Explainable AI over the Internet of Things (IoT): Overview, state-of-the-art and future directions
SK Jagatheesaperumal, QV Pham… - IEEE Open Journal …, 2022 - ieeexplore.ieee.org
Explainable Artificial Intelligence (XAI) is transforming the field of Artificial Intelligence (AI) by
enhancing the trust of end-users in machines. As the number of connected devices keeps on …
enhancing the trust of end-users in machines. As the number of connected devices keeps on …
Cyber resilience of power electronics-enabled power systems: A review
The demand for carbon neutrality leads to the transition from traditional synchronous
generator-based power systems to power electronics-enabled power systems. The …
generator-based power systems to power electronics-enabled power systems. The …
[HTML][HTML] Exploring expert perceptions about the cyber security and privacy of Connected and Autonomous Vehicles: A thematic analysis approach
Abstract Connected and Autonomous Vehicles (CAVs) constitute an automotive
development carrying paradigm-shifting potential that may soon be embedded into a …
development carrying paradigm-shifting potential that may soon be embedded into a …
A survey on the current security landscape of intelligent transportation systems
With the proliferation of embedded technologies and wireless capabilities, today's vehicles
are no longer isolated mechanical machines. They become part of a hyper-connected …
are no longer isolated mechanical machines. They become part of a hyper-connected …
SAIDuCANT: Specification-based automotive intrusion detection using controller area network (CAN) timing
H Olufowobi, C Young, J Zambreno… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The proliferation of embedded devices in modern vehicles has opened the traditionally-
closed vehicular system to the risk of cybersecurity attacks through physical and remote …
closed vehicular system to the risk of cybersecurity attacks through physical and remote …
Iovt: Internet of vulnerable things? threat architecture, attack surfaces, and vulnerabilities in internet of things and its applications towards smart grids
In recent years, people have witnessed numerous Internet of Things (IoT)-based attacks with
the exponential increase in the number of IoT devices. Alongside this, the means to secure …
the exponential increase in the number of IoT devices. Alongside this, the means to secure …
Reliability assessment of autonomous vehicles based on the safety control structure
F Wang, DF Araújo, YF Li - … , Part O: Journal of Risk and …, 2023 - journals.sagepub.com
The recent social trends and accelerated technological progress culminated in the
development of autonomous vehicles (AVs). Reliability assessment for AV systems is in high …
development of autonomous vehicles (AVs). Reliability assessment for AV systems is in high …
[PDF][PDF] WeepingCAN: A stealthy CAN bus-off attack
G Bloom - Workshop on Automotive and Autonomous Vehicle …, 2021 - par.nsf.gov
The controller area network (CAN) is a high-value asset to defend and attack in automobiles.
The bus-off attack exploits CAN's fault confinement to force a victim electronic control unit …
The bus-off attack exploits CAN's fault confinement to force a victim electronic control unit …
CSLPPS: Concerted silence-based location privacy preserving scheme for internet of vehicles
The Internet of Vehicles (IoV) connects vehicles together and also to other internet of things
components such as sensors and smart devices. The huge amount of data generated by …
components such as sensors and smart devices. The huge amount of data generated by …
In-vehicle network anomaly detection using extreme gradient boosting machine
Modern vehicles have significantly increased the number of Internet of Things (IoT) devices
called electronic control units (ECUs) connected by in-vehicle networks to provide enhanced …
called electronic control units (ECUs) connected by in-vehicle networks to provide enhanced …