Analyzing and Enhancing the Security of Ultrasonic Sensors for Autonomous Vehicles
暂无分享,去创建一个
Wenyuan Xu | Xiaoyu Ji | Chen Yan | Jianhao Liu | Weibin Jia | Wenyuan Xu | Xiaoyu Ji | Jianhao Liu | Weibin Jia | Chen Yan
[1] J. Pendry,et al. Hiding under the carpet: a new strategy for cloaking. , 2008, Physical review letters.
[2] Yongdae Kim,et al. Illusion and Dazzle: Adversarial Optical Channel Exploits Against Lidars for Automotive Applications , 2017, CHES.
[3] Chen Yan. Can You Trust Autonomous Vehicles : Contactless Attacks against Sensors of Self-driving Vehicle , 2016 .
[4] Wenyuan Xu,et al. WALNUT: Waging Doubt on the Integrity of MEMS Accelerometers with Acoustic Injection Attacks , 2017, 2017 IEEE European Symposium on Security and Privacy (EuroS&P).
[5] Christof Paar,et al. Security in Automotive Bus Systems , 2004 .
[6] Klaus-Werner Jörg,et al. Using Pseudo-Random Codes for Mobile Robot Sonar Sensing , 1998 .
[7] Matti Valovirta,et al. Experimental Security Analysis of a Modern Automobile , 2011 .
[8] Ruchir Chauhan,et al. A platform for false data injection in frequency modulated continuous wave radar , 2014 .
[9] Hermann Winner,et al. Handbook of Driver Assistance Systems: Basic Information, Components and Systems for Active Safety and Comfort , 2015 .
[10] Wenyuan Xu,et al. Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors , 2013, 2013 IEEE Symposium on Security and Privacy.
[11] Lindsay Kleeman,et al. A sonar sensor with random double pulse coding , 2000 .
[12] Mani Srivastava,et al. PyCRA: Physical Challenge-Response Authentication For Active Sensors Under Spoofing Attacks , 2015, CCS.
[13] Behrooz Parhami. A Data-Driven Dependability Assurance Scheme with Applications to Data and Design Diversity , 1991 .
[14] He Lin,et al. Development of submarine acoustic stealth technology , 2006 .
[15] Jonathan Petit,et al. Remote Attacks on Automated Vehicles Sensors : Experiments on Camera and LiDAR , 2015 .
[16] Heinrich Kuttruff,et al. Ultrasonics fundamentals and applications , 1991 .
[17] Fan Zhang,et al. A Distributed TDMA Scheduling Algorithm for Target Tracking in Ultrasonic Sensor Networks , 2013, IEEE Transactions on Industrial Electronics.
[18] S. Cummer,et al. One path to acoustic cloaking , 2007 .
[19] Yongdae Kim,et al. Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors , 2015, USENIX Security Symposium.
[20] Hovav Shacham,et al. Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.
[21] Moon G. Joo,et al. Multi-object identification for mobile robot using ultrasonic sensors , 2012 .
[22] Fan Zhang,et al. Distributed Active Sensor Scheduling for Target Tracking in Ultrasonic Sensor Networks , 2012, Mob. Networks Appl..
[23] Ralph D. Hippenstiel,et al. Detection Theory: Applications and Digital Signal Processing , 2001 .
[24] André Weimerskirch,et al. State of the Art: Embedding Security in Vehicles , 2007, EURASIP J. Embed. Syst..
[25] T. Başar,et al. A New Approach to Linear Filtering and Prediction Problems , 2001 .
[26] Stephen Milligan,et al. Understanding Ultrasonic Level Measurement , 2013 .