[HTML][HTML] Ensuring secure platooning of constrained intelligent and connected vehicles against Byzantine attacks: A distributed MPC framework

H Wei, H Zhang, AIH Kamal, Y Shi - Engineering, 2024 - Elsevier
This study investigates resilient platoon control for constrained intelligent and connected
vehicles (ICVs) against F-local Byzantine attacks. We introduce a resilient distributed model …

A systematic survey of attack detection and prevention in connected and autonomous vehicles

T Limbasiya, KZ Teng, S Chattopadhyay… - Vehicular …, 2022 - Elsevier
The number of Connected and Autonomous Vehicles (CAVs) is increasing rapidly in various
smart transportation services and applications, considering many benefits to society, people …

Machine learning and blockchain technologies for cybersecurity in connected vehicles

J Ahmad, MU Zia, IH Naqvi, JN Chattha… - … : Data Mining and …, 2024 - Wiley Online Library
Future connected and autonomous vehicles (CAVs) must be secured against cyberattacks
for their everyday functions on the road so that safety of passengers and vehicles can be …

[HTML][HTML] Cyber attack detection for self-driving vehicle networks using deep autoencoder algorithms

FW Alsaade, MH Al-Adhaileh - Sensors, 2023 - mdpi.com
Connected and autonomous vehicles (CAVs) present exciting opportunities for the
improvement of both the mobility of people and the efficiency of transportation systems. The …

Secure operations of connected and autonomous vehicles

J Han, Z Ju, X Chen, M Yang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With features of collaborative interaction and autonomous decision-making, connected and
autonomous vehicles (CAVs) offer a viable solution for a sustainable and efficient future of …

A novel deep policy gradient action quantization for trusted collaborative computation in intelligent vehicle networks

M Chen, M Yi, M Huang, G Huang, Y Ren… - Expert Systems with …, 2023 - Elsevier
The openness of the intelligent vehicle network makes it easy for selfish or untrustworthy
vehicles to maliciously occupy limited resources in the mobile edge network or spread …

Cybersecurity and forensics in connected autonomous vehicles: A review of the state-of-the-art

P Sharma, J Gillanders - IEEE Access, 2022 - ieeexplore.ieee.org
Connected Autonomous Vehicles (CAVs) are transformational technologies that have
demonstrated significant potential for shaping the future of transportation systems. CAV …

Anomaly detection against GPS spoofing attacks on connected and autonomous vehicles using learning from demonstration

Z Yang, J Ying, J Shen, Y Feng… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
GPS spoofing attacks pose great challenges to connected vehicle (CVs) safety applications
and localization of autonomous vehicles (AVs). In this paper, we propose to utilize …

[HTML][HTML] Large-scale vehicle platooning: Advances and challenges in scheduling and planning techniques

J Hou, G Chen, J Huang, Y Qiao, L Xiong, F Wen… - Engineering, 2023 - Elsevier
Through vehicle-to-vehicle (V2V) communication, autonomizing a vehicle platoon can
significantly reduce the distance between vehicles, thereby reducing air resistance and …

Autonomous bus operation alternatives in urban areas using fuzzy Dombi-Bonferroni operator based decision making model

M Deveci, D Pamucar, I Gokasar… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Advances in V2V, V2I, and autonomous vehicle technologies have made autonomous
buses possible in cities. Soon, autonomous bus operations will be common in urban areas …