Zobrazeno 1 - 10
of 45
pro vyhledávání: '"Mehrdad Nojoumian"'
Publikováno v:
Journal of Big Data, Vol 11, Iss 1, Pp 1-44 (2024)
Abstract The flourishing realm of advanced driver-assistance systems (ADAS) as well as autonomous vehicles (AVs) presents exceptional opportunities to enhance safe driving. An essential aspect of this transformation involves monitoring driver behavio
Externí odkaz:
https://doaj.org/article/9de97d423e7d4be280850b0883ec8d1e
Autor:
Pouya Pourtahmasbi, Mehrdad Nojoumian
Publikováno v:
Blockchain: Research and Applications, Vol 3, Iss 2, Pp 100065- (2022)
Since the introduction of Bitcoin, numerous studies on Bitcoin mining attacks have been conducted, and as a result, many countermeasures to these attacks have been proposed. The reputation-based mining paradigm is a comprehensive countermeasure solut
Externí odkaz:
https://doaj.org/article/3b1bf8dd62454f288363b3199b514219
Autor:
Linir Zamir, Mehrdad Nojoumian
Publikováno v:
Cryptography, Vol 6, Iss 2, p 23 (2022)
Consensus algorithms are the building block of any decentralized network where the risk of malicious users is high. These algorithms are required to be robust, scalable, and secure in order to operate properly. Localized state-change consensus (LSC)
Externí odkaz:
https://doaj.org/article/510ca2b4ebc94cf6aaee942128fda88c
Autor:
Carlos Garcia Cordero, Giulia Traverso, Mehrdad Nojoumian, Sheikh Mahbub Habib, Max Muhlhauser, Johannes Buchmann, Emmanouil Vasilomanolakis
Publikováno v:
IEEE Access, Vol 6, Pp 72427-72438 (2018)
The destructive effects of cyber-attacks demand more proactive security approaches. One such promising approach is the idea of collaborative intrusion detection systems (CIDSs). These systems combine the knowledge of multiple sensors (e.g., intrusion
Externí odkaz:
https://doaj.org/article/ef99bbdc052c4a6d82bb62fcc4ee5e18
Publikováno v:
International Journal of Advanced Robotic Systems, Vol 16 (2019)
Robot assistants and wearable devices are highly useful; however, these artificial systems are susceptible to hackers. In this article, two sets of experiments were conducted. The first part of this study simulated a malicious attack on a prosthetic
Externí odkaz:
https://doaj.org/article/295912c0235a4465b4b3df33d057af2e
Autor:
Steven Tolbert, Mehrdad Nojoumian
International adoption of autonomous vehicles has been in the center of attention in academia and industry. This paper therefore proposes to shed light on cross-cultural expectations of autonomous vehicles. We utilized a survey with 57 questions prep
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::896eee8ab65ac58b8f40570b72a95ebe
https://doi.org/10.21203/rs.3.rs-2432387/v1
https://doi.org/10.21203/rs.3.rs-2432387/v1
Publikováno v:
Multimedia Tools and Applications. 80:22193-22208
The detection of poor quality images for reasons such as focus, lighting, compression, and encoding is of great importance in the field of computer vision. The ability to quickly and automatically classify an image as poor quality creates opportuniti
Autor:
Corey Park, Mehrdad Nojoumian
Publikováno v:
HCI in Mobility, Transport, and Automotive Systems ISBN: 9783031049866
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6d51fd13557daa1d6a7cf1e4d80d557b
https://doi.org/10.1007/978-3-031-04987-3_27
https://doi.org/10.1007/978-3-031-04987-3_27
Publikováno v:
2021 IEEE 29th International Conference on Network Protocols (ICNP).
Autor:
Linir Zamir, Mehrdad Nojoumian
Publikováno v:
Proceedings of the Future Technologies Conference (FTC) 2021, Volume 3 ISBN: 9783030899110
Proceedings of the Future Technologies Conference (FTC) 2021, Volume 3
Proceedings of the Future Technologies Conference (FTC) 2021, Volume 3
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ca50fd015faa44d0756f5af3ab9dc3ca
https://doi.org/10.1007/978-3-030-89912-7_13
https://doi.org/10.1007/978-3-030-89912-7_13