Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Entire DC Network

Design Of Single-Modal Take-Over Request In Sae Level 2 & 3 Automated Vehicle, Jiwon Lee, Hanna Yun, Jaewon Kim, Sujin Baek, Hyunseo Han, S. Maryam Fakhr Hosseini, Eric Vasey, Okkeun Lee, Myounghoon Jeon, Ji Hyun Yang Mar 2019

Design Of Single-Modal Take-Over Request In Sae Level 2 & 3 Automated Vehicle, Jiwon Lee, Hanna Yun, Jaewon Kim, Sujin Baek, Hyunseo Han, S. Maryam Fakhr Hosseini, Eric Vasey, Okkeun Lee, Myounghoon Jeon, Ji Hyun Yang

Michigan Tech Publications

Recently, cutting-edge technology has led to the development of automated vehicles, but the limitations of the related technology may lead to hazardous situations. This resulted in the remarkable significance of the interaction between automated vehicles and drivers. In particular, the transition between the driver and the automated vehicle in accordance with Level 3 of SAE J3016 is inevitable, and guidelines or standards regarding the takeover should be provided. Therefore, we aim to prepare the safety guidelines for the takeover and to conduct a comparative test. First, guidelines for visual, auditory, and haptic displays in existing vehicles were examined. Second, preliminary …


De-Anonymyzing Scale-Free Social Networks By Using Spectrum Partitioning Method, Qi Sun, Jiguo Yu, Honglu Jiang, Yixian Chen, Xiuzhen Cheng Feb 2019

De-Anonymyzing Scale-Free Social Networks By Using Spectrum Partitioning Method, Qi Sun, Jiguo Yu, Honglu Jiang, Yixian Chen, Xiuzhen Cheng

Department of Computer Science Publications

Social network data is widely shared, forwarded and published to third parties, which led to the risks of privacy disclosure. Even thought the network provider always perturbs the data before publishing it, attackers can still recover anonymous data according to the collected auxiliary information. In this paper, we transform the problem of de-anonymization into node matching problem in graph, and the de-anonymization method can reduce the number of nodes to be matched at each time. In addition, we use spectrum partitioning method to divide the social graph into disjoint subgraphs, and it can effectively be applied to large-scale social networks …


Maia: A Language For Mandatory Integrity Controls Of Structured Data, Wassnaa Al-Mawee, Paul Bonamy, Steven Carr, Jean Mayo Jan 2019

Maia: A Language For Mandatory Integrity Controls Of Structured Data, Wassnaa Al-Mawee, Paul Bonamy, Steven Carr, Jean Mayo

Michigan Tech Publications

The integrity of systems files is necessary for the secure functioning of an operating system. Integrity is not generally discussed in terms of complete computer systems. Instead, integrity issues tend to be either tightly coupled to a particular domain (e.g. database constraints), or else so broad as to be useless except after the fact (e.g. backups). Often, file integrity is determined by who modifies the file or by a checksum. This paper focuses on a general model of the internal integrity of a file. Even if a file is modified by a subject with trust or has a valid checksum, …