Search Results for author: Weng-Keen Wong

Found 14 papers, 4 papers with code

Unsupervised Contrastive Learning for Robust RF Device Fingerprinting Under Time-Domain Shift

no code implementations6 Mar 2024 Jun Chen, Weng-Keen Wong, Bechir Hamdaoui

When applied to RF fingerprinting, our model treats RF signals from the same transmission as positive pairs and those from different transmissions as negative pairs.

Contrastive Learning Self-Supervised Learning

Transformer-Powered Surrogates Close the ICF Simulation-Experiment Gap with Extremely Limited Data

no code implementations6 Dec 2023 Matthew L. Olson, Shusen Liu, Jayaraman J. Thiagarajan, Bogdan Kustowski, Weng-Keen Wong, Rushil Anirudh

Recent advances in machine learning, specifically transformer architecture, have led to significant advancements in commercial domains.

HiNoVa: A Novel Open-Set Detection Method for Automating RF Device Authentication

no code implementations16 May 2023 Luke Puppo, Weng-Keen Wong, Bechir Hamdaoui, Abdurrahman Elmaghbub

New capabilities in wireless network security have been enabled by deep learning, which leverages patterns in radio frequency (RF) data to identify and authenticate devices.

Time Series

Cross-GAN Auditing: Unsupervised Identification of Attribute Level Similarities and Differences between Pretrained Generative Models

1 code implementation CVPR 2023 Matthew L. Olson, Shusen Liu, Rushil Anirudh, Jayaraman J. Thiagarajan, Peer-Timo Bremer, Weng-Keen Wong

To this end, we introduce Cross-GAN Auditing (xGA) that, given an established "reference" GAN and a newly proposed "client" GAN, jointly identifies intelligible attributes that are either common across both GANs, novel to the client GAN, or missing from the client GAN.

Attribute Fairness

ADL-ID: Adversarial Disentanglement Learning for Wireless Device Fingerprinting Temporal Domain Adaptation

no code implementations29 Jan 2023 Abdurrahman Elmaghbub, Bechir Hamdaoui, Weng-Keen Wong

Our framework has been evaluated on real LoRa and WiFi datasets and showed about 24% improvement in accuracy when compared to the baseline CNN network on short-term temporal adaptation.

Disentanglement Domain Adaptation

An Analysis of Complex-Valued CNNs for RF Data-Driven Wireless Device Classification

no code implementations20 Feb 2022 Jun Chen, Weng-Keen Wong, Bechir Hamdaoui, Abdurrahman Elmaghbub, Kathiravetpillai Sivanesan, Richard Dorrance, Lily L. Yang

We perform a deep dive into understanding the impact of (i) the input representation/type and (ii) the architectural layer of the neural network.

Contrastive Identification of Covariate Shift in Image Data

no code implementations18 Aug 2021 Matthew L. Olson, Thuy-Vy Nguyen, Gaurav Dixit, Neale Ratzlaff, Weng-Keen Wong, Minsuk Kahng

Identifying covariate shift is crucial for making machine learning systems robust in the real world and for detecting training data biases that are not reflected in test data.

Attribute

Counterfactual State Explanations for Reinforcement Learning Agents via Generative Deep Learning

2 code implementations29 Jan 2021 Matthew L. Olson, Roli Khanna, Lawrence Neal, Fuxin Li, Weng-Keen Wong

Our second user study investigates if counterfactual state explanations can help non-expert participants identify a flawed agent; we compare against a baseline approach based on a nearest neighbor explanation which uses images from the actual game.

counterfactual reinforcement-learning +1

Counterfactual States for Atari Agents via Generative Deep Learning

no code implementations27 Sep 2019 Matthew L. Olson, Lawrence Neal, Fuxin Li, Weng-Keen Wong

In this work, we introduce the concept of a counterfactual state to help humans gain a better understanding of what would need to change (minimally) in an Atari game image for the agent to choose a different action.

counterfactual Decision Making

Open Set Learning with Counterfactual Images

no code implementations ECCV 2018 Lawrence Neal, Matthew Olson, Xiaoli Fern, Weng-Keen Wong, Fuxin Li

In open set recognition, a classifier must label instances of known classes while detecting instances of unknown classes not encountered during training.

Classification counterfactual +4

Incorporating Feedback into Tree-based Anomaly Detection

2 code implementations30 Aug 2017 Shubhomoy Das, Weng-Keen Wong, Alan Fern, Thomas G. Dietterich, Md Amran Siddiqui

Unfortunately, in realworld applications, this process can be exceedingly difficult for the analyst since a large fraction of high-ranking anomalies are false positives and not interesting from the application perspective.

Anomaly Detection

A Meta-Analysis of the Anomaly Detection Problem

1 code implementation3 Mar 2015 Andrew Emmott, Shubhomoy Das, Thomas Dietterich, Alan Fern, Weng-Keen Wong

The intended contributions of this article are many; in addition to providing a large publicly-available corpus of anomaly detection benchmarks, we provide an ontology for describing anomaly detection contexts, a methodology for controlling various aspects of benchmark creation, guidelines for future experimental design and a discussion of the many potential pitfalls of trying to measure success in this field.

Anomaly Detection Benchmarking +2

Sequential Feature Explanations for Anomaly Detection

no code implementations28 Feb 2015 Md Amran Siddiqui, Alan Fern, Thomas G. Dietterich, Weng-Keen Wong

An SFE of an anomaly is a sequence of features, which are presented to the analyst one at a time (in order) until the information contained in the highlighted features is enough for the analyst to make a confident judgement about the anomaly.

Anomaly Detection

Cannot find the paper you are looking for? You can Submit a new open access paper.