Multi-agent trajectory prediction with heterogeneous edge-enhanced graph attention network

X Mo, Z Huang, Y Xing, C Lv - IEEE Transactions on Intelligent …, 2022 - ieeexplore.ieee.org
Simultaneous trajectory prediction for multiple heterogeneous traffic participants is essential
for safe and efficient operation of connected automated vehicles under complex driving …

Cyber attacks via consumer electronics: Studying the threat of covert malware in smart and autonomous vehicles

MS Haghighi, F Farivar, A Jolfaei… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In Industry 5.0, man and machine work alongside each other in production, but smart and
autonomous vehicles are examples that show this notion is now being extended to the end …

Analysis of stealthy false data injection attacks against networked control systems: Three case studies

Z Pang, Y Fu, H Guo, J Sun - Journal of Systems Science and Complexity, 2023 - Springer
This paper mainly investigates the security problem of a networked control system based on
a Kalman filter. A false data injection attack scheme is proposed to only tamper the …

Application of fuzzy learning in IoT-enabled remote healthcare monitoring and control of anesthetic depth during surgery

F Farivar, A Jolfaei, M Manthouri, MS Haghighi - Information Sciences, 2023 - Elsevier
Smart remote patient monitoring and early disease diagnosis systems have made huge
progresses after the introduction of Internet of Things (IoT) and Artificial Intelligence (AI) …

Covert attacks through adversarial learning: Study of lane keeping attacks on the safety of autonomous vehicles

F Farivar, MS Haghighi, A Jolfaei… - … /ASME Transactions on …, 2021 - ieeexplore.ieee.org
Road management systems are to improve in terms of integrity, mobility, sustainability, and
safety by the adoption of artificial intelligence and Internet of Things services. This article …

A machine-learning-based approach to build zero-false-positive IPSs for industrial IoT and CPS with a case study on power grids security

MS Haghighi, F Farivar, A Jolfaei - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Intrusion prevention systems have long been the first layer of defense against malicious
attacks. Most sensitive systems employ instances of them (eg, Firewalls) to secure the …

Completely stealthy FDI attack against state estimation in networked control systems

Y Liu, L Cheng - IEEE Transactions on Circuits and Systems II …, 2022 - ieeexplore.ieee.org
An effective false data injection attack should cause enough damage to the system while
avoiding being spotted by detection methods. This brief proposes an extremely stealthy …

[HTML][HTML] CICIoV2024: Advancing realistic IDS approaches against DoS and spoofing attack in IoV CAN bus

ECP Neto, H Taslimasa, S Dadkhah, S Iqbal, P Xiong… - Internet of Things, 2024 - Elsevier
Considering the complexity of network traffic in IoV operations, methods that can identify
complex patterns become useful. Machine learning fosters several techniques to enhance …

Optimized security algorithms for intelligent and autonomous vehicular transportation systems

M Kamal, M Tariq, G Srivastava… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
With the growth of the Internet of Vehicles (IoV) in Intelligent Autonomous Transport Systems
(IATS), a huge volume of data is exchanged between vehicles in these newly developed …

Filtering malicious messages by trust-aware cognitive routing in vehicular ad hoc networks

I Mirzadeh, MS Haghighi… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Vehicular Ad hoc Networks (VANET), as an inseparable part of Intelligent Transportation
Systems (ITS), enable data communication between vehicles to promote road safety and …