Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Deep learning adversarial attacks and defenses in autonomous vehicles: a systematic literature review from a safety perspective
Abstract The integration of Deep Learning (DL) algorithms in Autonomous Vehicles (AVs)
has revolutionized their precision in navigating various driving scenarios, ranging from anti …
has revolutionized their precision in navigating various driving scenarios, ranging from anti …
User scheduling and task offloading in multi-tier computing 6G vehicular network
H Zhang, L Feng, X Liu, K Long… - IEEE Journal on …, 2022 - ieeexplore.ieee.org
Many real-time application scenarios are developed in 6G communications. Driven by the
low-latency data processing requirements, multi-tier computing has become an important …
low-latency data processing requirements, multi-tier computing has become an important …
Adversarial attack and defense on deep learning for air transportation communication jamming
Air transportation communication jamming recognition model based on deep learning (DL)
can quickly and accurately identify and classify communication jamming, to improve the …
can quickly and accurately identify and classify communication jamming, to improve the …
[HTML][HTML] Cybersecurity vulnerability and resilience of cooperative driving automation for energy efficiency and flow stability in smart cities
ZH Khattak - Sustainable Cities and Society, 2024 - Elsevier
Increasing levels of communication and automation has led to the development of cyber
physical systems applications known as cooperative driving automation. While such …
physical systems applications known as cooperative driving automation. While such …
A novel deep deterministic policy gradient model applied to intelligent transportation system security problems in 5G and 6G network scenarios
Traffic congestion has been an actual problem in large cities, causing personal
inconvenience and environmental pollution. To solve this problem, new applications for …
inconvenience and environmental pollution. To solve this problem, new applications for …
Cybersecurity on connected and automated transportation systems: A survey
Connected and automated vehicles (CAVs) provide various valuable and advanced
services to manufacturers, owners, mobility service providers, and transportation authorities …
services to manufacturers, owners, mobility service providers, and transportation authorities …
Promoting or hindering: Stealthy black-box attacks against drl-based traffic signal control
Numerous studies have demonstrated, in-depth, the vulnerability of the deep reinforcement
learning (DRL) model's elements (eg, reward), which is a factor limiting the widespread …
learning (DRL) model's elements (eg, reward), which is a factor limiting the widespread …
Stealthy black-box attack with dynamic threshold against marl-based traffic signal control system
Multiagent reinforcement learning (MARL) promises outstanding performance for
multiintersection traffic signal control systems (TSCS), enabling intelligent administration of …
multiintersection traffic signal control systems (TSCS), enabling intelligent administration of …
Deep Reinforcement Learning for Adaptive Cyber Defense in Network Security
In the labyrinthine world of cybersecurity, the ever-evolving specter of cyber-attacks offers an
inevitable challenge to the fortifications of protection measures. Past investigations have …
inevitable challenge to the fortifications of protection measures. Past investigations have …
[HTML][HTML] The role of driver head pose dynamics and instantaneous driving in safety critical events: application of computer vision in naturalistic driving
This paper investigates the role of driver behavior especially head pose dynamics in safety–
critical events (SCEs). Using a large dataset collected in a naturalistic driving study, this …
critical events (SCEs). Using a large dataset collected in a naturalistic driving study, this …