R Hu, Z Wu, Y Xu, T Lai, C Xia - Plos one, 2022 - journals.plos.org
With the development of the Internet of Vehicles (IoV), attacks to the vehicle-mounted control area network (CAN) have seriously jeopardized the security of automobiles. As an important …
The modern car is increasingly connected. That connection is magnified by the presence of a large number of electronic control units (ECUs). The communication between the ECUs of …
The implementation of electronics in modern vehicles has resulted in an increase in attacks targeting in-vehicle networks; thus, attack detection models have caught the attention of the …
R Hu, Z Wu, Y Xu, T Lai - Mathematics, 2022 - mdpi.com
With the development of Internet of Vehicles (IoV) technology, the car is no longer a closed individual. It exchanges information with an external network, communicating through the …
H Sun, W Huang, J Weng, Z Liu, W Tan… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
Autonomous vehicles (AVs) rely on controller area network (CAN), which ensures the communication between massive electronic control units (ECUs) and passenger safety …
S Boumiza, R Braham - 2019 international conference on …, 2019 - ieeexplore.ieee.org
The domain of securing in-vehicle networks has attracted both academic and industrial researchers due to high danger of attacks on drivers and passengers. While securing wired …
P Wei, B Wang, X Dai, L Li, F He - Digital Communications and Networks, 2023 - Elsevier
The attacks on in-vehicle Controller Area Network (CAN) bus messages severely disrupt normal communication between vehicles. Therefore, researches on intrusion detection …
HC Lin, P Wang, KM Chao, WH Lin, JH Chen - Electronics, 2022 - mdpi.com
With rapid advancements in in-vehicle network (IVN) technology, the demand for multiple advanced functions and networking in electric vehicles (EVs) has recently increased. To …
D Shi, M Xu, T Wu, L Kou - Mobile Information Systems, 2021 - hindawi.com
In recent years, deep learning theories, such as Recurrent Neural Networks (RNN) and Convolutional Neural Networks (CNN), have been applied as effective methods for intrusion …