Blockchain-based secure and intelligent sensing scheme for autonomous vehicles activity tracking beyond 5g networks

D Reebadiya, T Rathod, R Gupta, S Tanwar… - Peer-to-Peer Networking …, 2021 - Springer
… Intelligent Transportation System (ITS) aims to manage and optimize the traffic congestion,
road accidents, parking allocation using Autonomous Vehicles (AV) system, where the AVs …

Avguardian: Detecting and mitigating publish-subscribe overprivilege for autonomous vehicle systems

DK Hong, J Kloosterman, Y Jin, Y Cao… - 2020 IEEE European …, 2020 - ieeexplore.ieee.org
… Abstract—Autonomous vehicle (AV) software systems … to vehicle collision and identity theft
for AV owners, which have been reported to Baidu Apollo and confirmed as valid. For defense

[HTML][HTML] Human factors in the cybersecurity of autonomous vehicles: Trends in current research

V Linkov, P Zámečník, D Havlíčková… - Frontiers in psychology, 2019 - frontiersin.org
Autonomous vehicles (AV) are vulnerable to many kinds of cyberattacks. The software …
The human is always the weakest point in defending against an attack and dealing with the …

Hidden voice commands: Attacks and defenses on the VCS of autonomous driving cars

M Zhou, Z Qin, X Lin, S Hu, Q Wang… - IEEE Wireless …, 2019 - ieeexplore.ieee.org
… voice commands and the corresponding defense strategies, propose a classification of …
the VCS of autonomous driving cars. Then, we propose a general defense strategy for different …

Security modeling of autonomous systems: A survey

F Jahan, W Sun, Q Niyaz, M Alam - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
… The design and development of autonomous vehicles in several developed countries to
ease transportation is no secret. On the other hand, domains such as agriculture, healthcare, …

Adversarial attack against urban scene segmentation for autonomous vehicles

X Xu, J Zhang, Y Li, Y Wang, Y Yang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
defense method, adversarial training, to analyze the robustness of the DeepLab-V3+ framework
and present the attacking segmentation result after the defense… attacking and defense to …

What humanlike errors do autonomous vehicles need to avoid to maximize safety?

AS Mueller, JB Cicchino, DS Zuby - Journal of safety research, 2020 - Elsevier
… It is assumed most crashes will be prevented by autonomous vehicles (AVs), but AVs will still
… behind vehicle control is also critical with respect to adherence to traffic laws and defensive

The vulnerability of semantic segmentation networks to adversarial attacks in autonomous driving: Enhancing extensive environment sensing

A Bar, J Lohdefink, N Kapoor… - IEEE Signal …, 2020 - ieeexplore.ieee.org
… the next major step in automotive technology, along with electromobility. An AD vehicle is
a highly … It is important to note that we applied both defense methods without any extensive …

Resilient cooperative adaptive cruise control for autonomous vehicles using machine learning

S Boddupalli, AS Rao, S Ray - IEEE Transactions on Intelligent …, 2022 - ieeexplore.ieee.org
vehicle application that extends Adaptive Cruise Control by exploiting vehicle-to-vehicle (V2V) …
CACC is a crucial ingredient for numerous autonomous vehicle functionalities including …

Intrusion detection system for platooning connected autonomous vehicles

D Kosmanos, A Pappas… - 2019 4th South-East …, 2019 - ieeexplore.ieee.org
… For example, a spoofing attack against the communication between CAVs could allow an
attacker to change the distance between autonomous vehicles within the platoon, disrupting …