Robotics cyber security: Vulnerabilities, attacks, countermeasures, and recommendations

JPA Yaacoub, HN Noura, O Salman… - International Journal of …, 2022 - Springer
The recent digital revolution led robots to become integrated more than ever into different
domains such as agricultural, medical, industrial, military, police (law enforcement), and …

Edge computing for autonomous driving: Opportunities and challenges

S Liu, L Liu, J Tang, B Yu, Y Wang… - Proceedings of the …, 2019 - ieeexplore.ieee.org
Safety is the most important requirement for autonomous vehicles; hence, the ultimate
challenge of designing an edge computing ecosystem for autonomous vehicles is to deliver …

Autonomous driving security: State of the art and challenges

C Gao, G Wang, W Shi, Z Wang… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
The autonomous driving industry has mushroomed over the past decade. Although
autonomous driving has undoubtedly become one of the most promising technologies of this …

Robot-assisted immersive kinematic experience transfer for welding training

Y Ye, T Zhou, J Du - Journal of Computing in Civil Engineering, 2023 - ascelibrary.org
Human motor skills are critical for executing a variety range of tasks in construction.
Traditional hands-on training is resource and labor intensive, whereas virtual training, such …

Adding salt to pepper: A structured security assessment over a humanoid robot

A Giaretta, M De Donno, N Dragoni - Proceedings of the 13th …, 2018 - dl.acm.org
The rise of connectivity, digitalization, robotics, and artificial intelligence (AI) is rapidly
changing our society and sha** its future development. During this technological and …

Intelligent and connected vehicles: Current situation, future directions, and challenges

J Liu, J Liu - IEEE Communications Standards Magazine, 2018 - ieeexplore.ieee.org
Given their large retention number worldwide, vehicles, as a very important part of the
emerging Internet of Things, have been stably evolving toward becoming highly connected …

Research on a PSO-H-SVM-based intrusion detection method for industrial robotic arms

Y Zhou, L **e, H Pan - Applied Sciences, 2022 - mdpi.com
Featured Application This research is mainly used for intrusion detection against physical
process logic attacks that industrial robotic arms may be subject to, and the establishment of …

[BUCH][B] Engineering autonomous vehicles and robots: the dragonfly modular-based approach

S Liu - 2020 - books.google.com
Offers a step-by-step guide to building autonomous vehicles and robots, with source code
and accompanying videos The first book of its kind on the detailed steps for creating an …

A case study on the cybersecurity of social robots

J Miller, AB Williams, D Perouli - Companion of the 2018 ACM/IEEE …, 2018 - dl.acm.org
During the last few years, we have observed a rapid increase in the number of robots that
are manufactured and marketed for our homes. These social robots promise to become not …

Runtime verification on hierarchical properties of ROS-based robot swarms

C Hu, W Dong, Y Yang, H Shi… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Various robots are playing critical roles in many areas such as industrial manufacturing,
disaster rescuing, unmanned vehicle, and science exploration. Because of the uncertain …