[HTML][HTML] Cybersecurity challenges in vehicular communications
Z El-Rewini, K Sadatsharan, DF Selvaraj… - Vehicular …, 2020 - Elsevier
As modern vehicles are capable to connect to an external infrastructure and Vehicle-to-
Everything (V2X) communication technologies mature, the necessity to secure …
Everything (V2X) communication technologies mature, the necessity to secure …
A survey on security attacks and defense techniques for connected and autonomous vehicles
M Pham, K Xiong - Computers & Security, 2021 - Elsevier
Autonomous Vehicle has been transforming intelligent transportation systems. As
telecommunication technology improves, autonomous vehicles are getting connected to …
telecommunication technology improves, autonomous vehicles are getting connected to …
Drift with devil: Security of {Multi-Sensor} fusion based localization in {High-Level} autonomous driving under {GPS} spoofing
For high-level Autonomous Vehicles (AV), localization is highly security and safety critical.
One direct threat to it is GPS spoofing, but fortunately, AV systems today predominantly use …
One direct threat to it is GPS spoofing, but fortunately, AV systems today predominantly use …
Maximum entropy scaled super pixels segmentation for multi-object detection and scene recognition via deep belief network
Recent advances in visionary technologies impacted multi-object recognition and scene
understanding. Such scene-understanding tasks are a demanding part of several …
understanding. Such scene-understanding tasks are a demanding part of several …
Dynamic selection techniques for detecting GPS spoofing attacks on UAVs
Unmanned aerial vehicles are prone to several cyber-attacks, including Global Positioning
System spoofing. Several techniques have been proposed for detecting such attacks …
System spoofing. Several techniques have been proposed for detecting such attacks …
Cybersecurity attacks in vehicular sensors
Z El-Rewini, K Sadatsharan, N Sugunaraj… - IEEE Sensors …, 2020 - ieeexplore.ieee.org
Today's modern vehicles contain anywhere from sixty to one-hundred sensors and exhibit
the characteristics of Cyber-Physical-Systems (CPS). There is a high degree of coupling …
the characteristics of Cyber-Physical-Systems (CPS). There is a high degree of coupling …
An experimental study of {GPS} spoofing and takeover attacks on {UAVs}
Today, there is limited knowledge about the behavior of UAVs under GPS spoofing attacks
in a real-world environment, in particular considering the interplay between the UAV's …
in a real-world environment, in particular considering the interplay between the UAV's …
Fooling lidar perception via adversarial trajectory perturbation
LiDAR point clouds collected from a moving vehicle are functions of its trajectories, because
the sensor motion needs to be compensated to avoid distortions. When autonomous …
the sensor motion needs to be compensated to avoid distortions. When autonomous …
Sybil attack identification for crowdsourced navigation: A self-supervised deep learning approach
JJQ Yu - IEEE Transactions on Intelligent Transportation …, 2021 - dl.acm.org
Crowdsourced navigation is becoming the prevalent automobile navigation solution with the
widespread adoption of smartphones over the past decade, which supports a plethora of …
widespread adoption of smartphones over the past decade, which supports a plethora of …
[PDF][PDF] Semperfi: Anti-spoofing gps receiver for uavs
It is well-known that GPS is vulnerable to signal spoofing attacks. Although several spoofing
detection techniques exist, they are incapable of mitigation and recovery from stealthy …
detection techniques exist, they are incapable of mitigation and recovery from stealthy …