Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Michigan Technological University

2023

Deep learning

Articles 1 - 2 of 2

Full-Text Articles in Engineering

Terrain Characterization Via Machine Vs. Deep Learning Using Remote Sensing, Jordan Ewing, Thomas Oommen, Jobin Thomas, Anush Kasaragod, Richard Dobson, Colin Brooks, Paramsothy Jayakumar, Michael Cole, Tulga Ersal Jun 2023

Terrain Characterization Via Machine Vs. Deep Learning Using Remote Sensing, Jordan Ewing, Thomas Oommen, Jobin Thomas, Anush Kasaragod, Richard Dobson, Colin Brooks, Paramsothy Jayakumar, Michael Cole, Tulga Ersal

Michigan Tech Publications

Terrain traversability is critical for developing Go/No-Go maps for ground vehicles, which significantly impact a mission’s success. To predict the mobility of terrain, one must understand the soil characteristics. In-situ measurements performed in the field are the current method of collecting this information, which is time-consuming, costly, and can be lethal for military operations. This paper investigates an alternative approach using thermal, multispectral, and hyperspectral remote sensing from an unmanned aerial vehicle (UAV) platform. Remotely sensed data combined with machine learning (linear, ridge, lasso, partial least squares (PLS), support vector machines (SVM), and k nearest neighbors (KNN)) and deep learning …


Noise2clean: Cross-Device Side-Channel Traces Denoising With Unsupervised Deep Learning, Honggang Yu, Mei Wang, Xiyu Song, Haoqi Shan, Hongbing Qiu, Junyi Wang, Kaichen Yang Feb 2023

Noise2clean: Cross-Device Side-Channel Traces Denoising With Unsupervised Deep Learning, Honggang Yu, Mei Wang, Xiyu Song, Haoqi Shan, Hongbing Qiu, Junyi Wang, Kaichen Yang

Michigan Tech Publications

Deep learning (DL)-based side-channel analysis (SCA) has posed a severe challenge to the security and privacy of embedded devices. During its execution, an attacker exploits physical SCA leakages collected from profiling devices to create a DL model for recovering secret information from victim devices. Despite this success, recent works have demonstrated that certain countermeasures, such as random delay interrupts or clock jitters, would make these attacks more complex and less practical in real-world scenarios. To address this challenge, we present a novel denoising scheme that exploits the U-Net model to pre-process SCA traces for “noises” (i.e., countermeasures) removal. Specifically, we …