no code implementations • 9 Sep 2022 • Finley Walden, Sagar Dasgupta, Mizanur Rahman, Mhafuzul Islam
Although visual sensors of an AV, such as camera, lidar, and radar, help to see its surrounding environment, an AV cannot see beyond those sensors line of sight.
no code implementations • 14 Oct 2021 • Mhafuzul Islam, Mashrur Chowdhury, Zadid Khan, Sakib Mahmud Khan
A classical computer works with ones and zeros, whereas a quantum computer uses ones, zeros, and superpositions of ones and zeros, which enables quantum computers to perform a vast number of calculations simultaneously compared to classical computers.
no code implementations • 19 Aug 2021 • Sagar Dasgupta, Mizanur Rahman, Mhafuzul Islam, Mashrur Chowdhury
Data from multiple low-cost in-vehicle sensors (i. e., accelerometer, steering angle sensor, speed sensor, and GNSS) are fused and fed into a recurrent neural network model, which is a long short-term memory (LSTM) network for predicting the location shift, i. e., the distance that an AV travels between two consecutive timestamps.
no code implementations • 5 Jun 2021 • Sagar Dasgupta, Mizanur Rahman, Mhafuzul Islam, Mashrur Chowdhury
In this study, a sensor fusion based GNSS spoofing attack detection framework is presented that consists of three concurrent strategies for an autonomous vehicle (AV): (i) prediction of location shift, (ii) detection of turns (left or right), and (iii) recognition of motion state (including standstill state).
no code implementations • 16 Oct 2020 • Sagar Dasgupta, Mizanur Rahman, Mhafuzul Islam, Mashrur Chowdhury
A spoofed attack is difficult to detect as a spoofer (attacker who performs spoofing attack) can mimic the GNSS signal and transmit inaccurate location coordinates to an AV.
no code implementations • 5 Mar 2020 • Gurcan Comert, Mizanur Rahman, Mhafuzul Islam, Mashrur Chowdhury
Connected vehicle (CV) systems are cognizant of potential cyber attacks because of increasing connectivity between its different components such as vehicles, roadside infrastructure, and traffic management centers.
no code implementations • 29 Jan 2020 • Mizanur Rahman, Mhafuzul Islam, Jon C. Calhoun, Mashrur Chowdhury
The objective of this study is to develop a real-time error-bounded lossy compression (EBLC) strategy to dynamically change the video compression level depending on different environmental conditions in order to maintain a high pedestrian detection accuracy.
no code implementations • 2 Jul 2019 • Mhafuzul Islam, Mizanur Rahman, Mashrur Chowdhury, Gurcan Comert, Eshaa Deepak Sood, Amy Apon
The contribution of this paper lies in the development of a system using a vision-based deep learning model that is able to generate personal safety messages (PSMs) in real-time (every 100 milliseconds).
no code implementations • 24 Jun 2019 • Zadid Khan, Mashrur Chowdhury, Mhafuzul Islam, Chin-Ya Huang, Mizanur Rahman
This attack detection model can detect false information with an accuracy, precision and recall of 95%, 95% and 87%, respectively, while satisfying the real-time communication and computational requirements.
1 code implementation • 2 Dec 2018 • Mhafuzul Islam, Mizanur Rahman, Sakib Mahmud Khan, Mashrur Chowdhury, Lipika Deka
Connected vehicle (CV) application developers need a development platform to build, test and debug CV applications, such as safety, mobility, and environmental applications, in an edge-centric Cyber-Physical Systems.
Networking and Internet Architecture
no code implementations • 30 Nov 2018 • Gurcan Comert, Mizanur Rahman, Mhafuzul Islam, Mashrur Chowdhury
Connected vehicle (CV) systems are cognizant of potential cyber attacks because of increasing connectivity between its different components such as vehicles, roadside infrastructure and traffic management centers.
Cryptography and Security
no code implementations • 27 Sep 2018 • Mhafuzul Islam, Mahsrur Chowdhury, Hongda Li, Hongxin Hu
Vision-based navigation of autonomous vehicles primarily depends on the Deep Neural Network (DNN) based systems in which the controller obtains input from sensors/detectors, such as cameras and produces a vehicle control output, such as a steering wheel angle to navigate the vehicle safely in a roadway traffic environment.
no code implementations • 27 Aug 2018 • Mizanur Rahman, Mhafuzul Islam, Jon Calhoun, Mashrur Chowdhury
We utilize a lossy compression technique on traffic camera data to determine the tradeoff between the reduction of the communication bandwidth requirements and a defined object detection accuracy.