Data poisoning attacks in intelligent transportation systems: A survey

F Wang, X Wang, XJ Ban - Transportation Research Part C: Emerging …, 2024 - Elsevier
Emerging technologies drive the ongoing transformation of Intelligent Transportation
Systems (ITS). This transformation has given rise to cybersecurity concerns, among which …

Modeling the assessment of intersections with traffic lights and the significance level of the number of pedestrians in microsimulation models based on the PTV Vissim …

M Ziemska-Osuch, D Osuch - Sustainability, 2022 - mdpi.com
The present article contains a microsimulation analysis of the impact of the number of
pedestrians on pedestrian crossings controlled by traffic lights. To analyze the level of …

[图书][B] Cyber-attacks to industrial control systems since stuxnet: A systematic review

SS Buchanan - 2022 - search.proquest.com
This qualitative exploratory study examined cyber-attacks against industrial control systems
(ICS) starting with Stuxnet in August 2009 and progressing through May 2021. The purpose …

Syncretic K-shell algorithm for node importance identification and invulnerability evaluation of urban rail transit network

Y Yin, W Huang, A Xie, H Li, W Gong… - Applied Mathematical …, 2023 - Elsevier
In this paper, the Syncretic K-shell algorithm is developed and applied to identify the node
importance and evaluate the invulnerability in an urban rail transit network, which is based …

Urban traffic signal control robust optimization against Risk-averse and Worst-case cyberattacks

L Zheng, J Bao, Z Mei - Information Sciences, 2023 - Elsevier
Ensuring the cybersecurity of urban traffic signal control systems has become increasingly
important in the digital age. This study proposes a passive countermeasure by designing …

Biobjective robust Network-wide traffic signal optimization against Cyber-attacks

J Bao, L Zheng, XJ Ban - Transportation research part C: emerging …, 2023 - Elsevier
In the cyber age, modern traffic signal control systems are inevitably exposed to a wide
range of cyber-attacks, which would negatively impact traffic system performance. To defend …

Biobjective robust simulation-based optimization for unconstrained problems

L Zheng, J Bao, C Xu, Z Tan - European Journal of Operational Research, 2022 - Elsevier
We propose a biobjective robust simulation-based optimization (BORSO) method to solve
unconstrained problems involving implementation errors and parameter perturbations. We …

Robust simulation-based optimization for multiobjective problems with constraints

L Zheng, J Bao, Z Tan - Annals of Operations Research, 2024 - Springer
This study proposes a constrained multiobjective robust simulation optimization (CMRSO)
method to address black-box problems with multiple objectives and constraints under …

[图书][B] Introduction to network traffic flow theory: Principles, concepts, models, and methods

WL Jin - 2021 - books.google.com
Introduction to Network Traffic Flow Theory: Principles, Concepts, Models, and Methods
provides a comprehensive introduction to modern theories for modeling, mathematical …

Two‐stage algorithm for traffic signal optimization and web‐service system development

S Lee, M Eom, BI Kim - IET Intelligent Transport Systems, 2024 - Wiley Online Library
Efficient control of traffic signals for vehicles and pedestrians at intersections is critical for
relieving traffic congestion. Considering the unique characteristics of intersections, such as …