LiDAR Data Integrity Verification for Autonomous Vehicle
暂无分享,去创建一个
[1] Yin Zhou,et al. VoxelNet: End-to-End Learning for Point Cloud Based 3D Object Detection , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[2] B. Prabhakaran,et al. Robust Blind Watermarking of Point-Sampled Geometry , 2009, IEEE Transactions on Information Forensics and Security.
[3] Martin Adams,et al. Sensor bias correction in simultaneous localization and mapping , 2003, Sixth International Conference of Information Fusion, 2003. Proceedings of the.
[4] Benjamin Glas,et al. Signal-based Automotive Communication Security and Its Interplay with Safety Requirements , 2012 .
[5] Yongdae Kim,et al. Illusion and Dazzle: Adversarial Optical Channel Exploits Against Lidars for Automotive Applications , 2017, CHES.
[6] Gregory W. Wornell,et al. Quantization Index Modulation Methods for Digital Watermarking and Information Embedding of Multimedia , 2001, J. VLSI Signal Process..
[7] Chen Yan. Can You Trust Autonomous Vehicles : Contactless Attacks against Sensors of Self-driving Vehicle , 2016 .
[8] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.
[9] Gregory W. Wornell,et al. Digital watermarking and information embedding using dither modulation , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).
[10] Bernd Girod,et al. Informed Watermarking , 2002 .
[11] Xinming Huang,et al. Security of Autonomous Systems Employing Embedded Computing and Sensors , 2013, IEEE Micro.
[12] Yongdae Kim,et al. Sampling Race: Bypassing Timing-Based Analog Active Sensor Spoofing Detection on Analog-Digital Systems , 2016, WOOT.
[13] Bo Li,et al. 3D fully convolutional network for vehicle detection in point cloud , 2016, 2017 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS).
[14] Jonathan Petit,et al. Remote Attacks on Automated Vehicles Sensors : Experiments on Camera and LiDAR , 2015 .
[15] B. Prabhakaran,et al. A study on lidar data forensics , 2017, 2017 IEEE International Conference on Multimedia and Expo (ICME).
[16] Andreas Geiger,et al. Are we ready for autonomous driving? The KITTI vision benchmark suite , 2012, 2012 IEEE Conference on Computer Vision and Pattern Recognition.
[17] Hovav Shacham,et al. Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.
[18] Rajarathnam Chandramouli,et al. Nonparametric steganalysis of QIM data hiding using approximate entropy , 2008, Electronic Imaging.
[19] Ingemar J. Cox,et al. Digital Watermarking and Steganography , 2014 .