{"title":"Defining Time-Varying Metrics of Task Conflict in Human/Robot Teams Using Simulated Agents","authors":"Audrey Balaska, J. Rife","doi":"10.1109/HST56032.2022.10025432","DOIUrl":"https://doi.org/10.1109/HST56032.2022.10025432","url":null,"abstract":"In this paper, we consider a simulated search & rescue application as context for introducing a novel monitoring concept that continually assesses the level of task conflict for a human-robot team. We define task conflict to mean inconsistent mental models of the task, including information about the agents, environment, and the task itself. In order to demonstrate a proof of concept, we used an agent-based modeling approach that simulates information fusion using a Bayesian algorithm. To represent nominal differences in the inferences made by each agent, we randomly perturbed the inputs to the Bayesian algorithm, with levels of randomization chosen to reflect the relevant existing literature regarding human performance. Using simulated nominal data, we generated a time-dependent conflict threshold. Then, this threshold was tested by injecting simulated anomalies and evaluating how often conflict was detected. The high resulting detection rate and the evidenced robustness of the simulation to parameter variation suggest the potential of the monitoring approach for future human-subject testing.","PeriodicalId":162426,"journal":{"name":"2022 IEEE International Symposium on Technologies for Homeland Security (HST)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127712509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure, Robust, Wide Area Communication for the Electric Power Industry","authors":"M. Adamiak, H. Falk, Chuck DuBose","doi":"10.1109/HST56032.2022.10024986","DOIUrl":"https://doi.org/10.1109/HST56032.2022.10024986","url":null,"abstract":"The introduction of significant numbers of Distributed Energy Resources (DERs) to the electric power grid has created the need for Secure, Robust, Wide Area Communications among these elements and control centers. Additionally, many other applications of Wide Area communication can be identified.","PeriodicalId":162426,"journal":{"name":"2022 IEEE International Symposium on Technologies for Homeland Security (HST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134624811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Md Taufique Hussain, Arif M. Khan, A. Azad, Samrat Chatterjee, R. Brigantic, M. Halappanavar
{"title":"Disruption-Robust Community Detection Using Consensus Clustering in Complex Networks","authors":"Md Taufique Hussain, Arif M. Khan, A. Azad, Samrat Chatterjee, R. Brigantic, M. Halappanavar","doi":"10.1109/HST56032.2022.10024983","DOIUrl":"https://doi.org/10.1109/HST56032.2022.10024983","url":null,"abstract":"Topological (graph-theoretic) analysis of critical infrastructure networks provides insight on several aspects of resilience. Graph clustering or community detection, which identifies densely connected components in a graph, has been employed for analysis. In this paper, we propose employing consensus clustering, which is a technique to determine consensus from a collection of different clusters on an input, such that the resulting clustering is robust to disruptions, where a disruption is represented as loss of one or more vertices or edges in the graph. Using two critical infrastructure networks as case studies, we empirically demonstrate the need to compute consensus clustering in order to address the drastic changes in the topology due to disruptions in the network.","PeriodicalId":162426,"journal":{"name":"2022 IEEE International Symposium on Technologies for Homeland Security (HST)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132472127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hyperdimensional Computing Encoding Schemes for Improved Image Classification","authors":"Victor Miranda, Olivia G. d'Aliberti","doi":"10.1109/HST56032.2022.10024980","DOIUrl":"https://doi.org/10.1109/HST56032.2022.10024980","url":null,"abstract":"We introduce a novel encoding scheme for hyperdimensional computing (HDC) image classification tasks that takes advantage of both spatial awareness of pixels and nonlinear relationships between pixel values using a Siamese Neural Network (SNN) architecture. We demonstrate that, using this encoding scheme, we can achieve improved classification accuracy on the MNIST and CIFAR datasets over the current state-of-the-art binary HDC encoding scheme.","PeriodicalId":162426,"journal":{"name":"2022 IEEE International Symposium on Technologies for Homeland Security (HST)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131970892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Leveraging Intermediate Node Evaluation to Secure Approximate Computing for AI Applications","authors":"Pruthvy Yellu, N. Chennagouni, Qiaoyan Yu","doi":"10.1109/HST56032.2022.10025430","DOIUrl":"https://doi.org/10.1109/HST56032.2022.10025430","url":null,"abstract":"Artificial Intelligence (AI) has been widely applied to homeland security to speed up target recognition, threat analysis, and decision-making. The intensive computation required by AI approaches could be an obstacle that prevents AI from achieving real-time responses. Approximate computing techniques that leverage accuracy for better performance have the potential to accelerate the computation in AI. However, since the AI techniques are applied in homeland security applications, which have high requirements for piracy and security, it is critical to deploy the approximation methods in a secure way. In this work, we analyze the stealthiness of the attacks in an approximate computing system and reveal that the primary outputs are not the best location to detect the presence of attacks. We propose an intermediate node evaluation-based attack detection (INEAD) method to examine the attacks in approximate computing systems. Our case studies on approximate Finite Impulse Response (FIR) filter and artificial neural network (ANN) show that intermediate nodes are better position for attack detection than the primary output. We observe that the attack detection speed has increased by 80% when INEAD method is deployed in FIR filter. The compile time for attack detection can be reduced by 52.7% for the case of ANN when our INEAD method is deployed.","PeriodicalId":162426,"journal":{"name":"2022 IEEE International Symposium on Technologies for Homeland Security (HST)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128319928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Sen, S. Adeniye, K. Basu, S. Ravishankar, J. Sefair, D. Roe-Sepowitz, E. Helderop, T. Grubesic, A. B. Sen
{"title":"Human Trafficking Interdiction Problem: A Data Driven Approach to Modeling and Analysis","authors":"A. Sen, S. Adeniye, K. Basu, S. Ravishankar, J. Sefair, D. Roe-Sepowitz, E. Helderop, T. Grubesic, A. B. Sen","doi":"10.1109/HST56032.2022.10025431","DOIUrl":"https://doi.org/10.1109/HST56032.2022.10025431","url":null,"abstract":"Based on the human trafficking incidence data from the Las Vegas Metropolitan Police Department (LVMPD), we have built a model of movement patterns of traffickers within the contiguous US states. We utilized the model for developing interdiction strategies for the law enforcement authorities, with the goal of maximizing interdiction pay-off within the agency budget, where pay-off is measured in terms of the number of trafficking incidences disrupted. In addition, from the U.S. Interstate Highway Map, we have built a U.S. Interstate Network Graph (USING) to test our interdiction pay-off maximization algorithm. This is a realistic approximation of the U.S. highway system and will be made available to researchers engaged in trafficking interdiction research. Finally, we evaluate our techniques on the data from LVMPD on USING and present the results.","PeriodicalId":162426,"journal":{"name":"2022 IEEE International Symposium on Technologies for Homeland Security (HST)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121881848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abigail Stone, S. P. Rao, Srijith Rajeev, K. Panetta, S. Agaian
{"title":"A Comprehensive 2D + 3D Dataset for Benchmarking Hyperspectral Imaging Systems","authors":"Abigail Stone, S. P. Rao, Srijith Rajeev, K. Panetta, S. Agaian","doi":"10.1109/HST56032.2022.10024982","DOIUrl":"https://doi.org/10.1109/HST56032.2022.10024982","url":null,"abstract":"Hyperspectral images are represented by numerous narrow wavelength bands in the visible and near-infrared parts of the electromagnetic spectrum. As hyperspectral imagery gains traction for general computer vision tasks, there is an increased need for large and comprehensive datasets for use as training data. Recent advancements in sensor technology allow us to capture hyperspectral data cubes at higher spatial and temporal resolution. However, there are few publicly available multi-purpose hyperspectral datasets captured in outdoor terrestrial conditions. Furthermore, there are no publicly available datasets that include 3D mesh representations of objects captured in outdoor scenes. This article introduces the first hyperspectral dataset of 3D objects and terrestrial outdoor scenes, the Tufts Outdoor Hyper-spectral Dataset (TOHS Dataset). The dataset includes 100 2D + 3D hyperspectral scenes, each containing 164 spectral bands. The contributions of this work are 1) Detailed description of the content, acquisition procedure, and benchmark results on state-of-the-art neural networks for 3D object scenes in the Tufts Hyperspectral Database; 2) The first-of-its-kind hyperspectral 3D dataset of outdoor objects that will be publicly available to researchers worldwide, which will allow for the assessment and creation of more robust, consistent, and adaptable AI algorithms; and 3) a comprehensive and up-to-date review on hyperspectral systems and datasets.","PeriodicalId":162426,"journal":{"name":"2022 IEEE International Symposium on Technologies for Homeland Security (HST)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115666170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Distributed Privacy-Preserving Integrity Verification Framework for the Smart Grid","authors":"Gaurav S. Wagh, S. Mishra","doi":"10.1109/HST56032.2022.10025444","DOIUrl":"https://doi.org/10.1109/HST56032.2022.10025444","url":null,"abstract":"Smart grid functionalities, such as real-time monitoring and load balancing, require smart metering data collection at frequent time intervals. There are several threats to this data collection process, including passive threats to customers' privacy and active threats to metering data integrity. Customer privacy can be breached with the fine grained metering data collection, and without appropriate measures for integrity verification, the metering data can be exploited to hamper the smart grid functionalities. Distributed privacy-preserving frameworks are more robust than centralized frameworks against privacy threats. Several distributed privacy-preserving frameworks for smart metering data exist in the literature. However, these frameworks assume a semi-honest threat model that does not consider threats to data integrity. This paper introduces a distributed framework under a malicious adversarial model. The proposed framework is capable of verifying metering data's integrity while maintaining customer privacy. We evaluate our framework's performance via simulation and show its feasibility for real-world deployments. We also evaluate the framework's resilience to active and passive attacks, followed by a comparative analysis with existing related frameworks in the literature.","PeriodicalId":162426,"journal":{"name":"2022 IEEE International Symposium on Technologies for Homeland Security (HST)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131488627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Hristozov, Eric Dietz, E.T. Matson, J. Gallagher, M. Rogers
{"title":"Secure Robotic Vehicles: Vulnerabilities and Mitigation Strategies","authors":"A. Hristozov, Eric Dietz, E.T. Matson, J. Gallagher, M. Rogers","doi":"10.1109/HST56032.2022.10025449","DOIUrl":"https://doi.org/10.1109/HST56032.2022.10025449","url":null,"abstract":"Robotic vehicles are becoming more widespread and used in many industries, including agriculture, manufacturing, and defense. They are safety-critical systems because of the fact that they are mobile, autonomous, and can operate in hazardous environments. The focus on robotic systems in the last several decades has been to add new complex functionality, in many cases using artificial intelligence. Many of these new technologies are fairly sophisticated and expose robotic vehicles to new vulnerabilities, especially when vehicles need to operate autonomously. Security and safety are connected and preventing intentional attacks on mobile robots improves safety and allows robots to complete their missions in challenging and hostile environments. In addition, robots that move can and need to adapt and counteract adversarial attacks and adapt to sensor and actuator faults. Robotic vehicles are also real-time systems; their ability to function is determined by their ability to maintain these characteristics all the time. In this work, we present the major classes of attacks on robotic vehicles and analyze the existing and propose some new mitigation strategies to counteract the attacks. Our scope is on robotic vehicles in general, with a specialized focus on UAVs as a class of vehicles receiving more attention and presenting significant security challenges. We discuss strategies based on simplex architecture, enforcers, partitioning, redundancy, self-adaptation, and dynamic architectures during run-time.","PeriodicalId":162426,"journal":{"name":"2022 IEEE International Symposium on Technologies for Homeland Security (HST)","volume":"420 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126708735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Haoyu Wang, Jennifer A. Miller, T. Grubesic, Shalene Jha
{"title":"A Framework for Using Ensemble Species Distribution Models for Geographic Attribution in Forensic Palynology","authors":"Haoyu Wang, Jennifer A. Miller, T. Grubesic, Shalene Jha","doi":"10.1109/HST56032.2022.10025427","DOIUrl":"https://doi.org/10.1109/HST56032.2022.10025427","url":null,"abstract":"As a next-generation DNA sequencing technique, metabarcoding aids in identifying biotic trace materials such as pollen, fungal spores, and other environmental DNA samples. This paper aims to develop a geographic attribution framework using pollen samples associated with objects or persons of interest to reduce search space for law enforcement investigations. We use plant occurrence data from the open-source Global Biodi-versity Information Facility (GBIF) to model individual genus and species distributions which were subsequently combined to inform possible geolocations objects or persons of interest have traveled. Results indicate that the geographic attribution frame-work could potentially aid forensic investigations by eliminating geographic search areas to determine the possible location history of people and objects.","PeriodicalId":162426,"journal":{"name":"2022 IEEE International Symposium on Technologies for Homeland Security (HST)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115319936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}