Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Department of Computer Science (2)
- Access and Usage Control (1)
- Auditory interface (1)
- Authentication (1)
- Automated vehicle (1)
-
- DVIDriver-Vehicle Interaction (1)
- Data and Software Security (1)
- De-anonymization (1)
- Department of Cognitive and Learning Sciences (1)
- Graph partition (1)
- Haptic interface (1)
- Privacy and Security Models (1)
- Privacy-preserving (1)
- Single-modal alarm (1)
- Social networks (1)
- Take over (1)
- Visual interface (1)
Articles 1 - 3 of 3
Full-Text Articles in Entire DC Network
Design Of Single-Modal Take-Over Request In Sae Level 2 & 3 Automated Vehicle, Jiwon Lee, Hanna Yun, Jaewon Kim, Sujin Baek, Hyunseo Han, S. Maryam Fakhr Hosseini, Eric Vasey, Okkeun Lee, Myounghoon Jeon, Ji Hyun Yang
Design Of Single-Modal Take-Over Request In Sae Level 2 & 3 Automated Vehicle, Jiwon Lee, Hanna Yun, Jaewon Kim, Sujin Baek, Hyunseo Han, S. Maryam Fakhr Hosseini, Eric Vasey, Okkeun Lee, Myounghoon Jeon, Ji Hyun Yang
Michigan Tech Publications
Recently, cutting-edge technology has led to the development of automated vehicles, but the limitations of the related technology may lead to hazardous situations. This resulted in the remarkable significance of the interaction between automated vehicles and drivers. In particular, the transition between the driver and the automated vehicle in accordance with Level 3 of SAE J3016 is inevitable, and guidelines or standards regarding the takeover should be provided. Therefore, we aim to prepare the safety guidelines for the takeover and to conduct a comparative test. First, guidelines for visual, auditory, and haptic displays in existing vehicles were examined. Second, preliminary …
De-Anonymyzing Scale-Free Social Networks By Using Spectrum Partitioning Method, Qi Sun, Jiguo Yu, Honglu Jiang, Yixian Chen, Xiuzhen Cheng
De-Anonymyzing Scale-Free Social Networks By Using Spectrum Partitioning Method, Qi Sun, Jiguo Yu, Honglu Jiang, Yixian Chen, Xiuzhen Cheng
Department of Computer Science Publications
Social network data is widely shared, forwarded and published to third parties, which led to the risks of privacy disclosure. Even thought the network provider always perturbs the data before publishing it, attackers can still recover anonymous data according to the collected auxiliary information. In this paper, we transform the problem of de-anonymization into node matching problem in graph, and the de-anonymization method can reduce the number of nodes to be matched at each time. In addition, we use spectrum partitioning method to divide the social graph into disjoint subgraphs, and it can effectively be applied to large-scale social networks …
Maia: A Language For Mandatory Integrity Controls Of Structured Data, Wassnaa Al-Mawee, Paul Bonamy, Steven Carr, Jean Mayo
Maia: A Language For Mandatory Integrity Controls Of Structured Data, Wassnaa Al-Mawee, Paul Bonamy, Steven Carr, Jean Mayo
Michigan Tech Publications
The integrity of systems files is necessary for the secure functioning of an operating system. Integrity is not generally discussed in terms of complete computer systems. Instead, integrity issues tend to be either tightly coupled to a particular domain (e.g. database constraints), or else so broad as to be useless except after the fact (e.g. backups). Often, file integrity is determined by who modifies the file or by a checksum. This paper focuses on a general model of the internal integrity of a file. Even if a file is modified by a subject with trust or has a valid checksum, …