Search Results - technology+classifications+%3e+computer+science+%3e+c%2fs+cybersecurity

22 Results Sort By:
Reinforcement Learning-Based Cooperative Adaptive Cruise Control Under False Data Injection Attacks
Advantages: Maintains safe inter-vehicle distance even under cyberattacks and disturbances Uses reinforcement learning with Lyapunov-based control for stability Features a neural network-based estimator to estimate and mitigate FDI attacks in real time Validated through simulation and real-world experimental testing Summary: Connected and automated...
Published: 4/4/2025   |   Inventor(s): Arman Sargolzaei, Parisa Ansari Bonab
Keywords(s): Autonomous Vehicle
Category(s): Technology Classifications > Computer Science > C/S Cybersecurity
An Automated False Data Injection Attack Generator for Testing and Verification of Networked Control Systems
Advantages: Automated security testing for networked control systems (NCSs), eliminating the need for manual attack scenario creation Reinforcement learning (RL)-based approach efficiently generates attack scenarios to identify vulnerabilities Proven stability using Lyapunov-based analysis, ensuring attack generation with convergence guarantees Adaptable...
Published: 4/4/2025   |   Inventor(s): Arman Sargolzaei, Farahnaz Javidi Niroumand
Keywords(s): Artificial Intelligence, Autonomous Vehicle, Cybersecurity
Category(s): Technology Classifications > Computer Science > C/S Cybersecurity, Technology Classifications > Data/AI > Cybersecurity - Data/AI
Universal and Efficient Detection of Adversarial Data through Nonuniform Impact on Network Layers
Advantages: Universal and real-time detection across image, video, and audio domains Lightweight and highly efficient, operating orders of magnitude faster than existing defenses Achieves 98% detection accuracy, significantly outperforming other methods Compatible with any Deep Neural Network (DNN) without requiring modifications Summary: Deep...
Published: 3/24/2025   |   Inventor(s): Yasin Yilmaz, Furkan Mumcu
Keywords(s): Artificial Intelligence, Cybersecurity
Category(s): Technology Classifications > Data/AI > Cybersecurity - Data/AI, Technology Classifications > Computer Science > C/S Cybersecurity
Defending Against Wi-Fi Spoofing Attacks Leveraging Physical-Layer Features
Advantages: Identifies Wi-Fi spoofing attacks by leveraging Doppler Effect and Symbol Timing Offset (STO) variations Protects against location manipulation, ensuring accurate navigation even in high-risk environments Improves navigation accuracy by differentiating legitimate and spoofed signals Cost-effective implementation with off-the-shelf...
Published: 1/22/2025   |   Inventor(s): Xiao Han, Yao Liu, Zhuo Lu
Keywords(s): Autonomous Vehicle, Cybersecurity , Telecommunication / Wireless Communication, Transportation
Category(s): Technology Classifications > Computer Science > C/S Cybersecurity, Technology Classifications > Computer Science > Algorithms
Resilient Multi-Robot System with Social Learning for Smart Factories
Advantages: This technology improves productivity, enabling seamless collaboration and optimized resource utilization in smart factories. The technology enhances the robustness and resilience of smart factories, maintaining objective performance under challenging circumstances. It strengthens security measures and cyber defense, ensuring the integrity...
Published: 9/3/2024   |   Inventor(s): Zixiang Nie, Kwang-Cheng Chen
Keywords(s): Artificial Intelligence, Cybersecurity, Industrial Applications, Robotics
Category(s): Technology Classifications > Data/AI, Technology Classifications > Computer Science > C/S Cybersecurity, Technology Classifications > Engineering > Industrial Engineering
System and Method for Reducing a Threat Footprint of an Area-of-Interest
Advantages: The AI-enabled technology automates the risk assessment process and eliminates the need for manual techniques, which can be time-consuming and prone to human error. By leveraging AI, the technology is able to learn patterns and analyze complex data, uncovering new and previously unrecognized attack paths and strategies. The methodical...
Published: 2/6/2024   |   Inventor(s): Ankit Shah, Soumyadeep Hore, Dinesh Sharma
Keywords(s): Artificial Intelligence, Diagnostic Tools for Network Vulnerability Evaluations, Machine Learning
Category(s): Technology Classifications > Software > Multimedia, Technology Classifications > Data/AI > Cybersecurity - Data/AI, Technology Classifications > Computer Science > Algorithms, Technology Classifications > Computer Science > C/S Cybersecurity
Graphene Based Scheme for IoT and Forensic Applications
Competitive Advantages This Graphene based scheme is profoundly lightweight but offers strong features, which make it ideal for resource-restricted IoT applications. This scheme provides a solution for application where it requires the minimal expense and wide organization of sensors, like in smart cities, and combat zones, wherein forward-security...
Published: 3/6/2025   |   Inventor(s): Attila Yavuz
Keywords(s): Health Tech, Internet of Things / IoT, Medical Devices
Category(s): Technology Classifications > Computer Science > C/S Cybersecurity, Technology Classifications > Computer Science > C/S Sensors, Technology Classifications > Data/AI > Cybersecurity - Data/AI, Technology Classifications > Engineering > Computer Engineering, Technology Classifications > Medical > Cybersecurity, Technology Classifications > Medical > Medical Devices
System and Method for Cryptographic Forensic Audits on Lightweight IoT and Digital Archives
­­­Competitive Advantages: Our solution solves the problem of bottleneck by converting it into logarithmic seed storage overhead, which helps in offering the service to different categories of end devices In terms of cryptographic audit data and time-combined performance, the suggested OPAS schemes achieve outstanding performance...
Published: 9/3/2024   |   Inventor(s): Attila Yavuz, Saif Nouma
Keywords(s): Internet of Things / IoT, Medical Devices, Medical Imaging, Sensor
Category(s): Technology Classifications > Computer Science > C/S Cybersecurity, Technology Classifications > Computer Science, Technology Classifications > Data/AI > Cybersecurity - Data/AI, Technology Classifications > Medical > Medical Sensors
CYBERSECURITY: Reliability Of A Computer Network
Competitive Advantages This analytical model is developed using real data of the National Vulnerability Database, NVD. This analytical model is made up of data from Microsoft, Linux, and Apple computer operating systems that represents 99.34% of the market around the globe. This analytical model can identify the minimum number of steps, n, that...
Published: 7/12/2023   |   Inventor(s): Chris Tsokos, Freeh Alenezi
Keywords(s): Computers Software and Information Technology, Cryptography and Intrusion Detection, Cybersecurity, Diagnostic Tools for Network Vulnerability Evaluations
Category(s): Technology Classifications > Computer Science > C/S Cybersecurity
Deploying Neural-Trojan-Resistant Convolutional Neural Networks for Self-Driving Vehicles
­Competitive Advantages This method can amplify Trojan’s malicious impact by making it more easily detectable so that system can provide rapid response and mitigation against the attacks This technology can prevent the spread of the attack to other connected systems and defend against attacks initiated through fake update requests The...
Published: 2/6/2024   |   Inventor(s): Robert Karam, Brooks Olney
Keywords(s): Autonomous Vehicle, Cryptography and Intrusion Detection, Cybersecurity, Hardware Based Security, Machine Learning
Category(s): Technology Classifications > Data/AI > Cybersecurity - Data/AI, Technology Classifications > Engineering > Autonomous Vehicle, Technology Classifications > Engineering > Computer Engineering, Technology Classifications > Computer Science > Algorithms, Technology Classifications > Computer Science > C/S Cybersecurity
1 2 3