Deep reinforcement learning approach for autonomous vehicle systems for maintaining security and safety using LSTM-GAN
暂无分享,去创建一个
Lin Zhang | Fei Hu | Iftikhar Rasheed | Fei Hu | I. Rasheed | Lin Zhang
[1] Theodore Bohn,et al. Security concerns of a plug-in vehicle , 2012, 2012 IEEE PES Innovative Smart Grid Technologies (ISGT).
[2] Jonathan P. How,et al. Robust Opponent Modeling via Adversarial Ensemble Reinforcement Learning in Asymmetric Imperfect-Information Games , 2019, ArXiv.
[3] David Silver,et al. Deep Reinforcement Learning from Self-Play in Imperfect-Information Games , 2016, ArXiv.
[4] Xin Zhang,et al. VANET alert endorsement using multi-source filters , 2010, VANET '10.
[5] Yi Yu,et al. Conditional LSTM-GAN for Melody Generation from Lyrics , 2019, ACM Trans. Multim. Comput. Commun. Appl..
[6] Walid Saad,et al. A colonel blotto game for interdependence-aware cyber-physical systems security in smart cities , 2017, SCOPE@CPSWeek.
[7] F. Lewis,et al. A Unified Strategy for Solution Seeking in Graphical $N$-Coalition Noncooperative Games , 2017, IEEE Transactions on Automatic Control.
[8] Liam Kilmartin,et al. Intra-Vehicle Networks: A Review , 2015, IEEE Transactions on Intelligent Transportation Systems.
[9] Zhu Han,et al. Game Theory in Wireless and Communication Networks: Theory, Models, and Applications , 2011 .
[10] Mike McDonald,et al. Car-following: a historical review , 1999 .
[11] M. Pirani,et al. A systems and control perspective of CPS security , 2019, Annu. Rev. Control..
[12] Ming Li,et al. A data trust framework for VANETs enabling false data detection and secure vehicle tracking , 2017, CNS.
[13] Jin Cui,et al. A review on safety failures, security attacks, and available countermeasures for autonomous vehicles , 2019, Ad Hoc Networks.
[14] Jerry den Hartog,et al. Security and privacy for innovative automotive applications: A survey , 2018, Comput. Commun..
[15] C. Maple,et al. Key Security Challenges for Cloud-assisted Connected and Autonomous Vehicles , 2019, Living in the Internet of Things (IoT 2019).
[16] T. Başar,et al. Dynamic Noncooperative Game Theory , 1982 .
[17] Panagiotis Papadimitratos,et al. Secure vehicular communication systems: implementation, performance, and research challenges , 2008, IEEE Communications Magazine.
[18] Zhu Han,et al. Stackelberg Differential Game Based Charging Control of Electric Vehicles in Smart Grid , 2018, Game Theory for Networking Applications.
[19] Yves Deswarte,et al. Survey on security threats and protection mechanisms in embedded automotive networks , 2013, 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W).
[20] Constantinos Antoniou,et al. Dynamic Car–Following Model Calibration Using SPSA and ISRES Algorithms , 2018 .
[21] Geoffrey E. Hinton,et al. Speech recognition with deep recurrent neural networks , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[22] Ákos Zarándy,et al. Intraframe Scene Capturing and Speed Measurement Based on Superimposed Image: New Sensor Concept for Vehicle Speed Measurement , 2016, J. Sensors.
[23] Stefania Santini,et al. A collaborative approach for improving the security of vehicular scenarios: The case of platooning , 2018, Comput. Commun..
[24] Walid Saad,et al. Robust Deep Reinforcement Learning for Security and Safety in Autonomous Vehicle Systems , 2018, 2018 21st International Conference on Intelligent Transportation Systems (ITSC).
[25] Tomas Olovsson,et al. Security aspects of the in-vehicle network in the connected car , 2011, 2011 IEEE Intelligent Vehicles Symposium (IV).
[26] Sepp Hochreiter,et al. GANs Trained by a Two Time-Scale Update Rule Converge to a Local Nash Equilibrium , 2017, NIPS.
[27] Jeffrey H. Reed,et al. Artificial Intelligence Defined 5G Radio Access Networks , 2018, IEEE Communications Magazine.
[28] Iftikhar Rasheed. Basics of 5G , 2016 .
[29] Dipak Ghosal,et al. Security vulnerabilities of connected vehicle streams and their impact on cooperative driving , 2015, IEEE Communications Magazine.
[30] Lars Grüne,et al. Noncooperative Model Predictive Control for Affine‐Quadratic Games , 2018, PAMM.
[31] Xiaojiang Du,et al. Millimeter-Wave Propagation Modeling and Measurements for 5G Mobile Networks , 2019, IEEE Wireless Communications.
[32] Naresh K. Sinha,et al. Modern Control Systems , 1981, IEEE Transactions on Systems, Man, and Cybernetics.
[33] Rita Cucchiara,et al. Predicting Human Eye Fixations via an LSTM-Based Saliency Attentive Model , 2016, IEEE Transactions on Image Processing.
[34] Fei Hu,et al. Intelligent Vehicle Network Routing With Adaptive 3D Beam Alignment for mmWave 5G-Based V2X Communications , 2020, IEEE Transactions on Intelligent Transportation Systems.
[35] Raj Gautam Dutta,et al. Security of Autonomous Systems under Physical Attacks: With application to Self-Driving Cars , 2018 .
[36] Andrey Koucheryavy,et al. Distributed Edge Computing to Assist Ultra-Low-Latency VANET Applications , 2019, Future Internet.
[37] D. Dowson,et al. The Fréchet distance between multivariate normal distributions , 1982 .
[38] Dong Hoon Lee,et al. A Practical Wireless Attack on the Connected Car and Security Protocol for In-Vehicle CAN , 2015, IEEE Transactions on Intelligent Transportation Systems.