Autonomous driving security: State of the art and challenges

C Gao, G Wang, W Shi, Z Wang… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
The autonomous driving industry has mushroomed over the past decade. Although
autonomous driving has undoubtedly become one of the most promising technologies of this …

A systematic survey of attack detection and prevention in connected and autonomous vehicles

T Limbasiya, KZ Teng, S Chattopadhyay… - Vehicular …, 2022 - Elsevier
The number of Connected and Autonomous Vehicles (CAVs) is increasing rapidly in various
smart transportation services and applications, considering many benefits to society, people …

Toward understanding and boosting adversarial transferability from a distribution perspective

Y Zhu, Y Chen, X Li, K Chen, Y He… - … on Image Processing, 2022 - ieeexplore.ieee.org
Transferable adversarial attacks against Deep neural networks (DNNs) have received broad
attention in recent years. An adversarial example can be crafted by a surrogate model and …

Machine learning and blockchain technologies for cybersecurity in connected vehicles

J Ahmad, MU Zia, IH Naqvi, JN Chattha… - … : Data Mining and …, 2024 - Wiley Online Library
Future connected and autonomous vehicles (CAVs) must be secured against cyberattacks
for their everyday functions on the road so that safety of passengers and vehicles can be …

Spoofing attacks against vehicular FMCW radar

R Komissarov, A Wool - Proceedings of the 5th Workshop on Attacks and …, 2021 - dl.acm.org
The safety and security of the passengers in vehicles in the face of cyber attacks is a key
concern in the automotive industry, especially with the emergence of the Advanced Driver …

Wireless communication, sensing, and REM: A security perspective

HM Furqan, MSJ Solaija, H Türkmen… - IEEE Open Journal of …, 2021 - ieeexplore.ieee.org
The diverse requirements of next-generation communication systems necessitate
awareness, flexibility, and intelligence as essential building blocks of future wireless …

A survey on cybersecurity attacks and defenses for unmanned aerial systems

Z Wang, Y Li, S Wu, Y Zhou, L Yang, Y Xu… - Journal of Systems …, 2023 - Elsevier
In recent years, unmanned aerial systems (UAS) have been widely used in both military and
civilian fields. However, their open-source software and protocols have made their security …

Metawave: Attacking mmwave sensing with meta-material-enhanced tags

X Chen, Z Li, B Chen, Y Zhu, CX Lu… - The 30th Network …, 2023 - research.ed.ac.uk
Millimeter-wave (mmWave) sensing has been applied in many critical applications, serving
millions of thousands of people around the world. However, it is vulnerable to attacks in the …

Physical layer security for authentication, confidentiality, and malicious node detection: a paradigm shift in securing IoT networks

E Illi, M Qaraqe, S Althunibat… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
The pervasiveness of commercial Internet of Things (IoT) around the globe is expected to
reach significant levels with the upcoming sixth generation of mobile networks (6G) …

mmphone: Acoustic eavesdropping on loudspeakers via mmwave-characterized piezoelectric effect

C Wang, F Lin, T Liu, Z Liu, Y Shen, Z Ba… - … -IEEE Conference on …, 2022 - ieeexplore.ieee.org
More and more people turn to online voice communication with loudspeaker-equipped
devices due to its convenience. To prevent speech leakage, soundproof rooms are often …