Robotics cyber security: Vulnerabilities, attacks, countermeasures, and recommendations
The recent digital revolution led robots to become integrated more than ever into different
domains such as agricultural, medical, industrial, military, police (law enforcement), and …
domains such as agricultural, medical, industrial, military, police (law enforcement), and …
Edge computing for autonomous driving: Opportunities and challenges
Safety is the most important requirement for autonomous vehicles; hence, the ultimate
challenge of designing an edge computing ecosystem for autonomous vehicles is to deliver …
challenge of designing an edge computing ecosystem for autonomous vehicles is to deliver …
Autonomous driving security: State of the art and challenges
The autonomous driving industry has mushroomed over the past decade. Although
autonomous driving has undoubtedly become one of the most promising technologies of this …
autonomous driving has undoubtedly become one of the most promising technologies of this …
Robot-assisted immersive kinematic experience transfer for welding training
Human motor skills are critical for executing a variety range of tasks in construction.
Traditional hands-on training is resource and labor intensive, whereas virtual training, such …
Traditional hands-on training is resource and labor intensive, whereas virtual training, such …
Adding salt to pepper: A structured security assessment over a humanoid robot
The rise of connectivity, digitalization, robotics, and artificial intelligence (AI) is rapidly
changing our society and sha** its future development. During this technological and …
changing our society and sha** its future development. During this technological and …
Intelligent and connected vehicles: Current situation, future directions, and challenges
J Liu, J Liu - IEEE Communications Standards Magazine, 2018 - ieeexplore.ieee.org
Given their large retention number worldwide, vehicles, as a very important part of the
emerging Internet of Things, have been stably evolving toward becoming highly connected …
emerging Internet of Things, have been stably evolving toward becoming highly connected …
Research on a PSO-H-SVM-based intrusion detection method for industrial robotic arms
Y Zhou, L **e, H Pan - Applied Sciences, 2022 - mdpi.com
Featured Application This research is mainly used for intrusion detection against physical
process logic attacks that industrial robotic arms may be subject to, and the establishment of …
process logic attacks that industrial robotic arms may be subject to, and the establishment of …
[BUCH][B] Engineering autonomous vehicles and robots: the dragonfly modular-based approach
S Liu - 2020 - books.google.com
Offers a step-by-step guide to building autonomous vehicles and robots, with source code
and accompanying videos The first book of its kind on the detailed steps for creating an …
and accompanying videos The first book of its kind on the detailed steps for creating an …
A case study on the cybersecurity of social robots
During the last few years, we have observed a rapid increase in the number of robots that
are manufactured and marketed for our homes. These social robots promise to become not …
are manufactured and marketed for our homes. These social robots promise to become not …
Runtime verification on hierarchical properties of ROS-based robot swarms
C Hu, W Dong, Y Yang, H Shi… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Various robots are playing critical roles in many areas such as industrial manufacturing,
disaster rescuing, unmanned vehicle, and science exploration. Because of the uncertain …
disaster rescuing, unmanned vehicle, and science exploration. Because of the uncertain …