Potential sources of sensor data anomalies for autonomous vehicles: An overview from road vehicle safety perspective

X Zhao, Y Fang, H Min, X Wu, W Wang… - Expert Systems with …, 2024 - Elsevier
Outstanding steps towards intelligent transportation systems with autonomous vehicles have
been taken in the past few years. Nevertheless, the safety issue in autonomous vehicles is …

In-vehicle network intrusion detection systems: a systematic survey of deep learning-based approaches

F Luo, J Wang, X Zhang, Y Jiang, Z Li, C Luo - PeerJ Computer Science, 2023 - peerj.com
Developments in connected and autonomous vehicle technologies provide drivers with
many convenience and safety benefits. Unfortunately, as connectivity and complexity within …

[HTML][HTML] Ensuring secure platooning of constrained intelligent and connected vehicles against Byzantine attacks: A distributed MPC framework

H Wei, H Zhang, AIH Kamal, Y Shi - Engineering, 2024 - Elsevier
This study investigates resilient platoon control for constrained intelligent and connected
vehicles (ICVs) against F-local Byzantine attacks. We introduce a resilient distributed model …

Energy-Efficient Self-Supervised Technique to Identify Abnormal User Over 5G Network for E-Commerce

SA Haider, MZU Rahman, S Gupta… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Within the realm of e-commerce networks, it is frequently observed that certain users exhibit
behavior patterns that differ substantially from the normative behaviors exhibited by the …

Anomaly diagnosis of connected autonomous vehicles: A survey

Y Fang, H Min, X Wu, W Wang, X Zhao… - Information …, 2024 - Elsevier
Connected autonomous vehicles (CAVs) are revolutionizing the development of
transportation due to their potential to improve transportation performance in many ways …

Security of 6G enabled vehicle-to-everything communication in emerging federated learning and blockchain technologies

M Kim, I Oh, K Yim, M Sahlabadi, Z Shukur - IEEE Access, 2023 - ieeexplore.ieee.org
Sixth-generation (6G) communication is emerging as a seamless and massive connection of
almost all digital devices. Vehicles, which are extensively linked with human mobility, must …

VitroBench: manipulating in-vehicle networks and COTS ECUs on your bench: a comprehensive test platform for automotive cybersecurity research

AKT Yeo, ME Garbelini, S Chattopadhyay… - Vehicular …, 2023 - Elsevier
With the increasing connectivity employed in automotive systems, remote cyber attacks have
now become a possibility and concrete threat. Prior works on automotive cyber security …

Android head units vs. In-vehicle ECUs: performance assessment for deploying in-vehicle intrusion detection systems for the CAN bus

T Andreica, CD Curiac, C Jichici, B Groza - IEEE Access, 2022 - ieeexplore.ieee.org
Following the numerous attacks that exploited vulnerabilities of Controller Area Networks
(CAN), intrusion detection systems have become a topic of prime importance for in-vehicle …

Anomaly Detection in Connected and Autonomous Vehicles: A Survey, Analysis, and Research Challenges

S Baccari, M Hadded, H Ghazzai, H Touati… - IEEE …, 2024 - ieeexplore.ieee.org
In Intelligent Transportation Systems (ITS), ensuring road safety has paved the way for
innovative advancements such as autonomous driving. These self-driving vehicles, with …

Security of Connected and Autonomous Vehicles: A Review of Attacks and Mitigation Strategies

FJ Niroumand, PA Bonab, A Sargolzaei - SoutheastCon 2024, 2024 - ieeexplore.ieee.org
Connected and autonomous vehicles (CAVs) play a significant role in shaping the future of
intelligent transportation by enhancing safety, efficiency, and reliability. CAV s, however, are …