暂无分享,去创建一个
P SomanK. | R. Vinayakumar | Amara Dinesh Kumar | Koti Naga Renu Chebrolu | P. SomanK. | R. Vinayakumar | Amara Dinesh Kumar | Kp Soman | Koti Naga | Renu Chebrolu
[1] Kwok-Yan Lam,et al. Security of autonomous vehicle as a cyber-physical system , 2017, 2017 7th International Symposium on Embedded Computing and System Design (ISED).
[2] Péter Gáspár,et al. Security issues and vulnerabilities in connected car systems , 2015, 2015 International Conference on Models and Technologies for Intelligent Transportation Systems (MT-ITS).
[3] V. V. Sajith Variyar,et al. Obstacle classification and detection for vision based navigation for autonomous driving , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[4] Hovav Shacham,et al. Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.
[5] Xinming Huang,et al. Security of Autonomous Systems Employing Embedded Computing and Sensors , 2013, IEEE Micro.
[6] Wei Yan. A two-year survey on security challenges in automotive threat landscape , 2015, 2015 International Conference on Connected Vehicles and Expo (ICCVE).
[7] Prakash Ranganathan,et al. Next generation distributed and networked autonomous vehicles: Review , 2018, 2018 10th International Conference on Communication Systems & Networks (COMSNETS).
[8] Atul Prakash,et al. Robust Physical-World Attacks on Machine Learning Models , 2017, ArXiv.
[9] Amara Dinesh Kumar,et al. Novel Deep Learning Model for Traffic Sign Detection Using Capsule Networks , 2018, ArXiv.
[10] Qiang Ni,et al. Driving with Sharks: Rethinking Connected Vehicles with Vehicle Cybersecurity , 2017, IEEE Vehicular Technology Magazine.
[11] V. V. Sajith Variyar,et al. Gps based navigation system for autonomous car , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[12] Xiang Li,et al. Controlling a Car Through OBD Injection , 2016, 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud).
[13] Ajmal Mian,et al. Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey , 2018, IEEE Access.
[14] Thomas Engel,et al. A Car Hacking Experiment: When Connectivity Meets Vulnerability , 2015, 2015 IEEE Globecom Workshops (GC Wkshps).
[15] Jihas Khan. Vehicle network security testing , 2017, 2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS).
[16] Jonathan Miller,et al. Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges , 2017, IEEE Transactions on Intelligent Transportation Systems.