Segment detection algorithm: CAN bus intrusion detection based on bit constraint

K Zheng, S Zou, G Xu, Z Bi - … Symposium on a World of Wireless …, 2022 - ieeexplore.ieee.org
With the rapid development of Internet of Vehicles and autonomous driving technologies, car
manufacturers provide more comfortable and safe driving experience while gradually …

[HTML][HTML] Granular Description of Uncertain Data for Classification Rules in Three-Way Decision

X Zhang, T Ouyang - Applied Sciences, 2022 - mdpi.com
Considering that data quality and model confidence bring threats to the confidence of
decision-making, a three-way decision with uncertain data description is more meaningful in …

A computational method for small molecule-RNA binding sites identification by utilizing position specificity and complex network information

L Zhang, K Xiao, L Kong - Biosystems, 2024 - Elsevier
Some computational methods have been given for small molecule-RNA binding site
identification due to that it plays a significant role in revealing biology function researches …

A Framework for Consistent and Repeatable Controller Area Network IDS Evaluation

P Agbaje, A Anjum, A Mitra, G Bloom… - … Workshop on Automotive …, 2022 - par.nsf.gov
The landscape of automotive vehicle attack surfaces continues to grow, and vulnerabilities
in the controller area network (CAN) expose vehicles to cyber-physical risks and attacks that …

Systematic Review on the Recent Trends of Cybersecurity in Automobile Industry

CP Eze, J Emmanuel, CIO Onietan… - … and Business for …, 2023 - ieeexplore.ieee.org
The increasing integration of technology in automobiles has raised industry concerns about
cyber-security. This paper provides an overview of the most recent developments in …

[HTML][HTML] An entropy analysis-based window size optimization scheme for merging LiDAR data frames

T Kim, J Jung, H Min, YH Jung - Sensors, 2022 - mdpi.com
LiDAR is a useful technology for gathering point cloud data from its environment and has
been adapted to many applications. We use a cost-efficient LiDAR system attached to a …

Wsg-inv: Weighted state graph model for intrusion detection on in-vehicle network

Y Linghu, X Li - 2021 IEEE Wireless Communications and …, 2021 - ieeexplore.ieee.org
The paper presents WSG-InV, a novel weighted state graph (WSG) model for lightweight IDS
on in-vehicle network. By capitalizing on historical in-vehicle data of timestamps, message …

Long short-term memory networks for in-vehicle networks intrusion detection using reverse engineered automotive packets

AK Desta, S Ohira, I Arai, K Fujikawa - Journal of Information …, 2020 - jstage.jst.go.jp
Nowadays, vehicles are equipped with multiple Electronic Control Units (ECUs) each of
which communicates with one another using a specification called Controller Area Network …

[HTML][HTML] Traffic anomaly detection algorithm for CAN bus using similarity analysis

C Wang, X Xu, K Xiao, Y He, GC Yang - High-Confidence Computing, 2024 - Elsevier
Recently, vehicles have experienced a rise in networking and informatization, leading to
increased security concerns. As the most widely used automotive bus network, the …

Exploiting channel distortion for transmitter identification for in-vehicle network security

A Hafeez, SC Ponnapali, H Malik - SAE International Journal of …, 2020 - sae.org
Cyberattacks on financial and government institutions, critical infrastructure, voting systems,
businesses, modern vehicles, and so on are on the rise. Fully connected autonomous …