Amr Alanwar

ORCID: 0000-0003-2941-519X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Fault Detection and Control Systems
  • Advanced Control Systems Optimization
  • Target Tracking and Data Fusion in Sensor Networks
  • Control Systems and Identification
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • Formal Methods in Verification
  • Cryptographic Implementations and Security
  • Autonomous Vehicle Technology and Safety
  • Indoor and Outdoor Localization Technologies
  • Integrated Circuits and Semiconductor Failure Analysis
  • Network Time Synchronization Technologies
  • Security in Wireless Sensor Networks
  • Distributed Sensor Networks and Detection Algorithms
  • Neuroscience and Neural Engineering
  • Semantic Web and Ontologies
  • Human-Automation Interaction and Safety
  • Embedded Systems Design Techniques
  • Bayesian Modeling and Causal Inference
  • Logic, Reasoning, and Knowledge
  • Smart Grid Security and Resilience
  • Chaos-based Image/Signal Encryption
  • Underwater Vehicles and Communication Systems
  • Security and Verification in Computing

Constructor University
2022-2024

KTH Royal Institute of Technology
2020-2024

Technical University of Munich
2017-2024

University of California, Los Angeles
2015-2018

University of California System
2017

Ain Shams University
2013-2016

We consider a problem where multiple agents participate in solving quadratic optimization subject to linear inequality constraints privacy-preserving manner. Several variables of the objective function as well are privacy-sensitive and known different agents. propose protocol based on partially homomorphic encryption each agent encrypts its own information before sending it an untrusted cloud computing infrastructure. To find optimal solution applies gradient descent algorithm encrypted data...

10.1109/cdc.2016.7799042 article EN 2016-12-01

We consider the problem of computing reachable sets directly from noisy data without a given system model. Several reachability algorithms are presented for different types systems generating data. First, an algorithm over-approximated based on matrix zonotopes is proposed linear systems. Constrained introduced to provide less conservative at cost increased computational expenses and utilized incorporate prior knowledge about unknown Then we extend approach polynomial and, under assumption...

10.1109/tac.2023.3257167 article EN cc-by-nc-nd IEEE Transactions on Automatic Control 2023-03-14

Cloud computing services provide a scalable solution for the storage and processing of images multimedia files. However, concerns about privacy risks prevent users from sharing their personal with third-party services. In this paper, we describe design implementation CryptoImg, library modular preserving image operations over encrypted images. By using homomorphic encryption, CryptoImg allows to delegate remote servers without any concerns. Currently, supports subset most frequently used...

10.1109/cns.2016.7860550 article EN 2016-10-01

We propose two distributed set-based observers using strip-based and set-propagation approaches for linear discrete-time dynamical systems with bounded modeling measurement uncertainties. Both algorithms utilize a diffusion step, which decreases the estimation errors size of estimated sets, can be seen as lightweight approach to achieve partial consensus between sets. Every node shares its neighbor in update step. In neighbors intersect their sets our novel zonotope intersection technique. A...

10.1016/j.jfranklin.2023.03.025 article EN cc-by Journal of the Franklin Institute 2023-04-23

This paper addresses a fundamental challenge in data-driven reachability analysis: accurately representing and propagating non-convex reachable sets. We propose novel approach using constrained polynomial zonotopes to describe sets for unknown LTI systems. Unlike commonly used existing literature, are closed under multiplication with matrix zonotopes. leverage this property develop an exact method that preserves the geometry of without resorting approximations. demonstrate our provides...

10.48550/arxiv.2504.02147 preprint EN arXiv (Cornell University) 2025-04-02

Aided by advances in sensors and algorithms, systems for localizing tracking target objects or events have become ubiquitous recent years. Most of these operate on the principle fusing measurements distance and/or direction to made a set spatially distributed observers using that measure signals such as RF, acoustic, optical. The computation target's location is done multilateration multiangulation typically running at an aggregation node that, addition distance/direction measurements, also...

10.1145/3055031.3055080 article EN 2017-04-12

Reinforcement learning (RL) is capable of sophisticated motion planning and control for robots in uncertain environments. However, state-of-the-art deep RL approaches typically lack safety guarantees, especially when the robot environment models are unknown. To justify widespread deployment, must respect constraints without sacrificing performance. Thus, we propose a Black-box Reachability-based Safety Layer (BRSL) with three main components: (1) data-driven reachability analysis black-box...

10.1109/lra.2022.3192205 article EN IEEE Robotics and Automation Letters 2022-07-19

We propose a method to perform set-based state estimation of an unknown dynamical linear system using data-driven set propagation function. Our comes with set-containment guarantees, making it applicable safety-critical systems. The consists two phases: (1) offline learning phase where we collect noisy input-output data determine function propagate the state-set ahead in time; and (2) online consisting time update measurement update. It is assumed that known finite sets bound noise...

10.23919/ecc55457.2022.9838494 article EN 2022 European Control Conference (ECC) 2022-07-12

Although different interaction modalities have been proposed in the field of human-computer interface (HCI), only a few these techniques could reach end users because scalability and usability issues. Given popularity growing number IoT devices, selecting one out many devices becomes hurdle typical smarthome environment. Therefore, an easy-to-learn, scalable, non-intrusive modality has to be explored. In this paper, we propose pointing approach interact with as is arguably natural way for...

10.1145/3054977.3054981 article EN 2017-04-17

Nowadays, hardware Trojan protection became a hot topic especially after the horizontal silicon industry business model. Third party IPs are building blocks of many critical systems and that arises question confidentiality reliability these blocks. In this work, we present novel methods for system detection alleviate need golden chip. addition, introduce scenario to dynamically remove infected embedded on FPGAs. We propose multiplexing reconfigurable IPs' outputs CRC schema detect Hardware...

10.1109/pacrim.2013.6625470 article EN 2013-08-01

The tight coupling of information technology with physical sensing and actuation in cyber-physical systems (CPS) has given rise to new security vulnerabilities attacks potentially life-threatening consequences. These are designed transfer the system into unstable insecure states by providing corrupted sensor readings. In this work, we present an approach for distributed secure linear state estimation presence modeling measurement noise between a network nodes pairwise measurements. We...

10.1109/cdc40024.2019.9029929 article EN 2019-12-01

Hardware Trojan detection is a very important topic especially as parts of critical systems which are designed and/or manufactured by untrusted third parties. Most the current research concentrates on detecting Trojans at testing phase comparing suspected circuit to golden (trusted) one. However, these attempts do not work in case party IPs, black boxes with no IPs trust. In this work, we present novel methods for system protection that alleviate need chip. Protection against injected done...

10.1109/dsd.2013.133 article EN 2013-09-01

Voice controlled interactive smart speakers, such as Google Home, Amazon Echo, and Apple HomePod are becoming commonplace in today's homes. These devices listen continually for the user commands, that triggered by special keywords, "Alexa" "Hey Siri". Recent research has shown these vulnerable to attacks through malicious voice commands from nearby devices. The can be sent easily during unoccupied periods, so may unaware of attacks. We present EchoSafe, a user-friendly sonar-based defense...

10.1145/3137003.3137014 article EN 2017-11-05

One of the main challenges in developing autonomous transport systems based on connected and automated vehicles is comprehension understanding environment around each vehicle. In many situations, limited to information gathered by sensors mounted ego-vehicle, it might be severely affected occlusion caused other or fixed obstacles along road. Situational awareness ability perceive comprehend a traffic situation predict intent road users surrounding ego-vehicle. The objective this paper...

10.1109/iv48863.2021.9575828 article EN 2022 IEEE Intelligent Vehicles Symposium (IV) 2021-07-11

This demo abstract presents PrOLoc, a localization system that combines partially homomorphic encryption with new way of structuring the problem to enable efficient and accurate computation target's location while preserving privacy observers.

10.1145/3055031.3055033 article EN 2017-04-12

In this paper, we propose a data-driven reachability analysis approach for unknown system dynamics. Reachability is an essential tool guaranteeing safety properties. However, most current heavily relies on the existence of suitable model, which often not directly available in practice. We instead from noisy data. More specifically, first provide algorithm over-approximating reachable set linear time-invariant using matrix zonotopes. Then introduce extension Lipschitz nonlinear systems....

10.48550/arxiv.2011.08472 preprint EN other-oa arXiv (Cornell University) 2020-01-01

Hardware spyware detection is a very critical topic, especially as untrusted third parties contribute in designing and/or manufacturing. Comparing suspected design with golden one the most common way to detect hardware Trojans. But, this methodology cannot be used party IPs, we have no IP compare with. In work, present novel technique for system protection that alleviates need chip. We aim decrease ability of leaking sensitive information by infected IPs. use IPs output multiplexing and...

10.1109/siecpc.2013.6550785 article EN Saudi International Electronics, Communications and Photonics Conference 2013-04-01

Through the last decade, we have witnessed a surge of Internet Things (IoT) devices, and with that greater need to choreograph their actions across both time space. Although these two problems, namely synchronization localization, share many aspects in common, they are traditionally treated separately or combined on centralized approaches results an ineffcient use resources, solutions not scalable terms number IoT devices. Therefore, propose D-SLATS, framework comprised three different...

10.1145/3084041.3084049 preprint EN 2017-07-10

We consider the spatial localization of nodes in a network, based on measurements their relative position with respect to neighbors. These include nodes' positions global coordinate system, distances, or pseudo ranges. show that maximum likelihood estimator associated these problems can be viewed as constrained optimization problem specific structure and provide distributed algorithm solve it. Under appropriate assumptions, it is shown estimates are locally asymptotically stable equilibrium...

10.1109/cdc.2017.8264154 article EN 2017-12-01

Electronic voting (e-voting) systems have been inuse since the 1960s. E-voting offers many advantages compared to other techniques. However, it also introduces security challenges. As may contain malicious back-doors that can affect system dependability. In this work, we present one of e-voting challenges where hardware Trojan tampers results totally. We implement an machine as a case study on XilinxFPGA board. Then, inject tamper results. The attack depends mainly unused bits. provide...

10.1109/waina.2014.53 article EN 2014-05-01

The Beaglebone Black single-board computer is well-suited for real-time embedded applications because its system-on-a-chip contains two "Programmable Real-time Units" (PRUs): 200-MHz microcontrollers that run concurrently with the main 1-GHz CPU runs Linux. This paper introduces "Cyclops": a web-browser-based IDE facilitates development of on Black's PRU. Users write PRU code in simple JavaScript-inspired language, which Cyclops converts to assembly and deploys automatically configures...

10.1109/ispcs.2017.8056744 article EN 2017-08-01
Coming Soon ...