Blockchain-based security attack resilience schemes for autonomous vehicles in industry 4.0: A systematic review

R Gupta, S Tanwar, N Kumar, S Tyagi - Computers & Electrical Engineering, 2020 - Elsevier
… and discussed the threat classification pertaining to autonomous vehicles (AV) by using the
… feasible in defending cyber-attacks. Then, we explored blockchain technology which fits into …

You Can't See Me: Physical Removal Attacks on {LiDAR-based} Autonomous Vehicles Driving Frameworks

Y Cao, SH Bhupathiraju, P Naghavi… - 32nd USENIX Security …, 2023 - usenix.org
… investigate existing defenses against laser spoofing … defense strategies that we call Fake
Shadow Detection and Azimuth-based Detection. We further discuss and evaluate the defenses

Analysis and simulation of cyber attacks against connected and autonomous vehicles

S Malik, W Sun - … conference on connected and autonomous …, 2020 - ieeexplore.ieee.org
… of connected and autonomous vehicles before they can drive … and compromise connected
and autonomous vehicles. In … to develop the effective defensive approaches against those …

The attachments of 'autonomous' vehicles

C Tennant, J Stilgoe - Social Studies of Science, 2021 - journals.sagepub.com
… of autonomy sees AVs as detached. Other potential narratives acknowledge how the technology
of autonomous vehicles is … spirit of innovation – a ‘cult of autonomy’ (Hennion, 2017) – …

[HTML][HTML] An overview of autonomous vehicles sensors and their vulnerability to weather conditions

J Vargas, S Alsweiss, O Toker, R Razdan, J Santos - Sensors, 2021 - mdpi.com
… It ranges from vehicles being solely human-driven to those that are completely autonomous
… In order to achieve higher autonomy levels, autonomous vehicles (AVs) must rely on a …

A review of autonomous vehicle technology landscape

KP Divakarla, A Emadi, S Razavi… - … and Hybrid Vehicles, 2019 - inderscienceonline.com
… shift from manual to semi-autonomous to fully autonomous vehicles. As such, this paper …
associated with an autonomous vehicle. The demand for autonomous vehicles has grown …

[HTML][HTML] Connected and autonomous vehicles: A cyber-risk classification framework

B Sheehan, F Murphy, M Mullins, C Ryan - Transportation research part A …, 2019 - Elsevier
… setting appropriate standards for emerging technologies. For CAVs, regulators are confronted
with an unusual dilemma whereby risky testing of autonomous vehicles on public roads in …

On the integration of enabling wireless technologies and sensor fusion for next-generation connected and autonomous vehicles

FA Butt, JN Chattha, J Ahmad, MU Zia, M Rizwan… - IEEE …, 2022 - ieeexplore.ieee.org
… Moreover, microphone sensors in an autonomous vehicle help the autonomous … an
autonomous vehicle for navigation purposes. The primary function of this sensor is to track the vehicle

An analysis of adversarial attacks and defenses on autonomous driving models

Y Deng, X Zheng, T Zhang, C Chen… - 2020 IEEE …, 2020 - ieeexplore.ieee.org
… Then we develop a reactive defense method based on the insight that real-time adversarial
… in autonomous vehicles. This method performs runtime monitoring in autonomous vehicles

[PDF][PDF] Advanced military technology in Russia

S Bendett, M Boulègue, R Connolly, M Konaev… - Chatham …, 2021 - chathamhouse.org
Russia has been incrementally integrating novel force-multiplier technologies into established
weapons systems, including nuclear and non-nuclear strategic weapons and general-…