Searched for: +
(1 - 19 of 19)
document
Martin, H.A. (author), Xu, Haojia (author), Smits, Edsger C.P. (author), van Driel, W.D. (author), Zhang, Kouchi (author)
This study introduces a training protocol utilizing Convolutional Neural Networks (CNNs) and Confocal Scanning Acoustic Microscopy (CSAM) imaging techniques to classify Power Quad Flat No-leads (PQFN) package delamination. The investigation involves empty PQFN packages with varied substrate metallizations subjected to thermal cycling. Four...
conference paper 2024
document
Abolfazli, Amir (author), Spiegelberg, Jakob (author), Anand, A. (author), Palmer, Gregory (author)
Configurable software systems have become increasingly popular as they enable customized software variants. The main challenge in dealing with configuration problems is that the number of possible configurations grows exponentially as the number of features increases. Therefore, algorithms for testing customized software have to deal with the...
conference paper 2023
document
Nasri, Maedeh (author), Fang, Zhizhou (author), Baratchi, Mitra (author), Englebienne, Gwenn (author), Wang, Shenghui (author), Koutamanis, A. (author), Rieffe, Carolien (author)
Detecting and analyzing group behavior from spatio-temporal trajectories is an interesting topic in various domains, such as autonomous driving, urban computing, and social sciences. This paper revisits the group detection problem from spatio-temporal trajectories and proposes “WavenetNRI”, a graph neural network (GNN) based method. The...
conference paper 2023
document
Chaudhary, Shivam (author), Pandey, Pankaj (author), Miyapuram, Krishna Prasad (author), Lomas, J.D. (author)
In the modern world, it is easy to get lost in thought, partly because of the vast knowledge available at our fingertips via smartphones that divide our cognitive resources and partly because of our intrinsic thoughts. In this work, we aim to find the differences in the neural signatures of mind-wandering and meditation that are common across...
conference paper 2022
document
Lin, Y. (author), Wiersma, R.T. (author), Pintea, S. (author), Hildebrandt, K.A. (author), Eisemann, E. (author), van Gemert, J.C. (author)
Deep learning has improved vanishing point detection in images. Yet, deep networks require expensive annotated datasets trained on costly hardware and do not generalize to even slightly different domains, and minor problem variants. Here, we address these issues by injecting deep vanishing point detection networks with prior knowledge. This...
conference paper 2022
document
Yang, Ximei (author), Guendel, Ronny (author), Yarovoy, Alexander (author), Fioranelli, F. (author)
Human activities classification in assisted living is one of the emerging applications of radar. The conventional analysis considers micro-Doppler signatures as the chosen input for feature extraction or deep learning classification algorithms, or, less frequently, other radar data formats such as the range-time, the range-Doppler, or the...
conference paper 2022
document
Shengren, H. (author), Salazar, Edgar Mauricio (author), Vergara Barrios, P.P. (author), Palensky, P. (author)
Taking advantage of their data-driven and model-free features, Deep Reinforcement Learning (DRL) algorithms have the potential to deal with the increasing level of uncertainty due to the introduction of renewable-based generation. To deal simultaneously with the energy systems’ operational cost and technical constraints (e.g, generation-demand...
conference paper 2022
document
Rijsdijk, Jorai (author), Wu, L. (author), Perin, G. (author)
Deep learning-based side-channel attacks are capable of breaking targets protected with countermeasures. The constant progress in the last few years makes the attacks more powerful, requiring fewer traces to break a target. Unfortunately, to protect against such attacks, we still rely solely on methods developed to protect against generic...
conference paper 2022
document
Kerkhof, Maikel (author), Wu, L. (author), Perin, G. (author), Picek, S. (author)
The deep learning-based side-channel analysis represents one of the most powerful side-channel attack approaches. Thanks to its capability in dealing with raw features and countermeasures, it becomes the de facto standard approach for the SCA community. The recent works significantly improved the deep learning-based attacks from various...
conference paper 2022
document
Mody, Prerak (author), Chaves-de-Plaza, Nicolas F. (author), Hildebrandt, K.A. (author), Staring, M. (author)
Bayesian Neural Nets (BNN) are increasingly used for robust organ auto-contouring. Uncertainty heatmaps extracted from BNNs have been shown to correspond to inaccurate regions. To help speed up the mandatory quality assessment (QA) of contours in radiotherapy, these heatmaps could be used as stimuli to direct visual attention of clinicians to...
conference paper 2022
document
Andringa, S.P.E. (author), Yorke-Smith, N. (author)
Simulation–optimization is often used in enterprise decision-making processes, both operational and tactical. This paper shows how an intuitive mapping from descriptive problem to optimization model can be realized with Constraint Programming (CP). It shows how a CP model can be constructed given a simulation model and a set of business goals...
conference paper 2022
document
Rezaeezade, A. (author), Perin, G. (author), Picek, S. (author)
Profiling side-channel analysis allows evaluators to estimate the worst-case security of a target. When security evaluations relax the assumptions about the adversary’s knowledge, profiling models may easily be sub-optimal due to the inability to extract the most informative points of interest from the side-channel measurements. When used for...
conference paper 2022
document
Applis, L.H. (author), Panichella, A. (author), van Deursen, A. (author)
Metamorphic testing is a well-established testing technique that has been successfully applied in various domains, including testing deep learning models to assess their robustness against data noise or malicious input. Currently, metamorphic testing approaches for machine learning (ML) models focused on image processing and object recognition...
conference paper 2021
document
Wu, L. (author), Perin, G. (author)
In recent years, the advent of deep neural networks opened new perspectives for security evaluations with side-channel analysis. Profiling attacks now benefit from capabilities offered by convolutional neural networks, such as dimensionality reduction and the inherent ability to reduce the trace desynchronization effects. These neural...
conference paper 2021
document
Cao, Wen-Jun (author)
The train wheel flat is one of the most common damages in the railway system. It occurs when a wheel locks up while the train is moving. The early detection of wheel-flat severity is crucial for passenger comfort and the safety of the railway operation. However, it is still challenging to quantify the properties of wheel flats (e.g., sizes)...
conference paper 2020
document
Wu, L. (author), Ribera, Gerard (author), Beringuier-Boher, Noemie (author), Picek, S. (author)
Semi-invasive fault injection attacks are powerful techniques well-known by attackers and secure embedded system designers. When performing such attacks, the selection of the fault injection parameters is of utmost importance and usually based on the experience of the attacker. Surprisingly, there exists no formal and general approach to...
conference paper 2020
document
Rahman, Muhammad Fazalul (author), Murukannaiah, P.K. (author), Sharma, Naveen (author)
Vacant lots are municipally-owned land parcels which were acquired post-abandonment or due to tax foreclosures. With time, failure to sell or find alternate uses for vacant lots results in them causing adverse effects on the health and safety of residents, and cost the city both directly and indirectly. Although existing research has tried to...
conference paper 2020
document
Gama, F. (author), Marques, Antonio G. (author), Leus, G.J.T. (author), Ribeiro, Alejandro (author)
In this ongoing work, we describe several architectures that generalize convolutional neural networks (CNNs) to process signals supported on graphs. The general idea of the replace time invariant filters with graph filters to generate convolutional features and to replace pooling with sampling schemes for graph signals. The different...
conference paper 2019
document
Gudi, A.A. (author), Bittner, M. (author), Lochmans, Roelof (author), van Gemert, J.C. (author)
Remote photo-plethysmography (rPPG) uses a remotely placed camera to estimating a person's heart rate (HR). Similar to how heart rate can provide useful information about a person's vital signs, insights about the underlying physio/psychological conditions can be obtained from heart rate variability (HRV). HRV is a measure of the fine...
conference paper 2019
Searched for: +
(1 - 19 of 19)