Analysis of connected vehicle networks using network-based perturbation techniques

SS Avedisov, G Orosz - Nonlinear Dynamics, 2017 - Springer
… 2 Modeling connected vehicle networks In this section we develop a model for connected
vehicle networks where vehicles may exploit information from multiple vehicles ahead, see Fig…

Securing connected & autonomous vehicles: Challenges posed by adversarial machine learning and the way forward

A Qayyum, M Usama, J Qadir… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
associated with the application of ML in vehicular networks. In … security issues associated
with the adoption of ML methods. … A taxonomy of adversarial examples, perturbation methods, …

Risk assessment for connected vehicles under stealthy attacks on vehicle-to-vehicle networks

T Yang, C Murguia, C Lv - IEEE Transactions on Intelligent …, 2023 - ieeexplore.ieee.org
Cooperative Adaptive Cruise Control (CACC) is an autonomous vehicle-following technology
that allows groups of vehicles on the highway to form in tightly-coupled platoons. This is …

Strategic information perturbation for an online in-vehicle coordinated routing mechanism for connected vehicles under mixed-strategy congestion game

S Spana, L Du, Y Yin - IEEE Transactions on Intelligent …, 2021 - ieeexplore.ieee.org
… We consider a large group of connected vehicles, all of which have chosen to make an
informed routing decision during the same time-window within a local area. These routing …

Preserving privacy in the internet of connected vehicles

S Ghane, A Jolfaei, L Kulik… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
vehicles enable an edge controller to discover knowledge about the state of edge network
received by the edge controller, it is perturbed in the IoT layer (vehicles) to ensure privacy [8]. …

Risk assessment for connected vehicles under stealthy attacks on vehicle-to-vehicle networks

T Yang, C Murguia, C Lv - arXiv preprint arXiv:2109.01553, 2021 - arxiv.org
Cooperative Adaptive Cruise Control (CACC) is an autonomous vehicle-following technology
that allows groups of vehicles on the highway to form in tightly-coupled platoons. This is …

[HTML][HTML] Attacks and defences on intelligent connected vehicles: A survey

M Dibaei, X Zheng, K Jiang, R Abbas, S Liu… - … and Networks, 2020 - Elsevier
… This paper first identifies some major security attacks on intelligent connected vehicles.
Then, we investigate and summarize the available defences against these attacks and classify …

An overview of attacks and defences on intelligent connected vehicles

M Dibaei, X Zheng, K Jiang, S Maric, R Abbas… - arXiv preprint arXiv …, 2019 - arxiv.org
… of inter-vehicle communications is … vehicles including driverless and intelligent vehicles,
this review paper identifies a few major security attacks on the intelligent connected vehicles. …

Change point models for real-time cyber attack detection in connected vehicle environment

G Comert, M Rahman, M Islam… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
… In addition, privacy preserving framework for connected vehicles was introduced by
perturbation and compression in [13]. As cybersecurity attacks are dynamic, it is a challenge to …

Machine learning and blockchain technologies for cybersecurity in connected vehicles

J Ahmad, MU Zia, IH Naqvi, JN Chattha… - … : Data Mining and …, 2024 - Wiley Online Library
… Future connected and autonomous vehicles (CAVs) must be secured against cyberattacks
for their everyday functions on the road so that safety of passengers and vehicles can be …