no code implementations • 6 Mar 2024 • Jun Chen, Weng-Keen Wong, Bechir Hamdaoui
When applied to RF fingerprinting, our model treats RF signals from the same transmission as positive pairs and those from different transmissions as negative pairs.
no code implementations • 6 Dec 2023 • Matthew L. Olson, Shusen Liu, Jayaraman J. Thiagarajan, Bogdan Kustowski, Weng-Keen Wong, Rushil Anirudh
Recent advances in machine learning, specifically transformer architecture, have led to significant advancements in commercial domains.
no code implementations • 16 May 2023 • Luke Puppo, Weng-Keen Wong, Bechir Hamdaoui, Abdurrahman Elmaghbub
New capabilities in wireless network security have been enabled by deep learning, which leverages patterns in radio frequency (RF) data to identify and authenticate devices.
1 code implementation • CVPR 2023 • Matthew L. Olson, Shusen Liu, Rushil Anirudh, Jayaraman J. Thiagarajan, Peer-Timo Bremer, Weng-Keen Wong
To this end, we introduce Cross-GAN Auditing (xGA) that, given an established "reference" GAN and a newly proposed "client" GAN, jointly identifies intelligible attributes that are either common across both GANs, novel to the client GAN, or missing from the client GAN.
no code implementations • 29 Jan 2023 • Abdurrahman Elmaghbub, Bechir Hamdaoui, Weng-Keen Wong
Our framework has been evaluated on real LoRa and WiFi datasets and showed about 24% improvement in accuracy when compared to the baseline CNN network on short-term temporal adaptation.
no code implementations • 20 Feb 2022 • Jun Chen, Weng-Keen Wong, Bechir Hamdaoui, Abdurrahman Elmaghbub, Kathiravetpillai Sivanesan, Richard Dorrance, Lily L. Yang
We perform a deep dive into understanding the impact of (i) the input representation/type and (ii) the architectural layer of the neural network.
no code implementations • 29 Sep 2021 • Matthew Lyle Olson, Neale Ratzlaff, Weng-Keen Wong
This Beta loss is a proper composite loss with a Beta weight function.
no code implementations • 18 Aug 2021 • Matthew L. Olson, Thuy-Vy Nguyen, Gaurav Dixit, Neale Ratzlaff, Weng-Keen Wong, Minsuk Kahng
Identifying covariate shift is crucial for making machine learning systems robust in the real world and for detecting training data biases that are not reflected in test data.
2 code implementations • 29 Jan 2021 • Matthew L. Olson, Roli Khanna, Lawrence Neal, Fuxin Li, Weng-Keen Wong
Our second user study investigates if counterfactual state explanations can help non-expert participants identify a flawed agent; we compare against a baseline approach based on a nearest neighbor explanation which uses images from the actual game.
no code implementations • 27 Sep 2019 • Matthew L. Olson, Lawrence Neal, Fuxin Li, Weng-Keen Wong
In this work, we introduce the concept of a counterfactual state to help humans gain a better understanding of what would need to change (minimally) in an Atari game image for the agent to choose a different action.
no code implementations • ECCV 2018 • Lawrence Neal, Matthew Olson, Xiaoli Fern, Weng-Keen Wong, Fuxin Li
In open set recognition, a classifier must label instances of known classes while detecting instances of unknown classes not encountered during training.
2 code implementations • 30 Aug 2017 • Shubhomoy Das, Weng-Keen Wong, Alan Fern, Thomas G. Dietterich, Md Amran Siddiqui
Unfortunately, in realworld applications, this process can be exceedingly difficult for the analyst since a large fraction of high-ranking anomalies are false positives and not interesting from the application perspective.
1 code implementation • 3 Mar 2015 • Andrew Emmott, Shubhomoy Das, Thomas Dietterich, Alan Fern, Weng-Keen Wong
The intended contributions of this article are many; in addition to providing a large publicly-available corpus of anomaly detection benchmarks, we provide an ontology for describing anomaly detection contexts, a methodology for controlling various aspects of benchmark creation, guidelines for future experimental design and a discussion of the many potential pitfalls of trying to measure success in this field.
no code implementations • 28 Feb 2015 • Md Amran Siddiqui, Alan Fern, Thomas G. Dietterich, Weng-Keen Wong
An SFE of an anomaly is a sequence of features, which are presented to the analyst one at a time (in order) until the information contained in the highlighted features is enough for the analyst to make a confident judgement about the anomaly.