Picture for Mashrur Chowdhury

Mashrur Chowdhury

Professor, Glenn Department of Civil Engineering, Clemson University

Graph-Powered Defense: Controller Area Network Intrusion Detection for Unmanned Aerial Vehicles

Add code
Dec 03, 2024
Viaarxiv icon

Crash Severity Risk Modeling Strategies under Data Imbalance

Add code
Dec 03, 2024
Viaarxiv icon

A Hybrid Quantum-Classical AI-Based Detection Strategy for Generative Adversarial Network-Based Deepfake Attacks on an Autonomous Vehicle Traffic Sign Classification System

Add code
Sep 25, 2024
Viaarxiv icon

Development and Evaluation of Ensemble Learning-based Environmental Methane Detection and Intensity Prediction Models

Add code
Dec 18, 2023
Viaarxiv icon

A Hybrid Defense Method against Adversarial Attacks on Traffic Sign Classifiers in Autonomous Vehicles

Add code
Apr 25, 2022
Figure 1 for A Hybrid Defense Method against Adversarial Attacks on Traffic Sign Classifiers in Autonomous Vehicles
Figure 2 for A Hybrid Defense Method against Adversarial Attacks on Traffic Sign Classifiers in Autonomous Vehicles
Figure 3 for A Hybrid Defense Method against Adversarial Attacks on Traffic Sign Classifiers in Autonomous Vehicles
Figure 4 for A Hybrid Defense Method against Adversarial Attacks on Traffic Sign Classifiers in Autonomous Vehicles
Viaarxiv icon

Hybrid Quantum-Classical Neural Network for Cloud-supported In-Vehicle Cyberattack Detection

Add code
Oct 14, 2021
Figure 1 for Hybrid Quantum-Classical Neural Network for Cloud-supported In-Vehicle Cyberattack Detection
Figure 2 for Hybrid Quantum-Classical Neural Network for Cloud-supported In-Vehicle Cyberattack Detection
Figure 3 for Hybrid Quantum-Classical Neural Network for Cloud-supported In-Vehicle Cyberattack Detection
Figure 4 for Hybrid Quantum-Classical Neural Network for Cloud-supported In-Vehicle Cyberattack Detection
Viaarxiv icon

A Sensor Fusion-based GNSS Spoofing Attack Detection Framework for Autonomous Vehicles

Add code
Aug 19, 2021
Figure 1 for A Sensor Fusion-based GNSS Spoofing Attack Detection Framework for Autonomous Vehicles
Figure 2 for A Sensor Fusion-based GNSS Spoofing Attack Detection Framework for Autonomous Vehicles
Figure 3 for A Sensor Fusion-based GNSS Spoofing Attack Detection Framework for Autonomous Vehicles
Figure 4 for A Sensor Fusion-based GNSS Spoofing Attack Detection Framework for Autonomous Vehicles
Viaarxiv icon

Hybrid Quantum-Classical Neural Network for Incident Detection

Add code
Aug 02, 2021
Figure 1 for Hybrid Quantum-Classical Neural Network for Incident Detection
Figure 2 for Hybrid Quantum-Classical Neural Network for Incident Detection
Figure 3 for Hybrid Quantum-Classical Neural Network for Incident Detection
Figure 4 for Hybrid Quantum-Classical Neural Network for Incident Detection
Viaarxiv icon

Hybrid Classical-Quantum Deep Learning Models for Autonomous Vehicle Traffic Image Classification Under Adversarial Attack

Add code
Aug 02, 2021
Figure 1 for Hybrid Classical-Quantum Deep Learning Models for Autonomous Vehicle Traffic Image Classification Under Adversarial Attack
Figure 2 for Hybrid Classical-Quantum Deep Learning Models for Autonomous Vehicle Traffic Image Classification Under Adversarial Attack
Figure 3 for Hybrid Classical-Quantum Deep Learning Models for Autonomous Vehicle Traffic Image Classification Under Adversarial Attack
Figure 4 for Hybrid Classical-Quantum Deep Learning Models for Autonomous Vehicle Traffic Image Classification Under Adversarial Attack
Viaarxiv icon

Efficacy of Statistical and Artificial Intelligence-based False Information Cyberattack Detection Models for Connected Vehicles

Add code
Aug 02, 2021
Figure 1 for Efficacy of Statistical and Artificial Intelligence-based False Information Cyberattack Detection Models for Connected Vehicles
Figure 2 for Efficacy of Statistical and Artificial Intelligence-based False Information Cyberattack Detection Models for Connected Vehicles
Figure 3 for Efficacy of Statistical and Artificial Intelligence-based False Information Cyberattack Detection Models for Connected Vehicles
Figure 4 for Efficacy of Statistical and Artificial Intelligence-based False Information Cyberattack Detection Models for Connected Vehicles
Viaarxiv icon