Publications
Representative small UAS trajectories for encounter modeling
Summary
Summary
As unmanned aircraft systems (UASs) continue to integrate into the U.S. National Airspace System (NAS), there is a need to quantify the risk of airborne collisions between unmanned and manned aircraft to support regulation and standards development. Both regulators and standards developing organizations have made extensive use of Monte Carlo...
Evaluating collision avoidance for small UAS using ACAS X
Summary
Summary
Small Unmanned Aircraft Systems (sUAS) offer many potential benefits to society but also pose a dangerous mid-air collision hazard. Safely integrating into shared airspace will require sUAS to perform Collision Avoidance (CA), one of the primary components of Detect and Avoid (DAA) technologies. This paper performs a Monte Carlo simulation...
The JHU-MIT System Description for NIST SRE19 AV
Summary
Summary
This document represents the SRE19 AV submission by the team composed of JHU-CLSP, JHU-HLTCOE and MIT Lincoln Labs. All the developed systems for the audio and videoconditions consisted of Neural network embeddings with some flavor of PLDA/cosine back-end. Primary fusions obtained Actual DCF of 0.250 on SRE18 VAST eval, 0.183...
Modeling and distributed control of microgrids: a negative feedback approach
Summary
Summary
In this paper, we first show how general microgrid can be modeled as a negative feedback configuration comprising two subsystems. The first subsystem is the interconnected microgrid grid which is affected through negative feedback by the second subsystem consisting of all single-port components. This is modeled by transforming physical state...
Graph matching via multi-scale heat diffusion
Summary
Summary
We propose a novel graph matching algorithm that uses ideas from graph signal processing to match vertices of graphs using alternative graph representations. Specifically, we consider a multi-scale heat diffusion on the graphs to create multiple weighted graph representations that incorporate both direct adjacencies as well as local structures induced...
This looks like that: deep learning for interpretable image recognition
Summary
Summary
When we are faced with challenging image classification tasks, we often explain our reasoning by dissecting the image, and pointing out prototypical aspects of one class or another. The mounting evidence for each of the classes helps us make our final decision. In this work, we introduce a deep network...
Characterization of disinformation networks using graph embeddings and opinion mining
Summary
Summary
Global social media networks' omnipresent access, real time responsiveness and ability to connect with and influence people have been responsible for these networks' sweeping growth. However, as an unintended consequence, these defining characteristics helped create a powerful new technology for spread of propaganda and false information. We present a novel...
Prototype and analytics for discovery and exploitation of threat networks on social media
Summary
Summary
Identifying and profiling threat actors are high priority tasks for a number of governmental organizations. These threat actors may operate actively, using the Internet to promote propaganda, recruit new members, or exert command and control over their networks. Alternatively, threat actors may operate passively, demonstrating operational security awareness online while...
Identification and detection of human trafficking using language models
Summary
Summary
In this paper, we present a novel language model-based method for detecting both human trafficking ads and trafficking indicators. The proposed system leverages language models to learn language structures in adult service ads, automatically select a list of keyword features, and train a machine learning model to detect human trafficking...
FirmFuzz: automated IOT firmware introspection and analysis
Summary
Summary
While the number of IoT devices grows at an exhilarating pace their security remains stagnant. Imposing secure coding standards across all vendors is infeasible. Testing individual devices allows an analyst to evaluate their security post deployment. Any discovered vulnerabilities can then be disclosed to the vendors in order to assist...