Securing connected & autonomous vehicles: Challenges posed by adversarial machine learning and the way forward

A Qayyum, M Usama, J Qadir… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Connected and autonomous vehicles (CAVs) will form the backbone of future next-
generation intelligent transportation systems (ITS) providing travel comfort, road safety …

Artificial intelligence security: Threats and countermeasures

Y Hu, W Kuang, Z Qin, K Li, J Zhang, Y Gao… - ACM Computing …, 2021 - dl.acm.org
In recent years, with rapid technological advancement in both computing hardware and
algorithm, Artificial Intelligence (AI) has demonstrated significant advantage over human …

Adversarial sensor attack on lidar-based perception in autonomous driving

Y Cao, C Xiao, B Cyr, Y Zhou, W Park… - Proceedings of the …, 2019 - dl.acm.org
In Autonomous Vehicles (AVs), one fundamental pillar is perception, which leverages
sensors like cameras and LiDARs (Light Detection and Ranging) to understand the driving …

[HTML][HTML] Generative AI in medical practice: in-depth exploration of privacy and security challenges

Y Chen, P Esmaeilzadeh - Journal of Medical Internet Research, 2024 - jmir.org
As advances in artificial intelligence (AI) continue to transform and revolutionize the field of
medicine, understanding the potential uses of generative AI in health care becomes …

Cyber-physical systems security—A survey

A Humayed, J Lin, F Li, B Luo - IEEE Internet of Things Journal, 2017 - ieeexplore.ieee.org
With the exponential growth of cyber-physical systems (CPSs), new security challenges
have emerged. Various vulnerabilities, threats, attacks, and controls have been introduced …

A survey on autonomous vehicle control in the era of mixed-autonomy: From physics-based to AI-guided driving policy learning

X Di, R Shi - Transportation research part C: emerging technologies, 2021 - Elsevier
This paper serves as an introduction and overview of the potentially useful models and
methodologies from artificial intelligence (AI) into the field of transportation engineering for …

Dolphinattack: Inaudible voice commands

G Zhang, C Yan, X Ji, T Zhang, T Zhang… - Proceedings of the 2017 …, 2017 - dl.acm.org
Speech recognition (SR) systems such as Siri or Google Now have become an increasingly
popular human-computer interaction method, and have turned various systems into voice …

Optimal denial-of-service attack scheduling with energy constraint over packet-dropping networks

J Qin, M Li, L Shi, X Yu - IEEE Transactions on Automatic …, 2017 - ieeexplore.ieee.org
The recent years have seen a surge of security issues of cyber-physical systems (CPS). In
this paper, denial-of-service (DoS) attack scheduling is investigated in depth. Specifically …

Wireless communication and security issues for cyber–physical systems and the Internet-of-Things

A Burg, A Chattopadhyay, KY Lam - Proceedings of the IEEE, 2017 - ieeexplore.ieee.org
Wireless sensors and actuators connected by the Internet-of-Things (IoT) are central to the
design of advanced cyber-physical systems (CPSs). In such complex, heterogeneous …

Rocking drones with intentional sound noise on gyroscopic sensors

Y Son, H Shin, D Kim, Y Park, J Noh, K Choi… - 24th USENIX security …, 2015 - usenix.org
Sensing and actuation systems contain sensors to observe the environment and actuators to
influence it. However, these sensors can be tricked by maliciously fabricated physical …