Publications
Radio frequency interference censoring scheme for Canadian Weather Radar
Summary
Summary
An automated scheme is developed for the upgraded S-band polarimetric Canadian weather radars to detect and censor radio frequency interference from wireless communication devices. The suite of algorithms employed in this scheme effectively identifies and edits out interference-contaminated reflectivity data, while preserving data dominated by weather signals. This scheme was...
A deep learning-based velocity dealiasing algorithm derived from the WSR-88D open radar product generator
Summary
Summary
Radial velocity estimates provided by Doppler weather radar are critical measurements used by operational forecasters for the detection and monitoring of life-impacting storms. The sampling methods used to produce these measurements are inherently susceptible to aliasing, which produces ambiguous velocity values in regions with high winds and needs to be...
Visibility estimation through image analytics
Summary
Summary
MIT Lincoln Laboratory (MIT LL) has developed an algorithm, known as the Visibility Estimation through Image Analytics Algorithm (VEIA), that ingests camera imagery collected by the FAA Weather Cameras Program Office (WeatherCams) and estimates the meteorological visibility in statute miles. The algorithm uses the presence of edges in the imagery...
Extended polarimetric observations of chaff using the WSR-88D weather radar network
Summary
Summary
Military chaff is a metallic, fibrous radar countermeasure that is released by aircraft and rockets for diversion and masking of targets. It is often released across the United States for training purposes, and, due to its resonant cut lengths, is often observed on the S-band Weather Surveillance Radar–1988 Doppler (WSR-88D)...
Poisoning network flow classifiers [e-print]
Summary
Summary
As machine learning (ML) classifiers increasingly oversee the automated monitoring of network traffic, studying their resilience against adversarial attacks becomes critical. This paper focuses on poisoning attacks, specifically backdoor attacks, against network traffic flow classifiers. We investigate the challenging scenario of clean-label poisoning where the adversary's capabilities are constrained to...
Improving long-text authorship verification via model selection and data tuning
Summary
Summary
Authorship verification is used to link texts written by the same author without needing a model per author, making it useful for deanonymizing users spreading text with malicious intent. Recent advances in Transformer-based language models hold great promise for author verification, though short context lengths and non-diverse training regimes present...
Network performance of pLEO topologies in a high-inclination Walker Delta Satellite Constellation
Summary
Summary
Low-earth-orbit satellite constellations with hundreds to thousands of satellites are emerging as practical alternatives for providing various types of data services such as global networking and large-scale sensing. The network performance of these satellite constellations is strongly dependent on the topology of the inter-satellite links (ISLs) in such systems. This...
Automated exposure notification for COVID-19
Summary
Summary
Private Automated Contact Tracing (PACT) was a collaborative team and effort formed during the beginning of the Coronavirus Disease 2019 (COVID-19) pandemic. PACT's mission was to enhance contact tracing in pandemic response by designing exposure-detection functions in personal digital communication devices that have maximal public health utility while preserving privacy...
A generative approach to condition-aware score calibration for speaker verification
Summary
Summary
In speaker verification, score calibration is employed to transform verification scores to log-likelihood ratios (LLRs) which are statistically interpretable. Conventional calibration techniques apply a global score transform. However, in condition-aware (CA) calibration, information conveying signal conditions is provided as input, allowing calibration to be adaptive. This paper explores a generative...
Backdoor poisoning of encrypted traffic classifiers
Summary
Summary
Significant recent research has focused on applying deep neural network models to the problem of network traffic classification. At the same time, much has been written about the vulnerability of deep neural networks to adversarial inputs, both during training and inference. In this work, we consider launching backdoor poisoning attacks...