Journal of Xidian University ›› 2021, Vol. 48 ›› Issue (3): 31-39.doi: 10.19665/j.issn1001-2400.2021.03.004
• Advances in Vehicular Network Technologies • Previous Articles Next Articles
CHAI Yanna(),LI Kunlun(),SONG Huansheng()
Received:
2020-12-09
Online:
2021-06-20
Published:
2021-07-05
Contact:
Kunlun LI
E-mail:ynchai@chd.edu.cn;kunlunli@chd.edu.cn;1192750414@qq.com
CLC Number:
CHAI Yanna,LI Kunlun,SONG Huansheng. On the security of the intrusion detection system in smart vehicles[J].Journal of Xidian University, 2021, 48(3): 31-39.
[1] | FARIVAR F, SAYAD HAGHIGHI M, BARCHINEZHAD S, et al. Detection and Compensation of Covert Service-Degrading Intrusions in Cyber Physical Systems Through Intelligent Adaptive Control[C]// Proceedings of the 2019 IEEE International Conference on Industrial Technology.Piscataway:IEEE, 2019: 1143-1148. |
[2] | 常玲, 赵蓓, 薛姗, 等. 车联网信息安全威胁分析及防护思路[J]. 移动通信, 2019,43(11):47-50. |
CHANG Ling, ZHAO Bei, XUE Shan, et al. Internetof Vehicles Information Security Threat Analysis and Protection Ideas[J]. Mobile Communication, 2019,43(11):47-50. | |
[3] | 王晨希, 孟祥峰, 王浩, 等. 医用机器人网络安全问题研究与探讨[J]. 中国医疗设备, 2020,35(9):13-17. |
WANG Chenxi, MENG Xiangfeng, WANG Hao, et al. Research and Discussion on Network Securityof Medical Robot[J]. China Medical Equipment, 2020,35(9):13-17. | |
[4] | WANG Z, MA P, ZOU X, et al. Security of Medical Cyber-physical Systems:an Empirical Study on Imaging Devices[C]// Proceedings of the IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops(INFOCOM WKSHPS).Piscataway:IEEE, 2020: 997-1002. |
[5] | 邹洪. 智能电网信息安全防御体系架构与关键技术研究[J]. 网络安全技术与应用, 2020,1:113-115. |
ZOU Hong. Smart Grid Information Security Defense Architectureand Key Technology Research[J]. Network Security Technology and Application, 2020,1:113-115. | |
[6] | 刘鑫蕊, 吴泽群. 面向智能电网的空间隐蔽型恶性数据注入攻击在线防御研究[J]. 中国电机工程学报, 2020,40(8):2546-2559. |
LIU Xinrui, WU Zequn. Researchon Online Defense of Space Hidden Malignant Data Injection Attack for Smart Grid[J]. Chinese Journal of Electrical Engineering, 2020,40(8):2546-2559. | |
[7] | ZHANG X M, HAN Q L, GE X H, et al. Networked Control Systems:a Survey of Trends and Techniques[J]. IEEE/CAA Journal of Automatica Sinica, 2020,7(01):1-17. |
[8] |
MALHI A K, BATRA S, PANNU H S. Security of Vehicular Ad-Hoc Networks:a Comprehensive Survey[J]. Computers and Security, 2020,89:101664.
doi: 10.1016/j.cose.2019.101664 |
[9] | 杨荣悦, 张鹏洲, 宋卿. 基于5G技术的智能车联网研究与展望[J]. 电信科学, 2020,36(5):106-114. |
YANG Rongyue, ZHANG Pengzhou, SONG Qing. Research and Prospect of Intelligent Vehicle Networking Basedon 5G Technology[J]. Telecom Science, 2020,36(5):106-114. | |
[10] | 武晓婷. 在“被黑”中汽车产业驶入新革命时代黑客PK车企 “战火”再升级[J]. 信息安全与通信保密, 2015,10:66-67. |
WU Xiaoting. In The Process of Being Hacked,the Automobile Industry Has Entered a New Revolutionary Era.Hackers PK The "Fire of War" of Automobile Enterprises to Upgrade Again[J]. Information Security and Communication Confidentiality, 2015,10:66-67. | |
[11] | 舒文琼. 国内首家车载信息安全产业联盟成立[J]. 通信世界, 2016,25:40. |
SHU Wenqiong. The First in Vehicle Information Security Industry Alliance in China Was Established[J]. Communication World, 2016,25:40. | |
[12] | KANG M J, KANG J W. Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security[J]. Plos One, 2016,11(6):0155781. |
[13] |
SA A O D. Covert Attacks in Cyber-Physical Control Systems[J]. IEEE Transactions on Industrial Informatics, 2017,13(4):1641-1651.
doi: 10.1109/TII.2017.2676005 |
[14] |
SHAKOURI P, ORDYS A W, LAILA D S, et al. Adaptive Cruise Control System:Comparing Gain-Scheduling PI and LQ Controllers[J]. IFAC Proceedings Volumes, 2011,44(1):12964-12969.
doi: 10.3182/20110828-6-IT-1002.02250 |
[15] |
BENGIO Y, SIMARD P, FRASCONI P. Learning Long-Term Dependencies with Gradient Descent Is Difficult[J]. IEEE Transactions on Neural Networks, 1994,5(2):157-166.
doi: 10.1109/TNN.72 |
[16] | ERHAN D, COURVILLE A, BENGIO Y, et al. Why Does Unsupervised Pre-Training Help Deep Learning?[C]// Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics.Piscataway:IEEE, 2010: 201-208. |
[17] | BENGIO Y, LAMBLIN P, POPOVICI D, et al. Greedy Layer-Wise Training of Deep Networks[J]. Advances in Neural Information Processing Systems 19, 2007,19:153-160. |
[18] | CHRISTOPHER E E, DAMON M. OCTANE:Open Car Testbed and Network Experiments Bringing Cyber-Physical Security Research to Researchers and Students[C]// Proceedings of the 2012 6th Workshop on Cyber Security Experimentation and Test({CSET}13).Washington:USENIX Association, 2013: 226-235. |
[19] | TZOVLA V, MEHTA A. A Simplified and Integrated Approach to Model Predictive Control Implementation[J]. Advances in Instrumentation and Control, 2000,53:84-91. |
[20] | ELSAYED A, HAFEZ A, OUDA A N, et al. Design of Longitudinal Motion Controller of a Small Unmanned Aerial Vehicle[J]. International Journal of Intelligent Systems and Applications, 2015,7(10):37-47. |
[21] |
PAGE P R, ABU-MAHFOUZ A M, YOYO S. Real-Time Adjustment of Pressure to Demand in Water Distribution Systems:Parameter-Less P-Controller Algorithm[J]. Procedia Engineering, 2016,154:391-397.
doi: 10.1016/j.proeng.2016.07.498 |
[1] | LV Wenkai,YANG Pengfei,DING Yunqing,ZHANG Heyu,ZHENG Tianyang. JEDERL:A task scheduling optimization algorithm for heterogeneous computing platforms [J]. Journal of Xidian University, 2021, 48(6): 67-74. |
[2] | YU Haoyang,YIN Liang,LI Shufang,LV Shun. Recognition algorithm for the little sample radar modulation signal based on the generative adversarial network [J]. Journal of Xidian University, 2021, 48(6): 96-104. |
[3] | HU Daiwang,JIAO Yiyuan,LI Yanni. Novel and efficient algorithm for entity relation extraction with the corpus knowledge graph [J]. Journal of Xidian University, 2021, 48(6): 75-83. |
[4] | SUN Yanjing,WEI Li,ZHANG Nianlong,YUN Xiao,DONG Kaiwen,GE Min,CHENG Xiaozhou,HOU Xiaofeng. Person re-identification method combining the DD-GAN and Global feature in a coal mine [J]. Journal of Xidian University, 2021, 48(5): 201-211. |
[5] | ZHOU Peng,YANG Jun. Semantic segmentation of remote sensing images based on neural architecture search [J]. Journal of Xidian University, 2021, 48(5): 47-57. |
[6] | ZHANG Shuwei,LI Junmin. Human body detection algorithm in complex monitoring scenes [J]. Journal of Xidian University, 2021, 48(5): 68-77. |
[7] | YANG Yunhang,MIN Lianquan. Multi-scalefusion sketch recognition model by dilated convolution [J]. Journal of Xidian University, 2021, 48(5): 92-99. |
[8] | ZHANG Yuhao,CHENG Peitao,ZHANG Shuhao,WANG Xiumei. Lightweight image super-resolution with the adaptive weight learning network [J]. Journal of Xidian University, 2021, 48(5): 15-22. |
[9] | HAN Yongsai,MA Shiping,HE Linyuan,LI Chenghao,ZHU Mingming,ZHANG Fei. Detection of the object in the fast remote sensing airport area on the improved YOLOv3 [J]. Journal of Xidian University, 2021, 48(5): 156-166. |
[10] | DONG Ruchan,JIAO Licheng,ZHAO Jin,SHEN Weiyan. Application of the deep fusion mechanism in object detection of remote sensing images [J]. Journal of Xidian University, 2021, 48(5): 128-138. |
[11] | CHENG De,HAO Yi,ZHOU Jingyu,WANG Nannan,GAO Xinbo. Cross-modality person re-identification utilizing the hybrid two-stream neural networks [J]. Journal of Xidian University, 2021, 48(5): 190-200. |
[12] | CHEN Changchuan,WANG Haining,HUANG Lian,HUANG Tao,LI Lianjie,HUANG Xiangkang,DAI Shaosheng. Facial expression recognition based on local representation [J]. Journal of Xidian University, 2021, 48(5): 100-109. |
[13] | SONG Jianfeng,MIAO Qiguang,WANG Chongxiao,XU Hao,YANG Jin. Multi-scale single object tracking based on the attention mechanism [J]. Journal of Xidian University, 2021, 48(5): 110-116. |
[14] | HUI Haisheng,ZHANG Xueying,WU Zelin,LI Fenglian. Method for stroke lesion segmentation using the primary-auxiliary path attention compensation network [J]. Journal of Xidian University, 2021, 48(4): 200-208. |
[15] | SONG Jianqiao,WANG Feng,NIU Jin,SHI Zezhou,MA Junhui. Potential emotion recognition based on the fusion of the spatio-temporal neural network and facial pulse signals [J]. Journal of Xidian University, 2021, 48(4): 159-167. |
|