autonomous vehicles
Recently Published Documents


TOTAL DOCUMENTS

5977
(FIVE YEARS 2768)

H-INDEX

68
(FIVE YEARS 9)

2022 ◽  
Vol 13 ◽  
pp. 100507
Author(s):  
Ella Rebalski ◽  
Marco Adelfio ◽  
Frances Sprei ◽  
Daniel J.A. Johansson

2023 ◽  
Vol 55 (1) ◽  
pp. 1-36
Author(s):  
Yupeng Hu ◽  
Wenxin Kuang ◽  
Zheng Qin ◽  
Kenli Li ◽  
Jiliang Zhang ◽  
...  

In recent years, with rapid technological advancement in both computing hardware and algorithm, Artificial Intelligence (AI) has demonstrated significant advantage over human being in a wide range of fields, such as image recognition, education, autonomous vehicles, finance, and medical diagnosis. However, AI-based systems are generally vulnerable to various security threats throughout the whole process, ranging from the initial data collection and preparation to the training, inference, and final deployment. In an AI-based system, the data collection and pre-processing phase are vulnerable to sensor spoofing attacks and scaling attacks, respectively, while the training and inference phases of the model are subject to poisoning attacks and adversarial attacks, respectively. To address these severe security threats against the AI-based systems, in this article, we review the challenges and recent research advances for security issues in AI, so as to depict an overall blueprint for AI security. More specifically, we first take the lifecycle of an AI-based system as a guide to introduce the security threats that emerge at each stage, which is followed by a detailed summary for corresponding countermeasures. Finally, some of the future challenges and opportunities for the security issues in AI will also be discussed.


2022 ◽  
Vol 14 (1) ◽  
pp. 1-10
Author(s):  
Tooska Dargahi ◽  
Hossein Ahmadvand ◽  
Mansour Naser Alraja ◽  
Chia-Mu Yu

Connected and Autonomous Vehicles (CAVs) are introduced to improve individuals’ quality of life by offering a wide range of services. They collect a huge amount of data and exchange them with each other and the infrastructure. The collected data usually includes sensitive information about the users and the surrounding environment. Therefore, data security and privacy are among the main challenges in this industry. Blockchain, an emerging distributed ledger, has been considered by the research community as a potential solution for enhancing data security, integrity, and transparency in Intelligent Transportation Systems (ITS). However, despite the emphasis of governments on the transparency of personal data protection practices, CAV stakeholders have not been successful in communicating appropriate information with the end users regarding the procedure of collecting, storing, and processing their personal data, as well as the data ownership. This article provides a vision of the opportunities and challenges of adopting blockchain in ITS from the “data transparency” and “privacy” perspective. The main aim is to answer the following questions: (1) Considering the amount of personal data collected by the CAVs, such as location, how would the integration of blockchain technology affect transparency , fairness , and lawfulness of personal data processing concerning the data subjects (as this is one of the main principles in the existing data protection regulations)? (2) How can the trade-off between transparency and privacy be addressed in blockchain-based ITS use cases?


Author(s):  
Isaac Oyeyemi Olayode ◽  
Alessandro Severino ◽  
Tiziana Campisi ◽  
Lagouge Kwanda Tartibu

In the last decades, the Italian road transport system has been characterized by severe and consistent traffic congestion and in particular Rome is one of the Italian cities most affected by this problem. In this study, a LevenbergMarquardt (LM) artificial neural network heuristic model was used to predict the traffic flow of non-autonomous vehicles. Traffic datasets were collected using both inductive loop detectors and video cameras as acquisition systems and selecting some parameters including vehicle speed, time of day, traffic volume and number of vehicles. The model showed a training, test and regression value (R2) of 0.99892, 0.99615 and 0.99714 respectively. The results of this research add to the growing body of literature on traffic flow modelling and help urban planners and traffic managers in terms of the traffic control and the provision of convenient travel routes for pedestrians and motorists.


2022 ◽  
Vol 33 (1) ◽  
pp. 100426
Author(s):  
Artur Modliński ◽  
Emilian Gwiaździński ◽  
Małgorzata Karpińska-Krakowiak

2022 ◽  
Vol 166 ◽  
pp. 106566
Author(s):  
Zhigui Chen ◽  
Xuesong Wang ◽  
Qiming Guo ◽  
Andrew Tarko

2022 ◽  
Vol 165 ◽  
pp. 106515
Author(s):  
Shah Khalid Khan ◽  
Nirajan Shiwakoti ◽  
Peter Stasinopoulos

2022 ◽  
Vol 21 (1) ◽  
pp. 1-24
Author(s):  
Katherine Missimer ◽  
Manos Athanassoulis ◽  
Richard West

Modern solid-state disks achieve high data transfer rates due to their massive internal parallelism. However, out-of-place updates for flash memory incur garbage collection costs when valid data needs to be copied during space reclamation. The root cause of this extra cost is that solid-state disks are not always able to accurately determine data lifetime and group together data that expires before the space needs to be reclaimed. Real-time systems found in autonomous vehicles, industrial control systems, and assembly-line robots store data from hundreds of sensors and often have predictable data lifetimes. These systems require guaranteed high storage bandwidth for read and write operations by mission-critical real-time tasks. In this article, we depart from the traditional block device interface to guarantee the high throughput needed to process large volumes of data. Using data lifetime information from the application layer, our proposed real-time design, called Telomere , is able to intelligently lay out data in NAND flash memory and eliminate valid page copies during garbage collection. Telomere’s real-time admission control is able to guarantee tasks their required read and write operations within their periods. Under randomly generated tasksets containing 500 tasks, Telomere achieves 30% higher throughput with a 5% storage cost compared to pre-existing techniques.


Sign in / Sign up

Export Citation Format

Share Document