Search Results - "Loper, Margaret"
-
1
Simulation Trust and the Internet of Things
Published in 2019 Winter Simulation Conference (WSC) (01-12-2019)“…The urban environment is becoming increasingly more connected and complex. In the coming decades, we will be surrounded by billions of sensors, devices, and…”
Get full text
Conference Proceeding -
2
The application of applied category theory to quantify mission success
Published in Simulation (San Diego, Calif.) (01-02-2023)“…Mission engineering is the quantification of the effects applied by a system of systems to achieve measurable desired results. The execution of the mission is…”
Get full text
Journal Article -
3
Agent-based modeling of a stadium evacuation in a smart city
Published in 2018 Winter Simulation Conference (WSC) (01-12-2018)“…The concept of Smart Cities is introduced to deal with the problems and challenges that come along with the growth of urbanization. Among all the challenges…”
Get full text
Conference Proceeding -
4
Machine to Machine Trust in Smart Cities
Published in 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS) (01-06-2017)“…In the coming decades, we will live in a world surrounded by tens of billions of devices that will interoperate and collaborate in an effort to deliver…”
Get full text
Conference Proceeding -
5
Modeling &Amp; Simulation in Systems Engineering: A Survey Course
Published in 2019 Winter Simulation Conference (WSC) (01-12-2019)“…Systems engineering is a bit different from other engineering disciplines in that students from many disciplines are enrolled in the program. Therefore, the…”
Get full text
Conference Proceeding -
6
Designing and Enabling Simulation of Real-World GPU Network Applications with ns-3 and DCE
Published in 2016 IEEE 24th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS) (01-09-2016)“…The ability to execute the original source code for network protocols and applications within a network simulation environment frees the simulation modeler…”
Get full text
Conference Proceeding -
7
Computational challenges in modeling & simulation of complex systems
Published in 2017 Winter Simulation Conference (WSC) (01-12-2017)“…Modeling and simulation faces many new computational challenges in the design of complex engineered systems. The systems that need to be modeled are…”
Get full text
Conference Proceeding -
8
Trust as a Service: Building and Managing Trust in the Internet of Things
Published in 2018 IEEE International Symposium on Technologies for Homeland Security (HST) (01-10-2018)“…Trust is an abstract, multi-faceted and subjective concept. It is difficult to define trust and identify the elements that establish trust. At the same time,…”
Get full text
Conference Proceeding -
9
Modeling an emergency operations center with agents
Published in Proceedings of the 37th conference on Winter simulation (04-12-2005)“…The Georgia Emergency Management Agency (GEMA) operates the State Operations Center, which is the centralized hub for all communications regarding state…”
Get full text
Conference Proceeding -
10
Adversarial Objectness Gradient Attacks in Real-time Object Detection Systems
Published in 2020 Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA) (01-10-2020)“…Real-time object detection is one of the key applications of deep neural networks (DNNs) for real-world mission-critical systems. While DNN-powered object…”
Get full text
Conference Proceeding -
11
Data Poisoning and Leakage Analysis in Federated Learning
Published 19-09-2024“…Data poisoning and leakage risks impede the massive deployment of federated learning in the real world. This chapter reveals the truths and pitfalls of…”
Get full text
Journal Article -
12
Deep Neural Network Ensembles Against Deception: Ensemble Diversity, Accuracy and Robustness
Published in 2019 IEEE 16th International Conference on Mobile Ad Hoc and Sensor Systems (MASS) (01-11-2019)“…Ensemble learning is a methodology that integrates multiple DNN learners for improving prediction performance of individual learners. Diversity is greater when…”
Get full text
Conference Proceeding -
13
Lessons from a conceptual modeling exercise
Published in Proceedings of the 2012 Winter Simulation Conference (WSC) (01-12-2012)“…There is considerable need to educate students in the process of developing conceptual models within the modeling and simulation discipline. The challenge is…”
Get full text
Conference Proceeding -
14
Exploiting temporal uncertainty in process-oriented distributed simulations
Published in Proceedings of the 36th conference on Winter simulation (05-12-2004)“…Existing research has defined a new type of simulation time called Approximate Time, where the simulation's knowledge about the values that represent time is…”
Get full text
Conference Proceeding -
15
Robust Few-Shot Ensemble Learning with Focal Diversity-Based Pruning
Published 05-04-2024“…This paper presents FusionShot, a focal diversity optimized few-shot ensemble learning approach for boosting the robustness and generalization performance of…”
Get full text
Journal Article -
16
Cross-Layer Strategic Ensemble Defense Against Adversarial Examples
Published in 2020 International Conference on Computing, Networking and Communications (ICNC) (01-02-2020)“…Deep neural network (DNN) has demonstrated its success in multiple domains. However, DNN models are inherently vulnerable to adversarial examples, which are…”
Get full text
Conference Proceeding -
17
Educating the workforce: M&S professional education
Published in Proceedings of the 2011 Winter Simulation Conference (WSC) (01-12-2011)“…As Modeling & Simulation (M&S) becomes increasingly important, there is a significant and growing need to educate and train M&S practitioners and researchers…”
Get full text
Conference Proceeding -
18
A Framework for Evaluating Gradient Leakage Attacks in Federated Learning
Published 22-04-2020“…Federated learning (FL) is an emerging distributed machine learning framework for collaborative model training with a network of clients (edge devices). FL…”
Get full text
Journal Article -
19
PrivacyZone: A Novel Approach to Protecting Location Privacy of Mobile Users
Published in 2018 IEEE International Conference on Big Data (Big Data) (01-12-2018)“…While location-based services and applications are increasing in popularity, there are growing concerns over users' location privacy. Although there exist…”
Get full text
Conference Proceeding -
20
Adversarial Deception in Deep Learning: Analysis and Mitigation
Published in 2020 Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA) (01-10-2020)“…The burgeoning success of deep learning has raised the security and privacy concerns as more and more tasks are accompanied with sensitive data. Adversarial…”
Get full text
Conference Proceeding