Search Results - "Ahmad Yousef, Khalil M."
-
1
Analyzing Cyber-Physical Threats on Robotic Platforms
Published in Sensors (Basel, Switzerland) (21-05-2018)“…Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots…”
Get full text
Journal Article -
2
Extrinsic Calibration of Camera and 2D Laser Sensors without Overlap
Published in Sensors (Basel, Switzerland) (14-10-2017)“…Extrinsic calibration of a camera and a 2D laser range finder (lidar) sensors is crucial in sensor data fusion applications; for example SLAM algorithms used…”
Get full text
Journal Article -
3
Automated Vulnerability Exploitation Using Deep Reinforcement Learning
Published in Applied sciences (01-10-2024)“…The main objective of this paper is to develop a reinforcement agent capable of effectively exploiting a specific vulnerability. Automating pentesting can…”
Get full text
Journal Article -
4
Solving the robot-world hand-eye(s) calibration problem with iterative methods
Published in Machine vision and applications (01-08-2017)“…Robot-world, hand-eye calibration is the problem of determining the transformation between the robot end-effector and a camera, as well as the transformation…”
Get full text
Journal Article -
5
Personal assistant robot using reinforcement learning: DARWIN-OP2 as a case study
Published in Intelligent service robotics (01-07-2024)“…The use of robots as personal assistants has gained significant interest in recent years. In this research, our motivation is to employ a robot as a personal…”
Get full text
Journal Article -
6
Building 3D visual maps of interior space with a new hierarchical sensor fusion architecture
Published in Robotics and autonomous systems (01-08-2013)“…It is now generally recognized that sensor-fusion is the best approach to the accurate construction of environment maps by a sensor-equipped mobile robot…”
Get full text
Journal Article -
7
Intelligent traffic light scheduling technique using calendar-based history information
Published in Future generation computer systems (01-02-2019)“…One of the most serious problems that are due to the vast increase in the number of vehicles, is the traffic congestion. The severe traffic congestion in…”
Get full text
Journal Article -
8
Parameterizations for reducing camera reprojection error for robot-world hand-eye calibration
Published in 2015 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS) (01-09-2015)“…Accurate robot-world, hand-eye calibration is crucial to automation tasks. In this paper, we discuss the robot-world, hand-eye calibration problem which has…”
Get full text
Conference Proceeding -
9
Semi-quantitative security risk assessment of robotic systems
Published in Jordanian journal of computers and information technology (Online) (01-12-2018)“…Robots are becoming increasingly integrated in our daily lives, providing services in civilian, industrial and military applications. many of those…”
Get full text
Journal Article -
10
Place recognition and self-localization in interior hallways by indoor mobile robots: A signature-based cascaded filtering framework
Published in 2014 IEEE/RSJ International Conference on Intelligent Robots and Systems (01-09-2014)“…We present a robot self-localization approach that is based on using a cascade of filters that increasingly refine a robot's guess regarding where it is in a…”
Get full text
Conference Proceeding -
11
Solving the Robot-World Hand-Eye(s) Calibration Problem with Iterative Methods
Published 29-07-2019“…Machine Vision and Applications, 2017 Robot-world, hand-eye calibration is the problem of determining the transformation between the robot end-effector and a…”
Get full text
Journal Article -
12
Vulnerability Exploitation Using Reinforcement Learning
Published in 2023 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT) (22-05-2023)“…Our main goal is to create a reinforcement agent that is capable of exploiting a particular vulnerability. Hiring a penetration tester or doing manual…”
Get full text
Conference Proceeding -
13
A Bispectrum-based Approach for Detecting Deception using EEG Signals
Published in 2018 IEEE 20th International Conference on e-Health Networking, Applications and Services (Healthcom) (01-09-2018)“…Deception is considered a ubiquitous social phenomenon that has a significant implications in clinical, moral, and law enforcement domains. In this study, we…”
Get full text
Conference Proceeding -
14
Hardware design and modeling of lightweight block ciphers for secure communications
Published in Future generation computer systems (01-06-2018)“…Lightweight ciphers are essential for secure communication in resource-constrained devices. The objective of this research is to implement lightweight ciphers…”
Get full text
Journal Article -
15
Kinect-Based Virtual Try-on System: A Case Study
Published in 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT) (01-04-2019)“…Virtual fitting rooms are a very important tool in on-line shopping, which can save time, promote products, increase sales, and reduce number of returns. The…”
Get full text
Conference Proceeding -
16
Power-Aware Adaptive Encryption
Published in 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT) (01-04-2019)“…Recently, there has been a significant increase in number of resource-constrained devices, which are typically battery-powered. Encryption schemes are employed…”
Get full text
Conference Proceeding -
17
Emotion Recognition Based on Decoupling the Spatial Context from the Temporal Dynamics of Facial Expressions
Published in 2019 International Symposium on Networks, Computers and Communications (ISNCC) (01-06-2019)“…This paper presents an emotion recognition approach based on decoupling the spatial context from the temporal dynamics of facial expressions in video…”
Get full text
Conference Proceeding -
18
Security risk assessment of the PeopleBot mobile robot research platform
Published in 2017 International Conference on Electrical and Computing Technologies and Applications (ICECTA) (01-11-2017)“…Nowadays, robots are widely ubiquitous and integral part in our daily lives, which can be seen almost everywhere in industry, hospitals, military, etc. To…”
Get full text
Conference Proceeding -
19
SIFT based automatic number plate recognition
Published in 2015 6th International Conference on Information and Communication Systems (ICICS) (01-04-2015)“…The aim of this paper is on presenting a new and simple, but fast and efficient technique for automatic number plate recognition (ANPR) using SIFT (Scale…”
Get full text
Conference Proceeding -
20
An approach-path independent framework for place recognition and mobile robot localization in interior hallways
Published in 2013 IEEE International Conference on Robotics and Automation (01-05-2013)“…Our work provides a fast approach-path-independent framework for the problem of place recognition and robot localization in indoor environments. The…”
Get full text
Conference Proceeding