2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC) 2018
DOI: 10.1109/ssic.2018.8556651
|View full text |Cite
|
Sign up to set email alerts
|

“My autonomous car is an elephant”: A Machine Learning based Detector for Implausible Dimension

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…Using this partition we can calculate, similarly to other studies [7] [16], the following performance metrics: Intuitively, the Recall characterizes the system ability to flag all the misbehaving messages, Whereas the P recision characterizes the system ability to not consider misbehaving as genuine messages. The F 1 score is the harmonic mean of Recall and P recision.…”
Section: ) Considered Attacksmentioning
confidence: 99%
“…Using this partition we can calculate, similarly to other studies [7] [16], the following performance metrics: Intuitively, the Recall characterizes the system ability to flag all the misbehaving messages, Whereas the P recision characterizes the system ability to not consider misbehaving as genuine messages. The F 1 score is the harmonic mean of Recall and P recision.…”
Section: ) Considered Attacksmentioning
confidence: 99%
“…Notice the inverse relationship of EXP with τ , which is given by P [EXP] = 1 − τ . As such, referring to (12), one can infer that the reward is piled faster with a larger τ : i.e., r t,i ∝ τ . This relationship forms the chain between the result of a packet transmission linked to the vehicle's learning in the next round.…”
Section: B Results and Discussionmentioning
confidence: 99%
“…Usage of redundant sensors on camera verification to avoid illusion and binding [35] P3 Jamming avoidance by making protective glasses around a LiDAR which acts as light filters [36] Vehicle-to-everything network P4 Usage of fog server with fog anonymizer to avoid eavesdropping in vehicular ad-hoc networks (VANETs) [20] P5 Maintaining data integrity in dynamic route guidance by forged data filtering scheme [25] P6 Using swarm algorithms for routing attacks [37] P7 Detecting bandwidth and entropy to reduce denial of service attack [38] P8 Implementing noisy control signals to avoid replay attacks [39] P9 Registering vehicles with TFD to avoid communication of attackers who are under victim identity [40] In-vehicle network P10 Encryption and cryptographic checksum to avoid proximity vulnerabilities [41] P11 Doing network segmentation to avoid CAN and SAE vulnerabilities [41] P12 Encryption and authentication to avoid flashing attacks [42]…”
Section: P2mentioning
confidence: 99%