no code implementations • 20 Oct 2023 • Mohammadhasan Faghihi, Meysam Yadegar, Mohammadhosein Bakhtiaridoust, Nader Meskin, Javad Shari, Peng Shi
This paper introduces a novel approach to solve the coverage optimization problem in multi-agent systems.
no code implementations • 26 Sep 2022 • Ehsan Sabouni, Christos G. Cassandras, Wei Xiao, Nader Meskin
We address the problem of controlling Connected and Automated Vehicles (CAVs) in conflict areas of a traffic network subject to hard safety constraints.
no code implementations • 2 May 2022 • Maede Zolanvari, Zebo Yang, Khaled Khan, Raj Jain, Nader Meskin
Simply put, TRUST XAI models the statistical behavior of the AI's outputs in an AI-based system.
no code implementations • 24 Mar 2022 • Nader Meskin, Ehsan Sabouni, Wei Xiao, Christos G. Cassandras
The safety constraints and the vehicle limitations are considered using the Control Barrier Function (CBF) framework and a self-triggered scheme is proposed using the CBF constraints.
no code implementations • 22 Mar 2022 • Ehsan Sabouni, Christos G. Cassandras, Wei Xiao, Nader Meskin
We address the problem of controlling Connected and Automated Vehicles (CAVs) in conflict areas of a traffic network subject to hard safety constraints.
no code implementations • 22 May 2021 • Mohammadreza Doostmohammadian, Themistoklis Charalambous, Miadreza Shafie-khah, Nader Meskin, Usman A. Khan
This paper considers distributed estimation of linear systems when the state observations are corrupted with Gaussian noise of unbounded support and under possible random adversarial attacks.
no code implementations • 26 Mar 2021 • Hossam S. Abbas, Roland Tóth, Mihály Petreczky, Nader Meskin, Javad Mohammadpour Velni, Patrick J. W. Koelewijn
In the SISO case, all nonlinearities of the original system are embedded into one NL function, which is factorized, based on a proposed algorithm, to construct an LPV representation of the original NL system.
no code implementations • 10 Feb 2020 • Deval Bhamare, Maede Zolanvari, Aiman Erbad, Raj Jain, Khaled Khan, Nader Meskin
In this work, we have a close look at the shift of the ICS from stand-alone systems to cloud-based environments.
Cryptography and Security Networking and Internet Architecture Systems and Control Systems and Control