[HTML][HTML] Cybersecurity challenges in vehicular communications

Z El-Rewini, K Sadatsharan, DF Selvaraj… - Vehicular …, 2020 - Elsevier
As modern vehicles are capable to connect to an external infrastructure and Vehicle-to-
Everything (V2X) communication technologies mature, the necessity to secure …

A survey on security attacks and defense techniques for connected and autonomous vehicles

M Pham, K Xiong - Computers & Security, 2021 - Elsevier
Autonomous Vehicle has been transforming intelligent transportation systems. As
telecommunication technology improves, autonomous vehicles are getting connected to …

Drift with devil: Security of {Multi-Sensor} fusion based localization in {High-Level} autonomous driving under {GPS} spoofing

J Shen, JY Won, Z Chen, QA Chen - 29th USENIX security symposium …, 2020 - usenix.org
For high-level Autonomous Vehicles (AV), localization is highly security and safety critical.
One direct threat to it is GPS spoofing, but fortunately, AV systems today predominantly use …

Maximum entropy scaled super pixels segmentation for multi-object detection and scene recognition via deep belief network

AA Rafique, M Gochoo, A Jalal, K Kim - Multimedia Tools and Applications, 2023 - Springer
Recent advances in visionary technologies impacted multi-object recognition and scene
understanding. Such scene-understanding tasks are a demanding part of several …

Dynamic selection techniques for detecting GPS spoofing attacks on UAVs

T Talaei Khoei, S Ismail, N Kaabouch - Sensors, 2022 - mdpi.com
Unmanned aerial vehicles are prone to several cyber-attacks, including Global Positioning
System spoofing. Several techniques have been proposed for detecting such attacks …

Cybersecurity attacks in vehicular sensors

Z El-Rewini, K Sadatsharan, N Sugunaraj… - IEEE Sensors …, 2020 - ieeexplore.ieee.org
Today's modern vehicles contain anywhere from sixty to one-hundred sensors and exhibit
the characteristics of Cyber-Physical-Systems (CPS). There is a high degree of coupling …

An experimental study of {GPS} spoofing and takeover attacks on {UAVs}

H Sathaye, M Strohmeier, V Lenders… - 31st USENIX security …, 2022 - usenix.org
Today, there is limited knowledge about the behavior of UAVs under GPS spoofing attacks
in a real-world environment, in particular considering the interplay between the UAV's …

Fooling lidar perception via adversarial trajectory perturbation

Y Li, C Wen, F Juefei-Xu… - Proceedings of the IEEE …, 2021 - openaccess.thecvf.com
LiDAR point clouds collected from a moving vehicle are functions of its trajectories, because
the sensor motion needs to be compensated to avoid distortions. When autonomous …

Sybil attack identification for crowdsourced navigation: A self-supervised deep learning approach

JJQ Yu - IEEE Transactions on Intelligent Transportation …, 2021 - dl.acm.org
Crowdsourced navigation is becoming the prevalent automobile navigation solution with the
widespread adoption of smartphones over the past decade, which supports a plethora of …

[PDF][PDF] Semperfi: Anti-spoofing gps receiver for uavs

H Sathaye, G LaMountain, P Closas… - Network and Distributed …, 2022 - par.nsf.gov
It is well-known that GPS is vulnerable to signal spoofing attacks. Although several spoofing
detection techniques exist, they are incapable of mitigation and recovery from stealthy …