Data authorisation and validation in autonomous vehicles: A critical review

R Alhabib, P Yadav - arXiv preprint arXiv:2405.17435, 2024 - arxiv.org
Autonomous systems are becoming increasingly prevalent in new vehicles. Due to their
environmental friendliness and their remarkable capability to significantly enhance road …

Smart road management system for prioritized autonomous vehicles under vehicle-to-everything (V2X) communication

AB Naeem, AM Soomro, HM Saim, H Malik - Multimedia Tools and …, 2024 - Springer
This paper works on smart transportation strategy for emergency autonomous and normal
autonomous vehicles under the vehicle-to-every-things circumstance. All vehicles are fully …

Epileptic seizure classification based on random neural networks using discrete wavelet transform for electroencephalogram signal decomposition

SY Shah, H Larijani, RM Gibson, D Liarokapis - Applied Sciences, 2024 - mdpi.com
An epileptic seizure is a brief episode of symptoms and signs caused by excessive electrical
activity in the brain. One of the major chronic neurological diseases, epilepsy, affects …

[HTML][HTML] Cybersecurity in Autonomous Vehicles—Are We Ready for the Challenge?

I Durlik, T Miller, E Kostecka, Z Zwierzewicz… - Electronics, 2024 - mdpi.com
The rapid development and deployment of autonomous vehicles (AVs) present
unprecedented opportunities and challenges in the transportation sector. While AVs promise …

CAPPAD: a privacy-preservation solution for autonomous vehicles using SDN, differential privacy and data aggregation

M Gheisari, WZ Khan, HE Najafabadi, G McArdle… - Applied …, 2024 - Springer
Abstract Autonomous Vehicles (AVs) and driverless cars which are equipped with
communication capabilities, advanced sensing, and Intelligent Control Systems (ICS), aim to …

Structure-Varying Complex Network Chaotic Model and Its Hardware Implementation

C Wang, J Zheng, Y Qian - … on Circuits and Systems I: Regular …, 2024 - ieeexplore.ieee.org
Existing research works on chaotic systems focus on enhancing the complexity of chaotic
systems while neglecting their practicality. Especially in scenarios with constrained …

Application of image encryption based improved chaotic sequence complexity algorithm in the area of ubiquitous wireless technologies

MM Jaber, MH Ali, SK Abd, MM Jassim, A Alkhayyat… - Wireless …, 2024 - Springer
Abstract 5G New networking applications need the development of mobile data networks.
The edge networks enabled by 5G technology will be able to collect, analyze, and act on …

Chaos-Based Stream Ciphers for 5G Inter-Slice Network Security

V Vijayan, K Jain… - 2024 12th International …, 2024 - ieeexplore.ieee.org
5G technology has transformed wireless communication networks, offering faster speeds,
enhanced capacity, and seamless connectivity for numerous devices. An integral feature …

Empowering Optimizing Resource Management in 5G Telecommunication Networks: The Power of Machine Learning

WA Al-Hamami, MJJ Ghrabat… - 2024 ASU International …, 2024 - ieeexplore.ieee.org
The emergence of 5G telecommunication technology has changed communication,
promising high-speed data transfer, low latency, and extensive device connectivity. A key …

Impact of 5G Technology on Cybersecurity: A Comprehensive Systematic and Bibliometric Review

J Gamboa-Cruzado, L Cuya-Chuica… - Computación y …, 2024 - polibits.cidetec.ipn.mx
The integration of 5G technology is progressively becoming standardized in everyday life,
presenting notable benefits. However, it also remains largely uncharted territory, whether …