Autonomous driving security: State of the art and challenges
The autonomous driving industry has mushroomed over the past decade. Although
autonomous driving has undoubtedly become one of the most promising technologies of this …
autonomous driving has undoubtedly become one of the most promising technologies of this …
[HTML][HTML] Artificial intelligence for IoMT security: A review of intrusion detection systems, attacks, datasets and Cloud-Fog-Edge architectures
ML Hernandez-Jaimes, A Martinez-Cruz… - Internet of Things, 2023 - Elsevier
Recent advances in the Internet of Medical Things (IoMT) have impacted traditional medical
treatment and have evolved data communications in the Smart Healthcare scenario …
treatment and have evolved data communications in the Smart Healthcare scenario …
Physical attack on monocular depth estimation with optimal adversarial patches
Deep learning has substantially boosted the performance of Monocular Depth Estimation
(MDE), a critical component in fully vision-based autonomous driving (AD) systems (eg …
(MDE), a critical component in fully vision-based autonomous driving (AD) systems (eg …
Dolphinattack: Inaudible voice commands
Speech recognition (SR) systems such as Siri or Google Now have become an increasingly
popular human-computer interaction method, and have turned various systems into voice …
popular human-computer interaction method, and have turned various systems into voice …
Real-time sensor anomaly detection and identification in automated vehicles
F Van Wyk, Y Wang, A Khojandi… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Connected and automated vehicles (CAVs) are expected to revolutionize the transportation
industry, mainly through allowing for a real-time and seamless exchange of information …
industry, mainly through allowing for a real-time and seamless exchange of information …
Light commands:{Laser-Based} audio injection attacks on {Voice-Controllable} systems
We propose a new class of signal injection attacks on microphones by physically converting
light to sound. We show how an attacker can inject arbitrary audio signals to a target …
light to sound. We show how an attacker can inject arbitrary audio signals to a target …
Continuous authentication for voice assistants
Voice has become an increasingly popular User Interaction (UI) channel, mainly contributing
to the current trend of wearables, smart vehicles, and home automation systems. Voice …
to the current trend of wearables, smart vehicles, and home automation systems. Voice …
Dirty road can attack: Security of deep learning based automated lane centering under {Physical-World} attack
Automated Lane Centering (ALC) systems are convenient and widely deployed today, but
also highly security and safety critical. In this work, we are the first to systematically study the …
also highly security and safety critical. In this work, we are the first to systematically study the …
Illusion and dazzle: Adversarial optical channel exploits against lidars for automotive applications
With the advancement in computing, sensing, and vehicle electronics, autonomous vehicles
are being realized. For autonomous driving, environment perception sensors such as …
are being realized. For autonomous driving, environment perception sensors such as …
Drift with devil: Security of {Multi-Sensor} fusion based localization in {High-Level} autonomous driving under {GPS} spoofing
For high-level Autonomous Vehicles (AV), localization is highly security and safety critical.
One direct threat to it is GPS spoofing, but fortunately, AV systems today predominantly use …
One direct threat to it is GPS spoofing, but fortunately, AV systems today predominantly use …