Artificial Intelligence

Augmenting Learning Components for Safety in Resource Constrained Autonomous Robots

Learning enabled components (LECs) trained using data-driven algorithms are increasingly being used in autonomous robots commonly found in factories, hospitals, and educational laboratories. However, these LECs do not provide any safety guarantees, …

Data-Driven Energy Optimization for Multi-Modal Transit

The goal of this project is to develop a high-resolution system-level data capture and analysis framework to revolutionize the operational planning of a regional transportation authority, specifically the Chattanooga Area Regional Transportation Authority (CARTA). There is existing research on improving energy efficiency in transportation networks through analyzing energy consumption data per vehicle type and driving context. However, these studies are based on trip specific estimation and thus cannot be applied to a regional transportation network. Further, a number of these studies are based on simplified model estimation that is used within a simulation framework for analysis and are therefore difficult to validate during actual driving/road conditions that are not captured in the training dataset (which is typically limited in size and features).

Get Your Workload in Order: Game Theoretic Prioritization of Database Auditing

A wide variety of mechanisms, such as alert triggers and auditing routines, have been developed to notify administrators about types of suspicious activities in the daily use of large databases of personal and sensitive information. However, such …

Monitoring Stealthy Diffusions

A broad variety of problems, such as targeted marketing and the spread of viruses and malware, have been modeled as maximizing the reach of diffusion through a network. In cybersecurity applications, however, a key consideration largely ignored in …

Optimal Detection of Faulty Traffic Sensors Used in Route Planning

A Game-Theoretic Approach for Alert Prioritization

Multi-Defender Strategic Filtering Against Spear-Phishing Attacks

Games of Timing for Security in Dynamic Environments

Monitoring Stealthy Diffusion

Optimal Personalized Filtering Against Spear-Phishing Attacks