Road Safety
Road Safety
ABSTRACT With the increasing reliance on technology in traffic management systems, ensuring road
safety and protecting the integrity of these systems against cyber threats have become critical concerns.
This research paper investigates the potential of reinforcement learning techniques in enhancing both road
safety and cyber security of traffic management systems. The paper explores the theoretical foundations
of reinforcement learning, discusses its applications in traffic management, and presents case studies and
empirical evidence demonstrating its effectiveness in improving road safety and mitigating cyber security
risks. The findings indicate that reinforcement learning can contribute to the development of intelligent and
secure traffic management systems, thus minimizing accidents and protecting against cyber-attacks.
INDEX TERMS Cyber security, traffic management systems, reinforcement learning, road safety.
algorithm, generating a sequence of actions that entices the in flow monitoring tasks, achieving load balancing and
agent to follow. Experimental results on agents trained with per-flow monitoring. It utilizes memory-efficient two-stage
DQN and A3C algorithms in Atari games demonstrate the Bloom filters to represent monitoring rules, ensuring sys-
efficacy of the strategically timed attack, achieving simi- tem scalability. The centralized SDN control is employed
lar reductions in reward as the uniform attack with fewer for installing, updating, and reconstructing the filters in the
attacks. The enchanting attack successfully lures the agent switch data plane. Experimental evaluation demonstrates that
towards the designated target states with a success rate DCM achieves high measurement accuracy compared to
exceeding 70%. existing solutions with the same memory budget.
Zhang et al. [5] address the vulnerability of deep reinforce- Zulqarnain et al. [12] focused on active traffic management
ment learning (DRL) agents to natural measurement errors (ATM) systems and their vulnerability to cyberattacks, espe-
and adversarial noises in their observations. They highlight cially with the integration of Internet of Things (IoT) devices.
that these deviations from true states can lead to suboptimal A prototype ATM system and real-time cyberattack monitor-
actions by the agent. While conventional techniques aimed at ing system were developed and evaluated on a section of I-66
bolstering resilience in classification tasks prove ineffective in Northern Virginia. The evaluation demonstrated that the
for Deep Reinforcement Learning (DRL), the authors present ATM system improved vehicle speed, but when subjected to
the concept of a state-adversarial Markov decision process cyberattacks, its effectiveness was negated. The monitoring
(SA-MDP) to probe this issue. They introduce a theoreti- system helped mitigate the impact of cyberattacks, highlight-
cally grounded approach for policy regularization that can be ing the need for revisiting ATM system design for enhanced
applied to various DRL algorithms, such as deep determin- cybersecurity.
istic policy gradient (DDPG), proximal policy optimization
(PPO), and deep Q networks (DQN), suitable for both dis-
crete and continuous action control scenarios. This proposed
technique notably enhances the resilience of DDPG, PPO,
and DQN agents against potent white box adversarial attacks,
encompassing novel attacks introduced within the study.
Additionally, the authors note that the adoption of a robust
policy tangibly enhances the overall performance of DRL
agents across diverse environments.
Artificial Intelligence (AI) and Machine Learning (ML)
algorithms play a crucial role in enhancing road safety
management systems. The Smart Road Traffic Management
System (SRTMS) leverages AI to detect unsafe driving
patterns and promptly inform the authorities. Real-time mon-
itoring of human activities is facilitated through the Internet
of Things (IoT), utilizing sensor equipped IoT devices.
Blockchain (BC) technology automates secure and decen-
tralized information sharing between IoT nodes, while AI
enables intelligent decision-making capabilities, resembling
human cognition. Together, these technologies form a pow-
erful framework for efficient and intelligent road traffic
management [8]. Sheikh et al. [9] provides a comprehensive
overview of Vehicular Ad Hoc Networks (VANETs), cov-
ering their architecture, security, challenges, authentication
schemes, mobility simulation, and safety applications, incor-
porating the latest trends in the field.
Putra et al. [10] describe that the internet network plays a
crucial role in all aspects of modern society, and the concept
of a smart city internet system is vital for addressing urban
challenges. With proper precautionary methods and intelli-
gent monitoring through IoT technologies, such as motion
sensors, ultrasonic sensors, PIR sensors, and speed sensors,
cities can achieve orderly traffic systems, efficient transporta-
tion, and improved safety measures. Yu et al. [11] presents
DCM, a Distributed and Collaborative Monitoring system
for network traffic. DCM enables switches to collaborate
E. DEEP REINFORCEMENT LEARNING continuous learning and adaptation, adaptive signal timing
Deep reinforcement learning combines reinforcement learn- systems can effectively respond to changing traffic patterns,
ing algorithms with deep neural networks. Deep neural reduce congestion, and enhance traffic efficiency.
networks, often referred to as deep Q-networks (DQNs), are
used to approximate the Q-values in high-dimensional state 3) TRAFFIC CONGESTION MANAGEMENT
and action spaces. Deep reinforcement learning enables the Reinforcement learning techniques can be utilized to address
agent to learn directly from raw sensory input, such as images the challenges of traffic congestion management. Congestion
or sensor data, without explicitly engineering features. It has arises from various factors, such as road incidents, bot-
shown significant success in domains with complex and high- tlenecks, and unpredictable traffic patterns. Reinforcement
dimensional environments, such as playing video games and learning algorithms can learn effective control policies to
controlling robotic systems. mitigate congestion by optimizing traffic flow and rerouting
Deep reinforcement learning algorithms, such as Deep Q- strategies. By considering factors such as traffic volume,
Networks (DQN), Proximal Policy Optimization (PPO), and historical congestion patterns, and incident detection, rein-
Advantage Actor-Critic (A2C), utilize neural networks as forcement learning agents can make decisions that help
function approximators to estimate Q-values or policy func- alleviate congestion hotspots and distribute traffic more
tions. These algorithms use techniques such as experience evenly across the road network. This can result in reduced
replay, target networks, and exploration strategies to stabilize travel times, enhanced mobility, and improved overall traffic
the learning process and improve sample efficiency. By uti- conditions.
lizing the theoretical foundations of reinforcement learning,
including Markov Decision Processes, Q-learning, policy
4) INCIDENT DETECTION AND RESPONSE
iteration, and deep reinforcement learning, researchers and
Reinforcement learning can contribute to incident detection
practitioners can develop intelligent agents that learn opti-
and response systems in traffic management. Timely detec-
mal policies in complex and dynamic environments. These
tion and efficient response to incidents, such as accidents,
foundations provide the basis for understanding and applying
breakdowns, or road hazards, are crucial for minimizing
reinforcement learning techniques to enhance road safety and
the impact on traffic flow and ensuring road safety. Rein-
cyber security in traffic management systems.
forcement learning algorithms can learn to analyze real-time
sensor data, including traffic cameras, vehicle trajectories,
F. APPLICATIONS OF REINFORCEMENT LEARNING IN and environmental sensors, to identify abnormal patterns or
TRAFFIC MANAGEMENT events indicative of incidents. Once an incident is detected,
1) INTELLIGENT TRAFFIC CONTROL SYSTEMS the system can use reinforcement learning to determine
Reinforcement learning can be applied to develop intelli- optimal response actions, such as rerouting traffic, dispatch-
gent traffic control systems that optimize traffic flow and ing emergency services, or implementing traffic diversions.
reduce congestion. Traditional traffic control systems often By integrating reinforcement learning into incident manage-
rely on fixed timing plans or pre-defined algorithms, which ment systems, the response time can be reduced, and the
may not adapt well to changing traffic patterns. Reinforce- overall impact on traffic flow can be mitigated.
ment learning enables traffic control systems to learn from By leveraging reinforcement learning techniques in these
real-time data and make adaptive decisions to improve traffic applications, traffic management systems can become more
efficiency. By modelling the traffic network as an MDP, the intelligent, adaptive, and efficient. These approaches have
reinforcement learning agent can learn optimal control poli- the potential to significantly improve road safety, reduce
cies that dynamically adjust signal timings at intersections congestion, and enhance the overall performance of trans-
based on current traffic conditions, such as traffic volume, portation networks. However, the successful deployment of
congestion levels, and pedestrian demand. This approach can these applications requires careful consideration of real-
significantly reduce delays, improve travel time, and enhance world constraints, system scalability, and coordination with
overall traffic flow. other components of the traffic management ecosystem.
techniques, DAS can learn optimal driving policies by ana- Algorithm 1 Define a function that takes input data as input.
lyzing real-time data and feedback from the environment. For Within the function:
example, reinforcement learning can be used to train DAS Store the pre-processed data in a variable.
to detect and respond to potential collision risks, maintain Return the pre-processed data.
safe distances from other vehicles, and navigate complex traf-
fic scenarios. Through continuous learning and adaptation, Define a function to extract features that takes pre-processed
intelligent DAS can assist drivers in avoiding accidents and data as input.
mitigating risks on the road.
Within the extract features function:
Extract pre-processed data and its features.
2) IMPROVING TRAFFIC FLOW AND REDUCING ACCIDENTS
Store the extracted features.
THROUGH OPTIMAL CONTROL POLICIES
Return features.
Reinforcement learning can be utilized to improve traffic Define a function to apply Detection Algorithm that takes
flow and reduce accidents by developing optimal control features as input.
policies for traffic management systems. By modelling traffic
as an MDP, reinforcement learning agents can learn control Within the function:
strategies that minimize congestion and improve overall traf- Apply the Reinforcement Learning detection algorithm to
fic conditions. These agents can make real-time decisions identify adversarial or malicious content based on features.
regarding traffic signal timings, lane management, and speed Store the detection result.
limits to optimize traffic flow and minimize the likelihood Return the detection result.
of accidents. For instance, reinforcement learning can be Define a function to detect Adversarial Content that takes
employed to determine the most effective signal phasing input Data as input.
and timing plans at intersections, considering factors such Within the function:
as traffic volume, pedestrian activity, and historical traffic Call the pre-process function with input Data as input and
patterns. By continuously learning and adapting to changing store the pre-processed data that will be generated.
traffic conditions, reinforcement learning-based control poli- Call the extract Features function with pre-processed Data
cies can lead to smoother traffic flow and reduced accident as input and store the result as features.
rates. Call the apply Detection Algorithm function with features as
input and store the result.
3) REAL-TIME DECISION-MAKING FOR SAFE AND EFFICIENT Return the stored result.
LANE-CHANGING AND MERGING
Reinforcement learning can enable real-time decision-
making for safe and efficient lane-changing and merging B. CYBER SECURITY OF TRAFFIC MANAGEMENT SYSTEMS
maneuvers. These maneuvers often pose challenges and risks, 1) VULNERABILITIES AND THREATS IN TRAFFIC
especially in congested traffic. By training reinforcement MANAGEMENT SYSTEMS
learning agents with rich sensory data, such as vehicle tra- Traffic management systems are vulnerable to various cyber
jectories, sensor readings, and contextual information, they threats that can compromise their security and integrity.
can learn to make informed decisions regarding when and These systems often rely on interconnected components,
how to change lanes or merge into traffic. The agents can including control systems, communication networks, and
consider factors such as vehicle speeds, distances, and safety data processing platforms. Vulnerabilities can arise from
gaps to make decisions that optimize traffic flow and mini- inadequate security measures, poor network segregation, out-
mize collision risks. Through reinforcement learning, these dated software, or weak authentication mechanisms. Threats
decision-making models can improve the efficiency and to traffic management systems can include unauthorized
safety of lane-changing and merging maneuvers, thereby access, denial-of-service attacks, data breaches, tampering
reducing the chances of accidents and enhancing overall road with traffic signals or sensors, and the injection of false
safety. information. Understanding the vulnerabilities and threats is
By leveraging reinforcement learning techniques in these crucial for developing effective cyber security measures.
areas, road safety can be significantly enhanced. The con-
tinuous learning and adaptation capabilities of reinforcement 2) REINFORCEMENT LEARNING FOR INTRUSION
learning allow for the development of intelligent systems that DETECTION AND PREVENTION
adapt to changing road conditions, learn from experience, Reinforcement learning can be utilized for intrusion detection
and make informed decisions to prevent accidents. However, and prevention in traffic management systems. By analysing
the deployment of reinforcement learning-based systems for network traffic data, reinforcement learning algorithms
road safety requires addressing challenges such as real-time can learn patterns and behaviours associated with normal
processing, ensuring system reliability, and integrating with system operation. Deviations from normal behaviour can
existing transportation infrastructure and regulations. be flagged as potential intrusion attempts. Reinforcement
anomalous patterns associated with intrusion attempts or C. INTEGRATION WITH EXISTING TRANSPORTATION
malicious activities. INFRASTRUCTURE AND SYSTEMS
Experimental Results: The experimental results demon- Integrating intelligent traffic management systems with exist-
strated the effectiveness of the reinforcement learning-based ing transportation infrastructure and systems can pose chal-
intrusion detection system in accurately detecting cyber- lenges due to legacy systems, interoperability issues, and
attacks with low false positive rates. Evaluation metrics, such coordination between different stakeholders. It is important to
as detection accuracy, false positive rates, and attack identifi- establish open standards and protocols to facilitate seamless
cation time, were used to assess the system’s performance. integration and interoperability among various components.
Comparative Analysis: A comparative analysis was con- Collaboration and coordination between traffic management
ducted to compare the performance of the reinforcement authorities, transportation agencies, and technology providers
learning-based intrusion detection system with tradi- are crucial to ensure smooth integration and maximize the
tional signature-based detection systems or anomaly-based benefits of intelligent traffic management systems.
methods. The analysis showed that the reinforcement
learning-based approach achieved higher detection rates, D. REGULATORY AND LEGAL CONSIDERATIONS
faster response times, and improved overall cyber security The deployment of intelligent traffic management systems
compared to traditional approaches. raises regulatory and legal considerations. Regulations must
In these case studies, the experimental results and eval- address the operation and responsibility of autonomous
uation metrics were used to quantify the effectiveness and systems, data ownership, liability, and privacy protection.
performance of the reinforcement learning-based approaches Developing appropriate regulations and standards to ensure
for road safety and cyber security. Comparative analysis the safe and responsible use of these systems is neces-
with traditional approaches provided insights into the advan- sary. Collaboration between policymakers, regulatory bodies,
tages and improvements offered by reinforcement learning industry experts, and legal professionals is essential to estab-
techniques. The experimental results and comparative anal- lish a regulatory framework that promotes innovation while
ysis highlighted the potential of reinforcement learning in safeguarding public safety and privacy.
enhancing road safety and cyber security, demonstrating its
superiority over traditional methods in terms of accuracy, E. FUTURE DIRECTIONS
adaptability, and efficiency. 1) MACHINE LEARNING EXPLAINABILITY
VIII. PROPOSED USE CASES
Enhancing transparency and interpretability of reinforcement
learning algorithms is crucial for gaining public trust and
A. ADDRESSING ETHICAL AND PRIVACY CONCERNS IN
regulatory compliance. Research should focus on developing
INTELLIGENT TRAFFIC MANAGEMENT SYSTEMS
explainable reinforcement learning models that provide clear
As intelligent traffic management systems rely on data collec-
rationales for decision-making, making them more under-
tion and analysis, addressing ethical and privacy concerns is
standable and accountable.
paramount. It is essential to establish transparent data collec-
tion and usage policies, ensuring that data is anonymized and
2) MULTI-AGENT SYSTEMS
handled in compliance with privacy regulations. Additionally,
attention should be given to potential biases in data collection Traffic management systems often involve multiple agents,
and algorithmic decision-making to avoid discriminatory out- such as vehicles, pedestrians, and infrastructure components.
comes. Developing robust ethical frameworks and engaging Future research should explore reinforcement learning tech-
stakeholders can help address these concerns and build public niques for multi-agent systems to address complex interac-
trust in intelligent traffic management systems tions, coordination, and cooperation among different entities,
thereby improving overall traffic efficiency and safety.
B. ENSURING RESILIENCE AGAINST SOPHISTICATED
CYBER ATTACKS 3) ADVERSARIAL REINFORCEMENT LEARNING
As traffic management systems become more connected Advancing research on adversarial reinforcement learning
and rely on digital infrastructure, the risk of sophisticated can enhance the resilience of traffic management systems
cyber-attacks increases. It is crucial to implement robust against sophisticated cyber-attacks. Developing intelligent
cybersecurity measures to protect against potential vul- agents that can detect and defend against adversarial attacks
nerabilities. This includes implementing strong encryption, in real-time can significantly improve the security and relia-
intrusion detection systems, and continuous monitoring of bility of traffic management systems.
network traffic. Regular security audits and proactive vulner-
ability assessments can help identify and address potential 4) REAL-TIME DATA FUSION AND SENSOR INTEGRATION
weaknesses. Additionally, promoting a culture of cyberse- Integrating data from diverse sources, such as connected
curity awareness and training among system administrators vehicles, traffic sensors, and surveillance cameras, can pro-
and personnel is essential to enhance the resilience of traffic vide a comprehensive view of the traffic environment. Future
management systems against cyber threats research should focus on developing reinforcement learning
approaches that effectively fuse and utilize real-time data through reinforcement learning techniques, improving traffic
from multiple sources to improve decision-making in traffic flow and reducing the likelihood of accidents
management systems
Addressing these challenges and advancing research in
these future directions can pave the way for more effective
B. POTENTIAL IMPACT OF REINFORCEMENT LEARNING
and secure intelligent traffic management systems that pri-
The integration of reinforcement learning in traffic manage-
oritize road safety, privacy, and efficiency while complying
ment systems has the potential to revolutionize road safety
with regulations and fostering public trust.
and cyber security. It enables the development of intelligent
systems that adapt to dynamic conditions, learn from real-
IX. CONCLUSION time data, and make informed decisions to prevent accidents
In this research paper, we have explored the potential of and mitigate cyber threats. Reinforcement learning tech-
reinforcement learning in enhancing road safety and cyber niques provide a flexible and adaptive approach, allowing
security in traffic management systems. We discussed the traffic management systems to continuously improve and
theoretical foundations of reinforcement learning, including optimize their performance in real-world scenarios.
concepts such as Markov Decision Processes, Q-learning,
policy iteration, and deep reinforcement learning. We also
examined its applications in traffic management, including
C. RECOMMENDATIONS FOR FUTURE RESEARCH AND
intelligent driver assistance systems, improving traffic flow,
IMPLEMENTATION
and real-time decision-making for safe lane-changing and
1. Ethical and Privacy Considerations: Future research
merging.
should focus on addressing ethical and privacy concerns
To enhance road safety, leveraging reinforcement learning
associated with intelligent traffic management systems. This
(RL) within traffic management systems proves instrumental.
includes developing transparent data collection and usage
Traditional approaches, such as regulations and infrastructure
policies, ensuring fairness and non-discrimination, and pro-
improvements, have limitations in addressing the complex-
tecting user privacy while maximizing the benefits of data-
ities of modern traffic environments. RL offers a dynamic
driven approaches.
solution by enabling the development of intelligent driver
2. Resilience against Cyber Attacks: Further research is
assistance systems. These systems analyze traffic patterns,
needed to enhance the resilience of traffic management sys-
identify risky situations, and make proactive decisions to pre-
tems against sophisticated cyber-attacks. This includes the
vent accidents. By learning from data, RL-based systems can
development of robust intrusion detection and prevention sys-
adapt to dynamic conditions, effectively reducing accident
tems, as well as the application of adversarial reinforcement
occurrences.
learning techniques to anticipate and defend against evolving
Furthermore, in adaptive traffic control, RL algorithms
cyber threats.
optimize signal timings, minimizing congestion and improv-
3. Integration with Existing Infrastructure: Future research
ing overall traffic flow efficiency compared to fixed-timing
should explore methods for seamless integration of intelli-
plans. Real-time decision-making facilitated by RL tech-
gent traffic management systems with existing transportation
niques enhances safe lane-changing and merging maneuvers,
infrastructure and systems. This involves considering interop-
contributing to improved traffic flow and decreased accident
erability, standardization, and coordination among different
likelihood. Integrating RL into traffic management systems
stakeholders to ensure the compatibility and effectiveness of
not only addresses challenges in road safety but also estab-
these systems.
lishes more intelligent, adaptive, and secure systems. These
4. Regulatory and Legal Frameworks: The implementation
findings underscore the transformative potential of reinforce-
of intelligent traffic management systems requires the estab-
ment learning in creating safer and more efficient road
lishment of appropriate regulatory and legal frameworks.
networks.
Research should focus on developing guidelines and stan-
dards to ensure the safe and responsible deployment of these
A. KEY FINDINGS systems, addressing liability, privacy, and security concerns.
1. Reinforcement learning-based intelligent driver assistance In conclusion, reinforcement learning offers immense
systems can significantly improve road safety by detecting potential for enhancing road safety and cyber security in
potential collision risks, assisting in safe decision-making, traffic management systems. By leveraging its capabilities,
and mitigating accidents. we can develop intelligent systems that adapt, learn, and
2. Adaptive traffic control using reinforcement learning optimize their performance to create safer and more efficient
algorithms can optimize traffic signal timings, reduce con- transportation networks. Future research and implementa-
gestion, and enhance overall traffic flow efficiency compared tion efforts should address ethical concerns, strengthen cyber
to traditional fixed-timing plans. security, integrate with existing infrastructure, and establish
3. Real-time decision-making for safe and efficient regulatory frameworks to realize the full potential of rein-
lane-changing and merging maneuvers can be achieved forcement learning in traffic management.
REFERENCES
[1] A. A. Ouallane, A. Bahnasse, A. Bakali, and M. Talea, ‘‘Overview of road
traffic management solutions based on IoT and AI,’’ Proc. Comput. Sci.,
vol. 198, pp. 518–523, Jan. 2022.
[2] M. Botvinick, S. Ritter, J. X. Wang, Z. Kurth-Nelson, C. Blundell, and
D. Hassabis, ‘‘Reinforcement learning, fast and slow,’’ Trends Cognit. Sci.,
vol. 23, no. 5, pp. 408–422, May 2019.
ARAN AGARWAL is currently pursuing the
[3] A. Pattanaik, Z. Tang, S. Liu, G. Bommannan, and G. Chowdhary,
‘‘Robust deep reinforcement learning with adversarial attacks,’’ 2017, [Link]. degree in computer science engineering
arXiv:1712.03632. with the Vellore Institute of Technology, Chennai,
[4] T. Chen, J. Liu, Y. Xiang, W. Niu, E. Tong, and Z. Han, ‘‘Adversarial India. His research interests include data analytics
attack and defense in reinforcement learning-from AI security view,’’ and deep learning and its applications.
Cybersecurity, vol. 2, no. 1, pp. 1–22, Dec. 2019.
[5] H. Zhang, H. Chen, C. Xiao, B. Li, M. Liu, D. Boning, and C. J. Hsieh,
‘‘Robust deep reinforcement learning against adversarial perturbations on
state observations,’’ in Proc. Adv. Neural Inf. Process. Syst., vol. 33, 2020,
pp. 21024–21037.
[6] Q. A. Chen, Y. Yin, Y. Feng, Z. M. Mao, and H. X. Liu, ‘‘Exposing con-
gestion attack on emerging connected vehicle based traffic signal control,’’
in Proc. Netw. Distrib. Syst. Secur. Symp., 2018, pp. 1–15.
[7] Y.-C. Lin, Z.-W. Hong, Y.-H. Liao, M.-L. Shih, M.-Y. Liu, and M. Sun,
‘‘Tactics of adversarial attack on deep reinforcement learning agents,’’ SHRUTI MISHRA received the Ph.D. degree in
2017, arXiv:1703.06748.
computer science and engineering from Siksha ‘O’
[8] A. Sharma, Y. Awasthi, and S. Kumar, ‘‘The role of blockchain, AI and IoT
Anusandhan University, Bhubaneswar, Odisha,
for smart road traffic management system,’’ in Proc. IEEE India Council
Int. Subsections Conf. (INDISCON), Oct. 2020, pp. 289–296.
India. She has been an Associate Professor with
[9] M. S. Sheikh and J. Liang, ‘‘A comprehensive survey on VANET security the Department of Computer Science and Engi-
services in traffic management system,’’ Wireless Commun. Mobile Com- neering, Vignana Bharathi Institute of Technology,
put., vol. 2019, pp. 1–23, Sep. 2019. Hyderabad. She is currently an Assistant Profes-
[10] A. S. Putra and H. L. H. S. Warnars, ‘‘Intelligent traffic monitoring system sor (Senior) with the Centre of Advanced Data
(ITMS) for smart city based on IoT monitoring,’’ in Proc. Indonesian Science, Vellore Institute of Technology, Chennai.
Assoc. Pattern Recognit. Int. Conf. (INAPR), Sep. 2018, pp. 161–165. She has more than 30 articles in both national and
[11] Y. Yu, C. Qian, and X. Li, ‘‘Distributed and collaborative traffic monitoring international to her credit along with three books. She has guided more than
in software defined networks,’’ in Proc. 3rd workshop Hot Topics Softw. 40 postgraduate and undergraduate students. She has served as a reviewer for
Defined Netw., Aug. 2014, pp. 85–90. many reputed journals and conferences. She is a guest editor of many reputed
[12] Z. H. Khattak, H. Park, S. Hong, R. A. Boateng, and B. L. Smith, ‘‘Investi- publishers, such as Elsevier.
gating cybersecurity issues in active traffic management systems,’’ Transp.
Res. Rec., J. Transp. Res. Board, vol. 2672, no. 19, pp. 79–90, Dec. 2018.
[13] S. Huang, N. Papernot, I. Goodfellow, Y. Duan, and P. Abbeel, ‘‘Adversar-
ial attacks on neural network policies,’’ 2017, arXiv:1702.0228.
[14] K. Eykholt, I. Evtimov, E. Fernandes, B. Li, A. Rahmati, C. Xiao,
A. Prakash, T. Kohno, and D. Song, ‘‘Robust physical-world attacks on SANDEEP KUMAR SATAPATHY received the
deep learning visual classification,’’ in Proc. IEEE/CVF Conf. Comput. Vis. Ph.D. degree in data mining and machine learning.
Pattern Recognit., Jun. 2018, pp. 1625–1634. His Ph.D. thesis include a detailed classification
[15] R. S. Sutton and A. G. Barto, Reinforcement Learning: An Introduction. of brain EEG signals using machine learning tech-
Cambridge, MA, USA: MIT Press, 2018.
niques. He was an Associate Professor with the
Department of Computer Science and Engineering
and the Head of the Department of Information
Technology, Vignana Bharathi Institute of Tech-
nology, Hyderabad. He worked as an Associate
Professor at Centre for Advanced Data Science,
VIT University, Chennai. He is currently a Post-Doctoral Fellow with Yonsei
University, Seoul, South Korea. He is highly engrossed into the areas of deep
learning, image processing, and machine learning. He has many research
ISHITA AGARWAL is currently pursuing the publications to his credit, such as more than 40 research articles, three books,
[Link]. degree in computer science engineering and many book chapters in various peer-reviewed journals. He has guided
with the Vellore Institute of Technology, Chennai, more than 15 master’s thesis. He has also authored two books, such as
India. Her research interests include data analytics, Frequent Pattern Discovery from Gene Expression Data: An Experimental
cloud computing, and machine learning and its Approach (Elsevier) and EEG Brain Signal Classification for Epileptic
applications. Seizure Disorder Detection (Elsevier). He has been a member of various
academic committees within the institution. He is a member of many profes-
sional organizations and society. He has been an active reviewer of various
peer-reviewed journals and prestigious conferences. He has also reviewed
many research articles and books in Elsevier for possible publication.
SUNG-BAE CHO (Senior Member, IEEE) SACHI NANDAN MOHANTY (Senior Member,
received the B.S. degree in computer science IEEE) received the first Ph.D. degree from IIT
from Yonsei University, Seoul, South Korea, and Kharagpur, India, in 2015, and the second Ph.D.
the M.S. and Ph.D. degrees in computer science degree from IIT Kanpur, in 2019. He has guided
from the Korea Advanced Institute of Science six Ph.D. scholars. He received the MHRD Schol-
and Technology (KAIST), Daejeon, South Korea. arship from the Government of India, for first
He was an Invited Researcher with the Human Ph.D. study. He has published 60 international
Information Processing Research Laboratories, journals of international repute. He has edited
Advanced Telecommunications Research (ATR) 24 books in association with Springer and Wiley.
Institute, Kyoto, Japan, from 1993 to 1995; and His research interests include data mining, big data
a Visiting Scholar with The University of New South Wales, Canberra, analysis, cognitive science, fuzzy decision making, brain–computer inter-
Australia, in 1998. He was also a Visiting Professor with The University face, cognition, and computational intelligence. He was elected as a fellow
of British Columbia, Vancouver, Canada, from 2005 to 2006; and King of the Institute of Engineers and a Senior Member of the IEEE Computer
Mongkut’s University of Technology, Thonburi, Bangkok, Thailand, in 2013. Society Hyderabad Chapter. He has received three Best Paper Awards during
Since 1995, he has been a Professor with the Department of Computer the Ph.D. degree at IIT Kharagpur from the International Conference in
Science, Yonsei University, and a Underwood Distinguished Professor, since Beijing, China; and the other from the International Conference on Soft Com-
2021. He has published over 230 journal articles and over 680 conference puting Applications organized by IIT Rookee, in 2013. He was a recipient
papers. His research interests include neural networks, pattern recognition, of the Best Thesis Award (First Prize Award) from the Computer Society of
intelligent man–machine interfaces, evolutionary computation, and artificial India, in 2015. He is also a Reviewer of Robotics and Autonomous Systems
life. He was a recipient of the Richard E. Merwin Prize from the IEEE (Elsevier), Computational and Structural Biotechnology Journal (Elsevier),
Computer Society, in 1993. He received several distinguished investigators Artificial Intelligence Review (Springer), and Spatial Information Research
awards from the Korea Information Science Society, in 2005, and the (Springer).
GaheonSindoricoh, in 2017. He was also a recipient of the Service Merit
Medal from the Korean Government, in 2022.