Skip to main content

NEWS AND RESOURCES FOR MEMBERS OF THE IEEE SIGNAL PROCESSING SOCIETY

Special Issue on Cyber Security in Aerospace Systems from IEEE AES Magazine

Cyber security is an increasing worry on many fronts, but typical discussions and headlines focus on very different types of threats than those experienced by aviation and space systems. Cyber security vulnerabilities compromise the control, traffic, navigation, and integrity of these systems. Countermeasures involve not only specialized systems and architectures, but often international cooperation, as the need for awareness extends well beyond the boundaries of a single aircraft. 

Read more

Recent Contest in Signal Processing and Machine Learning

Sponsored from the IEEE Signal Processing Society, there is a Kaggle contest focusing on identifying the camera that took

an image. Finding footage of a crime caught on tape is an investigator's dream. But even with crystal clear, damning evidence,

one critical question always remains–is the footage real? Today, one way to help authenticate footage is to identify the camera

that the image was taken with.

Read more

Mapping Sub-Saharan African Agriculture in High-Resolution Satellite Imagery with Computer Vision & Machine Learning (2017)

Advisor: Caylor, Kelly K.

Smallholder farms dominate in many parts of the world, including Sub-Saharan Africa. These systems are characterized by small, heterogeneous, and often indistinct field patterns, requiring a specialized methodology to map agricultural landcover. In this thesis, they developed a benchmark labeled data set of high-resolution satellite imagery of agricultural fields in South Africa. 

Read more

Exploiting On-Chip Voltage Regulators as a Countermeasure Against Power Analysis Attacks (2017)

Non-invasive side-channel attacks (SCA) are powerful attacks which can be used to obtain the secret key in a cryptographic circuit in feasible time without the need for expensive measurement equipment. Power analysis attacks (PAA) are a type of SCA that exploit the correlation between the leaked power consumption information and processed/stored data. Differential power analysis (DPA) and leakage power analysis (LPA) attacks are two types of PAA that exploit different characteristics of the side-channel leakage profile. 

Read more

Table of Contents:

New Books