Security Considerations in AI-Robotics: A Survey of Current Methods, Challenges, and Opportunities
Robotics and Artificial Intelligence (AI) have been inextricably intertwined since their
inception. Today, AI-Robotics systems have become an integral part of our daily lives, from …
inception. Today, AI-Robotics systems have become an integral part of our daily lives, from …
[HTML][HTML] Artificial intelligence of things for smart cities: advanced solutions for enhancing transportation safety
SK Jagatheesaperumal, SE Bibri, J Huang… - Computational Urban …, 2024 - Springer
In the context of smart cities, ensuring road safety is crucial due to increasing urbanization
and the interconnected nature of contemporary urban environments. Leveraging innovative …
and the interconnected nature of contemporary urban environments. Leveraging innovative …
Overview of Sensing Attacks on Autonomous Vehicle Technologies and Impact on Traffic Flow
While perception systems in Connected and Autonomous Vehicles (CAVs), which
encompass both communication technologies and advanced sensors, promise to …
encompass both communication technologies and advanced sensors, promise to …
Machine learning-based identification of cybersecurity threats affecting autonomous vehicle systems
F Onur, S Gönen, MA Barışkan, C Kubat… - Computers & Industrial …, 2024 - Elsevier
With the advancement of humanity, transportation and trade activities have increased,
leading to the development process of basic land vehicles as more than physical power …
leading to the development process of basic land vehicles as more than physical power …
AI-ciphering techniques for connected vehicular Adhoc networks
D Choudhary, R Pahuja - Multimedia Tools and Applications, 2024 - Springer
The major two issues in Wireless Sensor Networks (WSN) & Vehicular Networks (VANET)
remain energy and security. As a result, safeguarding these Connected Adhoc Wireless …
remain energy and security. As a result, safeguarding these Connected Adhoc Wireless …
Cyber security analysis of connected vehicles
The sensor‐enabled in‐vehicle communication and infrastructure‐centric vehicle‐to‐
everything (V2X) communications have significantly contributed to the spark in the amount of …
everything (V2X) communications have significantly contributed to the spark in the amount of …
Work in Progress: Emerging from Shadows: Optimal Hidden Actuator Attack to Cyber-Physical Systems
Industries are embracing information technology and constructing more robust machines
known as Cyber-Physical Systems (CPS) to automate processes. CPSs are envisioned to be …
known as Cyber-Physical Systems (CPS) to automate processes. CPSs are envisioned to be …
[图书][B] Deception in Autonomous Transport Systems: Threats Impacts and Mitigation Policies
This book provides a comprehensive overview of deception in autonomous transport
systems. This involves investigating the threats facing autonomous transport systems and …
systems. This involves investigating the threats facing autonomous transport systems and …
Prevention of Attacks in Vehicular Adhoc Networks
Over the past years, numerous methods have been developed to identify anomalies in
traditional VANETs networks. A survey of VANET anomaly detection and mitigation methods …
traditional VANETs networks. A survey of VANET anomaly detection and mitigation methods …
Assessing the Integrity of Mobile Platform-Based Sensor Data Pipelines
J Shropshire, T McDonald - 2024 12th International Symposium …, 2024 - ieeexplore.ieee.org
This paper describes the development and evaluation of a framework for assessing the
integrity of sensor data flows within mobile sensor-reliant systems such as UAVs, robots, and …
integrity of sensor data flows within mobile sensor-reliant systems such as UAVs, robots, and …