A comprehensive review on limitations of autonomous driving and its impact on accidents and collisions

A Chougule, V Chamola, A Sam… - IEEE Open Journal of …, 2023 - ieeexplore.ieee.org
The emergence of autonomous driving represents a pivotal milestone in the evolution of the
transportation system, integrating seamlessly into the daily lives of individuals due to its …

Toward robust 3d perception for autonomous vehicles: A review of adversarial attacks and countermeasures

KTY Mahima, AG Perera, S Anavatti… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
At present the perception system of autonomous vehicles is grounded on 3D vision
technologies along with deep learning to process depth information. Although deep learning …

Malicious Attacks against Multi-Sensor Fusion in Autonomous Driving

Y Zhu, C Miao, H Xue, Y Yu, L Su, C Qiao - Proceedings of the 30th …, 2024 - dl.acm.org
Multi-sensor fusion has been widely used by autonomous vehicles (AVs) to integrate the
perception results from different sensing modalities including LiDAR, camera and radar …

On Model Outsourcing Adaptive Attacks to Deep Learning Backdoor Defenses

H Peng, H Qiu, H Ma, S Wang, A Fu… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Deep learning models with backdoors act maliciously when triggered but seem normal
otherwise. This risk, often increased by model outsourcing, challenges their secure use …

Models on the Move: Towards Feasible Embedded {AI} for Intrusion Detection on Vehicular {CAN} Bus

H Xu, D Wu, Y Lu, J Lu, H Zeng - 2024 USENIX Annual Technical …, 2024 - usenix.org
Controller Area Network (CAN) protocol is widely used in vehicles as an efficient standard
enabling communication among Electronic Control Units (ECUs). However, the CAN bus is …

BadFusion: 2D-Oriented Backdoor Attacks against 3D Object Detection

SS Chaturvedi, L Zhang, W Zhang, P He… - arXiv preprint arXiv …, 2024 - arxiv.org
3D object detection plays an important role in autonomous driving; however, its vulnerability
to backdoor attacks has become evident. By injecting''triggers''to poison the training dataset …

On the Credibility of Backdoor Attacks Against Object Detectors in the Physical World

BG Doan, DQ Nguyen, C Lindquist, P Montague… - arXiv preprint arXiv …, 2024 - arxiv.org
Object detectors are vulnerable to backdoor attacks. In contrast to classifiers, detectors
possess unique characteristics, architecturally and in task execution; often operating in …

LightPure: Realtime Adversarial Image Purification for Mobile Devices Using Diffusion Models

H Khalili, S Park, V Li, B Bright, A Payani… - arXiv preprint arXiv …, 2024 - arxiv.org
Autonomous mobile systems increasingly rely on deep neural networks for perception and
decision-making. While effective, these systems are vulnerable to adversarial machine …

IPA-NeRF: Illusory Poisoning Attack Against Neural Radiance Fields

W Jiang, H Zhang, S Zhao, Z Guo, H Wang - arXiv preprint arXiv …, 2024 - arxiv.org
Neural Radiance Field (NeRF) represents a significant advancement in computer vision,
offering implicit neural network-based scene representation and novel view synthesis …

CloudFort: Enhancing Robustness of 3D Point Cloud Classification Against Backdoor Attacks via Spatial Partitioning and Ensemble Prediction

W Lan, Y Yang, H Shen, S Li - arXiv preprint arXiv:2404.14042, 2024 - arxiv.org
The increasing adoption of 3D point cloud data in various applications, such as autonomous
vehicles, robotics, and virtual reality, has brought about significant advancements in object …