Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2024
EdgeUNet: Edge-Guided Multi-Loss Network for Drivable Area and Lane Segmentation in Autonomous Vehicles
IEEE Transactions on Intelligent Transportation Systems (ITS-TRANSACTIONS), Volume 26, Issue 2Pages 2530–2542https://doi.org/10.1109/TITS.2024.3492383The perception system is a critical element of autonomous driving, where real-time and accurate segmentation of drivable areas and lanes is essential for intelligent decision-making during vehicle operation. Current approaches primarily focus on ...
- research-articleJanuary 2023
SLOGAN: SDC Probability Estimation Using Structured Graph Attention Network
ASPDAC '23: Proceedings of the 28th Asia and South Pacific Design Automation ConferencePages 296–301https://doi.org/10.1145/3566097.3567910The trend of progressive technology scaling makes the computing system more susceptible to soft errors. The most critical issue that soft error incurs is silent data corruption (SDC) since SDC occurs silently without any warnings to users. Estimating SDC ...
- research-articleOctober 2022
Algorithm for Integrating Multi-Proximity for Trust-Based Group Recommendation in Ridesharing
2022 IEEE 25th International Conference on Intelligent Transportation Systems (ITSC)Pages 1305–1310https://doi.org/10.1109/ITSC55140.2022.9921811It is anticipated that ridesharing will deliver solutions for transportation-related problems in large cities. A key issue of ridesharing is how to recommend a trustable ridesharing group. Because of the sparse rating on trust relations, large-scale group ...
- research-articleJune 2022
Deep Soft Error Propagation Modeling Using Graph Attention Network
Journal of Electronic Testing: Theory and Applications (JELT), Volume 38, Issue 3Pages 303–319https://doi.org/10.1007/s10836-022-06005-yAbstractSoft errors are increasing in computer systems due to shrinking feature sizes. Soft errors can induce incorrect outputs, also called silent data corruption (SDC), which raises no warnings in the system and hence is difficult to detect. To prevent ...
- research-articleJanuary 2022
Characterization of Program Behavior under Faulty Instruction Encoding
As process technology scales, electronic devices become more susceptible to soft errors. Soft errors can lead to silent data corruptions (SDCs), seriously compromising the reliability of a system. Researchers have explored error resilient encodings, which ...
- research-articleJanuary 2022
TFPPASV: A Three-Factor Privacy Preserving Authentication Scheme for VANETs
- AnMin Fu,
- Zongtao Duan,
- Jabar Mahmood,
- Yun Yang,
- Michael Abebe Berwo,
- Abd al Kader Ahmed Yassin,
- Muhammad Nasir Mumtaz Bhutta,
- Shehzad Ashraf Chaudhry
A vehicular ad hoc network (VANET) is essential for the autonomous vehicle industry, and with the advancement in VANET technology, security threats are increasing rapidly. Mitigation of these threats needs an intelligent security protocol that provides ...
- review-articleJanuary 2021
Security in Vehicular Ad Hoc Networks: Challenges and Countermeasures
- Azeem Irshad,
- Jabar Mahmood,
- Zongtao Duan,
- Yun Yang,
- Qinglong Wang,
- Jamel Nebhen,
- Muhammad Nasir Mumtaz Bhutta
Recently, vehicular ad hoc networks (VANETs) got much popularity and are now being considered as integral parts of the automobile industry. As a subclass of MANETs, the VANETs are being used in the intelligent transport system (ITS) to support passengers, ...
- research-articleJanuary 2021
Secure Message Transmission for V2V Based on Mutual Authentication for VANETs
- Muhammad Asghar Khan,
- Jabar Mahmood,
- Zongtao Duan,
- Heng Xue,
- Yun Yang,
- Michael Abebe Berwo,
- Sajjad Ahmad Khan,
- Abd al Kader Ahmed Yassin
The advancements in Vehicular Ad Hoc Networks (VANETs) require more intelligent security protocols that ultimately provide unbreakable security to vehicles and other components of VANETs. VANETs face various types of security pitfalls due to the openness ...
- research-articleMarch 2020
Efficient Ridesharing Framework for Ride-matching via Heterogeneous Network Embedding
ACM Transactions on Knowledge Discovery from Data (TKDD), Volume 14, Issue 3Article No.: 27, Pages 1–24https://doi.org/10.1145/3373839Ridesharing has attracted increasing attention in recent years, and combines the flexibility and speed of private cars with the reduced cost of fixed-line systems to benefit alleviating traffic pressure. A major issue in ridesharing is the accurate ...
- research-articleMarch 2020
E-DAM: Encoder-Decoder with Attention Mechanism for City-scale Taxi Trajectory Prediction
CSAI '19: Proceedings of the 2019 3rd International Conference on Computer Science and Artificial IntelligencePages 160–164https://doi.org/10.1145/3374587.3374610Taxi trajectory prediction plays an important role in perceiving urban traffic conditions and analyzing taxi passengers' travel behaviors. In this paper, an urban taxi trajectory prediction model is proposed based on attention mechanism and Long-short ...
- research-articleOctober 2019
A Dynamic K-nearest Neighbor Map Matching Method Combined with Neural Network
2019 IEEE Intelligent Transportation Systems Conference (ITSC)Pages 3573–3578https://doi.org/10.1109/ITSC.2019.8916909The purpose of map matching is to calibrate longitude and latitude values measured by GPS device and then project the GPS point onto a road segment. It has been widely used in navigation, data-driven traffic flow analysis and location based services. ...
- research-articleJanuary 2019
Discovering Travel Community for POI Recommendation on Location-Based Social Networks
Point-of-interest (POI) recommendations are a popular form of personalized service in which users share their POI location and related content with their contacts in location-based social networks (LBSNs). The similarity and relatedness between users of ...
- ArticleDecember 2009
Data Dependent Control Statements Conversion on SIMD Image Co-Processor
ICISE '09: Proceedings of the 2009 First IEEE International Conference on Information Science and EngineeringPages 174–177https://doi.org/10.1109/ICISE.2009.445Many data-parallel applications, including emerging media applications, have regular structures that can easily be expressed as a series of data parallel function operating on data streams. Data-parallel architectures are designed to exploit this ...