Search Results - "Robinette, Preston"
-
1
Automated detection of corrosion in used nuclear fuel dry storage canisters using residual neural networks
Published in Nuclear engineering and technology (01-02-2021)“…Nondestructive evaluation methods play an important role in ensuring component integrity and safety in many industries. Operator fatigue can play a critical…”
Get full text
Journal Article -
2
Reinforcement Learning Heuristics for Aerospace Control Systems
Published in 2022 IEEE Aerospace Conference (AERO) (05-03-2022)“…Reinforcement learning (RL) is a form of machine learning (ML) where an agent is directed to a goal by learning from interactions within an environment. RL has…”
Get full text
Conference Proceeding -
3
Automated detection of corrosion in used nuclear fuel dry storage canisters using residual neural networks
Published in Nuclear engineering and technology (2021)“…Nondestructive evaluation methods play an important role in ensuring component integrity and safety in many industries. Operator fatigue can play a critical…”
Get full text
Journal Article -
4
Monsters in the Dark: Sanitizing Hidden Threats with Diffusion Models
Published 10-10-2023“…Steganography is the art of hiding information in plain sight. This form of covert communication can be used by bad actors to propagate malware, exfiltrate…”
Get full text
Journal Article -
5
On Using Real-Time Reachability for the Safety Assurance of Machine Learning Controllers
Published in 2022 IEEE International Conference on Assured Autonomy (ICAA) (01-03-2022)“…Over the last decade, advances in machine learning and sensing technology have paved the way for the belief that safe, accessible, and convenient autonomous…”
Get full text
Conference Proceeding -
6
Trigger-Based Fragile Model Watermarking for Image Transformation Networks
Published 28-09-2024“…In fragile watermarking, a sensitive watermark is embedded in an object in a manner such that the watermark breaks upon tampering. This fragile process can be…”
Get full text
Journal Article -
7
Case Study: Neural Network Malware Detection Verification for Feature and Image Datasets
Published in 2024 IEEE/ACM 12th International Conference on Formal Methods in Software Engineering (FormaliSE) (14-04-2024)“…Malware, or software designed with harmful intent, is an ever-evolving threat that can have drastic effects on both individuals and institutions. Neural…”
Get full text
Conference Proceeding -
8
Case Study: Neural Network Malware Detection Verification for Feature and Image Datasets
Published 08-04-2024“…Malware, or software designed with harmful intent, is an ever-evolving threat that can have drastic effects on both individuals and institutions. Neural…”
Get full text
Journal Article -
9
SUDS: Sanitizing Universal and Dependent Steganography
Published 23-09-2023“…Steganography, or hiding messages in plain sight, is a form of information hiding that is most commonly used for covert communication. As modern steganographic…”
Get full text
Journal Article -
10
An Empirical Analysis of the Use of Real-Time Reachability for the Safety Assurance of Autonomous Vehicles
Published 03-05-2022“…Recent advances in machine learning technologies and sensing have paved the way for the belief that safe, accessible, and convenient autonomous vehicles may be…”
Get full text
Journal Article -
11
Automated detection of corrosion in used nuclear fuel dry storage canisters using residual neural networks
Published 06-03-2020“…Nondestructive evaluation methods play an important role in ensuring component integrity and safety in many industries. Operator fatigue can play a critical…”
Get full text
Journal Article