Who is in control? practical physical layer attack and defense for mmwave-based sensing in autonomous vehicles

Z Sun, S Balakrishnan, L Su, A Bhuyan… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
layer solutions to detect the developed spoofing attacks. First, we propose a challenge-response
defense where the victim AV detects the spoofing attacks from … the spoofing attacks. Our …

Security and privacy issues in autonomous vehicles: A layer-based survey

M Hataba, A Sherif, M Mahmoud… - IEEE Open Journal …, 2022 - ieeexplore.ieee.org
… We examine different attacks launched in a layer-based approach. We conceptualize the
architecture of AVs in a four-layered model. Then, we survey security and privacy attacks and …

A survey on security attacks and defense techniques for connected and autonomous vehicles

M Pham, K Xiong - Computers & Security, 2021 - Elsevier
Autonomous Vehicle has been transforming intelligent … , autonomous vehicles are getting
connected to each other and to infrastructures, forming Connected and Autonomous Vehicles (…

A systematic survey of attack detection and prevention in connected and autonomous vehicles

T Limbasiya, KZ Teng, S Chattopadhyay… - Vehicular …, 2022 - Elsevier
… The number of Connected and Autonomous Vehicles (CAVs) is increasing rapidly in … of
attacks, impacts of attacks, attack features, cyber-risk, defense methodologies against attacks, …

Cybersecurity for autonomous vehicles: Review of attacks and defense

K Kim, JS Kim, S Jeong, JH Park, HK Kim - Computers & security, 2021 - Elsevier
… In this survey, we analyzed previously conducted attack and defense studies described …
autonomous vehicles. We classified autonomous attacks into the three categories of autonomous

Internet of autonomous vehicles communications security: overview, issues, and directions

A Nanda, D Puthal, JJPC Rodrigues… - IEEE Wireless …, 2019 - ieeexplore.ieee.org
… the vehicles as well as the roadside units. This article provides an overview of autonomous
vehicle communication layers… -specific attacks, in this section we only discuss attacks that are …

Cybersecurity of autonomous vehicles: A systematic literature review of adversarial attacks and defense models

M Girdhar, J Hong, J Moore - IEEE Open Journal of Vehicular …, 2023 - ieeexplore.ieee.org
… of vehicles and the integration of AI features. The performance of the autonomous vehicle
(AV)-based applications is constrained by the DL models' susceptibility to adversarial attacks

Attacks on machine learning: Adversarial examples in connected and autonomous vehicles

P Sharma, D Austin, H Liu - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
… issues with the traditional attacks based techniques in VANET. … traditional attacks on Connected
Autonomous Vehicles and … The second layer is also a 100 neuron LSTM layer, but it will …

Attack models and countermeasures for autonomous vehicles

MC Chow, M Ma, Z Pan - Intelligent Technologies for Internet of Vehicles, 2021 - Springer
… of autonomous vehicles is increasing, it is intuitive that it would bring along with more possible
attacks … in the input layer, two neurons in the hidden layer, and one neuron in the output …

Evaluating adversarial attacks on driving safety in vision-based autonomous vehicles

J Zhang, Y Lou, J Wang, K Wu, K Lu… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
… : 1) the attack’s impact on the driving safety of autonomous vehicles and the attack’s impact
on … 8, we show how the patch activation area propagates layer by layer in the Stereo R-CNN …