Skip to main content

Showing 1–3 of 3 results for author: Aved, A

Searching in archive eess. Search in all archives.
.
  1. arXiv:2310.17069  [pdf, other

    eess.SY

    Electric Vehicle Aggregation Review: Benefits and Vulnerabilities of Managing a Growing EV Fleet

    Authors: Kelsey Nelson, Javad Mohammadi, Yu Chen, Erik Blasch, Alex Aved, David Ferris, Erika Ardiles Cruz, Philip Morrone

    Abstract: Electric vehicles (EVs) are becoming more popular within the United States, making up an increasingly large portion of the US's electricity consumption. Hence, there is much attention has been directed on how to manage EVs within the power sector. A well-investigated strategy for managing the increase in electricity demand from EV charging is aggregation, which allows for an intermediary to manage… ▽ More

    Submitted 27 October, 2023; v1 submitted 25 October, 2023; originally announced October 2023.

  2. arXiv:2207.13070  [pdf, other

    cs.CR cs.CV cs.LG eess.IV

    DeFakePro: Decentralized DeepFake Attacks Detection using ENF Authentication

    Authors: Deeraj Nagothu, Ronghua Xu, Yu Chen, Erik Blasch, Alexander Aved

    Abstract: Advancements in generative models, like Deepfake allows users to imitate a targeted person and manipulate online interactions. It has been recognized that disinformation may cause disturbance in society and ruin the foundation of trust. This article presents DeFakePro, a decentralized consensus mechanism-based Deepfake detection technique in online video conferencing tools. Leveraging Electrical N… ▽ More

    Submitted 21 July, 2022; originally announced July 2022.

    Journal ref: the IEEE IT Professional, Special Issue on Information Hygiene and the Fight against the Misinformation Info-demic, 2022

  3. arXiv:2003.04169  [pdf, other

    cs.CV cs.DC cs.MM eess.IV

    I-ViSE: Interactive Video Surveillance as an Edge Service using Unsupervised Feature Queries

    Authors: Seyed Yahya Nikouei, Yu Chen, Alexander Aved, Erik Blasch

    Abstract: Situation AWareness (SAW) is essential for many mission critical applications. However, SAW is very challenging when trying to immediately identify objects of interest or zoom in on suspicious activities from thousands of video frames. This work aims at develo** a queryable system to instantly select interesting content. While face recognition technology is mature, in many scenarios like public… ▽ More

    Submitted 9 March, 2020; originally announced March 2020.

    Comments: R1 is under review by the IEEE Internet of Things Journal