Skip to main content

Showing 1–4 of 4 results for author: Aftabi, N

Searching in archive math. Search in all archives.
.
  1. arXiv:2509.10948  [pdf, ps, other

    cs.RO cs.AI cs.CR eess.SY math.OC

    ViSTR-GP: Online Cyberattack Detection via Vision-to-State Tensor Regression and Gaussian Processes in Automated Robotic Operations

    Authors: Navid Aftabi, Philip Samaha, Jin Ma, Long Cheng, Ramy Harik, Dan Li

    Abstract: Industrial robotic systems are central to automating smart manufacturing operations. Connected and automated factories face growing cybersecurity risks that can potentially cause interruptions and damages to physical operations. Among these attacks, data-integrity attacks often involve sophisticated exploitation of vulnerabilities that enable an attacker to access and manipulate the operational da… ▽ More

    Submitted 13 September, 2025; originally announced September 2025.

  2. arXiv:2412.19395  [pdf, ps, other

    math.OC

    Two-echelon Electric Vehicle Routing Problem in Parcel Delivery: A Literature Review

    Authors: Nima Moradi, Niloufar Mirzavand Boroujeni, Navid Aftabi, Amin Aslani

    Abstract: Multi-echelon parcel delivery systems using electric vehicles (EVs) are crucial for managing urban logistics complexity and promoting sustainability. In multi-echelon systems, particularly within two-stage systems, larger vehicles transport parcels from a central depot to satellite hubs, where smaller EVs pick up the parcels and carry out last-mile deliveries. This system could increase efficiency… ▽ More

    Submitted 24 June, 2025; v1 submitted 26 December, 2024; originally announced December 2024.

  3. arXiv:2402.06697  [pdf, other

    cs.LG cs.AI math.OC

    Feed-Forward Neural Networks as a Mixed-Integer Program

    Authors: Navid Aftabi, Nima Moradi, Fatemeh Mahroo

    Abstract: Deep neural networks (DNNs) are widely studied in various applications. A DNN consists of layers of neurons that compute affine combinations, apply nonlinear operations, and produce corresponding activations. The rectified linear unit (ReLU) is a typical nonlinear operator, outputting the max of its input and zero. In scenarios like max pooling, where multiple input values are involved, a fixed-pa… ▽ More

    Submitted 8 February, 2024; originally announced February 2024.

  4. An Integrated Cyber-Physical Risk Assessment Framework for Worst-Case Attacks in Industrial Control Systems

    Authors: Navid Aftabi, Dan Li, Ph. D., Thomas Sharkey, Ph. D

    Abstract: Industrial Control Systems (ICSs) are widely used in critical infrastructures that face various cyberattacks causing physical damage. With the increasing integration of the ICSs and information technology (IT), ensuring the security of ICSs is of paramount importance. In an ICS, cyberattacks exploit vulnerabilities to compromise sensors and controllers, aiming to cause physical damage. Maliciously… ▽ More

    Submitted 30 January, 2024; v1 submitted 14 April, 2023; originally announced April 2023.