Poisoning and evasion attacks against deep learning algorithms in autonomous vehicles

W Jiang, H Li, S Liu, X Luo, R Lu - IEEE transactions on …, 2020 - ieeexplore.ieee.org
… effect of attack. • Third, we are the first to consider both poisoning attack and evasion attack
against … Our two attacks are universally applicable to all deep learning algorithms or machine …

Deep learning-based autonomous driving systems: A survey of attacks and defenses

Y Deng, T Zhang, G Lou, X Zheng… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
… Therefore, this article intends to cover physical black-box evasion attacks experimented in
both … The limitations of current defenses against adversarial evasion and poisoning attacks are …

Adversarial Backdoor Attack by Naturalistic Data Poisoning on Trajectory Prediction in Autonomous Driving

M Pourkeshavarz, M Sabokrou… - Proceedings of the …, 2024 - openaccess.thecvf.com
… In this paper, we propose a novel backdoor attack for poisoning trajectory data. To the best
Poisoning and evasion attacks against deep learning algorithms in autonomous vehicles. …

Cybersecurity of autonomous vehicles: A systematic literature review of adversarial attacks and defense models

M Girdhar, J Hong, J Moore - IEEE Open Journal of Vehicular …, 2023 - ieeexplore.ieee.org
… On the other hand, evasion attacks try to trick an already trained model into making … poisoning
attacks. There are multiple ways to manipulate the target model using a poisoning attack, …

Data poisoning attacks in internet-of-vehicle networks: Taxonomy, state-of-the-art, and future directions

Y Chen, X Zhu, X Gong, X Yi, S Li - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
… typical attacks and defense methods in autonomous vehicles. … poisoning attacks and defenses
in autonomous vehicles to … with evasion attacks [31], [32], data poisoning attacks happen …

Autonomous vehicles: Sophisticated attacks, safety issues, challenges, open topics, blockchain, and future directions

A Giannaros, A Karras, L Theodorakopoulos… - … of Cybersecurity and …, 2023 - mdpi.com
autonomous cars and the countermeasures that are related to them; We analyze all potential
attack vectors on autonomous vehicles, … , such as evasion or poisoning attacks, hackers can …

Securing connected & autonomous vehicles: Challenges posed by adversarial machine learning and the way forward

A Qayyum, M Usama, J Qadir… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
… affecting the training phase of the learning process is termed as poisoning attack where an
… to perform an evasion attack on ML-based sign recognition system of autonomous vehicles. …

Towards adversarial learning: from evasion attacks to poisoning attacks

W Wang, H Xu, Y Wan, J Ren, J Tang - Proceedings of the 28th ACM …, 2022 - dl.acm.org
… These scenarios include autonomous vehicles, fraudster detection, dialog systems and
copyright detection. These illustrations can stress the importance of adversarial …

Data Poisoning Attacks With Hybrid Particle Swarm Optimization Algorithms Against Federated Learning in Connected and Autonomous Vehicles

C Cui, H Du, Z Jia, X Zhang, Y He, Y Yang - IEEE Access, 2023 - ieeexplore.ieee.org
attacks, which include evasion attacks and poisoning attack [6]… Evasion attacks happen
in the prediction phase by adding … , while poisoning attacks aim to sabotage the model by …

Countering adversarial attacks on autonomous vehicles using denoising techniques: A review

A Kloukiniotis, A Papandreou, A Lalos… - IEEE Open Journal …, 2022 - ieeexplore.ieee.org
… types of adversarial attacks: evasion and poisoning attacks. In evasion attacks, the attacker
tampers test data to have them misclassified. As a result, the evasion attack on the machine …