Search Results for author: Mhafuzul Islam

Found 13 papers, 1 papers with code

Improving the Environmental Perception of Autonomous Vehicles using Deep Learning-based Audio Classification

no code implementations9 Sep 2022 Finley Walden, Sagar Dasgupta, Mizanur Rahman, Mhafuzul Islam

Although visual sensors of an AV, such as camera, lidar, and radar, help to see its surrounding environment, an AV cannot see beyond those sensors line of sight.

Audio Classification Autonomous Vehicles

Hybrid Quantum-Classical Neural Network for Cloud-supported In-Vehicle Cyberattack Detection

no code implementations14 Oct 2021 Mhafuzul Islam, Mashrur Chowdhury, Zadid Khan, Sakib Mahmud Khan

A classical computer works with ones and zeros, whereas a quantum computer uses ones, zeros, and superpositions of ones and zeros, which enables quantum computers to perform a vast number of calculations simultaneously compared to classical computers.

A Sensor Fusion-based GNSS Spoofing Attack Detection Framework for Autonomous Vehicles

no code implementations19 Aug 2021 Sagar Dasgupta, Mizanur Rahman, Mhafuzul Islam, Mashrur Chowdhury

Data from multiple low-cost in-vehicle sensors (i. e., accelerometer, steering angle sensor, speed sensor, and GNSS) are fused and fed into a recurrent neural network model, which is a long short-term memory (LSTM) network for predicting the location shift, i. e., the distance that an AV travels between two consecutive timestamps.

Autonomous Vehicles Dynamic Time Warping +1

Sensor Fusion-based GNSS Spoofing Attack Detection Framework for Autonomous Vehicles

no code implementations5 Jun 2021 Sagar Dasgupta, Mizanur Rahman, Mhafuzul Islam, Mashrur Chowdhury

In this study, a sensor fusion based GNSS spoofing attack detection framework is presented that consists of three concurrent strategies for an autonomous vehicle (AV): (i) prediction of location shift, (ii) detection of turns (left or right), and (iii) recognition of motion state (including standstill state).

Autonomous Vehicles Dynamic Time Warping +1

Prediction-Based GNSS Spoofing Attack Detection for Autonomous Vehicles

no code implementations16 Oct 2020 Sagar Dasgupta, Mizanur Rahman, Mhafuzul Islam, Mashrur Chowdhury

A spoofed attack is difficult to detect as a spoofer (attacker who performs spoofing attack) can mimic the GNSS signal and transmit inaccurate location coordinates to an AV.

Autonomous Vehicles

Change Point Models for Real-time Cyber Attack Detection in Connected Vehicle Environment

no code implementations5 Mar 2020 Gurcan Comert, Mizanur Rahman, Mhafuzul Islam, Mashrur Chowdhury

Connected vehicle (CV) systems are cognizant of potential cyber attacks because of increasing connectivity between its different components such as vehicles, roadside infrastructure, and traffic management centers.

Cyber Attack Detection Management

Dynamic Error-bounded Lossy Compression (EBLC) to Reduce the Bandwidth Requirement for Real-time Vision-based Pedestrian Safety Applications

no code implementations29 Jan 2020 Mizanur Rahman, Mhafuzul Islam, Jon C. Calhoun, Mashrur Chowdhury

The objective of this study is to develop a real-time error-bounded lossy compression (EBLC) strategy to dynamically change the video compression level depending on different environmental conditions in order to maintain a high pedestrian detection accuracy.

Pedestrian Detection Video Compression

Vision-based Pedestrian Alert Safety System (PASS) for Signalized Intersections

no code implementations2 Jul 2019 Mhafuzul Islam, Mizanur Rahman, Mashrur Chowdhury, Gurcan Comert, Eshaa Deepak Sood, Amy Apon

The contribution of this paper lies in the development of a system using a vision-based deep learning model that is able to generate personal safety messages (PSMs) in real-time (every 100 milliseconds).

Long Short-Term Memory Neural Networks for False Information Attack Detection in Software-Defined In-Vehicle Network

no code implementations24 Jun 2019 Zadid Khan, Mashrur Chowdhury, Mhafuzul Islam, Chin-Ya Huang, Mizanur Rahman

This attack detection model can detect false information with an accuracy, precision and recall of 95%, 95% and 87%, respectively, while satisfying the real-time communication and computational requirements.

Anomaly Detection Time Series +2

Connected Vehicle Application Development Platform (CVDeP) for Edge-centric Cyber-Physical Systems

1 code implementation2 Dec 2018 Mhafuzul Islam, Mizanur Rahman, Sakib Mahmud Khan, Mashrur Chowdhury, Lipika Deka

Connected vehicle (CV) application developers need a development platform to build, test and debug CV applications, such as safety, mobility, and environmental applications, in an edge-centric Cyber-Physical Systems.

Networking and Internet Architecture

Change Point Models for Real-time V2I Cyber Attack Detection in a Connected Vehicle Environment

no code implementations30 Nov 2018 Gurcan Comert, Mizanur Rahman, Mhafuzul Islam, Mashrur Chowdhury

Connected vehicle (CV) systems are cognizant of potential cyber attacks because of increasing connectivity between its different components such as vehicles, roadside infrastructure and traffic management centers.

Cryptography and Security

Vision-based Navigation of Autonomous Vehicle in Roadway Environments with Unexpected Hazards

no code implementations27 Sep 2018 Mhafuzul Islam, Mahsrur Chowdhury, Hongda Li, Hongxin Hu

Vision-based navigation of autonomous vehicles primarily depends on the Deep Neural Network (DNN) based systems in which the controller obtains input from sensors/detectors, such as cameras and produces a vehicle control output, such as a steering wheel angle to navigate the vehicle safely in a roadway traffic environment.

Autonomous Driving Navigate +4

Real-time Pedestrian Detection Approach with an Efficient Data Communication Bandwidth Strategy

no code implementations27 Aug 2018 Mizanur Rahman, Mhafuzul Islam, Jon Calhoun, Mashrur Chowdhury

We utilize a lossy compression technique on traffic camera data to determine the tradeoff between the reduction of the communication bandwidth requirements and a defined object detection accuracy.

Edge-computing object-detection +2

Cannot find the paper you are looking for? You can Submit a new open access paper.