Invisible for both camera and lidar: Security of multi-sensor fusion based perception in autonomous driving under physical-world attacks

Y Cao, N Wang, C Xiao, D Yang, J Fang… - … IEEE symposium on …, 2021 - ieeexplore.ieee.org
In Autonomous Driving (AD) systems, perception is both security and safety critical. Despite
various prior studies on its security issues, all of them only consider attacks on camera-or …

Fault detection, isolation, identification and recovery (fdiir) methods for automotive perception sensors including a detailed literature survey for lidar

T Goelles, B Schlager, S Muckenhuber - Sensors, 2020 - mdpi.com
Perception sensors such as camera, radar, and lidar have gained considerable popularity in
the automotive industry in recent years. In order to reach the next step towards automated …

A survey of data fusion in smart city applications

BPL Lau, SH Marakkalage, Y Zhou, NU Hassan… - Information …, 2019 - Elsevier
The advancement of various research sectors such as Internet of Things (IoT), Machine
Learning, Data Mining, Big Data, and Communication Technology has shed some light in …

A secure robot learning framework for cyber attack scheduling and countermeasure

C Wu, W Yao, W Luo, W Pan, G Sun… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The problem of learning-based control for robots has been extensively studied, whereas the
security issue under malicious adversaries has not been paid much attention to. Malicious …

Virtual obstacles for sensors incapacitation in robot navigation: A systematic review of 2D path planning

T Ngwenya, M Ayomoh, S Yadavalli - Sensors, 2022 - mdpi.com
The field of mobile robot (MR) navigation with obstacle avoidance has largely focused on
real, physical obstacles as the sole external causative agent for navigation impediment. This …

Real-time attack-recovery for cyber-physical systems using linear approximations

L Zhang, X Chen, F Kong… - 2020 IEEE Real-Time …, 2020 - ieeexplore.ieee.org
Attack detection and recovery are fundamental elements for the operation of safe and
resilient cyber-physical systems. Most of the literature focuses on attack-detection, while …

Pid-piper: Recovering robotic vehicles from physical attacks

P Dash, G Li, Z Chen, M Karimibiuki… - 2021 51st Annual …, 2021 - ieeexplore.ieee.org
Robotic Vehicles (RV) rely extensively on sensor inputs to operate autonomously. Physical
attacks such as sensor tampering and spoofing can feed erroneous sensor measurements …

General flow as foundation affordance for scalable robot learning

C Yuan, C Wen, T Zhang, Y Gao - arXiv preprint arXiv:2401.11439, 2024 - arxiv.org
We address the challenge of acquiring real-world manipulation skills with a scalable
framework. Inspired by the success of large-scale auto-regressive prediction in Large …

Learning based anomaly detection for industrial arm applications

V Narayanan, RB Bobba - Proceedings of the 2018 Workshop on Cyber …, 2018 - dl.acm.org
Smart Manufacturing (SM) is envisioned to make manufacturing processes more efficient
through automation and integration of networked information systems. Robotic arms are …

Secure pose estimation for autonomous vehicles under cyber attacks

Q Liu, Y Mo, X Mo, C Lv, E Mihankhah… - 2019 IEEE Intelligent …, 2019 - ieeexplore.ieee.org
In this paper, we address the problem of secure pose estimation of an autonomous vehicle
(AV) under cyber attacks. An extended Kalman filter (EKF) is used to fuse measurements …