2022
DOI: 10.48550/arxiv.2203.00150
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Explaining RADAR features for detecting spoofing attacks in Connected Autonomous Vehicles

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 0 publications
0
4
0
Order By: Relevance
“…LiDAR spoofing and jamming, signal analysis, relay, Radar spoofing and jamming. [11,[13][14][15][16]19].…”
Section: Lidar and Radarmentioning
confidence: 99%
See 1 more Smart Citation
“…LiDAR spoofing and jamming, signal analysis, relay, Radar spoofing and jamming. [11,[13][14][15][16]19].…”
Section: Lidar and Radarmentioning
confidence: 99%
“…Researchers in [11] perform experiments to investigate the accuracy of LiDAR and Radar data and suggest redundancy and randomization as countermeasures. More studies [14,15] have also evaluated the threats to LiDAR and Radar and can be referred to for further information.…”
Section: Lidar and Radarmentioning
confidence: 99%
“…In context of X-IDS, the explanations generated by the explainer module may become a new point of attack for malicious actors. Attackers may add, delete, or modify explanations to evade detection [164]. Attackers may also attack training datasets to alter the explainer's behavior.…”
Section: Adverserial Aimentioning
confidence: 99%
“…The CAN protocol, the mechanical and hydraulic systems used have been replaced by electronic network structures and control units. In this way, the amount of cables used has decreased, the cost has decreased, the connection structure has been simplified and the reliability of the system has increased [23]. It is the communication medium, also called low-speed CAN (Low-Speed CAN), where the electronic comfort units, where autonomous vehicles perform their functions, are connected, and non-real-time or non-critical data flows (Figure 4).…”
Section: Autonomous Vehicle Technologiesmentioning
confidence: 99%