When machine learning meets privacy in 6G: A survey

Y Sun, J Liu, J Wang, Y Cao… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
The rapid-developing Artificial Intelligence (AI) technology, fast-growing network traffic, and
emerging intelligent applications (eg, autonomous driving, virtual reality, etc.) urgently …

Unified biometric privacy preserving three-factor authentication and key agreement for cloud-assisted autonomous vehicles

Q Jiang, N Zhang, J Ni, J Ma, X Ma… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Autonomous vehicles (AVs) are increasingly common, although there remain a number of
limitations that need to be addressed in order for their deployment to be more widespread …

Covert communication in UAV-assisted air-ground networks

X Jiang, X Chen, J Tang, N Zhao… - IEEE Wireless …, 2021 - ieeexplore.ieee.org
Unmanned aerial vehicle (UAV) assisted communication is a promising technique for future
wireless networks due to its characteristics of low cost and flexible deployment. However …

NovelADS: A novel anomaly detection system for intra-vehicular networks

K Agrawal, T Alladi, A Agrawal… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Modern vehicular electronics is a complex system of multiple Electronic Control Units
(ECUs) communicating to provide efficient vehicle functioning. These ECUs communicate …

Robust enhancement of intrusion detection systems using deep reinforcement learning and stochastic game

H Benaddi, K Ibrahimi, A Benslimane… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
The incorporation of advanced networking technologies makes modern systems vulnerable
to cyber-attacks that can result in a number of harmful outcomes. Due to the increase of …

Velocity-free localization of autonomous driverless vehicles in underground intelligent mines

L Dong, D Sun, G Han, X Li, Q Hu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The rapid progress of science and technology has created favorable conditions for the
development of autonomous driverless vehicles. However, the complex conditions in the …

An exhaustive research on the application of intrusion detection technology in computer network security in sensor networks

Y Wang, J Ma, A Sharma, PK Singh… - Journal of …, 2021 - Wiley Online Library
Intrusion detection is crucial in computer network security issues; therefore, this work is
aimed at maximizing network security protection and its improvement by proposing various …

Mining hard samples globally and efficiently for person reidentification

H Sheng, Y Zheng, W Ke, D Yu… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Person reidentification (ReID) is an important application of Internet of Things (IoT). ReID
recognizes pedestrians across camera views at different locations and time, which is usually …

IIDS: Intelligent intrusion detection system for sustainable development in autonomous vehicles

S Anbalagan, G Raja, S Gurumoorthy… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Connected and Autonomous Vehicles (CAVs) enable various capabilities and functionalities
like automated driving assistance, navigation and path planning, cruise control, independent …

Development of quantum-enhanced authenticated key agreement protocol for autonomous vehicles

D Mishra, K Pursharthi, P Rewal - Vehicular Communications, 2023 - Elsevier
Autonomous vehicle (AV) technology for self-driving has emerged as a promising solution to
alleviate traffic congestion, reduce accidents, and optimize road capacity and fuel …