Picture for Gurcan Comert

Gurcan Comert

Associate Professor, Computational Data Science and Engineering Department, North Carolina A&T State University

SuperiorGAT: Graph Attention Networks for Sparse LiDAR Point Cloud Reconstruction in Autonomous Systems

Add code
Dec 30, 2025
Viaarxiv icon

Quantum Computing Supported Adversarial Attack-Resilient Autonomous Vehicle Perception Module for Traffic Sign Classification

Add code
Apr 17, 2025
Figure 1 for Quantum Computing Supported Adversarial Attack-Resilient Autonomous Vehicle Perception Module for Traffic Sign Classification
Figure 2 for Quantum Computing Supported Adversarial Attack-Resilient Autonomous Vehicle Perception Module for Traffic Sign Classification
Figure 3 for Quantum Computing Supported Adversarial Attack-Resilient Autonomous Vehicle Perception Module for Traffic Sign Classification
Figure 4 for Quantum Computing Supported Adversarial Attack-Resilient Autonomous Vehicle Perception Module for Traffic Sign Classification
Viaarxiv icon

Analyzing Factors Influencing Driver Willingness to Accept Advanced Driver Assistance Systems

Add code
Feb 23, 2025
Viaarxiv icon

A Multi-Scale Isolation Forest Approach for Real-Time Detection and Filtering of FGSM Adversarial Attacks in Video Streams of Autonomous Vehicles

Add code
Feb 22, 2025
Figure 1 for A Multi-Scale Isolation Forest Approach for Real-Time Detection and Filtering of FGSM Adversarial Attacks in Video Streams of Autonomous Vehicles
Figure 2 for A Multi-Scale Isolation Forest Approach for Real-Time Detection and Filtering of FGSM Adversarial Attacks in Video Streams of Autonomous Vehicles
Figure 3 for A Multi-Scale Isolation Forest Approach for Real-Time Detection and Filtering of FGSM Adversarial Attacks in Video Streams of Autonomous Vehicles
Figure 4 for A Multi-Scale Isolation Forest Approach for Real-Time Detection and Filtering of FGSM Adversarial Attacks in Video Streams of Autonomous Vehicles
Viaarxiv icon

A Systematic Evaluation of Generative Models on Tabular Transportation Data

Add code
Feb 13, 2025
Viaarxiv icon

A Robust Adversarial Ensemble with Causal (Feature Interaction) Interpretations for Image Classification

Add code
Dec 28, 2024
Figure 1 for A Robust Adversarial Ensemble with Causal (Feature Interaction) Interpretations for Image Classification
Figure 2 for A Robust Adversarial Ensemble with Causal (Feature Interaction) Interpretations for Image Classification
Figure 3 for A Robust Adversarial Ensemble with Causal (Feature Interaction) Interpretations for Image Classification
Figure 4 for A Robust Adversarial Ensemble with Causal (Feature Interaction) Interpretations for Image Classification
Viaarxiv icon

Quantum Adversarial Machine Learning and Defense Strategies: Challenges and Opportunities

Add code
Dec 16, 2024
Figure 1 for Quantum Adversarial Machine Learning and Defense Strategies: Challenges and Opportunities
Figure 2 for Quantum Adversarial Machine Learning and Defense Strategies: Challenges and Opportunities
Figure 3 for Quantum Adversarial Machine Learning and Defense Strategies: Challenges and Opportunities
Figure 4 for Quantum Adversarial Machine Learning and Defense Strategies: Challenges and Opportunities
Viaarxiv icon

Graph-Powered Defense: Controller Area Network Intrusion Detection for Unmanned Aerial Vehicles

Add code
Dec 03, 2024
Figure 1 for Graph-Powered Defense: Controller Area Network Intrusion Detection for Unmanned Aerial Vehicles
Figure 2 for Graph-Powered Defense: Controller Area Network Intrusion Detection for Unmanned Aerial Vehicles
Figure 3 for Graph-Powered Defense: Controller Area Network Intrusion Detection for Unmanned Aerial Vehicles
Figure 4 for Graph-Powered Defense: Controller Area Network Intrusion Detection for Unmanned Aerial Vehicles
Viaarxiv icon

Crash Severity Risk Modeling Strategies under Data Imbalance

Add code
Dec 03, 2024
Figure 1 for Crash Severity Risk Modeling Strategies under Data Imbalance
Figure 2 for Crash Severity Risk Modeling Strategies under Data Imbalance
Figure 3 for Crash Severity Risk Modeling Strategies under Data Imbalance
Figure 4 for Crash Severity Risk Modeling Strategies under Data Imbalance
Viaarxiv icon

An AutoML-based approach for Network Intrusion Detection

Add code
Nov 24, 2024
Figure 1 for An AutoML-based approach for Network Intrusion Detection
Figure 2 for An AutoML-based approach for Network Intrusion Detection
Figure 3 for An AutoML-based approach for Network Intrusion Detection
Figure 4 for An AutoML-based approach for Network Intrusion Detection
Viaarxiv icon