default search action
Alex Aved
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j27]Ronghua Xu, Deeraj Nagothu, Yu Chen, Alex Aved, Erika Ardiles-Cruz, Erik Blasch:
A Secure Interconnected Autonomous System Architecture for Multi-Domain IoT Ecosystems. IEEE Commun. Mag. 62(7): 52-57 (2024) - [j26]Ishfaq Ahmad, Addison Clark, Muhammad Ali, Hansheng Lei, David Ferris, Alex Aved:
Determining critical nodes in optimal cost attacks on networked infrastructures. Discov. Internet Things 4(1): 2 (2024) - [j25]Arslan Munir, Alexander J. Aved, Khanh Pham, Joonho Kong:
Trustworthiness of Situational Awareness: Significance and Quantification. J. Cybersecur. Priv. 4(2): 223-240 (2024) - [e3]Erik Blasch, Frederica Darema, Alex Aved:
Dynamic Data Driven Applications Systems - 4th International Conference, DDDAS 2022, Cambridge, MA, USA, October 6-10, 2022, Proceedings. Lecture Notes in Computer Science 13984, Springer 2024, ISBN 978-3-031-52669-5 [contents] - [i12]Nora Agah, Javad Mohammadi, Alex Aved, David Ferris, Erika Ardiles-Cruz, Philip Morrone:
Data Poisoning: An Overlooked Threat to Power Grid Resilience. CoRR abs/2407.14684 (2024) - 2023
- [j24]James Cunningham, Alexander J. Aved, David Ferris, Philip Morrone, Conrad S. Tucker:
A Deep Learning Game Theoretic Model for Defending Against Large Scale Smart Grid Attacks. IEEE Trans. Smart Grid 14(2): 1188-1197 (2023) - [c38]Simeon Ogunbunmi, Mohsen Hatami, Ronghua Xu, Yu Chen, Erik Blasch, Erika Ardiles-Cruz, Alexander J. Aved, Genshe Chen:
A Lightweight Reputation System for UAV Networks. SmartSP 2023: 114-129 - [i11]Kelsey Nelson, Javad Mohammadi, Yu Chen, Erik Blasch, Alex Aved, David Ferris, Erika Ardiles-Cruz, Philip Morrone:
Electric Vehicle Aggregation Review: Benefits and Vulnerabilities of Managing a Growing EV Fleet. CoRR abs/2310.17069 (2023) - 2022
- [j23]Deeraj Nagothu, Ronghua Xu, Yu Chen, Erik Blasch, Alexander J. Aved:
Deterring Deepfake Attacks with an Electrical Network Frequency Fingerprints Approach. Future Internet 14(5): 125 (2022) - [j22]Arslan Munir, Erik Blasch, Alexander J. Aved, E. Paul Ratazzi, Joonho Kong:
Security Issues in Situational Awareness: Adversarial Threats and Mitigation Techniques. IEEE Secur. Priv. 20(4): 51-60 (2022) - [j21]Deeraj Nagothu, Ronghua Xu, Yu Chen, Erik Blasch, Alexander J. Aved:
DeFakePro: Decentralized Deepfake Attacks Detection Using ENF Authentication. IT Prof. 24(5): 46-52 (2022) - [j20]Ishfaq Ahmad, Viswanathan Swaminathan, Alex Aved, Saifullah Khalid:
An overview of rate control techniques in HEVC and SHVC video encoding. Multim. Tools Appl. 81(24): 34919-34950 (2022) - [j19]Xin Liu, Bo Zhang, Bo Chen, Alex Aved, Dong Jin:
Towards Optimal and Executable Distribution Grid Restoration Planning With a Fine-Grained Power-Communication Interdependency Model. IEEE Trans. Smart Grid 13(3): 1911-1922 (2022) - [c37]Jie Wei, Weicong Feng, Erik Blasch, Philip Morrone, Erika Ardiles-Cruz, Alex Aved:
Deep Learning Approach for Data and Computing Efficient Situational Assessment and Awareness in Human Assistance and Disaster Response and Battlefield Damage Assessment Applications. DDDAS 2022: 187-195 - [c36]M. Rana, S. Shetty, Alex Aved, Erika Ardiles-Cruz, David Ferris, Philip Morrone:
Attack-Resilient Cyber-Physical System State Estimation for Smart Grid Digital Twin Design. DDDAS 2022: 315-324 - [c35]Jie Wei, Erik Blasch, Erika Ardiles-Cruz, Philip Morrone, Alex Aved:
Deep Learning Approach for Data and Computing Efficient Disaster Mitigation in Humanitarian Assistance and Disaster Response Applications. IHTC 2022: 79-85 - [c34]Nihal Poredi, Deeraj Nagothu, Yu Chen, Xiaohua Li, Alexander J. Aved, Erika Ardiles-Cruz, Erik Blasch:
Robustness of Electrical Network Frequency Signals as a Fingerprint for Digital Media Authentication. MMSP 2022: 1-6 - [i10]Deeraj Nagothu, Ronghua Xu, Yu Chen, Erik Blasch, Alexander J. Aved:
DeFakePro: Decentralized DeepFake Attacks Detection using ENF Authentication. CoRR abs/2207.13070 (2022) - 2021
- [j18]Arslan Munir, Jisu Kwon, Jong Hun Lee, Joonho Kong, Erik Blasch, Alexander J. Aved, Khan Muhammad:
FogSurv: A Fog-Assisted Architecture for Urban Surveillance Using Artificial Intelligence and Data Fusion. IEEE Access 9: 111938-111959 (2021) - [j17]Qian Qu, Ronghua Xu, Yu Chen, Erik Blasch, Alexander J. Aved:
Enable Fair Proof-of-Work (PoW) Consensus for Blockchains in IoT by Miner Twins (MinT). Future Internet 13(11): 291 (2021) - [j16]Seyed Yahya Nikouei, Yu Chen, Alex J. Aved, Erik Blasch:
I-ViSE: Interactive Video Surveillance as an Edge Service Using Unsupervised Feature Queries. IEEE Internet Things J. 8(21): 16181-16190 (2021) - [j15]Deeraj Nagothu, Yu Chen, Alexander J. Aved, Erik Blasch:
Authenticating Video Feeds using Electric Network Frequency Estimation at the Edge. EAI Endorsed Trans. Security Safety 7(24): e4 (2021) - [c33]Deeraj Nagothu, Ronghua Xu, Yu Chen, Erik Blasch, Alexander J. Aved:
DeFake: Decentralized ENF-Consensus Based DeepFake Detection in Video Conferencing. MMSP 2021: 1-6 - [c32]Deeraj Nagothu, Ronghua Xu, Yu Chen, Erik Blasch, Alexander J. Aved:
Detecting Compromised Edge Smart Cameras using Lightweight Environmental Fingerprint Consensus. SenSys 2021: 505-510 - 2020
- [j14]Ishfaq Ahmad, Hafiz Fahad Sheikh, Alex Aved:
Benchmarking the task scheduling algorithms for performance, energy, and temperature optimization. Sustain. Comput. Informatics Syst. 25: 100339 (2020) - [j13]Jing Peng, Alex J. Aved:
Regularized Information Preserving Projections. IEEE Trans. Aerosp. Electron. Syst. 56(5): 3868-3877 (2020) - [j12]Ammar O. Hoori, Ahmad Al Kazzaz, Rameez Khimani, Yuichi Motai, Alex J. Aved:
Electric Load Forecasting Model Using a Multicolumn Deep Neural Networks. IEEE Trans. Ind. Electron. 67(8): 6473-6482 (2020) - [c31]Han Sun, Yu Chen, Alexander J. Aved, Erik Blasch:
Collaborative Multi-Object Tracking as an Edge Service using Transfer Learning. HPCC/DSS/SmartCity 2020: 1112-1119 - [c30]Jing Peng, Alex J. Aved:
Information Preserving Discriminant Projections. ICAART (2) 2020: 162-171 - [c29]Jing Peng, Alex J. Aved:
Learning Latent Variable Models with Discriminant Regularization. ICAART (Revised Selected Papers) 2020: 378-398 - [c28]Ishfaq Ahmad, Addison Clark, Muhammad Ali, David Ferris, Alex J. Aved:
Identifying Optimal Attacks for Infrastructure Networks with failure Propagation. ICDIS 2020: 79-86 - [c27]Ishfaq Ahmad, Addison Clark, Alex Sabol, David Ferris, Alex Aved:
Maximizing Resilience under Defender Attacker Model in Heterogeneous Multi-Networks. ICDIS 2020: 117-126 - [e2]Frederica Darema, Erik Blasch, Sai Ravela, Alex Aved:
Dynamic Data Driven Applications Systems - Third International Conference, DDDAS 2020, Boston, MA, USA, October 2-4, 2020, Proceedings. Lecture Notes in Computer Science 12312, Springer 2020, ISBN 978-3-030-61724-0 [contents] - [i9]Seyed Yahya Nikouei, Yu Chen, Alexander J. Aved, Erik Blasch:
I-ViSE: Interactive Video Surveillance as an Edge Service using Unsupervised Feature Queries. CoRR abs/2003.04169 (2020) - [i8]Ronghua Xu, Yu Chen, Erik Blasch, Alexander J. Aved, Genshe Chen, Dan Shen:
Hybrid Blockchain-Enabled Secure Microservices Fabric for Decentralized Multi-Domain Avionics Systems. CoRR abs/2004.10674 (2020)
2010 – 2019
- 2019
- [j11]Erik Blasch, Robert Cruise, Alexander J. Aved, Uttam K. Majumder, Todd V. Rovito:
Methods of AI for Multimodal Sensing and Action for Complex Situations. AI Mag. 40(4): 50-65 (2019) - [j10]Deeraj Nagothu, Yu Chen, Erik Blasch, Alexander J. Aved, Sencun Zhu:
Detecting Malicious False Frame Injection Attacks on Surveillance Systems at the Edge Using Electrical Network Frequency Signals. Sensors 19(11): 2424 (2019) - [j9]David L. Stone, Gaurav Shah, Yuichi Motai, Alex J. Aved:
Vegetation Segmentation for Sensor Fusion of Omnidirectional Far-Infrared and Visual Stream. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 12(2): 614-626 (2019) - [c26]Ronghua Xu, Seyed Yahya Nikouei, Yu Chen, Erik Blasch, Alexander J. Aved:
BlendMAS: A Blockchain-Enabled Decentralized Microservices Architecture for Smart Public Safety. Blockchain 2019: 564-571 - [c25]Seyed Yahya Nikouei, Yu Chen, Alexander J. Aved, Erik Blasch, Timothy R. Faughnan:
I-SAFE: instant suspicious activity identification at the edge using fuzzy decision making. SEC 2019: 101-112 - [c24]Joshua Bassey, Damilola Adesina, Xiangfang Li, Lijun Qian, Alexander J. Aved, Timothy S. Kroecker:
Intrusion Detection for IoT Devices based on RF Fingerprinting using Deep Learning. FMEC 2019: 98-104 - [i7]Ronghua Xu, Seyed Yahya Nikouei, Yu Chen, Erik Blasch, Alex Aved:
BlendMAS: A BLockchain-ENabled Decentralized Microservices Architecture for Smart Public Safety. CoRR abs/1902.10567 (2019) - [i6]Seyed Yahya Nikouei, Ronghua Xu, Yu Chen, Alex Aved, Erik Blasch:
Decentralized Smart Surveillance through Microservices Platform. CoRR abs/1903.04563 (2019) - [i5]Seyed Yahya Nikouei, Yu Chen, Alexander J. Aved, Erik Blasch, Timothy R. Faughnan:
I-SAFE: Instant Suspicious Activity identiFication at the Edge using Fuzzy Decision Making. CoRR abs/1909.05776 (2019) - 2018
- [j8]Hossein Jafari, Xiangfang Li, Lijun Qian, Alexander J. Aved, Timothy S. Kroecker:
Big uncertain data of multiple sensors efficient processing with high order multi-hypothesis: an evidence theoretic approach. Int. J. Big Data Intell. 5(3): 177-190 (2018) - [j7]Larry Pearlstein, Skyler Maxwell, Alex Aved:
Adaptive prediction resolution video coding for reduced DRAM bandwidth. Integr. 62: 382-394 (2018) - [j6]Jing Peng, Alex J. Aved, Guna Seetharaman, Kannappan Palaniappan:
Multiview Boosting With Information Propagation for Classification. IEEE Trans. Neural Networks Learn. Syst. 29(3): 657-669 (2018) - [c23]Joshua Bassey, Xiangfang Li, Lijun Qian, Alexander J. Aved, Timothy S. Kroecker:
Efficient Computing of Dempster-Shafer Theoretic Conditionals for Big Hard/Soft Data Fusion. FUSION 2018: 643-650 - [c22]Erik Philip Blasch, Alex J. Aved:
Physics-Based and Human-Derived Information Fusion Video Activity Analysis. FUSION 2018: 997-1004 - [c21]Li Sulimowicz, Ishfaq Ahmad, Alexander J. Aved:
Superpixel-Enhanced Pairwise Conditional Random Field for Semantic Segmentation. ICIP 2018: 271-275 - [c20]Li Sulimowicz, Ishfaq Ahmad, Alexander J. Aved:
A Two Layer Pairwise Framework to Approximate Superpixel-Based Higher-Order Conditional Random Field for Semantic Segmentation. ICME Workshops 2018: 1-6 - [c19]Seyed Yahya Nikouei, Ronghua Xu, Deeraj Nagothu, Yu Chen, Alexander J. Aved, Erik Blasch:
Real-Time Index Authentication for Event-Oriented Surveillance Video Query using Blockchain. ISC2 2018: 1-8 - [p3]Erik Blasch, Alex Aved, Shuvra S. Bhattacharyya:
Dynamic Data Driven Application Systems (DDDAS) for Multimedia Content Analysis. Handbook of Dynamic Data Driven Applications Systems 2018: 631-651 - [p2]Erik Blasch, Sai Ravela, Alex Aved:
DDDAS: The Way Forward. Handbook of Dynamic Data Driven Applications Systems 2018: 723-731 - [e1]Erik Blasch, Sai Ravela, Alex Aved:
Handbook of Dynamic Data Driven Applications Systems. Springer 2018, ISBN 978-3-319-95503-2 [contents] - [i4]Li Sulimowicz, Ishfaq Ahmad, Alexander J. Aved:
A Multi-Layer Approach to Superpixel-based Higher-order Conditional Random Field for Semantic Image Segmentation. CoRR abs/1804.02032 (2018) - [i3]Li Sulimowicz, Ishfaq Ahmad, Alexander J. Aved:
Superpixel-enhanced Pairwise Conditional Random Field for Semantic Segmentation. CoRR abs/1805.11737 (2018) - [i2]Seyed Yahya Nikouei, Ronghua Xu, Deeraj Nagothu, Yu Chen, Alexander J. Aved, Erik Blasch:
Real-Time Index Authentication for Event-Oriented Surveillance Video Query using Blockchain. CoRR abs/1807.06179 (2018) - [i1]Seyed Yahya Nikouei, Yu Chen, Alexander J. Aved, Erik Blasch:
EIQIS: Toward an Event-Oriented Indexable and Queryable Intelligent Surveillance System. CoRR abs/1807.11329 (2018) - 2017
- [j5]Hossein Jafari, Xiangfang Li, Lijun Qian, Alexander J. Aved, Timothy S. Kroecker:
Multisensor change detection on the basis of big time-series data and Dempster-Shafer theory. Concurr. Comput. Pract. Exp. 29(17) (2017) - [j4]Alex J. Aved, Erik Philip Blasch, Jing Peng:
Regularized Difference Criterion for Computing Discriminants for Dimensionality Reduction. IEEE Trans. Aerosp. Electron. Syst. 53(5): 2372-2384 (2017) - [c18]Hafiz Fahad Sheikh, Ishfaq Ahmad, Sheheryar Arshad, Alex Aved:
Performance evaluation of diverse techniques for performance, energy, and temperature efficient task allocation. IGSC 2017: 1-6 - 2016
- [c17]Larry Pearlstein, Ian Patel, Alexander J. Aved:
Video coding layer optimization for target detection. AIPR 2016: 1-7 - [c16]Jing Peng, Alex J. Aved:
Mining Best Strategy for Multi-view Classification. DMBD 2016: 270-275 - [p1]Alex J. Aved, Erik Blasch:
Context Understanding from Query-Based Streaming Video. Context-Enhanced Information Fusion 2016: 507-537 - 2015
- [c15]Erik Blasch, Alex Aved:
URREF for veracity assessment in query-based information fusion systems. FUSION 2015: 58-65 - [c14]Erik Blasch, Haibin Ling, Dan Shen, Genshe Chen, Riad I. Hammoud, Arslan Basharat, Roddy Collins, Alex Aved, James G. Nagy:
Video-to-text information fusion evaluation for level 5 user refinement. FUSION 2015: 1993-2000 - [c13]Erik Philip Blasch, Alex J. Aved:
Dynamic Data-driven Application System (DDDAS) for Video Surveillance User Support. ICCS 2015: 2503-2517 - [c12]Alex J. Aved, Erik Philip Blasch:
Multi-INT Query Language for DDDAS Designs. ICCS 2015: 2518-2532 - [c11]Sharma Chakravarthy, Alex Aved, S. Shirvani, Manish Annappa, Erik Blasch:
Adapting Stream Processing Framework for Video Analysis. ICCS 2015: 2648-2657 - 2014
- [j3]Alexander J. Aved, Kien A. Hua:
An informatics-based approach to object tracking for distributed live video computing. Multim. Tools Appl. 68(1): 111-133 (2014) - [c10]Erik Blasch, James G. Nagy, Alex Aved, Eric K. Jones, William M. Pottenger, Arslan Basharat, Anthony Hoogs, Michael Schneider, Riad I. Hammoud, Genshe Chen, Dan Shen, Haibin Ling:
Context aided video-to-text information fusion. FUSION 2014: 1-8 - 2013
- [c9]Erik Blasch, Zhonghai Wang, Haibin Ling, Kannappan Palaniappan, Genshe Chen, Dan Shen, Alex Aved, Guna Seetharaman:
Video-based activity analysis using the L1 tracker on VIRAT data. AIPR 2013: 1-8 - 2012
- [j2]Alexander J. Aved, Kien A. Hua:
A general framework for managing and processing live video data with privacy protection. Multim. Syst. 18(2): 123-143 (2012) - 2011
- [c8]Alexander J. Aved, Kien A. Hua, Varalakshmi Gurappa:
An Informatics-Based Approach to Object Tracking for Distributed Live Video Computing. MCSS 2011: 120-128 - 2010
- [j1]Rui Peng, Alexander J. Aved, Kien A. Hua:
Real-Time Query Processing on Live Videos in Networks of Distributed Cameras. Int. J. Interdiscip. Telecommun. Netw. 2(1): 27-48 (2010)
2000 – 2009
- 2009
- [c7]Antoniya Petkova, Kien A. Hua, Alexander J. Aved:
Processing Approximate Moving Range Queries in Mobile Sensor Environments. CSE (2) 2009: 452-457 - [c6]Tai T. Do, Kien A. Hua, Alexander J. Aved, Fuyu Liu, Ning Jiang:
Scalable Video-On-Demand Streaming in Mobile Wireless Hybrid Networks. ICC 2009: 1-6 - [c5]Alexander J. Aved, Kien A. Hua, Antoniya Petkova:
CAWA: Continuous Approximate Where-About Queries. Infoscale 2009: 241-257 - 2007
- [c4]Alexander J. Aved, Tai T. Do, Georgiana L. Hamza-Lup, Ai Hua Ho, Lap Hoang, Liang Hsia, Kien A. Hua, Fuyu Liu, Rui Peng:
A Real-Time Route Diversion Management System. ITSC 2007: 1131-1136 - 2006
- [c3]Alexander J. Aved, Ai Hua Ho, Kien A. Hua, Lap Hoang, Georgiana L. Hamza-Lup:
A Mobile Computing Approach to Automatic Traffic Evacuation Management. ITSC 2006: 85-90 - [c2]Georgiana L. Hamza-Lup, Kien A. Hua, Alexander J. Aved:
Exit-Point Based Approaches for Real-Time Traffic Evacuation Management. ITSC 2006: 151-156 - [c1]Ai Hua Ho, Alexander J. Aved, Kien A. Hua:
A novel broadcast technique for high-density ad hoc networks. IWCMC 2006: 425-430
Coauthor Index
aka: Erik Philip Blasch
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint