Publications
Comparison of two-talker attention decoding from EEG with nonlinear neural networks and linear methods
Summary
Summary
Auditory attention decoding (AAD) through a brain-computer interface has had a flowering of developments since it was first introduced by Mesgarani and Chang (2012) using electrocorticograph recordings. AAD has been pursued for its potential application to hearing-aid design in which an attention-guided algorithm selects, from multiple competing acoustic sources, which...
Improving robustness to attacks against vertex classification
Summary
Summary
Vertex classification—the problem of identifying the class labels of nodes in a graph—has applicability in a wide variety of domains. Examples include classifying subject areas of papers in citation networks or roles of machines in a computer network. Recent work has demonstrated that vertex classification using graph convolutional networks is...
The Human Trafficking Technology Roadmap: A Targeted Development Strategy for the Department of Homeland Security(9.16 MB)
Summary
Summary
Human trafficking is a form of modern-day slavery that involves the use of force, fraud, or coercion for the purposes of involuntary labor and sexual exploitation. It affects tens of million of victims worldwide and generates tens of billions of dollars in illicit profits annually. While agencies across the U.S...
The Human Trafficking Technology Roadmap: a targeted development strategy for the Department of Homeland Security
Summary
Summary
Human trafficking is a form of modern-day slavery that involves the use of force, fraud, or coercion for the purposes of involuntary labor and sexual exploitation. It affects tens of million of victims worldwide and generates tens of billions of dollars in illicit profits annually. While agencies across the U.S...
A compact end cryptographic unit for tactical unmanned systems
Summary
Summary
Under the Navy's Flexible Cyber-Secure Radio (FlexCSR) program, the Naval Information Warfare Center Pacific and the Massachusetts Institute of Technology's Lincoln Laboratory are jointly developing a unique cybersecurity solution for tactical unmanned systems (UxS): the FlexCSR Security/Cyber Module (SCM) End Cryptographic Unit (ECU). To deal with possible loss of unmanned...
Supporting security sensitive tenants in a bare-metal cloud
Summary
Summary
Bolted is a new architecture for bare-metal clouds that enables tenants to control tradeoffs between security, price, and performance. Security-sensitive tenants can minimize their trust in the public cloud provider and achieve similar levels of security and control that they can obtain in their own private data centers. At the...
Control-flow integrity for real-time embedded systems
Summary
Summary
Attacks on real-time embedded systems can endanger lives and critical infrastructure. Despite this, techniques for securing embedded systems software have not been widely studied. Many existing security techniques for general-purpose computers rely on assumptions that do not hold in the embedded case. This paper focuses on one such technique, control-flow...
New software helps users build resilient, cost-effective energy architectures
Summary
Summary
The Energy Resilience Analysis tool lets mission owners and energy managers balance the needs of critical missions on military installations with affordability when they design energy resilience solutions.
A Framework for Evaluating Electric Power Grid Improvements in Puerto Rico(2.58 MB)
Summary
Summary
This report is motivated by the recognition that serving highly distributed electric power load in Puerto Rico during extreme events requires innovative methods. To do this, we must determine the type and locations of the most critical equipment, innovative methods, and software for operating the electrical system most effectively. It...
A framework for evaluating electric power grid improvements in Puerto Rico
Summary
Summary
This report is motivated by the recognition that serving highly distributed electric power load in Puerto Rico during extreme events requires innovative methods. To do this, we must determine the type and locations of the most critical equipment, innovative methods, and software for operating the electrical system most effectively. It...