Intelligence & Security

Authenticating a User on a Mobile Device

Detecting Fake News on Social Media by Message Diffusion Pathways

Predict Enterprise Cyber Incidents by Social Network Analysis on Dark Web Forums

RIM: Robust Intersection Management for Connected Autonomous Vehicles

Simultaneous Localization and Mapping by Merging Imaging and Wireless Communications

Evaluating Perception Systems for Autonomous Vehicles using Quality Temporal Logic

Wrist-Worn Monitoring System for Personalized Activity Tracking

Low-Cost Auto-Aligning Charging Station for Autonomous Drones

Hyper-Precise Positioning and Communications for Radio Networks

Real-Time Simulation of Interdependent Infrastructure Responses to Environmental, Cyber, and Kinetic Disruptions