2022
DOI: 10.1109/ojits.2022.3142612
|View full text |Cite
|
Sign up to set email alerts
|

Countering Adversarial Attacks on Autonomous Vehicles Using Denoising Techniques: A Review

Abstract: The evolution of automotive technology will eventually permit the automated driving system on the vehicle to handle all circumstances. Human occupants will be just passengers. This poses security issues that need to be addressed. This paper has two aims. The first one investigates strategies for robustifying scene analysis of adversarial road scenes. A taxonomy of the defense mechanisms for countering adversarial perturbations is initially presented, classifying those mechanisms in three major categories: thos… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
8
1
1

Relationship

1
9

Authors

Journals

citations
Cited by 29 publications
(8 citation statements)
references
References 95 publications
0
8
0
Order By: Relevance
“…While adversarial instances for 2D pictures and CNNs have received a great deal of study, 3D data like point clouds have received less attention [142]. Investigating the influence of adversarial point clouds on established deep 3D models assumes paramount importance in numerous safety-critical 3D applications, notably in the domain of autonomous driving [143]. A key component of the attack method against 3D models is the creation of 3D adversarial point clouds.…”
Section: F Attacks On Lidarmentioning
confidence: 99%
“…While adversarial instances for 2D pictures and CNNs have received a great deal of study, 3D data like point clouds have received less attention [142]. Investigating the influence of adversarial point clouds on established deep 3D models assumes paramount importance in numerous safety-critical 3D applications, notably in the domain of autonomous driving [143]. A key component of the attack method against 3D models is the creation of 3D adversarial point clouds.…”
Section: F Attacks On Lidarmentioning
confidence: 99%
“…Adversarial machine learning refers to a set of attacks techniques against intelligent systems, wherein the adversary aims to perturb, poison, or seal the underlying machine learning models [28,29]. These types of attacks are of particular concern in safety-critical applications [30]. This section explores the use of this mechanism to undermine the operations of the proposed tamper-proof detection mechanism and develops a countermeasure to enhance the security of our solution.…”
Section: Resilience To Adversarial Learning Attacksmentioning
confidence: 99%
“…To do so, scene analysis and understanding, i.e., visually detect nearby objects (e.g., vehicles, cyclists, pedestrians) by drawing bounding boxes, are necessary pre-processing steps. Deep learning can be considered paramount for this challenging perception task [13]. Localization is a step beyond perception, since it is required for optimizing the driving performance of vehicle through advanced path planning and control.…”
Section: A Preliminariesmentioning
confidence: 99%