L Guo, J Ye, L Du - IEEE transactions on transportation …, 2020 - ieeexplore.ieee.org
… vehicle (HEV) against sophisticated cyberattacks is presented. To the best of our knowledge, cyberattacks, especially sophisticated and subtle cyber-attacks, … sophisticated cyber-attacks …
… in connected and autonomousvehicles and related infrastructure also give rise to cyber-attacks to … -attackers have the flexibility to attack either part of a system or use more sophisticated …
S Boumiza, R Braham - 2017 IEEE/ACS 14th International …, 2017 - ieeexplore.ieee.org
… For example, Google’s AV may operate fully autonomously and has … Advanced sensors, sophisticated algorithms and … attack methods that we divided in two parts: intra-vehicle and …
… Please note that we may have more sophisticatedattack tools, attacks, and attack methods in … Mellor, “Autonomousvehicle data storage: We grill self-driving car experts about sensors, …
… its own problems that require sophisticated resource management and isolation techniques. … OBD ports that are mandatory in modern vehicles are also potential attack surface for CAV. …
… associated with intelligent vehicles, and identify … attacks they leverage for infecting modern vehicles. This work also presents a detailed survey of available defenses against such attacks …
… [41] 2021 × ✓ ✓ ✓ × × × × ✓ ✓ This work has identified the attack and defense strategies from … Sophisticated blockchain-based autonomous systems provide secure content transmission …
… Challenge, which yielded several sophisticated implementations of self-driving ground … on the ECUs provide several opportunities for attackingautonomousvehicles, such as hardware …
… must work for autonomousvehicles (AV) … attack on machine learning models used by AVs for traffic sign recognition. To make classification models resilient against adversarial attacks, …