Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2021 IEEE 93rd Vehicular Technology Conference (VTC2021-Spring) 2021
DOI: 10.1109/vtc2021-spring51267.2021.9449086
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly Detection using IoT Sensor-Assisted ConvLSTM Models for Connected Vehicles

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 16 publications
(16 citation statements)
references
References 5 publications
0
16
0
Order By: Relevance
“… Methods to find anomalies in spatial, temporal and Spatio-temporal elements. Where S.1 [ 33 ], S.2 [ 34 ], S.3 [ 61 ], S.4 [ 35 ], S.5 [ 62 ], S.6 [ 26 ] represent spatial anomaly detection methods, ST.1 [ 42 ], ST.2 [ 43 ], ST.3 [ 44 ], ST.4 [ 46 ], ST.5 [ 47 ], ST.6 [ 45 ] represent Spatio-temporal anomaly detection methods and T.1 [ 38 ], T.2 [ 39 ], T.3 [ 40 ], T.4 [ 41 ] represent Temporal anomaly detection methods. The colour variation represents the year when the method was first used in Robotics for anomaly detection.…”
Section: Methods Of Anomaly Detection In Armsmentioning
confidence: 99%
See 1 more Smart Citation
“… Methods to find anomalies in spatial, temporal and Spatio-temporal elements. Where S.1 [ 33 ], S.2 [ 34 ], S.3 [ 61 ], S.4 [ 35 ], S.5 [ 62 ], S.6 [ 26 ] represent spatial anomaly detection methods, ST.1 [ 42 ], ST.2 [ 43 ], ST.3 [ 44 ], ST.4 [ 46 ], ST.5 [ 47 ], ST.6 [ 45 ] represent Spatio-temporal anomaly detection methods and T.1 [ 38 ], T.2 [ 39 ], T.3 [ 40 ], T.4 [ 41 ] represent Temporal anomaly detection methods. The colour variation represents the year when the method was first used in Robotics for anomaly detection.…”
Section: Methods Of Anomaly Detection In Armsmentioning
confidence: 99%
“…In another recent paper [ 44 ], the authors claimed that their ConvLSTM models identified unusual variations in spatiotemporal elements during the motions of an autonomous vehicle and termed these variations anomalies.…”
Section: Classification Of Anomalies In Armsmentioning
confidence: 99%
“…Time-series data [43,44,45,46,47,48,49,50] Smart city [51,52,53,54] Monitoring machinery health [55,5] Robotics and manufacturing [56,57,58] Detection applications for IoT sensors [59,60] Other industrial or manufacturing [61,62,63,64] Surveillance and video [65,66,67] General-purpose frameworks [68,69,70] Network and communication frameworks [71,72,73,74] User security and privacy frameworks [75,76,77] Other frameworks [78,79] Network traffic in IoT [80,81,82] Device and infrastructure security [83,21,84,85,86,87] Data transport security [88,…”
Section: Application Category Referencementioning
confidence: 99%
“…The safety and security of connected autonomous vehicles' passengers are essential for the development of autonomous vehicles. The method by Zekry et al [62] proposes an IoT sensor-assisted convolutional long short-term memory (LSTM) model for connected vehicles for anomaly detection. The method by Wang et al [63] targets log anomalies in large-scale IoT systems.…”
Section: Other Industrial or Manufacturing Applicationsmentioning
confidence: 99%
“…Firstly, it is difficult to collect attack behavior data from the IoV. With the continuous development and expansion of the IoV, many new types of attack will appear [7,8]. This results in a lack of attack-related data in the dataset used to train the intrusion detection model, which reduces the intrusion detection performance due to the missed detection of attacks that have not yet appeared.…”
Section: Introductionmentioning
confidence: 99%