Search Results for author: Zadid Khan

Found 6 papers, 0 papers with code

A Hybrid Defense Method against Adversarial Attacks on Traffic Sign Classifiers in Autonomous Vehicles

no code implementations25 Apr 2022 Zadid Khan, Mashrur Chowdhury, Sakib Mahmud Khan

Moreover, the hybrid defense method, presented in this study, improves the accuracy for traffic sign classification compared to the traditional defense methods (i. e., JPEG filtering, feature squeezing, binary filtering, and random filtering) up to 6%, 50%, and 55% for FGSM, MIM, and PGD attacks, respectively.

Autonomous Vehicles Navigate +3

Hybrid Quantum-Classical Neural Network for Cloud-supported In-Vehicle Cyberattack Detection

no code implementations14 Oct 2021 Mhafuzul Islam, Mashrur Chowdhury, Zadid Khan, Sakib Mahmud Khan

A classical computer works with ones and zeros, whereas a quantum computer uses ones, zeros, and superpositions of ones and zeros, which enables quantum computers to perform a vast number of calculations simultaneously compared to classical computers.

Grey Models for Short-Term Queue Length Predictions for Adaptive Traffic Signal Control

no code implementations29 Dec 2019 Gurcan Comert, Zadid Khan, Mizanur Rahman, Mashrur Chowdhury

Thus, the objective of this study is to develop queue length prediction models for signalized intersections that can be leveraged by ASCS using four variations of Grey systems: (i) the first order single variable Grey model (GM(1, 1)); (ii) GM(1, 1) with Fourier error corrections; (iii) the Grey Verhulst model (GVM), and (iv) GVM with Fourier error corrections.

Time Series Time Series Analysis

Long Short-Term Memory Neural Networks for False Information Attack Detection in Software-Defined In-Vehicle Network

no code implementations24 Jun 2019 Zadid Khan, Mashrur Chowdhury, Mhafuzul Islam, Chin-Ya Huang, Mizanur Rahman

This attack detection model can detect false information with an accuracy, precision and recall of 95%, 95% and 87%, respectively, while satisfying the real-time communication and computational requirements.

Anomaly Detection Time Series +2

Cannot find the paper you are looking for? You can Submit a new open access paper.