Search Results for author: Ahmad Taha

Found 4 papers, 0 papers with code

Enhancing Vehicle Platooning Safety via Control Node Placement and Sizing under State and Input Bounds

no code implementations11 Mar 2025 Yifei She, Shen Wang, Ahmad Taha, Xiaofeng Tao

Vehicle platooning with Cooperative Adaptive Cruise Control improves traffic efficiency, reduces energy consumption, and enhances safety but remains vulnerable to cyber-attacks that disrupt communication and cause unsafe actions.

Enhancing Network Security Management in Water Systems using FM-based Attack Attribution

no code implementations3 Mar 2025 Aleksandar Avdalovic, Joseph Khoury, Ahmad Taha, Elias Bou-Harb

In multi-feature cyber attack scenarios involving intricate sensor-actuator interactions, our FM-based attack attribution method effectively ranks attack root causes, achieving approximately 20% average improvement over SHAP and LEMNA.

Feature Importance Management

On input-to-state stability verification of identified models obtained by Koopman operator

no code implementations3 Sep 2023 Wenjie Mei, Dongzhe Zheng, Yu Zhou, Ahmad Taha, Chengyan Zhao

This paper proposes a class of basis functions for realizing the input-to-state stability verification of identified models obtained from the true system (assumed to be input-to-state stable) using the Koopman operator.

Cannot find the paper you are looking for? You can Submit a new open access paper.