2020
DOI: 10.1016/j.vehcom.2020.100266
|View full text |Cite
|
Sign up to set email alerts
|

Deep reinforcement learning approach for autonomous vehicle systems for maintaining security and safety using LSTM-GAN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 39 publications
(19 citation statements)
references
References 18 publications
0
17
0
Order By: Relevance
“…This section describes the comparative analysis for various parameter metrics namely the FID, overall accuracy rate, and cost function for various respective methods namely the proposed CNN-OHGS approach, new deep reinforcement learning-based long short-term memory with generative adversarial network (NDRL-LSTM-GNN) (Rasheed et al, 2020) approach as well as new deep reinforcement learning approach (NDRL) (Ferdowsi et al, 2018). Figure 9 shows the comparative analysis for FID with respect to the total number of iterations.…”
Section: Comparative Analysismentioning
confidence: 99%
“…This section describes the comparative analysis for various parameter metrics namely the FID, overall accuracy rate, and cost function for various respective methods namely the proposed CNN-OHGS approach, new deep reinforcement learning-based long short-term memory with generative adversarial network (NDRL-LSTM-GNN) (Rasheed et al, 2020) approach as well as new deep reinforcement learning approach (NDRL) (Ferdowsi et al, 2018). Figure 9 shows the comparative analysis for FID with respect to the total number of iterations.…”
Section: Comparative Analysismentioning
confidence: 99%
“…Hardware/Software-based Attacks Several attacks can take place over the hardware components and software sys- Platoon Attack [37] DDoS Attack [38] DDoS Attack [74] DDoS Attack [77] DDoS Attack [39] GreyHole & BlackHole [40] Black hole [41] Sybil Attack [42] Sybil Attack [43] Sybil Attack [44] Jamming Attack [69] Jamming Attack [45] jamming Attack [91] Data Manipulation [70] Crossfire Attack [56] Spoofing Attack [57] Spoofing Attack [58] Spoofing Attack [92] Cyber Physical Attack [93] Cyber Physical Attack [46] MDS [47] MDS [49] MDS [50] MDS [82] MDS [68] MDS [76] MDS [55] MDS [48] FDI [51] IDS [52] IDS [59] IDS [60] IDS [53] IDS [54] IDS [81] IDS [73] IDS [94] IDS [95] Trust Computation [96] Trust Computation [61] Trust Computation [62] Trust Computation [63] Trust Computation [71] Trust Computation [65] Trust Computation [66] Trust Com...…”
Section: Security Attacks and Requirementsmentioning
confidence: 99%
“…Confidentiality [53] Availability [37]- [40], [44], [45], [49]- [55], [59], [60], [69], [70], [74], [77], [81], [84], [94], [98] Integrity [36], [46], [48], [52], [68], [76], [82], [91]- [93] Privacy [42], [51], [54], [64], [72], [75], [78], [80] Authentication [41]- [43], [46], [49], [53], [55]- [60] Trust [61]- [63], [65]- [67], [71], [79], [95], [96] This survey centers around the use of ML in achieving the above security requirements. As shown in Fig.…”
Section: Security Attacks and Requirementsmentioning
confidence: 99%
“…As the autonomous technology develops, the AVs will have to wirelessly communicate with road facilities, satellites, and other vehicles (e.g., vehicular cloud). How to make sure the cyber-security will be one of the biggest concerns for AVs [88].…”
Section: Cyber-securitymentioning
confidence: 99%