Artificial Intelligence

Detection and Mitigation of Attacks on Transportation Networks as a Multi-Stage Security Game

In recent years, state-of-the-art traffic-control devices have evolved from standalone hardware to networked smart devices. Smart traffic control enables operators to decrease traffic congestion and environmental impact by acquiring real-time traffic …

Data-Driven Detection of Anomalies and Cascading Failures in Traffic Networks

Traffic networks are one of the most critical infrastructures for any community. The increasing integration of smart and connected sensors in traffic networks provides researchers with unique opportunities to study the dynamics of this critical …

A Game-Theoretic Approach for Selecting Optimal Time-Dependent Thresholds for Anomaly Detection

Adversaries may cause significant damage to smart infrastructure using malicious attacks. To detect and mitigate these attacks before they can cause physical damage, operators can deploy anomaly detection systems (ADS), which can alarm operators to …

Database Audit Workload Prioritization via Game Theory

The quantity of personal data that is collected, stored, and subsequently processed continues to grow rapidly. Given its sensitivity, ensuring privacy protections has become a necessary component of database management. To enhance protection, a …

Augmenting Learning Components for Safety in Resource Constrained Autonomous Robots

Learning enabled components (LECs) trained using data-driven algorithms are increasingly being used in autonomous robots commonly found in factories, hospitals, and educational laboratories. However, these LECs do not provide any safety guarantees, …

Data-Driven Energy Optimization for Multi-Modal Transit

The goal of this project is to develop a high-resolution system-level data capture and analysis framework to revolutionize the operational planning of a regional transportation authority, specifically the Chattanooga Area Regional Transportation Authority (CARTA).

Get Your Workload in Order: Game Theoretic Prioritization of Database Auditing

A wide variety of mechanisms, such as alert triggers and auditing routines, have been developed to notify administrators about types of suspicious activities in the daily use of large databases of personal and sensitive information. However, such …

Monitoring Stealthy Diffusions

A broad variety of problems, such as targeted marketing and the spread of viruses and malware, have been modeled as maximizing the reach of diffusion through a network. In cybersecurity applications, however, a key consideration largely ignored in …

Optimal Detection of Faulty Traffic Sensors Used in Route Planning

A Game-Theoretic Approach for Alert Prioritization