{"id":78,"date":"2024-11-15T12:51:22","date_gmt":"2024-11-15T12:51:22","guid":{"rendered":"https:\/\/www.kios.ucy.ac.cy\/guardai\/?page_id=78"},"modified":"2025-08-19T08:07:22","modified_gmt":"2025-08-19T08:07:22","slug":"use-cases","status":"publish","type":"page","link":"https:\/\/www.kios.ucy.ac.cy\/guardai\/use-cases\/","title":{"rendered":"Use Cases"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"78\" class=\"elementor elementor-78\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d472228 e-flex e-con-boxed e-con e-parent\" data-id=\"d472228\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3a04b6b elementor-widget elementor-widget-spacer\" data-id=\"3a04b6b\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ba1c2c5 e-flex e-con-boxed e-con e-parent\" data-id=\"ba1c2c5\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ca47939 elementor-widget elementor-widget-text-editor\" data-id=\"ca47939\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #000000;\">GuardAI&#8217;s Use Cases (UC) focus on high-risk application use-cases of edge AI Systems that take decisions and inform\/take actions used in<\/span><\/p><ul><li><span style=\"color: #000000;\">Critical infrastructures (e.g., transport), that could put the life and health of citizens at risk<\/span><\/li><li><span style=\"color: #000000;\">Essential private and public services<\/span><\/li><\/ul><p><span style=\"color: #000000;\">Test, and validate the novel tools to be developed in three edge AI Use Cases of broad interest, concerning diverse high-risk domain:<\/span><\/p><ul><li><span style=\"color: #000000;\">Remote monitoring with drones (UC1)<\/span><\/li><li><span style=\"color: #000000;\">5G network edge infrastructure (UC2)<\/span><\/li><li><span style=\"color: #000000;\">Autonomous vehicles (UC3)<\/span><\/li><\/ul><p><span style=\"color: #000000;\">The developed algorithms will be optimized and applied to each Use Case, taking into consideration their appropriateness and relevance, to provide increased capabilities.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9ca40a1 e-flex e-con-boxed e-con e-parent\" data-id=\"9ca40a1\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e369025 e-con-full e-flex e-con e-child\" data-id=\"e369025\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3662106 elementor-widget elementor-widget-image\" data-id=\"3662106\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"209\" src=\"https:\/\/www.kios.ucy.ac.cy\/guardai\/wp-content\/uploads\/2024\/11\/UCoverview-1024x209.png\" class=\"attachment-large size-large wp-image-235\" alt=\"\" srcset=\"https:\/\/www.kios.ucy.ac.cy\/guardai\/wp-content\/uploads\/2024\/11\/UCoverview-1024x209.png 1024w, https:\/\/www.kios.ucy.ac.cy\/guardai\/wp-content\/uploads\/2024\/11\/UCoverview-300x61.png 300w, https:\/\/www.kios.ucy.ac.cy\/guardai\/wp-content\/uploads\/2024\/11\/UCoverview-768x157.png 768w, https:\/\/www.kios.ucy.ac.cy\/guardai\/wp-content\/uploads\/2024\/11\/UCoverview-1536x314.png 1536w, https:\/\/www.kios.ucy.ac.cy\/guardai\/wp-content\/uploads\/2024\/11\/UCoverview.png 1615w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-682602b e-flex e-con-boxed e-con e-parent\" data-id=\"682602b\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-97b5645 elementor-widget elementor-widget-spacer\" data-id=\"97b5645\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-42d89f7 e-n-tabs-mobile elementor-widget elementor-widget-n-tabs\" data-id=\"42d89f7\" data-element_type=\"widget\" data-settings=\"{&quot;horizontal_scroll&quot;:&quot;disable&quot;}\" data-widget_type=\"nested-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-tabs\" data-widget-number=\"70093303\" aria-label=\"Tabs. Open items with Enter or Space, close with Escape and navigate using the Arrow keys.\">\n\t\t\t<div class=\"e-n-tabs-heading\" role=\"tablist\">\n\t\t\t\t\t<button id=\"e-n-tab-title-700933031\" class=\"e-n-tab-title\" aria-selected=\"true\" data-tab-index=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"e-n-tab-content-700933031\" style=\"--n-tabs-title-order: 1;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tUC #1: Remote monitoring with drones\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-700933032\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-700933032\" style=\"--n-tabs-title-order: 2;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tUC #2: 5G network edge infrastructures\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-700933033\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-700933033\" style=\"--n-tabs-title-order: 3;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tUC #3: Autonomous vehicles\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"e-n-tabs-content\">\n\t\t\t\t<div id=\"e-n-tab-content-700933031\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-700933031\" data-tab-index=\"1\" style=\"--n-tabs-title-order: 1;\" class=\"e-active elementor-element elementor-element-650fd69 e-con-full e-flex e-con e-child\" data-id=\"650fd69\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-310835a elementor-widget elementor-widget-heading\" data-id=\"310835a\" data-element_type=\"widget\" id=\"robust-surveillance-and-monitoring\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">UC1 \u2013 Robust Surveillance and Monitoring with AI-Enabled Drones<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-38bd50b e-grid e-con-boxed e-con e-child\" data-id=\"38bd50b\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0c66b9a elementor-widget elementor-widget-text-editor\" data-id=\"0c66b9a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #000000;\"><b>Summary: <\/b><\/span><\/p><p><span style=\"color: #000000;\">AI-enabled drones equipped with RGB cameras, LiDAR, GPS, for the surveillance and monitoring of public spaces, such as city centres, transportation hubs, and critical infrastructure.<\/span><\/p><p><span style=\"color: #000000;\"><b>Scenarios\/attack surfaces: <\/b><\/span><\/p><p><span style=\"color: #000000;\">a) Tangible <b>physical<\/b> adversarial artifacts, such as affixing adhesive labels<\/span><\/p><p><span style=\"color: #000000;\">b) <b>Digital<\/b> adversarial attacks aiming to manipulate the image pixel values and adding perturbations<\/span><\/p><p><span style=\"color: #000000;\"><b>Innovation: <\/b><\/span><\/p><p><span style=\"color: #000000;\">a) <b>Generative and unsupervised <\/b>defence mechanisms with data from <b>AIR<\/b>,<\/span><\/p><p><span style=\"color: #000000;\">b) <b>Multi-sensor <\/b>fusion from <b>CEE<\/b> for increased context-aware resiliency<\/span><\/p><p><span style=\"color: #000000;\">c) <b>Multi-agent <\/b>module of <b>CEE<\/b> to gather predictions from multiple drones<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a5b1085 elementor-widget elementor-widget-image\" data-id=\"a5b1085\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.kios.ucy.ac.cy\/guardai\/wp-content\/uploads\/elementor\/thumbs\/UC1-1-qxbqe8qeng1dlbx2wx6lpgkj0z16p78089itbqpou8.png\" title=\"UC1\" alt=\"GuardAI use case 1: robust surveillance and monitoring with AI-enabled drones\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-700933032\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-700933032\" data-tab-index=\"2\" style=\"--n-tabs-title-order: 2;\" class=\" elementor-element elementor-element-ac16271 e-flex e-con-boxed e-con e-child\" data-id=\"ac16271\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-851f2db elementor-widget elementor-widget-heading\" data-id=\"851f2db\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">UC2 \u2013 Protecting decentralized 5G network analytics<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3ab0a40 e-grid e-con-full e-con e-child\" data-id=\"3ab0a40\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9369b0d elementor-widget elementor-widget-image\" data-id=\"9369b0d\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.kios.ucy.ac.cy\/guardai\/wp-content\/uploads\/elementor\/thumbs\/UC2-2-qxbqdumtsxin7rtujbrnp5ymi1evrmn7rt8d5jtjpc.png\" title=\"UC2\" alt=\"GuardAI use case 2: protecting decentralized 5G network analytics\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-883525d elementor-widget elementor-widget-text-editor\" data-id=\"883525d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #000000;\"><b>Summary: <\/b><\/span><\/p><p><span style=\"color: #000000;\">Adversarial attacks on AI-enabled decentralized (edge-based) 5G Network Data Analytics Functions <b>(<\/b>NWDAF) running predictive analytics; anomaly detection; QoS optimization; load balancing and resource planning.<\/span><\/p><p><span style=\"color: #000000;\"><b>Scenarios\/attack surfaces: <\/b><\/span><\/p><p><span style=\"color: #000000;\">a) Adversarial attacks on <b>5G infrastructure <\/b>(evasion\/exploratory attacks, model inversion, trojan, GAN-generated waveform jamming, etc).<\/span><\/p><p><span style=\"color: #000000;\">b) AI-based automated <b>vulnerability assessment <\/b>and ML-powered penetration testing<\/span><\/p><p><span style=\"color: #000000;\">c) AI-assisted <b>reinforcement learning<\/b>-based <b>anomaly detection<\/b><\/span><\/p><p><span style=\"color: #000000;\">d) Stationary and mobile 5G testbeds will be employed\u00a0<\/span><\/p><p><span style=\"color: #000000;\"><b>Innovation: <\/b><\/span><\/p><p><span style=\"color: #000000;\">a) <b>RL<\/b> (deep Q learning), GANs and Transformers to <b>generate<\/b> adversarial attacks<\/span><\/p><p><span style=\"color: #000000;\">b) <b>RL<\/b> models for attack <b>detection<\/b><\/span><\/p><p><span style=\"color: #000000;\">c) AI models for data <b>denoising<\/b><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-700933033\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-700933033\" data-tab-index=\"3\" style=\"--n-tabs-title-order: 3;\" class=\" elementor-element elementor-element-455ff91 e-con-full e-flex e-con e-child\" data-id=\"455ff91\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-3a1c876 e-flex e-con-boxed e-con e-child\" data-id=\"3a1c876\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9812358 elementor-widget elementor-widget-heading\" data-id=\"9812358\" data-element_type=\"widget\" id=\"resilient-connected-vehicles\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">UC3 \u2013 Resilient Perception in Connected Autonomous Vehicles\u00a0<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-436275e e-grid e-con-full e-con e-child\" data-id=\"436275e\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ac6102a elementor-widget elementor-widget-image\" data-id=\"ac6102a\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.kios.ucy.ac.cy\/guardai\/wp-content\/uploads\/elementor\/thumbs\/UC3-1-qxbqd9ydmkq1w1zqq1hmwr9h8n0pfcdj284rkzeqdc.png\" title=\"UC3\" alt=\"GuardAI use case 3: resilient perception in connected autonomous vehicles\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0f49086 elementor-widget elementor-widget-text-editor\" data-id=\"0f49086\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #000000;\"><b>Summary: <\/b><\/span><\/p><p><span style=\"color: #000000;\">Multi-modal and multi-agent co-operative awareness, to eliminate individual sensor deficiencies (adverse conditions, poor lighting occlusions, etc.), and protect system against cyber-attacks.<\/span><\/p><p><span style=\"color: #000000;\"><b>Scenarios\/attack surfaces: <\/b><\/span><\/p><p><span style=\"color: #000000;\">a) Test the <b>co-operative situational awareness <\/b>modelling based on real sensory inputs<\/span><\/p><p><span style=\"color: #000000;\">b) Enhance safety indexes for autonomous driving by utilizing <b>decentralized FL <\/b><\/span><\/p><p><span style=\"color: #000000;\">c) <b>4D awareness <\/b>for improved security in real and simulated <b>digital twin <\/b>environments<\/span><\/p><p><span style=\"color: #000000;\">d) Adversarial attacks to the perception ML models (e.g., LiDAR jamming)<\/span><\/p><p><span style=\"color: #000000;\"><b>Innovation: <\/b><\/span><\/p><p><span style=\"color: #000000;\">a) <b>Multi-agent <\/b>and <b>multi-modal <\/b>capabilities of CEE<\/span><\/p><p><span style=\"color: #000000;\">b) <b>Swarm Learning<\/b> (SL) as a decentralized FL framework<\/span><\/p><p><span style=\"color: #000000;\">c) <b>Homomorphic encryption<\/b>, ensuring data sovereignty, security, and confidentiality<\/span><\/p><p><span style=\"color: #000000;\">d) <b>Deep unrolling <\/b>for increased robustness of perception algorithms.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>GuardAI&#8217;s Use Cases (UC) focus on high-risk application use-cases of edge AI Systems that take decisions and inform\/take actions used in Critical infrastructures (e.g., transport), that could put the life and health of citizens at risk Essential private and public services Test, and validate the novel tools to be developed in three edge AI Use [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-78","page","type-page","status-publish","hentry"],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.kios.ucy.ac.cy\/guardai\/wp-json\/wp\/v2\/pages\/78","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kios.ucy.ac.cy\/guardai\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.kios.ucy.ac.cy\/guardai\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.kios.ucy.ac.cy\/guardai\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kios.ucy.ac.cy\/guardai\/wp-json\/wp\/v2\/comments?post=78"}],"version-history":[{"count":116,"href":"https:\/\/www.kios.ucy.ac.cy\/guardai\/wp-json\/wp\/v2\/pages\/78\/revisions"}],"predecessor-version":[{"id":1511,"href":"https:\/\/www.kios.ucy.ac.cy\/guardai\/wp-json\/wp\/v2\/pages\/78\/revisions\/1511"}],"wp:attachment":[{"href":"https:\/\/www.kios.ucy.ac.cy\/guardai\/wp-json\/wp\/v2\/media?parent=78"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}