Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 7, Issue 2April 2023
Editor:
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
ISSN:2378-962X
EISSN:2378-9638
Reflects downloads up to 15 Oct 2024Bibliometrics
Skip Table Of Content Section
research-article
Data-Driven Parameterized Corner Synthesis for Efficient Validation of Perception Systems for Autonomous Driving
Article No.: 9, Pages 1–24https://doi.org/10.1145/3571286

Today's automotive cyber-physical systems for autonomous driving aim to enhance driving safety by replacing the uncertainties posed by human drivers with standard procedures of automated systems. However, the accuracy of in-vehicle perception systems may ...

research-article
A Two-Speed Synchronous Traffic Protocol for Intelligent Intersections: From Single-Vehicle to Platoon Crossing
Article No.: 10, Pages 1–21https://doi.org/10.1145/3571289

With progress in cooperative and autonomous driving, there is an increasing interest in intelligent intersections to replace conventional traffic lights and, thereby, improve traffic efficiency. To avoid accidents in such safety-critical systems, a ...

research-article
Open Access
Machine Learning-based Intrusion Detection for Smart Grid Computing: A Survey
Article No.: 11, Pages 1–31https://doi.org/10.1145/3578366

Machine learning (ML)-based intrusion detection system (IDS) approaches have been significantly applied and advanced the state-of-the-art system security and defense mechanisms. In smart grid computing environments, security threats have been ...

research-article
Open Access
Intrusion Detection Framework for Invasive FPV Drones Using Video Streaming Characteristics
Article No.: 12, Pages 1–29https://doi.org/10.1145/3579999

Cheap commercial off-the-shelf (COTS) First-Person View (FPV) drones have become widely available for consumers in recent years. Unfortunately, they also provide low-cost attack opportunities to malicious users. Thus, effective methods to detect the ...

research-article
Open Access
Optimizing Mixed Autonomy Traffic Flow with Decentralized Autonomous Vehicles and Multi-Agent Reinforcement Learning
Article No.: 13, Pages 1–22https://doi.org/10.1145/3582576

We study the ability of autonomous vehicles to improve the throughput of a bottleneck using a fully decentralized control scheme in a mixed autonomy setting. We consider the problem of improving the throughput of a scaled model of the San Francisco–...

research-article
Open Access
AcTrak: Controlling a Steerable Surveillance Camera using Reinforcement Learning
Article No.: 14, Pages 1–27https://doi.org/10.1145/3585316

Steerable cameras that can be controlled via a network, to retrieve telemetries of interest have become popular. In this paper, we develop a framework called AcTrak, to automate a camera’s motion to appropriately switch between (a) zoom ins on existing ...

research-article
Understanding Indicators of Compromise against Cyber-attacks in Industrial Control Systems: A Security Perspective
Article No.: 15, Pages 1–33https://doi.org/10.1145/3587255

Numerous sophisticated and nation-state attacks on Industrial Control Systems (ICSs) have increased in recent years, exemplified by Stuxnet and Ukrainian Power Grid. Measures to be taken post-incident are crucial to reduce damage, restore control, and ...

Subjects

Comments