive index n1 to another of index n2is considered for the propagation of an electromagnetic pulse. A qubit lattice algorithm (QLA), which consists of a specially chosen non-commuting sequence of collision and streaming operators acting on a basis set of qubits, is theoretically determined that recovers the Maxwell equations to second-order in a small parameter ϵ. For very thin boundary layer the scattering properties of the pulse mimics that found from the Fresnel jump conditions for a plane wave - except that …


View Synthesis With Scene Recognition For Cross-View Image Localization, Uddom Lee, Peng Jiang, Hongyi Wu, Chunsheng Xin Jan 2023

View Synthesis With Scene Recognition For Cross-View Image Localization, Uddom Lee, Peng Jiang, Hongyi Wu, Chunsheng Xin

Electrical & Computer Engineering Faculty Publications

Image-based localization has been widely used for autonomous vehicles, robotics, augmented reality, etc., and this is carried out by matching a query image taken from a cell phone or vehicle dashcam to a large scale of geo-tagged reference images, such as satellite/aerial images or Google Street Views. However, the problem remains challenging due to the inconsistency between the query images and the large-scale reference datasets regarding various light and weather conditions. To tackle this issue, this work proposes a novel view synthesis framework equipped with deep generative models, which can merge the unique features from the outdated reference dataset with …


Security Of Internet Of Things (Iot) Using Federated Learning And Deep Learning — Recent Advancements, Issues And Prospects, Vinay Gugueoth, Sunitha Safavat, Sachin Shetty Jan 2023

Security Of Internet Of Things (Iot) Using Federated Learning And Deep Learning — Recent Advancements, Issues And Prospects, Vinay Gugueoth, Sunitha Safavat, Sachin Shetty

Electrical & Computer Engineering Faculty Publications

There is a great demand for an efficient security framework which can secure IoT systems from potential adversarial attacks. However, it is challenging to design a suitable security model for IoT considering the dynamic and distributed nature of IoT. This motivates the researchers to focus more on investigating the role of machine learning (ML) in the designing of security models. A brief analysis of different ML algorithms for IoT security is discussed along with the advantages and limitations of ML algorithms. Existing studies state that ML algorithms suffer from the problem of high computational overhead and risk of privacy leakage. …


Class Activation Mapping And Uncertainty Estimation In Multi-Organ Segmentation, Md. Shibly Sadique, Walia Farzana, Ahmed Temtam, Khan Iftekharuddin, Khan Iftekharuddin (Ed.), Weijie Chen (Ed.) Jan 2023

Class Activation Mapping And Uncertainty Estimation In Multi-Organ Segmentation, Md. Shibly Sadique, Walia Farzana, Ahmed Temtam, Khan Iftekharuddin, Khan Iftekharuddin (Ed.), Weijie Chen (Ed.)

Electrical & Computer Engineering Faculty Publications

Deep learning (DL)-based medical imaging and image segmentation algorithms achieve impressive performance on many benchmarks. Yet the efficacy of deep learning methods for future clinical applications may become questionable due to the lack of ability to reason with uncertainty and interpret probable areas of failures in prediction decisions. Therefore, it is desired that such a deep learning model for segmentation classification is able to reliably predict its confidence measure and map back to the original imaging cases to interpret the prediction decisions. In this work, uncertainty estimation for multiorgan segmentation task is evaluated to interpret the predictive modeling in DL …


Deep-Learning-Based Classification Of Digitally Modulated Signals Using Capsule Networks And Cyclic Cumulants, John A. Snoap, Dimitrie C. Popescu, James A. Latshaw, Chad M. Spooner Jan 2023

Deep-Learning-Based Classification Of Digitally Modulated Signals Using Capsule Networks And Cyclic Cumulants, John A. Snoap, Dimitrie C. Popescu, James A. Latshaw, Chad M. Spooner

Electrical & Computer Engineering Faculty Publications

This paper presents a novel deep-learning (DL)-based approach for classifying digitally modulated signals, which involves the use of capsule networks (CAPs) together with the cyclic cumulant (CC) features of the signals. These were blindly estimated using cyclostationary signal processing (CSP) and were then input into the CAP for training and classification. The classification performance and the generalization abilities of the proposed approach were tested using two distinct datasets that contained the same types of digitally modulated signals, but had distinct generation parameters. The results showed that the classification of digitally modulated signals using CAPs and CCs proposed in the paper …


Ict Security Tools And Techniques Among Higher Education Institutions: A Critical Review, Miko Nuñez, Xavier-Lewis Palmer, Lucas Potter, Chris Jordan Aliac, Lemuel Clark Velasco Jan 2023

Ict Security Tools And Techniques Among Higher Education Institutions: A Critical Review, Miko Nuñez, Xavier-Lewis Palmer, Lucas Potter, Chris Jordan Aliac, Lemuel Clark Velasco

Electrical & Computer Engineering Faculty Publications

Higher education institutions (HEIs) are increasingly relying on digital technologies for classroom and organizational management, but this puts them at higher risk for information and communication (ICT security attacks. Recent studies show that HEIs have experienced more security breaches in ICT security composed of both cybersecurity an information security. A literature review was conducted to identify common ICT security practices in HEIs over the last decade. 11 journal articles were profiled and analyzed, revealing threats to HEIs’ security and protective measures in terms of organizational security, technological security, physical security, and standards and frameworks. Security tools and techniques were grouped …


Special Section Editorial: Artificial Intelligence For Medical Imaging In Clinical Practice, Claudia Mello-Thoms, Karen Drukker, Sian Taylor-Phillips, Khan Iftekharuddin, Marios Gavrielides Jan 2023

Special Section Editorial: Artificial Intelligence For Medical Imaging In Clinical Practice, Claudia Mello-Thoms, Karen Drukker, Sian Taylor-Phillips, Khan Iftekharuddin, Marios Gavrielides

Electrical & Computer Engineering Faculty Publications

This editorial introduces the JMI Special Section on Artificial Intelligence for Medical Imaging in Clinical Practice.


A Survey Of Using Machine Learning In Iot Security And The Challenges Faced By Researchers, Khawlah M. Harahsheh, Chung-Hao Chen Jan 2023

A Survey Of Using Machine Learning In Iot Security And The Challenges Faced By Researchers, Khawlah M. Harahsheh, Chung-Hao Chen

Electrical & Computer Engineering Faculty Publications

The Internet of Things (IoT) has become more popular in the last 15 years as it has significantly improved and gained control in multiple fields. We are nowadays surrounded by billions of IoT devices that directly integrate with our lives, some of them are at the center of our homes, and others control sensitive data such as military fields, healthcare, and datacenters, among others. This popularity makes factories and companies compete to produce and develop many types of those devices without caring about how secure they are. On the other hand, IoT is considered a good insecure environment for cyber …


Opioid Use Disorder Prediction Using Machine Learning Of Fmri Data, A. Temtam, Liangsuo Ma, F. Gerard Moeller, M. S. Sadique, K. M. Iftekharuddin, Khan M. Iftekharuddin (Ed.), Weijie Chen (Ed.) Jan 2023

Opioid Use Disorder Prediction Using Machine Learning Of Fmri Data, A. Temtam, Liangsuo Ma, F. Gerard Moeller, M. S. Sadique, K. M. Iftekharuddin, Khan M. Iftekharuddin (Ed.), Weijie Chen (Ed.)

Electrical & Computer Engineering Faculty Publications

According to the Centers for Disease Control and Prevention (CDC) more than 932,000 people in the US have died since 1999 from a drug overdose. Just about 75% of drug overdose deaths in 2020 involved Opioid, which suggests that the US is in an Opioid overdose epidemic. Identifying individuals likely to develop Opioid use disorder (OUD) can help public health in planning effective prevention, intervention, drug overdose and recovery policies. Further, a better understanding of prediction of overdose leading to the neurobiology of OUD may lead to new therapeutics. In recent years, very limited work has been done using statistical …


Runtime Energy Savings Based On Machine Learning Models For Multicore Applications, Vaibhav Sundriyal, Masha Sosonkina Jun 2022

Runtime Energy Savings Based On Machine Learning Models For Multicore Applications, Vaibhav Sundriyal, Masha Sosonkina

Electrical & Computer Engineering Faculty Publications

To improve the power consumption of parallel applications at the runtime, modern processors provide frequency scaling and power limiting capabilities. In this work, a runtime strategy is proposed to maximize energy savings under a given performance degradation. Machine learning techniques were utilized to develop performance models which would provide accurate performance prediction with change in operating core-uncore frequency. Experiments, performed on a node (28 cores) of a modern computing platform showed significant energy savings of as much as 26% with performance degradation of as low as 5% under the proposed strategy compared with the execution in the unlimited power case.


Understanding The Mechanism Of Deep Learning Frameworks In Lesion Detection For Pathological Images With Breast Cancer, Wei-Wen Hsu, Chung-Hao Chen, Chang Hao, Yu-Ling Hou, Xiang Gao, Yun Shao, Xueli Zhang, Jingjing Wang, Tao He, Yanhong Tai Apr 2022

Understanding The Mechanism Of Deep Learning Frameworks In Lesion Detection For Pathological Images With Breast Cancer, Wei-Wen Hsu, Chung-Hao Chen, Chang Hao, Yu-Ling Hou, Xiang Gao, Yun Shao, Xueli Zhang, Jingjing Wang, Tao He, Yanhong Tai

Electrical & Computer Engineering Faculty Publications

With the advances of scanning sensors and deep learning algorithms, computational pathology has drawn much attention in recent years and started to play an important role in the clinical workflow. Computer-aided detection (CADe) systems have been developed to assist pathologists in slide assessment, increasing diagnosis efficiency and reducing misdetections. In this study, we conducted four experiments to demonstrate that the features learned by deep learning models are interpretable from a pathological perspective. In addition, classifiers such as the support vector machine (SVM) and random forests (RF) were used in experiments to replace the fully connected layers and decompose the end-to-end …


Deeppose: Detecting Gps Spoofing Attack Via Deep Recurrent Neural Network, Peng Jiang, Hongyi Wu, Chunsheng Xin Jan 2022

Deeppose: Detecting Gps Spoofing Attack Via Deep Recurrent Neural Network, Peng Jiang, Hongyi Wu, Chunsheng Xin

Electrical & Computer Engineering Faculty Publications

The Global Positioning System (GPS) has become a foundation for most location-based services and navigation systems, such as autonomous vehicles, drones, ships, and wearable devices. However, it is a challenge to verify if the reported geographic locations are valid due to various GPS spoofing tools. Pervasive tools, such as Fake GPS, Lockito, and software-defined radio, enable ordinary users to hijack and report fake GPS coordinates and cheat the monitoring server without being detected. Furthermore, it is also a challenge to get accurate sensor readings on mobile devices because of the high noise level introduced by commercial motion sensors. To this …


Bitcoin Selfish Mining Modeling And Dependability Analysis, Chencheng Zhou, Liudong Xing, Jun Guo, Qisi Liu Jan 2022

Bitcoin Selfish Mining Modeling And Dependability Analysis, Chencheng Zhou, Liudong Xing, Jun Guo, Qisi Liu

Electrical & Computer Engineering Faculty Publications

Blockchain technology has gained prominence over the last decade. Numerous achievements have been made regarding how this technology can be utilized in different aspects of the industry, market, and governmental departments. Due to the safety-critical and security-critical nature of their uses, it is pivotal to model the dependability of blockchain-based systems. In this study, we focus on Bitcoin, a blockchain-based peer-to-peer cryptocurrency system. A continuous-time Markov chain-based analytical method is put forward to model and quantify the dependability of the Bitcoin system under selfish mining attacks. Numerical results are provided to examine the influences of several key parameters related to …


Spectrum Sensing With Energy Detection In Multiple Alternating Time Slots, Călin Vlădeanu, Alexandru Marţian, Dimitrie C. Popescu Jan 2022

Spectrum Sensing With Energy Detection In Multiple Alternating Time Slots, Călin Vlădeanu, Alexandru Marţian, Dimitrie C. Popescu

Electrical & Computer Engineering Faculty Publications

Energy detection (ED) represents a low complexity approach used by secondary users (SU) to sense spectrum occupancy by primary users (PU) in cognitive radio (CR) systems. In this paper, we present a new algorithm that senses the spectrum occupancy by performing ED in K consecutive sensing time slots starting from the current slot and continuing by alternating before and after the current slot. We consider a PU traffic model specified in terms of an average duty cycle value, and derive analytical expressions for the false alarm probability (FAP) and correct detection probability (CDP) for any value of K . Our …


Deep Learning Based Superconducting Radio-Frequency Cavity Fault Classification At Jefferson Laboratory, Lasitha Vidyaratne, Adam Carpenter, Tom Powers, Chris Tennant, Khan M. Iftekharuddin, Md. Monibor Rahman, Anna S. Shabalina Jan 2022

Deep Learning Based Superconducting Radio-Frequency Cavity Fault Classification At Jefferson Laboratory, Lasitha Vidyaratne, Adam Carpenter, Tom Powers, Chris Tennant, Khan M. Iftekharuddin, Md. Monibor Rahman, Anna S. Shabalina

Electrical & Computer Engineering Faculty Publications

This work investigates the efficacy of deep learning (DL) for classifying C100 superconducting radio-frequency (SRF) cavity faults in the Continuous Electron Beam Accelerator Facility (CEBAF) at Jefferson Lab. CEBAF is a large, high-power continuous wave recirculating linac that utilizes 418 SRF cavities to accelerate electrons up to 12 GeV. Recent upgrades to CEBAF include installation of 11 new cryomodules (88 cavities) equipped with a low-level RF system that records RF time-series data from each cavity at the onset of an RF failure. Typically, subject matter experts (SME) analyze this data to determine the fault type and identify the cavity of …


"Mystify": A Proactive Moving-Target Defense For A Resilient Sdn Controller In Software Defined Cps, Mohamed Azab, Mohamed Samir, Effat Samir Jan 2022

"Mystify": A Proactive Moving-Target Defense For A Resilient Sdn Controller In Software Defined Cps, Mohamed Azab, Mohamed Samir, Effat Samir

Electrical & Computer Engineering Faculty Publications

The recent devastating mission Cyber–Physical System (CPS) attacks, failures, and the desperate need to scale and to dynamically adapt to changes, revolutionized traditional CPS to what we name as Software Defined CPS (SD-CPS). SD-CPS embraces the concept of Software Defined (SD) everything where CPS infrastructure is more elastic, dynamically adaptable and online-programmable. However, in SD-CPS, the threat became more immanent, as the long-been physically-protected assets are now programmatically accessible to cyber attackers. In SD-CPSs, a network failure hinders the entire functionality of the system. In this paper, we present MystifY, a spatiotemporal runtime diversification for Moving-Target Defense (MTD) to secure …


A Channel State Information Based Virtual Mac Spoofing Detector, Peng Jiang, Hongyi Wu, Chunsheng Xin Jan 2022

A Channel State Information Based Virtual Mac Spoofing Detector, Peng Jiang, Hongyi Wu, Chunsheng Xin

Electrical & Computer Engineering Faculty Publications

Physical layer security has attracted lots of attention with the expansion of wireless devices to the edge networks in recent years. Due to limited authentication mechanisms, MAC spoofing attack, also known as the identity attack, threatens wireless systems. In this paper, we study a new type of MAC spoofing attack, the virtual MAC spoofing attack, in a tight environment with strong spatial similarities, which can create multiple counterfeits entities powered by the virtualization technologies to interrupt regular services. We develop a system to effectively detect such virtual MAC spoofing attacks via the deep learning method as a countermeasure. …


Runtime Power Allocation Based On Multi-Gpu Utilization In Gamess, Masha Sosonkina, Vaibhav Sundriyal, Jorge Luis Galvez Vallejo Jan 2022

Runtime Power Allocation Based On Multi-Gpu Utilization In Gamess, Masha Sosonkina, Vaibhav Sundriyal, Jorge Luis Galvez Vallejo

Electrical & Computer Engineering Faculty Publications

To improve the power consumption of parallel applications at the runtime, modern processors provide frequency scaling and power limiting capabilities. In this work, a runtime strategy is proposed to maximize performance under a given power budget by distributing the available power according to the relative GPU utilization. Time series forecasting methods were used to develop workload prediction models that provide accurate prediction of GPU utilization during application execution. Experiments were performed on a multi-GPU computing platform DGX-1 equipped with eight NVIDIA V100 GPUs used for quantum chemistry calculations in the GAMESS package. For a limited power budget, the proposed strategy …


Arithfusion: An Arithmetic Deep Model For Temporal Remote Sensing Image Fusion, Md Reshad Ul Hoque, Jian Wu, Chiman Kwan, Krzysztof Koperski, Jiang Li Jan 2022

Arithfusion: An Arithmetic Deep Model For Temporal Remote Sensing Image Fusion, Md Reshad Ul Hoque, Jian Wu, Chiman Kwan, Krzysztof Koperski, Jiang Li

Electrical & Computer Engineering Faculty Publications

Different satellite images may consist of variable numbers of channels which have different resolutions, and each satellite has a unique revisit period. For example, the Landsat-8 satellite images have 30 m resolution in their multispectral channels, the Sentinel-2 satellite images have 10 m resolution in the pan-sharp channel, and the National Agriculture Imagery Program (NAIP) aerial images have 1 m resolution. In this study, we propose a simple yet effective arithmetic deep model for multimodal temporal remote sensing image fusion. The proposed model takes both low- and high-resolution remote sensing images at t1 together with low-resolution images at a …


Facial Landmark Feature Fusion In Transfer Learning Of Child Facial Expressions, Megan A. Witherow, Manar D. Samad, Norou Diawara, Khan M. Iftekharuddin Jan 2022

Facial Landmark Feature Fusion In Transfer Learning Of Child Facial Expressions, Megan A. Witherow, Manar D. Samad, Norou Diawara, Khan M. Iftekharuddin

Electrical & Computer Engineering Faculty Publications

Automatic classification of child facial expressions is challenging due to the scarcity of image samples with annotations. Transfer learning of deep convolutional neural networks (CNNs), pretrained on adult facial expressions, can be effectively finetuned for child facial expression classification using limited facial images of children. Recent work inspired by facial age estimation and age-invariant face recognition proposes a fusion of facial landmark features with deep representation learning to augment facial expression classification performance. We hypothesize that deep transfer learning of child facial expressions may also benefit from fusing facial landmark features. Our proposed model architecture integrates two input branches: a …


Qu-Brats: Miccai Brats 2020 Challenge On Quantifying Uncertainty In Brain Tumor Segmentation - Analysis Of Ranking Scores And Benchmarking Results, Raghav Mehta, Angelos Filos, Ujjwal Baid, Chiharu Sako, Richard Mckinley, Michael Rebsamen, Katrin Dätwyler, Raphael Meier, Piotr Radojewski, Gowtham Krishnan Murugesan, Sahil Nalawade, Chandan Ganesh, Ben Wagner, Fang F. Yu, Baowei Fei, Ananth J. Madhuranthakam, Joseph A. Maldjian, Laura Daza, Catalina Gómez, Pablo Arbeláez, Chengliang Dai, Shuo Wang, Hadrien Reynaud, Yuan-Han Mo, Elsa Angelini, Yike Guo, Wenjia Bai, Subhashis Banerjee, Lin-Min Pei, Murat Ak, Sarahi Rosas-González, Ilyess Zemmoura, Clovis Tauber, Minh H. Vu, Tufve Nyholm, Tommy Löfstedt, Laura Mora Ballestar, Veronica Vilaplana, Hugh Mchugh, Gonzalo Maso Talou, Alan Wang, Jay Patel, Ken Chang, Katharina Hoebel, Mishka Gidwani, Nishanth Arun, Sharut Gupta, Mehak Aggarwal, Praveer Singh, Elizabeth R. Gerstner, Jayashree Kalpathy-Cramer, Nicholas Boutry, Alexis Huard, Lasitha Vidyaratne, Md. Monibor Rahman, Khan M. Iftekharuddin, Joseph Chazalon, Elodie Puybareau, Guillaume Tochon, Jun Ma, Mariano Cabezas, Xavier Llado, Arnau Oliver, Liliana Valencia, Sergi Valverde, Mehdi Amian, Mohammadreza Soltaninejad, Andriy Myronenko, Ali Hatamizadeh, Xue Feng, Quan Dou, Nicholas Tustison, Craig Meyer, Nisarg A. Shah, Sanjay Talbar, Marc-André Weber, Abhishek Mahajan, Andras Jakab, Roland Wiest, Hassan M. Fathallah-Shaykh, Arash Nazeri, Mikhail Milchenko1, Daniel Marcus, Aikaterini Kotrotsou, Rivka Colen, John Freymann, Justin Kirby, Christos Davatzikos, Bjoern Menze, Spyridon Bakas, Yarin Gal, Tal Arbel Jan 2022

Qu-Brats: Miccai Brats 2020 Challenge On Quantifying Uncertainty In Brain Tumor Segmentation - Analysis Of Ranking Scores And Benchmarking Results, Raghav Mehta, Angelos Filos, Ujjwal Baid, Chiharu Sako, Richard Mckinley, Michael Rebsamen, Katrin Dätwyler, Raphael Meier, Piotr Radojewski, Gowtham Krishnan Murugesan, Sahil Nalawade, Chandan Ganesh, Ben Wagner, Fang F. Yu, Baowei Fei, Ananth J. Madhuranthakam, Joseph A. Maldjian, Laura Daza, Catalina Gómez, Pablo Arbeláez, Chengliang Dai, Shuo Wang, Hadrien Reynaud, Yuan-Han Mo, Elsa Angelini, Yike Guo, Wenjia Bai, Subhashis Banerjee, Lin-Min Pei, Murat Ak, Sarahi Rosas-González, Ilyess Zemmoura, Clovis Tauber, Minh H. Vu, Tufve Nyholm, Tommy Löfstedt, Laura Mora Ballestar, Veronica Vilaplana, Hugh Mchugh, Gonzalo Maso Talou, Alan Wang, Jay Patel, Ken Chang, Katharina Hoebel, Mishka Gidwani, Nishanth Arun, Sharut Gupta, Mehak Aggarwal, Praveer Singh, Elizabeth R. Gerstner, Jayashree Kalpathy-Cramer, Nicholas Boutry, Alexis Huard, Lasitha Vidyaratne, Md. Monibor Rahman, Khan M. Iftekharuddin, Joseph Chazalon, Elodie Puybareau, Guillaume Tochon, Jun Ma, Mariano Cabezas, Xavier Llado, Arnau Oliver, Liliana Valencia, Sergi Valverde, Mehdi Amian, Mohammadreza Soltaninejad, Andriy Myronenko, Ali Hatamizadeh, Xue Feng, Quan Dou, Nicholas Tustison, Craig Meyer, Nisarg A. Shah, Sanjay Talbar, Marc-André Weber, Abhishek Mahajan, Andras Jakab, Roland Wiest, Hassan M. Fathallah-Shaykh, Arash Nazeri, Mikhail Milchenko1, Daniel Marcus, Aikaterini Kotrotsou, Rivka Colen, John Freymann, Justin Kirby, Christos Davatzikos, Bjoern Menze, Spyridon Bakas, Yarin Gal, Tal Arbel

Electrical & Computer Engineering Faculty Publications

Deep learning (DL) models have provided the state-of-the-art performance in a wide variety of medical imaging benchmarking challenges, including the Brain Tumor Segmentation (BraTS) challenges. However, the task of focal pathology multi-compartment segmentation (e.g., tumor and lesion sub-regions) is particularly challenging, and potential errors hinder the translation of DL models into clinical workflows. Quantifying the reliability of DL model predictions in the form of uncertainties, could enable clinical review of the most uncertain regions, thereby building trust and paving the way towards clinical translation. Recently, a number of uncertainty estimation methods have been introduced for DL medical image segmentation tasks. …


Matters Of Biocybersecurity With Consideration To Propaganda Outlets And Biological Agents, Xavier-Lewis Palmer, Ernestine Powell, Lucas Potter, Thaddeus Eze (Ed.), Lee Speakman (Ed.), Cyril Onwubiko (Ed.) Jan 2021

Matters Of Biocybersecurity With Consideration To Propaganda Outlets And Biological Agents, Xavier-Lewis Palmer, Ernestine Powell, Lucas Potter, Thaddeus Eze (Ed.), Lee Speakman (Ed.), Cyril Onwubiko (Ed.)

Electrical & Computer Engineering Faculty Publications

The modern era holds vast modalities in human data utilization. Within Biocybersecurity (BCS), categories of biological information, especially medical information transmitted online, can be viewed as pathways to destabilize organizations. Therefore, analysis of how the public, along with medical providers, process such data, and the methods by which false information, particularly propaganda, can be used to upset the flow of verified information to populations of medical professionals, is important for maintenance of public health. Herein, we discuss some interplay of BCS within the scope of propaganda and considerations for navigating the field.


Converting Optical Videos To Infrared Videos Using Attention Gan And Its Impact On Target Detection And Classification Performance, Mohammad Shahab Uddin, Reshad Hoque, Kazi Aminul Islam, Chiman Kwan, David Gribben, Jiang Li Jan 2021

Converting Optical Videos To Infrared Videos Using Attention Gan And Its Impact On Target Detection And Classification Performance, Mohammad Shahab Uddin, Reshad Hoque, Kazi Aminul Islam, Chiman Kwan, David Gribben, Jiang Li

Electrical & Computer Engineering Faculty Publications

To apply powerful deep-learning-based algorithms for object detection and classification in infrared videos, it is necessary to have more training data in order to build high-performance models. However, in many surveillance applications, one can have a lot more optical videos than infrared videos. This lack of IR video datasets can be mitigated if optical-to-infrared video conversion is possible. In this paper, we present a new approach for converting optical videos to infrared videos using deep learning. The basic idea is to focus on target areas using attention generative adversarial network (attention GAN), which will preserve the fidelity of target areas. …


Continuity Of Chen-Fliess Series For Applications In System Identification And Machine Learning, Rafael Dahmen, W. Steven Gray, Alexander Schmeding Jan 2021

Continuity Of Chen-Fliess Series For Applications In System Identification And Machine Learning, Rafael Dahmen, W. Steven Gray, Alexander Schmeding

Electrical & Computer Engineering Faculty Publications

Model continuity plays an important role in applications like system identification, adaptive control, and machine learning. This paper provides sufficient conditions under which input-output systems represented by locally convergent Chen-Fliess series are jointly continuous with respect to their generating series and as operators mapping a ball in an Lp-space to a ball in an Lq-space, where p and q are conjugate exponents. The starting point is to introduce a class of topological vector spaces known as Silva spaces to frame the problem and then to employ the concept of a direct limit to describe convergence. The proof of the main …


Covid-19 And Biocybersecurity's Increasing Role On Defending Forward, Xavier Palmer, Lucas N. Potter, Saltuk Karahan Jan 2021

Covid-19 And Biocybersecurity's Increasing Role On Defending Forward, Xavier Palmer, Lucas N. Potter, Saltuk Karahan

Electrical & Computer Engineering Faculty Publications

The evolving nature of warfare has been changing with cybersecurity and the use of advanced biotechnology in each aspect of the society is expanding and overlapping with the cyberworld. This intersection, which has been described as “biocybersecurity” (BCS), can become a major front of the 21st-century conflicts. There are three lines of BCS which make it a critical component of overall cybersecurity: (1) cyber operations within the area of BCS have life threatening consequences to a greater extent than other cyber operations, (2) the breach in health-related personal data is a significant tool for fatal attacks, and (3) health-related misinformation …