Develo** future human-centered smart cities: Critical analysis of smart city security, Data management, and Ethical challenges

K Ahmad, M Maabreh, M Ghaly, K Khan, J Qadir… - Computer Science …, 2022 - Elsevier
As the globally increasing population drives rapid urbanization in various parts of the world,
there is a great need to deliberate on the future of the cities worth living. In particular, as …

Autonomous vehicles security: Challenges and solutions using blockchain and artificial intelligence

G Bendiab, A Hameurlaine, G Germanos… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
The arrival of autonomous vehicles (AVs) promises many great benefits, including increased
safety and reduced energy consumption, pollution, and congestion. However, these engines …

Trustworthy ai: A computational perspective

H Liu, Y Wang, W Fan, X Liu, Y Li, S Jain, Y Liu… - ACM Transactions on …, 2022 - dl.acm.org
In the past few decades, artificial intelligence (AI) technology has experienced swift
developments, changing everyone's daily life and profoundly altering the course of human …

Perception-aware multi-sensor fusion for 3d lidar semantic segmentation

Z Zhuang, R Li, K Jia, Q Wang… - Proceedings of the …, 2021 - openaccess.thecvf.com
Abstract 3D LiDAR (light detection and ranging) semantic segmentation is important in
scene understanding for many applications, such as auto-driving and robotics. For example …

Advhat: Real-world adversarial attack on arcface face id system

S Komkov, A Petiushko - 2020 25th international conference on …, 2021 - ieeexplore.ieee.org
In this paper we propose a novel easily reproducible technique to attack the best public
Face ID system ArcFace in different shooting conditions. To create an attack, we print the …

Shapeshifter: Robust physical adversarial attack on faster r-cnn object detector

ST Chen, C Cornelius, J Martin, DH Chau - Machine Learning and …, 2019 - Springer
Given the ability to directly manipulate image pixels in the digital input space, an adversary
can easily generate imperceptible perturbations to fool a Deep Neural Network (DNN) …

Stegastamp: Invisible hyperlinks in physical photographs

M Tancik, B Mildenhall, R Ng - Proceedings of the IEEE …, 2020 - openaccess.thecvf.com
Printed and digitally displayed photos have the ability to hide imperceptible digital data that
can be accessed through internet-connected imaging systems. Another way to think about …

A survey on autonomous vehicle control in the era of mixed-autonomy: From physics-based to AI-guided driving policy learning

X Di, R Shi - Transportation research part C: emerging technologies, 2021 - Elsevier
This paper serves as an introduction and overview of the potentially useful models and
methodologies from artificial intelligence (AI) into the field of transportation engineering for …

Making an invisibility cloak: Real world adversarial attacks on object detectors

Z Wu, SN Lim, LS Davis, T Goldstein - … , Glasgow, UK, August 23–28, 2020 …, 2020 - Springer
We present a systematic study of the transferability of adversarial attacks on state-of-the-art
object detection frameworks. Using standard detection datasets, we train patterns that …

AI in health: state of the art, challenges, and future directions

F Wang, A Preininger - Yearbook of medical informatics, 2019 - thieme-connect.com
Introduction: Artificial intelligence (AI) technologies continue to attract interest from a broad
range of disciplines in recent years, including health. The increase in computer hardware …