Autonomous driving security: State of the art and challenges

C Gao, G Wang, W Shi, Z Wang… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
The autonomous driving industry has mushroomed over the past decade. Although
autonomous driving has undoubtedly become one of the most promising technologies of this …

[HTML][HTML] Artificial intelligence for IoMT security: A review of intrusion detection systems, attacks, datasets and Cloud-Fog-Edge architectures

ML Hernandez-Jaimes, A Martinez-Cruz… - Internet of Things, 2023 - Elsevier
Recent advances in the Internet of Medical Things (IoMT) have impacted traditional medical
treatment and have evolved data communications in the Smart Healthcare scenario …

Physical attack on monocular depth estimation with optimal adversarial patches

Z Cheng, J Liang, H Choi, G Tao, Z Cao, D Liu… - European conference on …, 2022 - Springer
Deep learning has substantially boosted the performance of Monocular Depth Estimation
(MDE), a critical component in fully vision-based autonomous driving (AD) systems (eg …

Dolphinattack: Inaudible voice commands

G Zhang, C Yan, X Ji, T Zhang, T Zhang… - Proceedings of the 2017 …, 2017 - dl.acm.org
Speech recognition (SR) systems such as Siri or Google Now have become an increasingly
popular human-computer interaction method, and have turned various systems into voice …

Real-time sensor anomaly detection and identification in automated vehicles

F Van Wyk, Y Wang, A Khojandi… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Connected and automated vehicles (CAVs) are expected to revolutionize the transportation
industry, mainly through allowing for a real-time and seamless exchange of information …

Light commands:{Laser-Based} audio injection attacks on {Voice-Controllable} systems

T Sugawara, B Cyr, S Rampazzi, D Genkin… - 29th USENIX Security …, 2020 - usenix.org
We propose a new class of signal injection attacks on microphones by physically converting
light to sound. We show how an attacker can inject arbitrary audio signals to a target …

Continuous authentication for voice assistants

H Feng, K Fawaz, KG Shin - … of the 23rd Annual International Conference …, 2017 - dl.acm.org
Voice has become an increasingly popular User Interaction (UI) channel, mainly contributing
to the current trend of wearables, smart vehicles, and home automation systems. Voice …

Dirty road can attack: Security of deep learning based automated lane centering under {Physical-World} attack

T Sato, J Shen, N Wang, Y Jia, X Lin… - 30th USENIX security …, 2021 - usenix.org
Automated Lane Centering (ALC) systems are convenient and widely deployed today, but
also highly security and safety critical. In this work, we are the first to systematically study the …

Illusion and dazzle: Adversarial optical channel exploits against lidars for automotive applications

H Shin, D Kim, Y Kwon, Y Kim - … , Taipei, Taiwan, September 25-28, 2017 …, 2017 - Springer
With the advancement in computing, sensing, and vehicle electronics, autonomous vehicles
are being realized. For autonomous driving, environment perception sensors such as …

Drift with devil: Security of {Multi-Sensor} fusion based localization in {High-Level} autonomous driving under {GPS} spoofing

J Shen, JY Won, Z Chen, QA Chen - 29th USENIX security symposium …, 2020 - usenix.org
For high-level Autonomous Vehicles (AV), localization is highly security and safety critical.
One direct threat to it is GPS spoofing, but fortunately, AV systems today predominantly use …