Zum Hauptinhalt springen

Showing 1–16 of 16 results for author: Hamad, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.04004  [pdf, other

    cs.RO

    Towards Safe Robot Use with Edged or Pointed Objects: A Surrogate Study Assembling a Human Hand Injury Protection Database

    Authors: Robin Jeanne Kirschner, Carina M. Micheler, Yangcan Zhou, Sebastian Siegner, Mazin Hamad, Claudio Glowalla, Jan Neumann, Nader Rajaei, Rainer Burgkart, Sami Haddadin

    Abstract: The use of pointed or edged tools or objects is one of the most challenging aspects of today's application of physical human-robot interaction (pHRI). One reason for this is that the severity of harm caused by such edged or pointed impactors is less well studied than for blunt impactors. Consequently, the standards specify well-reasoned force and pressure thresholds for blunt impactors and advise… ▽ More

    Submitted 18 August, 2024; v1 submitted 5 April, 2024; originally announced April 2024.

    Comments: \c{opyright} 2024 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works

  2. arXiv:2401.10664  [pdf, other

    cs.CR cs.NI

    PTPsec: Securing the Precision Time Protocol Against Time Delay Attacks Using Cyclic Path Asymmetry Analysis

    Authors: Andreas Finkenzeller, Oliver Butowski, Emanuel Regnath, Mohammad Hamad, Sebastian Steinhorst

    Abstract: High-precision time synchronization is a vital prerequisite for many modern applications and technologies, including Smart Grids, Time-Sensitive Networking (TSN), and 5G networks. Although the Precision Time Protocol (PTP) can accomplish this requirement in trusted environments, it becomes unreliable in the presence of specific cyber attacks. Mainly, time delay attacks pose the highest threat to t… ▽ More

    Submitted 7 February, 2024; v1 submitted 19 January, 2024; originally announced January 2024.

    Comments: Accepted at INFOCOM24

  3. arXiv:2401.04792  [pdf, other

    cs.CR

    REACT: Autonomous Intrusion Response System for Intelligent Vehicles

    Authors: Mohammad Hamad, Andreas Finkenzeller, Michael Kühr, Andrew Roberts, Olaf Maennel, Vassilis Prevelakis, Sebastian Steinhorst

    Abstract: Autonomous and connected vehicles are rapidly evolving, integrating numerous technologies and software. This progress, however, has made them appealing targets for cybersecurity attacks. As the risk of cyber threats escalates with this advancement, the focus is shifting from solely preventing these attacks to also mitigating their impact. Current solutions rely on vehicle security operation center… ▽ More

    Submitted 16 January, 2024; v1 submitted 9 January, 2024; originally announced January 2024.

    Comments: 20 pages

  4. arXiv:2312.00018  [pdf, other

    cs.CR

    Security Challenges in Autonomous Systems Design

    Authors: Mohammad Hamad, Sebastian Steinhorst

    Abstract: Autonomous systems are emerging in many application domains. With the recent advancements in artificial intelligence and machine learning, sensor technology, perception algorithms and robotics, scenarios previously requiring strong human involvement can be handled by autonomous systems. With the independence from human control, cybersecurity of such systems becomes even more critical as no human i… ▽ More

    Submitted 3 December, 2023; v1 submitted 5 November, 2023; originally announced December 2023.

  5. arXiv:2309.09936  [pdf, other

    cs.RO

    A Concise Overview of Safety Aspects in Human-Robot Interaction

    Authors: Mazin Hamad, Simone Nertinger, Robin J. Kirschner, Luis Figueredo, Abdeldjallil Naceri, Sami Haddadin

    Abstract: As of today, robots exhibit impressive agility but also pose potential hazards to humans using/collaborating with them. Consequently, safety is considered the most paramount factor in human-robot interaction (HRI). This paper presents a multi-layered safety architecture, integrating both physical and cognitive aspects for effective HRI. We outline critical requirements for physical safety layers a… ▽ More

    Submitted 18 September, 2023; originally announced September 2023.

    Comments: Accepted for Human-Friendly Robotics 2023: 16th International Workshop

  6. Fast yet predictable braking manoeuvers for real-time robot control

    Authors: Mazin Hamad, Jesus Gutierrez-Moreno, Hugo T. M. Kussaba, Nico Mansfeld, Saeed Abdolshah, Abdalla Swikir, Wolfram Burgard, Sami Haddadin

    Abstract: This paper proposes a framework for generating fast, smooth and predictable braking manoeuvers for a controlled robot. The proposed framework integrates two approaches to obtain feasible modal limits for designing braking trajectories. The first approach is real-time capable but conservative considering the usage of the available feasible actuator control region, resulting in longer braking times.… ▽ More

    Submitted 10 June, 2023; originally announced June 2023.

    Comments: This work has been accepted to the 22nd IFAC World Congress

  7. arXiv:2301.06289  [pdf, other

    cs.IT

    Strong Converses using Typical Changes of Measures and Asymptotic Markov Chains

    Authors: Mustapha Hamad, Michele Wigger, Mireille Sarkiss

    Abstract: The paper presents exponentially-strong converses for source-coding, channel coding, and hypothesis testing problems. More specifically, it presents alternative proofs for the well-known exponentially-strong converse bounds for almost lossless source-coding with side-information and for channel coding over a discrete memoryless channel (DMC). These alternative proofs are solely based on a change o… ▽ More

    Submitted 16 January, 2023; originally announced January 2023.

    Comments: Submitted to IEEE Trans. on IT

  8. arXiv:2211.03475  [pdf, ps, other

    cs.IT

    Testing Against Independence with an Eavesdropper

    Authors: Sara Faour, Mustapha Hamad, Mireille Sarkiss, Michele Wigger

    Abstract: We study a distributed binary hypothesis testing (HT) problem with communication and security constraints, involving three parties: a remote sensor called Alice, a legitimate decision centre called Bob, and an eavesdropper called Eve, all having their own source observations. In this system, Alice conveys a rate R description of her observation to Bob, and Bob performs a binary hypothesis test on… ▽ More

    Submitted 7 November, 2022; originally announced November 2022.

    Comments: submitted to ITW 2023

  9. arXiv:2208.14243  [pdf, other

    cs.IT

    Multi-Hop Network with Multiple Decision Centers under Expected-Rate Constraints

    Authors: Mustapha Hamad, Michèle Wigger, Mireille Sarkiss

    Abstract: We consider a multi-hop distributed hypothesis testing problem with multiple decision centers (DCs) for testing against independence and where the observations obey some Markov chain. For this system, we characterize the fundamental type-II error exponents region, i.e., the type-II error exponents that the various DCs can achieve simultaneously, under expected rate-constraints. Our results show th… ▽ More

    Submitted 30 August, 2022; originally announced August 2022.

    Comments: Submitted to IEEE Transactions on Information Theory

  10. arXiv:2205.08910  [pdf, other

    cs.IT

    Strong Converses using Change of Measure and Asymptotic Markov Chains

    Authors: Mustapha Hamad, Michèle Wigger, Mireille Sarkiss

    Abstract: The main contribution of this paper is a strong converse result for $K$-hop distributed hypothesis testing against independence with multiple (intermediate) decision centers under a Markov condition. Our result shows that the set of type-II error exponents that can simultaneously be achieved at all the terminals does not depend on the maximum permissible type-I error probabilities. Our strong conv… ▽ More

    Submitted 18 May, 2022; originally announced May 2022.

  11. arXiv:2202.02282  [pdf, other

    cs.IT

    Benefits of Rate-Sharing for Distributed Hypothesis Testing

    Authors: Mustapha Hamad, Mireille Sarkiss, Michèle Wigger

    Abstract: We study distributed binary hypothesis testing with a single sensor and two remote decision centers that are also equipped with local sensors. The communication between the sensor and the two decision centers takes place over three links: a shared link to both centers and an individual link to each of the two centers. All communication links are subject to expected rate constraints. This paper cha… ▽ More

    Submitted 4 February, 2022; originally announced February 2022.

    Comments: arXiv admin note: text overlap with arXiv:2106.12299

  12. arXiv:2106.12299  [pdf, other

    cs.IT

    Optimal Exponents In Cascaded Hypothesis Testing under Expected Rate Constraints

    Authors: Mustapha Hamad, Michèle Wigger, Mireille Sarkiss

    Abstract: Cascaded binary hypothesis testing is studied in this paper with two decision centers at the relay and the receiver. All terminals have their own observations, where we assume that the observations at the transmitter, the relay, and the receiver form a Markov chain in this order. The communication occurs over two hops, from the transmitter to the relay and from the relay to the receiver. Expected… ▽ More

    Submitted 23 June, 2021; originally announced June 2021.

    Comments: arXiv admin note: substantial text overlap with arXiv:2105.05917

  13. arXiv:2105.05917  [pdf, other

    cs.IT

    Two-Hop Network with Multiple Decision Centers under Expected-Rate Constraints

    Authors: Mustapha Hamad, Michèle Wigger, Mireille Sarkiss

    Abstract: The paper studies distributed binary hypothesis testing over a two-hop relay network where both the relay and the receiver decide on the hypothesis. Both communication links are subject to expected rate constraints, which differs from the classical assumption of maximum rate constraints. We exactly characterize the set of type-II error exponent pairs at the relay and the receiver when both type-I… ▽ More

    Submitted 26 May, 2021; v1 submitted 12 May, 2021; originally announced May 2021.

  14. arXiv:2101.06137  [pdf, ps, other

    cs.CR

    Quantitative System-Level Security Verification of the IoV Infrastructure

    Authors: Jan Lauinger, Mudassar Aslam, Mohammad Hamad, Shahid Raza, Sebastian Steinhorst

    Abstract: The Internet of Vehicles (IoV) equips vehicles with connectivity to the Internet and the Internet of Things (IoT) to support modern applications such as autonomous driving. However, the consolidation of complex computing domains of vehicles, the Internet, and the IoT limits the applicability of tailored security solutions. In this paper, we propose a new methodology to quantitatively verify the se… ▽ More

    Submitted 15 January, 2021; originally announced January 2021.

  15. arXiv:2010.09616  [pdf, other

    cs.IT

    Cooperative Multi-Sensor Detection under Variable-Length Coding

    Authors: Mustapha Hamad, Michèle Wigger, Mireille Sarkiss

    Abstract: We investigate the testing-against-independence problem \mw{over a cooperative MAC} with two sensors and a single detector under an average rate constraint on the sensors-detector links. For this setup, we design a variable-length coding scheme that maximizes the achievable type-II error exponent when the type-I error probability is limited to $ε$. Similarly to the single-link result, we show here… ▽ More

    Submitted 19 October, 2020; originally announced October 2020.

  16. Towards Robotic Eye Surgery: Marker-free, Online Hand-eye Calibration using Optical Coherence Tomography Images

    Authors: Mingchuan Zhou, Mahdi Hamad, Jakob Weiss, Abouzar Eslami, Kai Huang, Mathias Maier, Chris P. Lohmann, Nassir Navab, Alois Knoll, M. Ali Nasseri

    Abstract: Ophthalmic microsurgery is known to be a challenging operation, which requires very precise and dexterous manipulation. Image guided robot-assisted surgery (RAS) is a promising solution that brings significant improvements in outcomes and reduces the physical limitations of human surgeons. However, this technology must be further developed before it can be routinely used in clinics. One of the pro… ▽ More

    Submitted 17 August, 2018; originally announced August 2018.

    Comments: *The first two authors contributed equally to this paper. Accepted by IEEE Robotics and Automation Letters (RA-L), 2018