Kevin Heaslip

According to our database1, Kevin Heaslip authored at least 14 papers between 2013 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
Semi-Supervised Deep Learning Approach for Transportation Mode Identification Using GPS Trajectory Data.
IEEE Trans. Knowl. Data Eng., 2020

2019
Facilitating Emergency Response Vehicles' Movement Through a Road Segment in a Connected Vehicle Environment.
IEEE Trans. Intell. Transp. Syst., 2019

Developing a Twitter-based traffic event detection model using deep learning architectures.
Expert Syst. Appl., 2019

Survey on Vehicular Ad Hoc Networks and Its Access Technologies Security Vulnerabilities and Countermeasures.
CoRR, 2019

2018
Analysis of Friendly Jamming for Secure Location Verification of Vehicles for Intelligent Highways.
IEEE Trans. Veh. Technol., 2018

Twitter-based traffic information system based on vector representations for words.
CoRR, 2018

Vehicle Security: Risk Assessment in Transportation.
CoRR, 2018

Inferring transportation modes from GPS trajectories using a convolutional neural network.
CoRR, 2018

Transport-domain applications of widely used data sources in the smart transportation: A survey.
CoRR, 2018

2016
Optimizing Departures of Automated Vehicles From Highways While Maintaining Mainline Capacity.
IEEE Trans. Intell. Transp. Syst., 2016

2015
Minimizing the Disruption of Traffic Flow of Automated Vehicles During Lane Changes.
IEEE Trans. Intell. Transp. Syst., 2015

2014
Friendly Jamming for Secure Localization in Vehicular Transportation.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

POSTER: Analysis and Comparison of Secure Localization Schemes for Intelligent Transportation Systems.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
CPS: an efficiency-motivated attack against autonomous vehicular transportation.
Proceedings of the Annual Computer Security Applications Conference, 2013


  Loading...