… Abstract—Autonomousvehicle (AV) software systems … to vehicle collision and identity theft for AV owners, which have been reported to Baidu Apollo and confirmed as valid. For defense…
V Linkov, P Zámečník, D Havlíčková… - Frontiers in psychology, 2019 - frontiersin.org
… Autonomousvehicles (AV) are vulnerable to many kinds of cyberattacks. The software … The human is always the weakest point in defending against an attack and dealing with the …
M Zhou, Z Qin, X Lin, S Hu, Q Wang… - IEEE Wireless …, 2019 - ieeexplore.ieee.org
… voice commands and the corresponding defense strategies, propose a classification of … the VCS of autonomous driving cars. Then, we propose a general defense strategy for different …
F Jahan, W Sun, Q Niyaz, M Alam - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
… The design and development of autonomousvehicles in several developed countries to ease transportation is no secret. On the other hand, domains such as agriculture, healthcare, …
X Xu, J Zhang, Y Li, Y Wang, Y Yang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
… defense method, adversarial training, to analyze the robustness of the DeepLab-V3+ framework and present the attacking segmentation result after the defense… attacking and defense to …
AS Mueller, JB Cicchino, DS Zuby - Journal of safety research, 2020 - Elsevier
… It is assumed most crashes will be prevented by autonomousvehicles (AVs), but AVs will still … behind vehicle control is also critical with respect to adherence to traffic laws and defensive …
… the next major step in automotive technology, along with electromobility. An AD vehicle is a highly … It is important to note that we applied both defense methods without any extensive …
S Boddupalli, AS Rao, S Ray - IEEE Transactions on Intelligent …, 2022 - ieeexplore.ieee.org
… vehicle application that extends Adaptive Cruise Control by exploiting vehicle-to-vehicle (V2V) … CACC is a crucial ingredient for numerous autonomousvehicle functionalities including …
D Kosmanos, A Pappas… - 2019 4th South-East …, 2019 - ieeexplore.ieee.org
… For example, a spoofing attack against the communication between CAVs could allow an attacker to change the distance between autonomousvehicles within the platoon, disrupting …