Training accurate and robust machine learning models requires a large amount of data that is usually scattered across data silos. Sharing, transferring, and centralizing the data from silos, however, is difficult due to current privacy regulations (e.g., H ...
Decisions regarding the management of civil infrastructure are becoming more crucial as a large share of bridges is presently approaching what is often considered to be the end of their theoretical service duration. Evaluating existing structures using a d ...
The management of existing civil infrastructure is becoming more crucial as a large share of bridges is approaching their theoretical end of service duration. Structural performance monitoring aims to verify bridge safety at a given time, and it should be ...
Current post-earthquake damage assessment methodologies are not only time-consuming but also subjective in nature and difficult to document. Recent advancements in artificial intelligence and technological devices make it possible to accomplish this task a ...
The integration of smart thermostats in home automation systems has created an opportunity to optimize space heating and cooling through the use of machine learning, for example for thermal model identification. Nonetheless, its full potential remains unta ...
On the one hand, the web needs to be secured from malicious activities such as bots or DoS attacks; on the other hand, such needs ideally should not justify services tracking people's activities on the web. Anonymous tokens provide a nice tradeoff between ...
This paper addresses intra-client and inter-client covariate shifts in federated learning (FL) with a focus on the overall generalization performance. To handle covariate shifts, we formulate a new global model training paradigm and propose Federated Impor ...
Sustainability and ethical topics can be embedded and assessed in existing technical courses within an engineering curriculum. This article describes how we integrated a reflection on the importance of ethical and environmental aspects of connected objects ...
Background: Increasingly, hospitals and research institutes are developing technical solutions for sharing patient data in a privacy preserving manner. Two of these technical solutions are homomorphic encryption and distributed ledger technology. Homomorph ...
Strategic information is valuable either by remaining private (for instance if it is sensitive) or, on the other hand, by being used publicly to increase some utility. These two objectives are antagonistic and leaking this information by taking full advant ...
Although encryption hides the content of communications from third parties, metadata, i.e., the information attached to the content (such as the size or timing of communication) can be a rich source of details and context. In this dissertation, we demonstr ...