Multi-source adversarial sample attack on autonomous vehicles

Z Xiong, H Xu, W Li, Z Cai - IEEE Transactions on Vehicular …, 2021 - ieeexplore.ieee.org
… Thus, to speed up the process of generating adversarial samples in the autonomous vehicle
scenario, we utilize a generation-based approach that is more efficient than the optimization-…

Covert attacks through adversarial learning: Study of lane keeping attacks on the safety of autonomous vehicles

F Farivar, MS Haghighi, A Jolfaei… - … /ASME Transactions on …, 2021 - ieeexplore.ieee.org
… This process is carried out by using actor-critic learning based on the NewtonRaphson
method in the sample studied scenario. We additionally show how an intrusion detection system …

A systematic survey of attack detection and prevention in connected and autonomous vehicles

T Limbasiya, KZ Teng, S Chattopadhyay… - Vehicular …, 2022 - Elsevier
samples, T N O = the number of correctly identified negative samples, F P O = the number
of wrongly identified positive samples, and F N O = the number of wrongly identified negative …

Who is in control? practical physical layer attack and defense for mmwave-based sensing in autonomous vehicles

Z Sun, S Balakrishnan, L Su, A Bhuyan… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
… is to use filtered noise to introduce undesired correlation in the received radar signal
samples, so that we can use multiple attackers to fake the location of existing obstacles. a) …

Poisoning and evasion attacks against deep learning algorithms in autonomous vehicles

W Jiang, H Li, S Liu, X Luo, R Lu - IEEE transactions on …, 2020 - ieeexplore.ieee.org
… In this work, we assume that the attacker who carries out the poisoning attack has the ability
of injecting corrupted samples into the training dataset and the attacker who implements …

A survey on security attacks and defense techniques for connected and autonomous vehicles

M Pham, K Xiong - Computers & Security, 2021 - Elsevier
… Besides, our survey paper covers the recent developments of attacks and defenses on CAVs,
including three ethical hacking studies on Tesla and Baidu autonomous vehicles in 2019. …

No need to worry about adversarial examples in object detection in autonomous vehicles

J Lu, H Sibai, E Fabry, D Forsyth - arXiv preprint arXiv:1707.03501, 2017 - arxiv.org
attack the multiple object detector we replace yfool with a near zero vector and otherwise follow
the recipe for attacking … : from phenomena to blackbox attacks using adversarial samples. …

Adaptive square attack: Fooling autonomous cars with adversarial traffic signs

Y Li, X Xu, J Xiao, S Li, HT Shen - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
… by autonomous vehicle manufacturers without unauthorized access. Therefore, the black-box
attack … 2) We develop a learnable sampling strategy in our ASA method by replacing the …

A benchmarking framework for cyber-attacks on autonomous vehicles

A Khadka, P Karypidis, A Lytos… - Transportation research …, 2021 - Elsevier
… , various studies [34,35] have successfully shown that DL models such as classification
models, with the introduction of GAN attack can misclassify the legitimate sample. These …

Cybersecurity of autonomous vehicles: A systematic literature review of adversarial attacks and defense models

M Girdhar, J Hong, J Moore - IEEE Open Journal of Vehicular …, 2023 - ieeexplore.ieee.org
autonomous vehicle (AV)-based applications is constrained by the DL models’ susceptibility
to adversarial attacks … Cai, “Multi-source adversarial sample attack on autonomous vehicles,…