Skip to main content

Showing 1–12 of 12 results for author: Velipasalar, S

Searching in archive eess. Search in all archives.
.
  1. arXiv:2405.00213  [pdf, other

    cs.LG cs.HC eess.SP

    Block-As-Domain Adaptation for Workload Prediction from fNIRS Data

    Authors: Jiyang Wang, Ayse Altay, Senem Velipasalar

    Abstract: Functional near-infrared spectroscopy (fNIRS) is a non-intrusive way to measure cortical hemodynamic activity. Predicting cognitive workload from fNIRS data has taken on a diffuse set of methods. To be applicable in real-world settings, models are needed, which can perform well across different sessions as well as different subjects. However, most existing works assume that training and testing da… ▽ More

    Submitted 30 April, 2024; originally announced May 2024.

  2. arXiv:2312.00088  [pdf, ps, other

    cs.LG eess.SP eess.SY

    Anomaly Detection via Learning-Based Sequential Controlled Sensing

    Authors: Geethu Joseph, Chen Zhong, M. Cenk Gursoy, Senem Velipasalar, Pramod K. Varshney

    Abstract: In this paper, we address the problem of detecting anomalies among a given set of binary processes via learning-based controlled sensing. Each process is parameterized by a binary random variable indicating whether the process is anomalous. To identify the anomalies, the decision-making agent is allowed to observe a subset of the processes at each time instant. Also, probing each process has an as… ▽ More

    Submitted 30 November, 2023; originally announced December 2023.

  3. arXiv:2112.04912  [pdf, ps, other

    cs.LG eess.SP stat.ML

    Scalable and Decentralized Algorithms for Anomaly Detection via Learning-Based Controlled Sensing

    Authors: Geethu Joseph, Chen Zhong, M. Cenk Gursoy, Senem Velipasalar, Pramod K. Varshney

    Abstract: We address the problem of sequentially selecting and observing processes from a given set to find the anomalies among them. The decision-maker observes a subset of the processes at any given time instant and obtains a noisy binary indicator of whether or not the corresponding process is anomalous. In this setting, we develop an anomaly detection algorithm that chooses the processes to be observed… ▽ More

    Submitted 8 December, 2021; originally announced December 2021.

    Comments: 13 pages, 4 figures. arXiv admin note: substantial text overlap with arXiv:2105.06289

  4. arXiv:2105.06288  [pdf, ps, other

    cs.LG eess.SP

    Anomaly Detection via Controlled Sensing and Deep Active Inference

    Authors: Geethu Joseph, Chen Zhong, M. Cenk Gursoy, Senem Velipasalar, Pramod K. Varshney

    Abstract: In this paper, we address the anomaly detection problem where the objective is to find the anomalous processes among a given set of processes. To this end, the decision-making agent probes a subset of processes at every time instant and obtains a potentially erroneous estimate of the binary variable which indicates whether or not the corresponding process is anomalous. The agent continues to probe… ▽ More

    Submitted 12 May, 2021; originally announced May 2021.

    Comments: 6 pages,9 figures

    Journal ref: Globecom 2020

  5. arXiv:2011.14139  [pdf, other

    eess.IV cs.LG

    Preclinical Stage Alzheimer's Disease Detection Using Magnetic Resonance Image Scans

    Authors: Fatih Altay, Guillermo Ramon Sanchez, Yanli James, Stephen V. Faraone, Senem Velipasalar, Asif Salekin

    Abstract: Alzheimer's disease is one of the diseases that mostly affects older people without being a part of aging. The most common symptoms include problems with communicating and abstract thinking, as well as disorientation. It is important to detect Alzheimer's disease in early stages so that cognitive functioning would be improved by medication and training. In this paper, we propose two attention mode… ▽ More

    Submitted 28 November, 2020; originally announced November 2020.

    Comments: 10 pages, 5 figures

  6. Adversarial jamming attacks and defense strategies via adaptive deep reinforcement learning

    Authors: Feng Wang, Chen Zhong, M. Cenk Gursoy, Senem Velipasalar

    Abstract: As the applications of deep reinforcement learning (DRL) in wireless communications grow, sensitivity of DRL based wireless communication strategies against adversarial attacks has started to draw increasing attention. In order to address such sensitivity and alleviate the resulting security concerns, we in this paper consider a victim user that performs DRL-based dynamic channel access, and an at… ▽ More

    Submitted 12 July, 2020; originally announced July 2020.

    Comments: 13 pages, 24 figures

    MSC Class: 68T07 (Primary) 94A15 (Secondary)

  7. arXiv:2002.03751  [pdf, other

    cs.CV eess.IV

    Weighted Average Precision: Adversarial Example Detection in the Visual Perception of Autonomous Vehicles

    Authors: Yilan Li, Senem Velipasalar

    Abstract: Recent works have shown that neural networks are vulnerable to carefully crafted adversarial examples (AE). By adding small perturbations to input images, AEs are able to make the victim model predicts incorrect outputs. Several research work in adversarial machine learning started to focus on the detection of AEs in autonomous driving. However, the existing studies either use preliminary assumpti… ▽ More

    Submitted 3 May, 2020; v1 submitted 25 January, 2020; originally announced February 2020.

  8. arXiv:1911.11616  [pdf, other

    eess.IV cs.CR cs.CV cs.LG

    Enhancing Cross-task Black-Box Transferability of Adversarial Examples with Dispersion Reduction

    Authors: Yantao Lu, Yunhan Jia, Jianyu Wang, Bai Li, Weiheng Chai, Lawrence Carin, Senem Velipasalar

    Abstract: Neural networks are known to be vulnerable to carefully crafted adversarial examples, and these malicious samples often transfer, i.e., they remain adversarial even against other models. Although great efforts have been delved into the transferability across models, surprisingly, less attention has been paid to the cross-task transferability, which represents the real-world cybercriminal's situati… ▽ More

    Submitted 22 November, 2019; originally announced November 2019.

    Comments: arXiv admin note: substantial text overlap with arXiv:1905.03333

  9. arXiv:1905.13533  [pdf, other

    cs.CV eess.IV

    Autonomous Human Activity Classification from Ego-vision Camera and Accelerometer Data

    Authors: Yantao Lu, Senem Velipasalar

    Abstract: There has been significant amount of research work on human activity classification relying either on Inertial Measurement Unit (IMU) data or data from static cameras providing a third-person view. Using only IMU data limits the variety and complexity of the activities that can be detected. For instance, the sitting activity can be detected by IMU data, but it cannot be determined whether the subj… ▽ More

    Submitted 28 May, 2019; originally announced May 2019.

    Comments: Accepted for presentation at EPIC@CVPR2019 workshop

  10. arXiv:1810.07548  [pdf, ps, other

    cs.LG cs.IT eess.IV stat.ML

    Deep Learning Based Power Control for Quality-Driven Wireless Video Transmissions

    Authors: Chuang Ye, M. Cenk Gursoy, Senem Velipasalar

    Abstract: In this paper, wireless video transmission to multiple users under total transmission power and minimum required video quality constraints is studied. In order to provide the desired performance levels to the end-users in real-time video transmissions while using the energy resources efficiently, we assume that power control is employed. Due to the presence of interference, determining the optimal… ▽ More

    Submitted 16 October, 2018; originally announced October 2018.

    Comments: arXiv admin note: text overlap with arXiv:1707.08232

  11. arXiv:1809.10296  [pdf, other

    cs.IT eess.SP

    Learning-Based Delay-Aware Caching in Wireless D2D Caching Networks

    Authors: Yi Li, Chen Zhong, M. Cenk Gursoy, Senem Velipasalar

    Abstract: Recently, wireless caching techniques have been studied to satisfy lower delay requirements and offload traffic from peak periods. By storing parts of the popular files at the mobile users, users can locate some of their requested files in their own caches or the caches at their neighbors. In the latter case, when a user receives files from its neighbors, device-to-device(D2D) communication is per… ▽ More

    Submitted 26 September, 2018; originally announced September 2018.

    Comments: 14 pages, 11 figures. arXiv admin note: text overlap with arXiv:1704.01984

  12. arXiv:1809.10244  [pdf, other

    cs.CV eess.IV

    Autonomously and Simultaneously Refining Deep Neural Network Parameters by a Bi-Generative Adversarial Network Aided Genetic Algorithm

    Authors: Yantao Lu, Burak Kakillioglu, Senem Velipasalar

    Abstract: The choice of parameters, and the design of the network architecture are important factors affecting the performance of deep neural networks. Genetic Algorithms (GA) have been used before to determine parameters of a network. Yet, GAs perform a finite search over a discrete set of pre-defined candidates, and cannot, in general, generate unseen configurations. In this paper, to move from exploratio… ▽ More

    Submitted 24 September, 2018; originally announced September 2018.

    Comments: arXiv admin note: substantial text overlap with arXiv:1805.09712