Skip to main content

Showing 1–38 of 38 results for author: Blasch, E

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.04734  [pdf, other

    eess.SP cs.ET cs.LG cs.NI

    Neuro-Symbolic Fusion of Wi-Fi Sensing Data for Passive Radar with Inter-Modal Knowledge Transfer

    Authors: Marco Cominelli, Francesco Gringoli, Lance M. Kaplan, Mani B. Srivastava, Trevor Bihl, Erik P. Blasch, Nandini Iyer, Federico Cerutti

    Abstract: Wi-Fi devices, akin to passive radars, can discern human activities within indoor settings due to the human body's interaction with electromagnetic signals. Current Wi-Fi sensing applications predominantly employ data-driven learning techniques to associate the fluctuations in the physical properties of the communication channel with the human activity causing them. However, these techniques often… ▽ More

    Submitted 1 July, 2024; originally announced July 2024.

    Comments: 8 pages, 9 figures, accepted at 27th International Conference on Information Fusion (FUSION 2024)

  2. arXiv:2405.15995  [pdf, other

    cs.CV

    Efficient Temporal Action Segmentation via Boundary-aware Query Voting

    Authors: Peiyao Wang, Yuewei Lin, Erik Blasch, Jie Wei, Haibin Ling

    Abstract: Although the performance of Temporal Action Segmentation (TAS) has improved in recent years, achieving promising results often comes with a high computational cost due to dense inputs, complex model structures, and resource-intensive post-processing requirements. To improve the efficiency while keeping the performance, we present a novel perspective centered on per-segment classification. By harne… ▽ More

    Submitted 24 May, 2024; originally announced May 2024.

    Comments: 17 pages, 8 figures, 11 tables

  3. arXiv:2403.03281  [pdf, other

    cs.LG cs.AI

    Credibility-Aware Multi-Modal Fusion Using Probabilistic Circuits

    Authors: Sahil Sidheekh, Pranuthi Tenali, Saurabh Mathur, Erik Blasch, Kristian Kersting, Sriraam Natarajan

    Abstract: We consider the problem of late multi-modal fusion for discriminative learning. Motivated by noisy, multi-source domains that require understanding the reliability of each data source, we explore the notion of credibility in the context of multi-modal fusion. We propose a combination function that uses probabilistic circuits (PCs) to combine predictive distributions over individual modalities. We… ▽ More

    Submitted 17 July, 2024; v1 submitted 5 March, 2024; originally announced March 2024.

  4. arXiv:2401.13850  [pdf, other

    cs.CY

    PADTHAI-MM: A Principled Approach for Designing Trustable, Human-centered AI systems using the MAST Methodology

    Authors: Nayoung Kim, Myke C. Cohen, Yang Ba, Anna Pan, Shawaiz Bhatti, Pouria Salehi, James Sung, Erik Blasch, Michelle V. Mancenido, Erin K. Chiou

    Abstract: Designing for AI trustworthiness is challenging, with a lack of practical guidance despite extensive literature on trust. The Multisource AI Scorecard Table (MAST), a checklist rating system, addresses this gap in designing and evaluating AI-enabled decision support systems. We propose the Principled Approach for Designing Trustable Human-centered AI systems using MAST Methodology (PADTHAI-MM), a… ▽ More

    Submitted 24 January, 2024; originally announced January 2024.

  5. arXiv:2311.18040  [pdf, other

    cs.CY

    Evaluating Trustworthiness of AI-Enabled Decision Support Systems: Validation of the Multisource AI Scorecard Table (MAST)

    Authors: Pouria Salehi, Yang Ba, Nayoung Kim, Ahmadreza Mosallanezhad, Anna Pan, Myke C. Cohen, Yixuan Wang, Jieqiong Zhao, Shawaiz Bhatti, James Sung, Erik Blasch, Michelle V. Mancenido, Erin K. Chiou

    Abstract: The Multisource AI Scorecard Table (MAST) is a checklist tool based on analytic tradecraft standards to inform the design and evaluation of trustworthy AI systems. In this study, we evaluate whether MAST is associated with people's trust perceptions in AI-enabled decision support systems (AI-DSSs). Evaluating trust in AI-DSSs poses challenges to researchers and practitioners. These challenges incl… ▽ More

    Submitted 29 November, 2023; originally announced November 2023.

  6. arXiv:2310.17801  [pdf

    cs.CV

    Image Prior and Posterior Conditional Probability Representation for Efficient Damage Assessment

    Authors: Jie Wei, Weicong Feng, Erik Blasch, Erika Ardiles-Cruz, Haibin Ling

    Abstract: It is important to quantify Damage Assessment (DA) for Human Assistance and Disaster Response (HADR) applications. In this paper, to achieve efficient and scalable DA in HADR, an image prior and posterior conditional probability (IP2CP) is developed as an effective computational imaging representation. Equipped with the IP2CP representation, the matching pre- and post-disaster images are effective… ▽ More

    Submitted 26 October, 2023; originally announced October 2023.

    Comments: 6 pages, 2 figures

    MSC Class: I.4.6; I.5.3

  7. arXiv:2309.06701  [pdf, ps, other

    cs.CV cs.RO

    Transparent Object Tracking with Enhanced Fusion Module

    Authors: Kalyan Garigapati, Erik Blasch, Jie Wei, Haibin Ling

    Abstract: Accurate tracking of transparent objects, such as glasses, plays a critical role in many robotic tasks such as robot-assisted living. Due to the adaptive and often reflective texture of such objects, traditional tracking algorithms that rely on general-purpose learned features suffer from reduced performance. Recent research has proposed to instill transparency awareness into existing general obje… ▽ More

    Submitted 12 September, 2023; originally announced September 2023.

    Comments: IEEE IROS 2023

  8. arXiv:2303.10703  [pdf, other

    cs.CV

    CCTV-Gun: Benchmarking Handgun Detection in CCTV Images

    Authors: Srikar Yellapragada, Zhenghong Li, Kevin Bhadresh Doshi, Purva Makarand Mhasakar, Heng Fan, Jie Wei, Erik Blasch, Bin Zhang, Haibin Ling

    Abstract: Gun violence is a critical security problem, and it is imperative for the computer vision community to develop effective gun detection algorithms for real-world scenarios, particularly in Closed Circuit Television (CCTV) surveillance data. Despite significant progress in visual object detection, detecting guns in real-world CCTV images remains a challenging and under-explored task. Firearms, espec… ▽ More

    Submitted 11 July, 2023; v1 submitted 19 March, 2023; originally announced March 2023.

  9. arXiv:2208.01466  [pdf, other

    cs.NI

    A Secure Dynamic Edge Resource Federation Architecture for Cross-Domain IoT Systems

    Authors: Ronghua Xu, Yu Chen, Xiaohua Li, Erik Blasch

    Abstract: The fast integration of 5G communication, Artificial Intelligence (AI), and Internet-of-Things (IoT) technologies is envisioned to enable Next Generation Networks (NGNs) for diverse smart services and user-defined applications for Smart Cities. However, it is still challenging to build a scalable and efficient infrastructure that satisfies the various performance, security, and management demands… ▽ More

    Submitted 2 August, 2022; originally announced August 2022.

    Journal ref: the 4th International Workshop on Smart City Communication and Networking (SmartCityCom 2022), in conjunction with the 31st International Conference on Computer Communications and Networks (ICCCN 2022), July 27, 2022

  10. arXiv:2207.13070  [pdf, other

    cs.CR cs.CV cs.LG eess.IV

    DeFakePro: Decentralized DeepFake Attacks Detection using ENF Authentication

    Authors: Deeraj Nagothu, Ronghua Xu, Yu Chen, Erik Blasch, Alexander Aved

    Abstract: Advancements in generative models, like Deepfake allows users to imitate a targeted person and manipulate online interactions. It has been recognized that disinformation may cause disturbance in society and ruin the foundation of trust. This article presents DeFakePro, a decentralized consensus mechanism-based Deepfake detection technique in online video conferencing tools. Leveraging Electrical N… ▽ More

    Submitted 21 July, 2022; originally announced July 2022.

    Journal ref: the IEEE IT Professional, Special Issue on Information Hygiene and the Fight against the Misinformation Info-demic, 2022

  11. arXiv:2206.10129  [pdf, other

    cs.CV cs.IR cs.LG

    Automatic Concept Extraction for Concept Bottleneck-based Video Classification

    Authors: Jeya Vikranth Jeyakumar, Luke Dickens, Luis Garcia, Yu-Hsi Cheng, Diego Ramirez Echavarria, Joseph Noor, Alessandra Russo, Lance Kaplan, Erik Blasch, Mani Srivastava

    Abstract: Recent efforts in interpretable deep learning models have shown that concept-based explanation methods achieve competitive accuracy with standard end-to-end models and enable reasoning and intervention about extracted high-level visual concepts from images, e.g., identifying the wing color and beak length for bird-species classification. However, these concept bottleneck models rely on a necessary… ▽ More

    Submitted 21 June, 2022; originally announced June 2022.

    Comments: 10 pages, Appendix: 2 pages

  12. arXiv:2203.16666  [pdf, other

    cs.NI stat.AP

    Hawkes Process Modeling of Block Arrivals in Bitcoin Blockchain

    Authors: Rui Luo, Vikram Krishnamurthy, Erik Blasch

    Abstract: The paper constructs a multi-variate Hawkes process model of Bitcoin block arrivals and price jumps. Hawkes processes are selfexciting point processes that can capture the self- and cross-excitation effects of block mining and Bitcoin price volatility. We use publicly available blockchain datasets to estimate the model parameters via maximum likelihood estimation. The results show that Bitcoin pri… ▽ More

    Submitted 30 March, 2022; originally announced March 2022.

  13. arXiv:2201.07076  [pdf, other

    cs.SI eess.SP

    Mitigating Misinformation Spread on Blockchain Enabled Social Media Networks

    Authors: Rui Luo, Vikram Krishnamurthy, Erik Blasch

    Abstract: The paper develops a blockchain protocol for a social media network (BE-SMN) to mitigate the spread of misinformation. BE-SMN is derived based on the information transmission-time distribution by modeling the misinformation transmission as double-spend attacks on blockchain. The misinformation distribution is then incorporated into the SIR (Susceptible, Infectious, or Recovered) model, which subst… ▽ More

    Submitted 1 May, 2023; v1 submitted 18 January, 2022; originally announced January 2022.

  14. arXiv:2112.05614   

    cs.AI

    AAAI FSS-21: Artificial Intelligence in Government and Public Sector Proceedings

    Authors: Mihai Boicu, Erik Blasch, Alun Preece

    Abstract: Proceedings of the AAAI Fall Symposium on Artificial Intelligence in Government and Public Sector, Washington, DC, USA, November 4-6, 2021

    Submitted 10 December, 2021; originally announced December 2021.

    Comments: Post-symposium proceedings including 9 papers

  15. arXiv:2111.02026  [pdf

    cs.AI eess.SP

    The Powerful Use of AI in the Energy Sector: Intelligent Forecasting

    Authors: Erik Blasch, Haoran Li, Zhihao Ma, Yang Weng

    Abstract: Artificial Intelligence (AI) techniques continue to broaden across governmental and public sectors, such as power and energy - which serve as critical infrastructures for most societal operations. However, due to the requirements of reliability, accountability, and explainability, it is risky to directly apply AI-based methods to power systems because society cannot afford cascading failures and l… ▽ More

    Submitted 3 November, 2021; originally announced November 2021.

    Comments: Presented at AAAI FSS-21: Artificial Intelligence in Government and Public Sector, Washington, DC, USA

  16. arXiv:2111.02001  [pdf

    cs.AI eess.IV

    Certifiable Artificial Intelligence Through Data Fusion

    Authors: Erik Blasch, Junchi Bin, Zheng Liu

    Abstract: This paper reviews and proposes concerns in adopting, fielding, and maintaining artificial intelligence (AI) systems. While the AI community has made rapid progress, there are challenges in certifying AI systems. Using procedures from design and operational test and evaluation, there are opportunities towards determining performance bounds to manage expectations of intended use. A notional use cas… ▽ More

    Submitted 2 November, 2021; originally announced November 2021.

    Comments: Presented at AAAI FSS-21: Artificial Intelligence in Government and Public Sector, Washington, DC, USA

  17. arXiv:2110.14518  [pdf

    cs.LG

    NIDA-CLIFGAN: Natural Infrastructure Damage Assessment through Efficient Classification Combining Contrastive Learning, Information Fusion and Generative Adversarial Networks

    Authors: Jie Wei, Zhigang Zhu, Erik Blasch, Bilal Abdulrahman, Billy Davila, Shuoxin Liu, Jed Magracia, Ling Fang

    Abstract: During natural disasters, aircraft and satellites are used to survey the impacted regions. Usually human experts are needed to manually label the degrees of the building damage so that proper humanitarian assistance and disaster response (HADR) can be achieved, which is labor-intensive and time-consuming. Expecting human labeling of major disasters over a wide area gravely slows down the HADR effo… ▽ More

    Submitted 29 October, 2022; v1 submitted 27 October, 2021; originally announced October 2021.

  18. arXiv:2105.12823  [pdf, other

    cs.NI cs.AI cs.LG

    UAV-Assisted Communication in Remote Disaster Areas using Imitation Learning

    Authors: Alireza Shamsoshoara, Fatemeh Afghah, Erik Blasch, Jonathan Ashdown, Mehdi Bennis

    Abstract: The damage to cellular towers during natural and man-made disasters can disturb the communication services for cellular users. One solution to the problem is using unmanned aerial vehicles to augment the desired communication network. The paper demonstrates the design of a UAV-Assisted Imitation Learning (UnVAIL) communication system that relays the cellular users' information to a neighbor base s… ▽ More

    Submitted 1 April, 2021; originally announced May 2021.

    Comments: 15 pages, 14 Figures, 1 Table

  19. arXiv:2103.15222  [pdf, other

    cs.NI

    TULVCAN: Terahertz Ultra-broadband Learning Vehicular Channel-Aware Networking

    Authors: Chia-Hung Lin, Shih-Chun Lin, Erik Blasch

    Abstract: Due to spectrum scarcity and increasing wireless capacity demands, terahertz (THz) communications at 0.1-10THz and the corresponding spectrum characterization have emerged to meet diverse service requirements in future 5G and 6G wireless systems. However, conventional compressed sensing techniques to reconstruct the original wideband spectrum with under-sampled measurements become inefficient as l… ▽ More

    Submitted 28 March, 2021; originally announced March 2021.

    Comments: This paper was already accepted by the IEEE 2021 INFOCOM Workshop

  20. arXiv:2102.03985  [pdf

    cs.AI cs.HC cs.LG

    Multisource AI Scorecard Table for System Evaluation

    Authors: Erik Blasch, James Sung, Tao Nguyen

    Abstract: The paper describes a Multisource AI Scorecard Table (MAST) that provides the developer and user of an artificial intelligence (AI)/machine learning (ML) system with a standard checklist focused on the principles of good analysis adopted by the intelligence community (IC) to help promote the development of more understandable systems and engender trust in AI outputs. Such a scorecard enables a tra… ▽ More

    Submitted 7 February, 2021; originally announced February 2021.

    Comments: Presented at AAAI FSS-20: Artificial Intelligence in Government and Public Sector, Washington, DC, USA

  21. arXiv:2012.14036  [pdf, other

    cs.CV cs.AI cs.LG eess.IV

    Aerial Imagery Pile burn detection using Deep Learning: the FLAME dataset

    Authors: Alireza Shamsoshoara, Fatemeh Afghah, Abolfazl Razi, Liming Zheng, Peter Z Fulé, Erik Blasch

    Abstract: Wildfires are one of the costliest and deadliest natural disasters in the US, causing damage to millions of hectares of forest resources and threatening the lives of people and animals. Of particular importance are risks to firefighters and operational forces, which highlights the need for leveraging technology to minimize danger to people and property. FLAME (Fire Luminosity Airborne-based Machin… ▽ More

    Submitted 27 December, 2020; originally announced December 2020.

    Comments: 27 Pages, 7 Figures, 4 Tables

  22. arXiv:2004.10674  [pdf, other

    cs.CR cs.DC

    Hybrid Blockchain-Enabled Secure Microservices Fabric for Decentralized Multi-Domain Avionics Systems

    Authors: Ronghua Xu, Yu Chen, Erik Blasch, Alexander Aved, Genshe Chen, Dan Shen

    Abstract: Advancement in artificial intelligence (AI) and machine learning (ML), dynamic data driven application systems (DDDAS), and hierarchical cloud-fog-edge computing paradigm provide opportunities for enhancing multi-domain systems performance. As one example that represents multi-domain scenario, a "fly-by-feel" system utilizes DDDAS framework to support autonomous operations and improve maneuverabil… ▽ More

    Submitted 15 April, 2020; originally announced April 2020.

    Comments: 2020 SPIE Defense + Commercial Sensing

  23. arXiv:2003.04169  [pdf, other

    cs.CV cs.DC cs.MM eess.IV

    I-ViSE: Interactive Video Surveillance as an Edge Service using Unsupervised Feature Queries

    Authors: Seyed Yahya Nikouei, Yu Chen, Alexander Aved, Erik Blasch

    Abstract: Situation AWareness (SAW) is essential for many mission critical applications. However, SAW is very challenging when trying to immediately identify objects of interest or zoom in on suspicious activities from thousands of video frames. This work aims at developing a queryable system to instantly select interesting content. While face recognition technology is mature, in many scenarios like public… ▽ More

    Submitted 9 March, 2020; originally announced March 2020.

    Comments: R1 is under review by the IEEE Internet of Things Journal

  24. arXiv:1911.05727  [pdf

    cs.CY cs.IR eess.IV

    Artificial Intelligence Strategies for National Security and Safety Standards

    Authors: Erik Blasch, James Sung, Tao Nguyen, Chandra P. Daniel, Alisa P. Mason

    Abstract: Recent advances in artificial intelligence (AI) have lead to an explosion of multimedia applications (e.g., computer vision (CV) and natural language processing (NLP)) for different domains such as commercial, industrial, and intelligence. In particular, the use of AI applications in a national security environment is often problematic because the opaque nature of the systems leads to an inability… ▽ More

    Submitted 3 November, 2019; originally announced November 2019.

    Comments: Presented at AAAI FSS-19: Artificial Intelligence in Government and Public Sector, Arlington, Virginia, USA

  25. arXiv:1910.10638  [pdf, other

    cs.DC eess.SP

    Blockchain Methods for Trusted Avionics Systems

    Authors: Erik Blasch, Ronghua Xu, Yu Chen, Genshe Chen, Dan Shen

    Abstract: Blockchain is a popular method to ensure security for trusted systems. The benefits include an auditable method to provide decentralized security without a trusted third party, but the drawback is the large computational resources needed to process and store the ever-expanding chain of security blocks. The promise of blockchain for edge devices (e.g., internet of things) poses a variety of challen… ▽ More

    Submitted 21 October, 2019; originally announced October 2019.

    Comments: Accepted and presented at 2019 IEEE NAECON Conference. arXiv admin note: text overlap with arXiv:1902.10567

  26. arXiv:1909.10948  [pdf, other

    cs.DC

    Microchain: A Hybrid Consensus Mechanism for Lightweight Distributed Ledger for IoT

    Authors: Ronghua Xu, Yu Chen, Erik Blasch, Genshe Chen

    Abstract: A blockchain and smart contract enabled security mechanism for IoT applications has been reported recently for urban, financial, and network services. However, due to the power-intensive and a low-throughput consensus mechanism in existing blockchain, like Bitcoin and Ethereum, there are still challenges in integrating blockchain technology into resource-constrained IoT platforms. In this paper, M… ▽ More

    Submitted 24 September, 2019; originally announced September 2019.

  27. arXiv:1909.05776  [pdf, other

    cs.CV

    I-SAFE: Instant Suspicious Activity identiFication at the Edge using Fuzzy Decision Making

    Authors: Seyed Yahya Nikouei, Yu Chen, Alexander Aved, Erik Blasch, Timothy R. Faughnan

    Abstract: Urban imagery usually serves as forensic analysis and by design is available for incident mitigation. As more imagery collected, it is harder to narrow down to certain frames among thousands of video clips to a specific incident. A real-time, proactive surveillance system is desirable, which could instantly detect dubious personnel, identify suspicious activities, or raise momentous alerts. The re… ▽ More

    Submitted 12 September, 2019; originally announced September 2019.

    Comments: Manuscript has been accepted and to be presented at the Fourth ACM/IEEE Symposium on Edge Computing, Washington DC, November 7-9, 2019

  28. arXiv:1904.08008  [pdf, other

    cs.CV

    Clustered Object Detection in Aerial Images

    Authors: Fan Yang, Heng Fan, Peng Chu, Erik Blasch, Haibin Ling

    Abstract: Detecting objects in aerial images is challenging for at least two reasons: (1) target objects like pedestrians are very small in pixels, making them hardly distinguished from surrounding background; and (2) targets are in general sparsely and non-uniformly distributed, making the detection very inefficient. In this paper, we address both issues inspired by observing that these targets are often c… ▽ More

    Submitted 26 August, 2019; v1 submitted 16 April, 2019; originally announced April 2019.

  29. arXiv:1903.04563  [pdf, other

    cs.DC cs.CR

    Decentralized Smart Surveillance through Microservices Platform

    Authors: Seyed Yahya Nikouei, Ronghua Xu, Yu Chen, Alex Aved, Erik Blasch

    Abstract: Connected societies require reliable measures to assure the safety, privacy, and security of members. Public safety technology has made fundamental improvements since the first generation of surveillance cameras were introduced, which aims to reduce the role of observer agents so that no abnormality goes unnoticed. While the edge computing paradigm promises solutions to address the shortcomings of… ▽ More

    Submitted 11 March, 2019; originally announced March 2019.

    Comments: 2019 SPIE Defense + Commercial Sensing

  30. arXiv:1903.03473  [pdf, other

    cs.CR

    A Study on Smart Online Frame Forging Attacks against Video Surveillance System

    Authors: Deeraj Nagothu, Jacob Schwell, Yu Chen, Erik Blasch, Sencun Zhu

    Abstract: Video Surveillance Systems (VSS) have become an essential infrastructural element of smart cities by increasing public safety and countering criminal activities. A VSS is normally deployed in a secure network to prevent access from unauthorized personnel. Compared to traditional systems that continuously record video regardless of the actions in the frame, a smart VSS has the capability of capturi… ▽ More

    Submitted 8 March, 2019; originally announced March 2019.

    Comments: To Appear in the 2019 SPIE Defense + Commercial Sensing

  31. arXiv:1902.10567  [pdf, other

    cs.NI

    BlendMAS: A BLockchain-ENabled Decentralized Microservices Architecture for Smart Public Safety

    Authors: Ronghua Xu, Seyed Yahya Nikouei, Yu Chen, Erik Blasch, Alex Aved

    Abstract: Thanks to rapid technological advances in the Internet of Things (IoT), a smart public safety (SPS) system has become feasible by integrating heterogeneous computing devices to collaboratively provide public protection services. While a service oriented architecture (SOA) has been adopted by IoT and cyber-physical systems (CPS), it is difficult for a monolithic architecture to provide scalable and… ▽ More

    Submitted 27 February, 2019; originally announced February 2019.

    Comments: Submitted to the 2019 IEEE International Conference on Blockchain (Blockchain-2019)

  32. An Exploration of Blockchain Enabled Decentralized Capability based Access Control Strategy for Space Situation Awareness

    Authors: Ronghua Xu, Yu Chen, Erik Blasch, Genshe Chen

    Abstract: Space situation awareness (SSA) includes tracking of active and inactive resident space objects (RSOs) and assessing the space environment through sensor data collection and processing. To enhance SSA, the dynamic data-driven applications systems (DDDAS) framework couples on-line data with off-line models to enhance system performance. Using feedback control, sensor management, and communications… ▽ More

    Submitted 24 December, 2018; v1 submitted 1 October, 2018; originally announced October 2018.

    Comments: Submitted to SPIE Optical Engineering, Special Section on Sensors and Systems for Space Applications. arXiv admin note: substantial text overlap with arXiv:1804.09267

  33. arXiv:1807.11329  [pdf, other

    cs.NI

    EIQIS: Toward an Event-Oriented Indexable and Queryable Intelligent Surveillance System

    Authors: Seyed Yahya Nikouei, Yu Chen, Alexander Aved, Erik Blasch

    Abstract: Edge computing provides the ability to link distributor users for multimedia content, while retaining the power of significant data storage and access at a centralized computer. Two requirements of significance include: what information show be processed at the edge and how the content should be stored. Answers to these questions require a combination of query-based search, access, and response as… ▽ More

    Submitted 30 July, 2018; originally announced July 2018.

  34. arXiv:1807.06179  [pdf, other

    cs.DC cs.CR

    Real-Time Index Authentication for Event-Oriented Surveillance Video Query using Blockchain

    Authors: Seyed Yahya Nikouei, Ronghua Xu, Deeraj Nagothu, Yu Chen, Alexander Aved, Erik Blasch

    Abstract: Information from surveillance video is essential for situational awareness (SAW). Nowadays, a prohibitively large amount of surveillance data is being generated continuously by ubiquitously distributed video sensors. It is very challenging to immediately identify the objects of interest or zoom in suspicious actions from thousands of video frames. Making the big data indexable is critical to tackl… ▽ More

    Submitted 16 July, 2018; originally announced July 2018.

    Comments: Submitted to the 1st International Workshop on BLockchain Enabled Sustainable Smart Cities (BLESS 2018), In Conjunction with the 4th IEEE Annual International Smart Cities Conference (ISC2 2018), Kansas City, MO, USA, Sept. 16-19, 2018

  35. arXiv:1806.09565  [pdf, other

    cs.CV

    IR2VI: Enhanced Night Environmental Perception by Unsupervised Thermal Image Translation

    Authors: Shuo Liu, Vijay John, Erik Blasch, Zheng Liu, Ying Huang

    Abstract: Context enhancement is critical for night vision (NV) applications, especially for the dark night situation without any artificial lights. In this paper, we present the infrared-to-visual (IR2VI) algorithm, a novel unsupervised thermal-to-visible image translation framework based on generative adversarial networks (GANs). IR2VI is able to learn the intrinsic characteristics from VI images and inte… ▽ More

    Submitted 25 June, 2018; originally announced June 2018.

    Comments: Present at CVPR Workshops 2018

  36. arXiv:1805.00825  [pdf, other

    cs.NI

    A Federated Capability-based Access Control Mechanism for Internet of Things (IoTs)

    Authors: Ronghua Xu, Yu Chen, Erik Blasch, Genshe Chen

    Abstract: The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide intelligent services with or without human intervention. While leveraging the large-scale IoT-based applications like Smart Gird and Smart Cities, IoT also incurs more concerns on privacy and security. Among the top security challenges that IoTs face is that access authorization is cr… ▽ More

    Submitted 1 May, 2018; originally announced May 2018.

    Comments: the SPIE Defense & Commercial Sensing 2018 (DCS), Conference on Sensors and Systems for Space Applications, Orlando, FL, USA, April 15, 2018. arXiv admin note: text overlap with arXiv:1804.09267

  37. arXiv:1804.09267  [pdf, other

    cs.NI cs.CR cs.DC

    BlendCAC: A BLockchain-ENabled Decentralized Capability-based Access Control for IoTs

    Authors: Ronghua Xu, Yu Chen, Erik Blasch, Genshe Chen

    Abstract: The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide smart services with or without human intervention. While leveraging the large scale IoT based applications like Smart Gird or Smart Cities, IoTs also incur more concerns on privacy and security. Among the top security challenges that IoTs face, access authorization is critical in reso… ▽ More

    Submitted 24 April, 2018; originally announced April 2018.

  38. arXiv:1601.04386  [pdf

    cs.CV

    A Comparative Study of Object Trackers for Infrared Flying Bird Tracking

    Authors: Ying Huang, Hong Zheng, Haibin Ling, Erik Blasch, Hao Yang

    Abstract: Bird strikes present a huge risk for aircraft, especially since traditional airport bird surveillance is mainly dependent on inefficient human observation. Computer vision based technology has been proposed to automatically detect birds, determine bird flying trajectories, and predict aircraft takeoff delays. However, the characteristics of bird flight using imagery and the performance of existing… ▽ More

    Submitted 17 January, 2016; originally announced January 2016.