2023
DOI: 10.1109/tits.2023.3269029
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly Detection Against GPS Spoofing Attacks on Connected and Autonomous Vehicles Using Learning From Demonstration

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 33 publications
0
4
0
Order By: Relevance
“…Our method was trained on 650 samples and achieved an average accuracy of 100%, which is 56% higher than deep learning methods [4] with the same amount of data. Based on the analysis of real‐world sensor attack models [2], we set the anomaly rate to 0.025%.GSA is design based on experiments [8]. We set the lane offset of the vehicle as a random value generated within the range false[3.5,1false]false[1,3.5false]$[ { - 3.5, - 1} ]\cup [ {1,3.5} ]$.…”
Section: Simulation and Discussionmentioning
confidence: 99%
“…Our method was trained on 650 samples and achieved an average accuracy of 100%, which is 56% higher than deep learning methods [4] with the same amount of data. Based on the analysis of real‐world sensor attack models [2], we set the anomaly rate to 0.025%.GSA is design based on experiments [8]. We set the lane offset of the vehicle as a random value generated within the range false[3.5,1false]false[1,3.5false]$[ { - 3.5, - 1} ]\cup [ {1,3.5} ]$.…”
Section: Simulation and Discussionmentioning
confidence: 99%
“…The data-centric approach utilizes data generated inside the vehicle to detect abnormalities for self-recovery or transmits this data to the outside to determine whether an abnormality exists in an external system [1][2][3][4]. Image-based approaches identify vehicles through image-processing technology and detect abnormal behavior based on this [5][6][7][8][9].…”
Section: Related Workmentioning
confidence: 99%
“…The authors of [115] have addressed the security issues caused by GPS spoofing attacks facing the CV/AV localization system. In this work, after collecting a sufficient number of historical trajectories as a demonstration, maximum entropy inverse reinforcement learning will be adopted to derive the optimal driving policy that will be used to generate a predicted optimal trajectory.…”
Section: B Classical Machine Learning-based Techniquesmentioning
confidence: 99%