暂无分享,去创建一个
Yiheng Feng | Henry X. Liu | Qi Alfred Chen | Z. Morley Mao | Wai Wong | Shihong Ed Huang | Henry X. Liu | Yiheng Feng | W. Wong | S. Huang
[1] Shihong Huang,et al. Vulnerability of Traffic Control System Under Cyberattacks with Falsified Data , 2018 .
[2] Sing-Tze Bow,et al. Pattern recognition and image preprocessing , 1992 .
[3] Ilsoo Yun,et al. Cumulative Travel-Time Responsive Real-Time Intersection Control Algorithm in the Connected Vehicle Environment , 2013 .
[4] Shihong Huang,et al. Traffic Signal Optimization Using Crowdsourced Vehicle Trajectory Data , 2018 .
[5] Dipak Ghosal,et al. Delay-Based Traffic Signal Control for Throughput Optimality and Fairness at an Isolated Intersection , 2018, IEEE Transactions on Vehicular Technology.
[6] S. Ilgin Guler,et al. Using connected vehicle technology to improve the efficiency of intersections , 2014 .
[7] Alan J. Michaels,et al. Framework for Evaluating the Severity of Cybervulnerability of a Traffic Cabinet , 2017 .
[8] Shiwen Mao,et al. An Overview of 3GPP Cellular Vehicle-to-Everything Standards , 2017, GETMBL.
[9] Zhen Yang,et al. Eco-Trajectory Planning with Consideration of Queue along Congested Corridor for Hybrid Electric Vehicles , 2019 .
[10] Dipak Ghosal,et al. Adaptive Traffic Signal Control With Vehicular Ad hoc Networks , 2013, IEEE Transactions on Vehicular Technology.
[11] Dipak Ghosal,et al. Falsified Data Attack on Backpressure-based Traffic Signal Control Algorithms , 2018, 2018 IEEE Vehicular Networking Conference (VNC).
[12] Bo Zhao,et al. Location Spoofing in a Location-Based Game: A Case Study of Pokémon Go , 2017 .
[13] J. Alex Halderman,et al. Green Lights Forever: Analyzing the Security of Traffic Infrastructure , 2014, WOOT.
[14] Suvrajeet Sen,et al. Controlled Optimization of Phases at an Intersection , 1997, Transp. Sci..
[15] Yiheng Feng,et al. Spatiotemporal intersection control in a connected and automated vehicle environment , 2018 .
[16] Ryan M. Gerdes,et al. Secure Traffic Lights: Replay Attack Detection for Model-based Smart Traffic Controllers , 2020, AutoSec@CODASPY.
[17] Ananthram Swami,et al. Practical Black-Box Attacks against Machine Learning , 2016, AsiaCCS.
[18] Saurabh Amin,et al. Vulnerability of Transportation Networks to Traffic-Signal Tampering , 2016, 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS).
[19] Shwetak N. Patel,et al. Experimental Security Analysis of a Modern Automobile , 2010, 2010 IEEE Symposium on Security and Privacy.
[20] Aaron Hunter,et al. A Security Analysis of an In-Vehicle Infotainment and App Platform , 2016, WOOT.
[21] Wan Li,et al. Connected Vehicles Based Traffic Signal Timing Optimization , 2019, IEEE Transactions on Intelligent Transportation Systems.
[22] Yiheng Feng,et al. Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control , 2018, NDSS.
[23] Yiheng Feng,et al. Corridor level cooperative trajectory optimization with connected and automated vehicles , 2019, Transportation Research Part C: Emerging Technologies.
[24] Yiheng Feng,et al. Adaptive Coordination Based on Connected Vehicle Technology , 2017 .
[25] Jianfeng Zheng,et al. Real-Time Detector-Free Adaptive Signal Control with Low Penetration of Connected Vehicles , 2018 .
[26] William Whyte,et al. A security credential management system for V2V communications , 2013, 2013 IEEE Vehicular Networking Conference.
[27] Ron Kohavi,et al. Irrelevant Features and the Subset Selection Problem , 1994, ICML.
[28] Hovav Shacham,et al. Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.
[29] Alexandre M. Bayen,et al. Creating complex congestion patterns via multi-objective optimal freeway traffic control with application to cyber-security , 2016 .
[30] Eran Yahav,et al. Exploiting Social Navigation , 2014, ArXiv.
[31] Jun Ding,et al. Multi-modal traffic signal control with priority, signal actuation and coordination , 2014 .
[32] Byungkyu Park,et al. Traffic Signal Control with Connected Vehicles , 2013 .
[33] Stephen D. Boyles,et al. Implications of traffic signal cybersecurity on potential deliberate traffic disruptions , 2019, Transportation Research Part A: Policy and Practice.
[34] Cade Braud,et al. Traffic signal timing manual. , 2008 .
[35] Jun Ding,et al. PAMSCOD: Platoon-based arterial multi-modal signal control with online data , 2011 .
[36] Leo Breiman,et al. Classification and Regression Trees , 1984 .
[37] Yevgeniy Vorobeychik,et al. Vulnerability of fixed-time control of signalized intersections to cyber-tampering , 2016, 2016 Resilience Week (RWS).
[38] Yi-Zeng Liang,et al. Monte Carlo cross validation , 2001 .
[39] Yiheng Feng,et al. A real-time adaptive signal control in a connected vehicle environment , 2015 .
[40] Christian Priemer,et al. A decentralized adaptive traffic signal control using V2I communication data , 2009, 2009 12th International IEEE Conference on Intelligent Transportation Systems.
[41] John B. Kenney,et al. Dedicated Short-Range Communications (DSRC) Standards in the United States , 2011, Proceedings of the IEEE.
[42] Alexander Skabardonis,et al. Oversaturated Freeway Flow Algorithm for Use in Next Generation Simulation , 2008 .
[43] William Whyte,et al. A Security Credential Management System for V2X Communications , 2018, IEEE Transactions on Intelligent Transportation Systems.