Recent Submissions

  • Hidden vulnerability of US Atlantic coast to sea-level rise due to vertical land motion 

    Ohenhen, Leonard O.; Shirzaei, Manoochehr; Ojha, Chandrakanta; Kirwan, Matthew L. (Nature Research, 2023-04-11)
    The vulnerability of coastal environments to sea-level rise varies spatially, particularly due to local land subsidence. However, high-resolution observations and models of coastal subsidence are scarce, hindering an ...
  • A survey of inverse reinforcement learning 

    Adams, Stephen; Cody, Tyler; Beling, Peter A. (Springer, 2022-08)
    Learning from demonstration, or imitation learning, is the process of learning to act in an environment from examples provided by a teacher. Inverse reinforcement learning (IRL) is a specific form of learning from demonstration ...
  • Decoupling RNN Training and Testing Observation Intervals for Spectrum Sensing Applications 

    Moore, Megan O.; Buehrer, R. Michael; Headley, William Chris (MDPI, 2022-06-22)
    Recurrent neural networks have been shown to outperform other architectures when processing temporally correlated data, such as from wireless communication signals. However, compared to other architectures, such as ...
  • Transfer Learning for Radio Frequency Machine Learning: A Taxonomy and Survey 

    Wong, Lauren J.; Michaels, Alan J. (MDPI, 2022-02-12)
    Transfer learning is a pervasive technology in computer vision and natural language processing fields, yielding exponential performance improvements by leveraging prior knowledge gained from data with different distributions. ...
  • Real-Time Mask Recognition 

    Billings, Rachel M.; Michaels, Alan J. (MDPI, 2021-11-08)
    While a variety of image processing studies have been performed to quantify the potential performance of neural network-based models using high-quality still images, relatively few studies seek to apply those models to a ...
  • Designing a Block Cipher in Galois Extension Fields for IoT Security 

    George, Kiernan; Michaels, Alan J. (MDPI, 2021-11-05)
    This paper focuses on a block cipher adaptation of the Galois Extension Fields (GEF) combination technique for PRNGs and targets application in the Internet of Things (IoT) space, an area where the combination technique ...
  • Enabling Artificial Intelligence Adoption through Assurance 

    Freeman, Laura J.; Rahman, Abdul; Batarseh, Feras A. (MDPI, 2021-08-25)
    The wide scale adoption of Artificial Intelligence (AI) will require that AI engineers and developers can provide assurances to the user base that an algorithm will perform as intended and without failure. Assurance is the ...
  • Shannon Entropy Loss in Mixed-Radix Conversions 

    Vennos, Amy; Michaels, Alan J. (MDPI, 2021-07-27)
    This paper models a translation for base-2 pseudorandom number generators (PRNGs) to mixed-radix uses such as card shuffling. In particular, we explore a shuffler algorithm that relies on a sequence of uniformly distributed ...
  • An ontological metamodel for cyber-physical system safety, security, and resilience coengineering 

    Bakirtzis, Georgios; Sherburne, Tim; Adams, Stephen C.; Horowitz, Barry M.; Beling, Peter A.; Fleming, Cody H. (2021-06-01)
    Cyber-physical systems are complex systems that require the integration of diverse software, firmware, and hardware to be practical and useful. This increased complexity is impacting the management of models necessary for ...
  • Cyberphysical Security Through Resiliency: A Systems-Centric Approach 

    Fleming, Cody H.; Elks, Carl R.; Bakirtzis, Georgios; Adams, Stephen C.; Carter, Bryan; Beling, Peter A.; Horowitz, Barry M. (2021-06)
    Cyberphysical systems require resiliency techniques for defense, and multicriteria resiliency problems need an approach that evaluates systems for current threats and potential design solutions. A systems-oriented view of ...
  • Attacks and Defenses for Single-Stage Residue Number System PRNGs 

    Vennos, Amy; George, Kiernan; Michaels, Alan J. (MDPI, 2021-06-25)
    This paper explores the security of a single-stage residue number system (RNS) pseudorandom number generator (PRNG), which has previously been shown to provide extremely high-quality outputs when evaluated through available ...
  • A Coupled OpenFOAM-WRF Study on Atmosphere-Wake-Ocean Interaction 

    Gilbert, John; Pitt, Jonathan (MDPI, 2020-12-30)
    This work aims to better understand how small scale disturbances that are generated at the air-sea interface propagate into the surrounding atmosphere under realistic environmental conditions. To that end, a one-way coupled ...
  • Multi-Physics Modeling of Electrochemical Deposition 

    Kauffman, Justin; Gilbert, John; Paterson, Eric G. (MDPI, 2020-12-11)
    Electrochemical deposition (ECD) is a common method used in the field of microelectronics to grow metallic coatings on an electrode. The deposition process occurs in an electrolyte bath where dissolved ions of the depositing ...
  • A Practical Guide for Managing Interdisciplinary Teams: Lessons Learned from Coupled Natural and Human Systems Research 

    Henson, V. Reilly; Cobourn, Kelly M.; Weathers, Kathleen C.; Carey, Cayelan C.; Farrell, Kaitlin J.; Klug, Jennifer L.; Sorice, Michael G.; Ward, Nicole K.; Weng, Weizhe (MDPI, 2020-07-09)
    Interdisciplinary team science is essential to address complex socio-environmental questions, but it also presents unique challenges. The scientific literature identifies best practices for high-level processes in team ...
  • Fallthrough Correlation Techniques for Arbitrary-Phase Spread Spectrum Waveforms 

    Fletcher, Michael; Michaels, Alan J.; Ridge, Devin (IEEE, 2019-09-11)
    The use of practically non-repeating spreading codes to generate sequence-based spread spectrum waveforms is a strong method to improve transmission security, by limiting an observer's opportunity to cross-correlate snapshots ...
  • Further Analysis of PRNG-Based Key Derivation Functions 

    McGinthy, Jason M.; Michaels, Alan J. (IEEE, 2019)
    The Internet of Things (IoT) is growing at a rapid pace. With everyday applications and services becoming wirelessly networked, security still is a major concern. Many of these sensors and devices have limitations, such ...
  • Cyberbiosecurity: A New Perspective on Protecting US Food and Agricultural System 

    Duncan, Susan E.; Reinhard, Robert; Williams, Robert C.; Ramsey, A. Ford; Thomason, Wade E.; Lee, Kiho; Dudek, Nancy; Mostaghimi, Saied; Colbert, Edward; Murch, Randall Steven (Frontiers, 2019-03-29)
    Our national data and infrastructure security issues affecting the "bioeconomy" are evolving rapidly. Simultaneously, the conversation about cyber security of the U.S. food and agricultural system (cyber biosecurity) is ...
  • Specific Emitter Identification Using Convolutional Neural Network-Based IQ Imbalance Estimators 

    Wong, Lauren J.; Headley, William C.; Michaels, Alan J. (IEEE, 2019)
    Specific Emitter Identification is the association of a received signal to a unique emitter, and is made possible by the naturally occurring and unintentional characteristics an emitter imparts onto each transmission, known ...
  • System and method for heterogenous spectrum sharing between commercial cellular operators and legacy incumbent users in wireless networks 

    Electrical and Computer Engineering; Business Information Technology; Hume Center for National Security and Technology; Virginia Tech Intellectual Properties, Inc.; Federated Wireless, Inc.; Kumar, Akshay; Mitola, Joseph III; Reed, Jeffrey H.; Clancy, Thomas Charles III; Amanna, Ashwin E.; McGweir, Robert; Sengupta, Avik (United States Patent and Trademark Office, 2016-12-06)
    Described herein are systems and methods for telecommunications spectrum sharing between multiple heterogeneous users, which leverage a hybrid approach that includes both distributed spectrum sharing, spectrum-sensing, and ...
  • Distributed Storage Systems with Secure and Exact Repair - New Results 

    Tandon, Ravi; Amuru, SaiDhiraj; Clancy, Thomas Charles III; Buehrer, R. Michael (IEEE, 2014-02)
    Distributed storage systems (DSS) in the presence of a passive eavesdropper are considered in this paper. A typical DSS is characterized by 3 parameters (n, k, d) where, a file is stored in a distributed manner across n ...

View more