… associated with the application of ML in vehicularnetworks. In … security issues associated with the adoption of ML methods. … A taxonomy of adversarial examples, perturbationmethods, …
T Yang, C Murguia, C Lv - IEEE Transactions on Intelligent …, 2023 - ieeexplore.ieee.org
Cooperative Adaptive Cruise Control (CACC) is an autonomousvehicle-following technology that allows groups of vehicles on the highway to form in tightly-coupled platoons. This is …
S Spana, L Du, Y Yin - IEEE Transactions on Intelligent …, 2021 - ieeexplore.ieee.org
… We consider a large group of connectedvehicles, all of which have chosen to make an informed routing decision during the same time-window within a local area. These routing …
S Ghane, A Jolfaei, L Kulik… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
… vehicles enable an edge controller to discover knowledge about the state of edge network … received by the edge controller, it is perturbed in the IoT layer (vehicles) to ensure privacy [8]. …
Cooperative Adaptive Cruise Control (CACC) is an autonomousvehicle-following technology that allows groups of vehicles on the highway to form in tightly-coupled platoons. This is …
… This paper first identifies some major security attacks on intelligent connectedvehicles. Then, we investigate and summarize the available defences against these attacks and classify …
M Dibaei, X Zheng, K Jiang, S Maric, R Abbas… - arXiv preprint arXiv …, 2019 - arxiv.org
… of inter-vehicle communications is … vehicles including driverless and intelligent vehicles, this review paper identifies a few major security attacks on the intelligent connectedvehicles. …
… In addition, privacy preserving framework for connectedvehicles was introduced by perturbation and compression in [13]. As cybersecurity attacks are dynamic, it is a challenge to …
… Future connected and autonomousvehicles (CAVs) must be secured against cyberattacks for their everyday functions on the road so that safety of passengers and vehicles can be …