Future connected and autonomous vehicles (CAVs) must be secured against cyberattacks for their everyday functions on the road so that safety of passengers and vehicles can be …
S Xiao, X Ge, QL Han, Y Zhang - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
This article deals with the problem of secure distributed adaptive platooning control of automated vehicles over vehicular ad-hoc networks (VANETs) in the presence of intermittent …
Intelligent Traffic Systems (ITS) are currently evolving in the form of a cooperative ITS or connected vehicles. Both forms use the data communications between Vehicle-to-Vehicle …
The so-called Internet of Vehicle (IoV) systems will interconnect numerous vehicles to communicate significant information through an Internet of Things (IoT) enabled network. It …
One prominent security threat that targets unmanned aerial vehicles (UAVs) is the capture via global positioning system (GPS) spoofing in which an attacker manipulates a UAV's GPS …
L Xiao, X Lu, T Xu, W Zhuang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In controller area networks (CANs), electronic control units (ECUs) such as telematics ECUs and on-board diagnostic ports must protect the message exchange from spoofing attacks. In …
M Kordestani, M Saif - IEEE Systems, Man, and Cybernetics …, 2021 - ieeexplore.ieee.org
Demands for security, efficiency, and environmental protection have led to the rapid deployment of cyberphysical systems (CPSs), which are now an integral part of modern …
Harmful Algal Blooms (HABs) have been observed in all 50 states in the US, ranging from large freshwater lakes, such as the Great Lakes, to smaller inland lakes, rivers, and …
Y Xue, C Wang, C Ding, B Yu, S Cui - Transportation research part C …, 2024 - Elsevier
Based on the back-stepping technique, this paper designs an observer-based event- triggered adaptive platooning control algorithm for autonomous vehicles (AVs) with motion …