Design of an automotive radar sensor firmware resilient to cyberattacks

O Toker, S Alsweiss, J Vargas, R Razdan - 2020 SoutheastCon, 2020 - ieeexplore.ieee.org
In this paper, we introduce a novel automotive radar sensor design resilient to cyberattacks.
The proposed design can be implemented at the firmware level of the system which …

Performance bounds for cyberattack detectors using multiple observations

O Toker - SoutheastCon 2022, 2022 - ieeexplore.ieee.org
In this paper, we consider False Data Injection (FDI) attacks with small injected error, and
derive risk upper bounds for cyberattack detectors using multiple observations. FDI attacks …

Mainlobe deceptive jammer suppression with MIMO radar using element-pulse coding

L Lan, G Liao, J Xu, Y Zhang - 2020 IEEE Radar Conference …, 2020 - ieeexplore.ieee.org
This paper deals with the suppression of mainlobe deceptive jammers in a collocated
multiple-input multiple-output (MIMO) radar by element-pulse coding (EPC). At the design …

A survey on obstacles to the widespread use of connected and automated vehicles

S Uysal, MT Sandıkkaya - Journal of Ambient Intelligence and …, 2024 - content.iospress.com
Abstract Connected and Automated Vehicles (CAVs) are rapidly evolving technology with
great benefits such as reducing gas emissions and decreasing traffic congestion. They have …

Designing secure and privacy-preserving information systems for industry benchmarking

J Pennekamp, J Lohmöller, E Vlad, J Loos… - International Conference …, 2023 - Springer
Benchmarking is an essential tool for industrial organizations to identify potentials that
allows them to improve their competitive position through operational and strategic means …

A Bayesian Multi-Stage Fusion Model for Radar Anti-Jamming Performance Evaluation

L Zhao, L Yan, X Duan, Z Wang - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
When evaluating the effectiveness of radar antijamming techniques, the limited sample size
poses a challenge. To overcome this limitation, this article proposes a signal-to-interference …

RadArnomaly: Protecting radar systems from data manipulation attacks

S Cohen, E Levy, A Shaked, T Cohen, Y Elovici… - Sensors, 2022 - mdpi.com
Radar systems are mainly used for tracking aircraft, missiles, satellites, and watercraft. In
many cases, information regarding the objects detected by a radar system is sent to, and …

Exploring the Security Landscape of Underwater Positioning and Navigation Systems: An Attack Surface Analysis

H Alamleh, B Karabacak - 2024 IEEE 49th Conference on …, 2024 - ieeexplore.ieee.org
Underwater positioning and navigation systems are vital for maritime operations but face
significant security threats like spoofing, jamming, interception, sensor manipulation, and …

Output resilient containment control of heterogeneous systems with active leaders using reinforcement learning under attack inputs

Q Li, L Xia, R Song - IEEE Access, 2019 - ieeexplore.ieee.org
The optimal solution to the distributed output containment control problem of heterogeneous
multiple-agent systems (MASs) with unknown active leaders under attack inputs by using …

Design of wireless mobile environment monitoring system based on spherical amphibious robots

S Guo, X Yang, J Guo, C Li - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
A wireless mobile environmental monitoring system based on spherical amphibious robots
is proposed in this paper, which is used to monitor environmental data in aquaculture. The …