过去一年中添加的文章,按日期排序

BWM Integrated VIKOR method using Neutrosophic fuzzy sets for cybersecurity risk assessment of connected and autonomous vehicles

BA Tanaji, S Roychowdhury - Applied Soft Computing, 2024 - Elsevier
36 天前 - … addressed effectively for the secure operation of CAVs. This study offers a
comprehensive … A novel hybrid multi-criteria decision making (MCDM) technique has been …

Adversarial Machine Learning and Defenses for Automated and Connected Vehicles

D Zhang - 2024 - uwspace.uwaterloo.ca
40 天前 - … offensive and defensive strategies, including the exploration of adversarial training,
this … threats in autonomous driving and advocates for the integration of robust defense

Rectifying Adversarial Examples Using Their Vulnerabilities

F Morimoto, S Ono - Available at SSRN 4752243 - papers.ssrn.com
81 天前 - method for road sign recognition in automated driving. While … The essence of our
AE rectification method in this study … re-attacking the AE identified by the defense method. Our …

AI drive: quantum-computational DRL framework for EHV navigational efficiency and security augmentation

IS Bangroo, R Kumar - Optical and Quantum Electronics, 2024 - Springer
119 天前 - vehicles (EHVs) toward growing autonomythreats in the disciplines of vehicle
automation and cooperative ITS. These underlying dangers may be found in the sectors of vehicle

Securing Cloud-Assisted Connected and Autonomous Vehicles: An In-Depth Threat Analysis and Risk Assessment

AT Sheik, C Maple, G Epiphaniou, M Dianati - Sensors, 2023 - mdpi.com
149 天前 - … , this study offers an attack tree to delineate attack vectors and provides a novel
defense … However, these defense tactics may not be effective against CAVs due to their dynamic …

ODFa2: Overall Defense Framework against Cyber-Attacks on Intelligent Connected Vehicles

Z Zhou, Q Zhi, L Tao, P Ping… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
160 天前 - … this method using Nagoya University’s autonomous vehiclesdefense framework
against cyber-attacks on ICVs are discussed in Section 6. Finally, the conclusion of this study

An approach to enhance the security of unmanned aerial vehicles (UAVs)

NA Sabuwala, RD Daruwala - The Journal of Supercomputing, 2024 - Springer
168 天前 - Unmanned vehicles are autonomous, easily programmable technologies that can
threats including message manipulation, injection, GPS spoofing, and jamming. Security is of …

Converging Blockchain and Deep Learning in UAV Network Defense Strategy: Ensuring Data Security During Flight

Z Li, Q Chen, W Mo, X Wang, L Hu, Y Cao - … Artificial Intelligence Security …, 2023 - Springer
177 天前 - … This section outlines the architecture of an Unmanned Aerial Vehicle Network (IoD)
service system, emphasizing security, reliability, and efficiency, achieved through the …

Survey on Security Attacks in Connected and Autonomous Vehicular Systems

SMM Hossain, S Banik, T Banik… - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
232 天前 - … After that, it details the most up-to-date defense tactics for securing CAVs and analyzes
… ] and connected autonomous vehicles (CAV) [2], which has led to the emergence of new …

Survey on Security Attacks in Connected and Autonomous Vehicular Systems

SM Mostaq Hossain, S Banik, T Banik… - arXiv e …, 2023 - ui.adsabs.harvard.edu
241 天前 - attacks to be an additional form of threat posed by the environment of CAVs. After
that, it details the most uptodate defense tactics … Adversary Attacks on Autonomous Vehicles. …