暂无分享,去创建一个
Ningfei Wang | Junjie Shen | Qi Alfred Chen | Takami Sato | Yunhan Jack Jia | Xue Lin | Yunhan Jia | Ningfei Wang | Junjie Shen | Takami Sato | Xue Lin
[1] Sergey Ioffe,et al. Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift , 2015, ICML.
[2] Sibel Yenikaya,et al. Keeping the vehicle on the road: A survey on on-road lane detection systems , 2013, CSUR.
[3] Wenyuan Xu,et al. WALNUT: Waging Doubt on the Integrity of MEMS Accelerometers with Acoustic Injection Attacks , 2017, 2017 IEEE European Symposium on Security and Privacy (EuroS&P).
[4] Junfeng Yang,et al. DeepXplore: Automated Whitebox Testing of Deep Learning Systems , 2017, SOSP.
[5] Samy Bengio,et al. Adversarial examples in the physical world , 2016, ICLR.
[6] Ting Wang,et al. DEEPSEC: A Uniform Platform for Security Analysis of Deep Learning Model , 2019, 2019 IEEE Symposium on Security and Privacy (SP).
[7] J. L. Testud,et al. Paper: Model predictive heuristic control , 1978 .
[8] Long Chen,et al. Robust Lane Detection From Continuous Driving Scenes Using Deep Neural Networks , 2019, IEEE Transactions on Vehicular Technology.
[9] Yuval Elovici,et al. Phantom of the ADAS: Phantom Attacks on Driver-Assistance Systems , 2020, IACR Cryptol. ePrint Arch..
[10] Yongdae Kim,et al. Illusion and Dazzle: Adversarial Optical Channel Exploits Against Lidars for Automotive Applications , 2017, CHES.
[11] Yue Zhao,et al. Seeing isn't Believing: Practical Adversarial Attack Against Object Detectors , 2018 .
[12] Moustapha Cissé,et al. Countering Adversarial Images using Input Transformations , 2018, ICLR.
[13] Seyed-Mohsen Moosavi-Dezfooli,et al. DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[14] Christian Früh,et al. Google Street View: Capturing the World at Street Level , 2010, Computer.
[15] Alan L. Yuille,et al. Feature Denoising for Improving Adversarial Robustness , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[16] John Brewer,et al. Functional Safety Assessment of an Automated Lane Centering System , 2018 .
[17] Dejing Dou,et al. On Adversarial Examples for Character-Level Neural Machine Translation , 2018, COLING.
[18] Dawn Song,et al. Physical Adversarial Examples for Object Detectors , 2018, WOOT @ USENIX Security Symposium.
[19] Kevin Fu,et al. Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving , 2019, CCS.
[20] Ananthram Swami,et al. The Limitations of Deep Learning in Adversarial Settings , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[21] Sebastian Thrun,et al. Robust vehicle localization in urban environments using probabilistic maps , 2010, 2010 IEEE International Conference on Robotics and Automation.
[22] Yoshua Bengio,et al. Learning Phrase Representations using RNN Encoder–Decoder for Statistical Machine Translation , 2014, EMNLP.
[23] Lujo Bauer,et al. Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition , 2016, CCS.
[24] Eder Santana,et al. A Commute in Data: The comma2k19 Dataset , 2018, ArXiv.
[25] Logan Engstrom,et al. Synthesizing Robust Adversarial Examples , 2017, ICML.
[26] Taxonomy and definitions for terms related to driving automation systems for on-road motor vehicles , 2022 .
[27] Aboelmagd Noureldin,et al. INS/GPS/LiDAR Integrated Navigation System for Urban and Indoor Environments Using Hybrid Scan Matching Algorithm , 2015, Sensors.
[28] Jin-Woo Lee,et al. A unified framework of the automated lane centering/changing control for motion smoothness adaptation , 2012, 2012 15th International IEEE Conference on Intelligent Transportation Systems.
[29] Yanjun Qi,et al. Feature Squeezing: Detecting Adversarial Examples in Deep Neural Networks , 2017, NDSS.
[30] Atul Prakash,et al. Robust Physical-World Attacks on Deep Learning Visual Classification , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[31] Yuchen Zhang,et al. Defending against Whitebox Adversarial Attacks via Randomized Discretization , 2019, AISTATS.
[32] David A. Wagner,et al. Audio Adversarial Examples: Targeted Attacks on Speech-to-Text , 2018, 2018 IEEE Security and Privacy Workshops (SPW).
[33] Graham W. Taylor,et al. Batch Normalization is a Cause of Adversarial Vulnerability , 2019, ArXiv.
[34] Ronen Lerner,et al. Recent progress in road and lane detection: a survey , 2012, Machine Vision and Applications.
[35] Dacheng Tao,et al. Deep Neural Network for Structural Prediction and Lane Detection in Traffic Scene , 2017, IEEE Transactions on Neural Networks and Learning Systems.
[36] Germán Ros,et al. CARLA: An Open Urban Driving Simulator , 2017, CoRL.
[37] Francesco Borrelli,et al. Kinematic and dynamic vehicle models for autonomous driving control design , 2015, 2015 IEEE Intelligent Vehicles Symposium (IV).
[38] Morgan Quigley,et al. ROS: an open-source Robot Operating System , 2009, ICRA 2009.
[39] Alan L. Yuille,et al. Mitigating adversarial effects through randomization , 2017, ICLR.
[40] Shinpei Kato,et al. Autoware on Board: Enabling Autonomous Vehicles with Embedded Systems , 2018, 2018 ACM/IEEE 9th International Conference on Cyber-Physical Systems (ICCPS).
[41] Helen Loeb,et al. Age and gender differences in emergency takeover from automated to manual driving on simulator , 2019, Traffic injury prevention.
[42] Gudrun Klinker,et al. Stable Road Lane Model Based on Clothoids , 2010 .
[43] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[44] Aleksander Madry,et al. On Adaptive Attacks to Adversarial Example Defenses , 2020, NeurIPS.
[45] Pieter Hintjens,et al. ZeroMQ: Messaging for Many Applications , 2013 .
[46] Bernhard P. Wrobel,et al. Multiple View Geometry in Computer Vision , 2001 .
[47] Weiqiang Ren,et al. LaneNet: Real-Time Lane Detection Networks for Autonomous Driving , 2018, ArXiv.
[48] Cristina Nita-Rotaru,et al. Are Self-Driving Cars Secure? Evasion Attacks Against Deep Neural Networks for Steering Angle Prediction , 2019, 2019 IEEE Security and Privacy Workshops (SPW).
[49] J. Zico Kolter,et al. Adversarial camera stickers: A physical camera-based attack on deep learning systems , 2019, ICML.
[50] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[51] Hao Wang,et al. Robust and Precise Vehicle Localization Based on Multi-Sensor Fusion in Diverse City Scenes , 2017, 2018 IEEE International Conference on Robotics and Automation (ICRA).
[52] Yoshua Bengio,et al. Learning long-term dependencies with gradient descent is difficult , 1994, IEEE Trans. Neural Networks.
[53] Moongu Jeon,et al. Key Points Estimation and Point Instance Segmentation Approach for Lane Detection , 2020, ArXiv.
[54] Takenao Ohkawa,et al. Vehicle Detection Based on Perspective Transformation Using Rear-View Camera , 2011 .
[55] David A. Wagner,et al. Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples , 2018, ICML.
[56] Suman Jana,et al. DeepTest: Automated Testing of Deep-Neural-Network-Driven Autonomous Cars , 2017, 2018 IEEE/ACM 40th International Conference on Software Engineering (ICSE).
[57] Xiaogang Wang,et al. Spatial As Deep: Spatial CNN for Traffic Scene Understanding , 2017, AAAI.
[58] Xiaolin Hu,et al. Defense Against Adversarial Attacks Using High-Level Representation Guided Denoiser , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[59] Chen Yan. Can You Trust Autonomous Vehicles : Contactless Attacks against Sensors of Self-driving Vehicle , 2016 .
[60] Dan Boneh,et al. Ensemble Adversarial Training: Attacks and Defenses , 2017, ICLR.
[61] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[62] Insup Lee,et al. Injected and Delivered: Fabricating Implicit Control over Actuation Systems by Spoofing Inertial Sensors , 2018, USENIX Security Symposium.
[63] Rajesh Rajamani,et al. Vehicle dynamics and control , 2005 .
[64] Eric Hamilton. JPEG File Interchange Format , 2004 .
[65] H. Neumann,et al. Multiple Cue Data Fusion with Particle Filters for Road Course Detection in Vision Systems , 2006, 2006 IEEE Intelligent Vehicles Symposium.
[66] Tao Wei,et al. Fooling Detection Alone is Not Enough: Adversarial Attack against Multiple Object Tracking , 2020, ICLR.
[67] Fabian de Ponte Müller,et al. Survey on Ranging Sensors and Cooperative Techniques for Relative Positioning of Vehicles , 2017, Sensors.
[68] Jonathan Petit,et al. Remote Attacks on Automated Vehicles Sensors : Experiments on Camera and LiDAR , 2015 .
[69] A. Soloviev,et al. Tight coupling of GPS, laser scanner, and inertial measurements for navigation in urban environments , 2008, 2008 IEEE/ION Position, Location and Navigation Symposium.
[70] Wei Li,et al. DeepBillboard: Systematic Physical-World Testing of Autonomous Driving Systems , 2018, 2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE).
[71] Heinrich Daembkes,et al. Automated Driving Safer and More Efficient Future Driving Foreword , 2017 .
[72] Jürgen Schmidhuber,et al. Long Short-Term Memory , 1997, Neural Computation.
[73] Aleksander Madry,et al. Towards Deep Learning Models Resistant to Adversarial Attacks , 2017, ICLR.
[74] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.