Securing connected & autonomous vehicles: Challenges posed by adversarial machine learning and the way forward
Connected and autonomous vehicles (CAVs) will form the backbone of future next-
generation intelligent transportation systems (ITS) providing travel comfort, road safety …
generation intelligent transportation systems (ITS) providing travel comfort, road safety …
Artificial intelligence security: Threats and countermeasures
In recent years, with rapid technological advancement in both computing hardware and
algorithm, Artificial Intelligence (AI) has demonstrated significant advantage over human …
algorithm, Artificial Intelligence (AI) has demonstrated significant advantage over human …
Adversarial sensor attack on lidar-based perception in autonomous driving
In Autonomous Vehicles (AVs), one fundamental pillar is perception, which leverages
sensors like cameras and LiDARs (Light Detection and Ranging) to understand the driving …
sensors like cameras and LiDARs (Light Detection and Ranging) to understand the driving …
[HTML][HTML] Generative AI in medical practice: in-depth exploration of privacy and security challenges
Y Chen, P Esmaeilzadeh - Journal of Medical Internet Research, 2024 - jmir.org
As advances in artificial intelligence (AI) continue to transform and revolutionize the field of
medicine, understanding the potential uses of generative AI in health care becomes …
medicine, understanding the potential uses of generative AI in health care becomes …
Cyber-physical systems security—A survey
With the exponential growth of cyber-physical systems (CPSs), new security challenges
have emerged. Various vulnerabilities, threats, attacks, and controls have been introduced …
have emerged. Various vulnerabilities, threats, attacks, and controls have been introduced …
A survey on autonomous vehicle control in the era of mixed-autonomy: From physics-based to AI-guided driving policy learning
This paper serves as an introduction and overview of the potentially useful models and
methodologies from artificial intelligence (AI) into the field of transportation engineering for …
methodologies from artificial intelligence (AI) into the field of transportation engineering for …
Dolphinattack: Inaudible voice commands
Speech recognition (SR) systems such as Siri or Google Now have become an increasingly
popular human-computer interaction method, and have turned various systems into voice …
popular human-computer interaction method, and have turned various systems into voice …
Optimal denial-of-service attack scheduling with energy constraint over packet-dropping networks
The recent years have seen a surge of security issues of cyber-physical systems (CPS). In
this paper, denial-of-service (DoS) attack scheduling is investigated in depth. Specifically …
this paper, denial-of-service (DoS) attack scheduling is investigated in depth. Specifically …
Wireless communication and security issues for cyber–physical systems and the Internet-of-Things
Wireless sensors and actuators connected by the Internet-of-Things (IoT) are central to the
design of advanced cyber-physical systems (CPSs). In such complex, heterogeneous …
design of advanced cyber-physical systems (CPSs). In such complex, heterogeneous …
Rocking drones with intentional sound noise on gyroscopic sensors
Sensing and actuation systems contain sensors to observe the environment and actuators to
influence it. However, these sensors can be tricked by maliciously fabricated physical …
influence it. However, these sensors can be tricked by maliciously fabricated physical …