Michael Pound

Last updated
Michael Pound
Michael-Pound.jpg
Michael in 2018
Other namesMike Pound
Occupation(s)Lecturer, Researcher, Media Personality
Years activePresent
Academic work
Discipline Computer Science
Sub-disciplineBioimage analysis, computer vision, image recognition, computer security
InstitutionsUniversity of Nottingham

Michael P. Pound is a researcher at the University of Nottingham. [1] He is known for his work in the areas of bioimage analysis, computer vision, image recognition, computer security, and for his appearances on the video series Computerphile. [2]

Contents

Career

Pound's work focuses on the use of machine learning, deep learning, and bioimage analysis for the purpose of plant phenotyping. [3] [4] His work on the identification of root and leaf tips through image-based phenotyping has been recognized as important in the field of bioimage analysis. [5]

The image analysis tool RootNav [6] was developed by a research team led by Pound. The tool uses image analysis to identify complex root system architectures. [7] It has been made available to the scientific community and has been used by other researchers in the field to facilitate batch processing of high numbers of images in various studies of plant phenotyping. [8]

Media appearances

Pound has made numerous appearances on Brady Haran's video series Computerphile. During these appearances, Pound has discussed aspects of his work including password cracking, brute forcing, kernel convolution and image analysis. [9] [3]

Related Research Articles

<span class="mw-page-title-main">Password</span> Used for user authentication to prove identity or access approval

A password, sometimes called a passcode, is secret data, typically a string of characters, usually used to confirm a user's identity. Traditionally, passwords were expected to be memorized, but the large number of password-protected services that a typical individual accesses can make memorization of unique passwords for each service impractical. Using the terminology of the NIST Digital Identity Guidelines, the secret is held by a party called the claimant while the party verifying the identity of the claimant is called the verifier. When the claimant successfully demonstrates knowledge of the password to the verifier through an established authentication protocol, the verifier is able to infer the claimant's identity.

Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that a person using the keyboard is unaware that their actions are being monitored. Data can then be retrieved by the person operating the logging program. A keystroke recorder or keylogger can be either software or hardware.

A backdoor is a typically covert method of bypassing normal authentication or encryption in a computer, product, embedded device, or its embodiment. Backdoors are most often used for securing remote access to a computer, or obtaining access to plaintext in cryptosystems. From there it may be used to gain access to privileged information like passwords, corrupt or delete data on hard drives, or transfer information within autoschediastic networks.

Wi-Fi Protected Access (WPA), Wi-Fi Protected Access 2 (WPA2), and Wi-Fi Protected Access 3 (WPA3) are the three security certification programs developed after 2000 by the Wi-Fi Alliance to secure wireless computer networks. The Alliance defined these in response to serious weaknesses researchers had found in the previous system, Wired Equivalent Privacy (WEP).

FileVault is a disk encryption program in Mac OS X 10.3 Panther (2003) and later. It performs on-the-fly encryption with volumes on Mac computers.

A password policy is a set of rules designed to enhance computer security by encouraging users to employ strong passwords and use them properly. A password policy is often part of an organization's official regulations and may be taught as part of security awareness training. Either the password policy is merely advisory, or the computer systems force users to comply with it. Some governments have national authentication frameworks that define requirements for user authentication to government services, including requirements for passwords.

In parallel computing, an embarrassingly parallel workload or problem is one where little or no effort is needed to split the problem into a number of parallel tasks. This is due to minimal or no dependency upon communication between the parallel tasks, or for results between them.

A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network. Hackers may be motivated by a multitude of reasons, such as profit, protest, information gathering, challenge, recreation, or evaluation of a system weaknesses to assist in formulating defenses against potential hackers.

Phenomics is the systematic study of traits that make up a phenotype. It was coined by UC Berkeley and LBNL scientist Steven A. Garan. As such, it is a transdisciplinary area of research that involves biology, data sciences, engineering and other fields. Phenomics is concerned with the measurement of the phenotype where a phenome is a set of traits that can be produced by a given organism over the course of development and in response to genetic mutation and environmental influences. It is also important to remember that an organism's phenotype changes with time. The relationship between phenotype and genotype enables researchers to understand and study pleiotropy. Phenomics concepts are used in functional genomics, pharmaceutical research, metabolic engineering, agricultural research, and increasingly in phylogenetics.

<span class="mw-page-title-main">Password strength</span> Resistance of a password to being guessed

Password strength is a measure of the effectiveness of a password against guessing or brute-force attacks. In its usual form, it estimates how many trials an attacker who does not have direct access to the password would need, on average, to guess it correctly. The strength of a password is a function of length, complexity, and unpredictability.

<span class="mw-page-title-main">Kiwicon</span>

Kiwicon is a New Zealand computer security conference held annually in Wellington from 2007. It brings together a variety of people interested in information security. Representatives of government agencies and corporations attend, along with hackers.

Reverse engineering is a process or method through which one attempts to understand through deductive reasoning how a previously made device, process, system, or piece of software accomplishes a task with very little insight into exactly how it does so. Depending on the system under consideration and the technologies employed, the knowledge gained during reverse engineering can help with repurposing obsolete objects, doing security analysis, or learning how something works.

Bioimage informatics is a subfield of bioinformatics and computational biology. It focuses on the use of computational techniques to analyze bioimages, especially cellular and molecular images, at large scale and high throughput. The goal is to obtain useful knowledge out of complicated and heterogeneous image and related metadata.

A cognitive password is a form of knowledge-based authentication that requires a user to answer a question, presumably something they intrinsically know, to verify their identity. Cognitive password systems have been researched for many years and are currently commonly used as a form of secondary access. They were developed to overcome the common memorability vs. strength problem that exists with the traditional password. Cognitive passwords, when compared to other password systems, can be measured through the usage of a memorability vs. guessability ratio.

Computer security compromised by hardware failure is a branch of computer security applied to hardware. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. Such secret information could be retrieved by different ways. This article focus on the retrieval of data thanks to misused hardware or hardware failure. Hardware could be misused or exploited to get secret data. This article collects main types of attack that can lead to data theft.

MacKeeper is a cleanup utility for macOS. MacKeeper was developed by ZeoBIT, later acquired by Kromtech, and is currently owned by Clario Tech.

Shamoon, also known as W32.DistTrack, is a modular computer virus that was discovered in 2012, targeting then-recent 32-bit NT kernel versions of Microsoft Windows. The virus was notable due to the destructive nature of the attack and the cost of recovery. Shamoon can spread from an infected machine to other computers on the network. Once a system is infected, the virus continues to compile a list of files from specific locations on the system, upload them to the attacker, and erase them. Finally the virus overwrites the master boot record of the infected computer, making it unusable.

BisQue is a free, open source web-based platform for the exchange and exploration of large, complex datasets. It is being developed at the Vision Research Lab at the University of California, Santa Barbara. BisQue specifically supports large scale, multi-dimensional multimodal-images and image analysis. Metadata is stored as arbitrarily nested and linked tag/value pairs, allowing for domain-specific data organization. Image analysis modules can be added to perform complex analysis tasks on compute clusters. Analysis results are stored within the database for further querying and processing. The data and analysis provenance is maintained for reproducibility of results. BisQue can be easily deployed in cloud computing environments or on computer clusters for scalability. BisQue has been integrated into the NSF Cyberinfrastructure project CyVerse. The user interacts with BisQue via any modern web browser.

<span class="mw-page-title-main">Information engineering</span> Engineering discipline

Information engineering is the engineering discipline that deals with the generation, distribution, analysis, and use of information, data, and knowledge in systems. The field first became identifiable in the early 21st century.

Anna Kreshuk is a group leader at the European Molecular Biology Laboratory in Heidelberg, Germany. She joined the Cell Biology and Biophysics Unit in July 2018, where her group employs machine learning to develop automated methods to help biologists speed up image analysis.

References

  1. "Michael Pound". University of Nottingham. Retrieved 31 May 2024.
  2. "Computerphile". YouTube.
  3. 1 2 Keeper Security (2016-11-07). "Keeper Q&A: What You Can Learn From Michael Pound's Scary Password-Cracking Video". Keeper. Keeper Security, Inc. Retrieved 2 September 2018.
  4. Pound, Michael P.; Atkinson, Jonathan A.; Wells, Darren M.; Pridmore, Tony P.; French, Andrew P. (2017). "Deep Learning for Multi-task Plant Phenotyping" (PDF). 2017 IEEE International Conference on Computer Vision Workshops (ICCVW). pp. 2055–2063. doi:10.1109/ICCVW.2017.241. ISBN   978-1-5386-1034-3. S2CID   4734648.
  5. Atanbori, John; Chen, Feng; French, Andrew; Pridmore, Tony. "Towards Low-Cost Image-based Plant Phenotyping using Reduced-Parameter CNN" (PDF): 1. Retrieved 3 September 2018.{{cite journal}}: Cite journal requires |journal= (help)
  6. Yasrab, Robail (2020-09-22), robail-yasrab/RootNav-2.0 , retrieved 2020-10-26
  7. Pound, Michael; French, Andrew; Atkinson, Jonathan; Wells, Darren; Malcolm, Bennet; Pridmore, Tony (1 January 2013). "RootNav: Navigating images of complex root architectures". Plant Physiology. 162 (4): 1802–14. doi:10.1104/pp.113.221531. PMC   3729762 . PMID   23766367.
  8. Granier, Christine; Vile, Denis (2014). "Phenotyping and beyond: modelling the relationships between traits". Current Opinion in Plant Biology. 18: 96–102. doi:10.1016/j.pbi.2014.02.009. PMID   24637194.[ dead link ]
  9. Muller, Tiffany (2015-10-03). "Listen to an Expert Image Analyst Easily Explain the Science Behind Photo Filters". DIY Photography. Retrieved 2 September 2018.