2020
DOI: 10.1007/978-3-030-46931-3_24
|View full text |Cite
|
Sign up to set email alerts
|

Queue Length Estimation Based Defence Against Data Poisoning Attack for Traffic Signal Control

Abstract: With the development of intelligent transportation systems, especially in the context of the comprehensive development and popularization of big data and 5G networks, intelligent transportation signal systems have been experimented and promoted in various countries around the world. As with other big data-based systems, specific attacks pose a threat to the security of big data-based intelligent transportation system systems. Targeting system vulnerabilities, certain simple forms of attack will have a huge imp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…Gao et al [150] proposed queue length estimation-based defense against data poisoning attacks that can be a serious threat for intelligent transportation system systems. The authors analyze the characteristics of the single-point attack and increase the number of attack points to analyze the system's vulnerabilities.…”
Section: Defenses Against Ai/m Attackmentioning
confidence: 99%
“…Gao et al [150] proposed queue length estimation-based defense against data poisoning attacks that can be a serious threat for intelligent transportation system systems. The authors analyze the characteristics of the single-point attack and increase the number of attack points to analyze the system's vulnerabilities.…”
Section: Defenses Against Ai/m Attackmentioning
confidence: 99%
“…Gao et al [83] propose queue length estimation-based defense against data poisoning attacks that can be a serious threat to intelligent transportation systems. The authors analyze the characteristics of the single-point attack and increase the number of attack points to analyze the system vulnerabilities.…”
Section: ) Defenses Against Replay Attackmentioning
confidence: 99%
“…. , G r,0 max do (16) tG r,0 � i (17) tG r,1 � effectG r − tG r,0 (18) if tG r,1 ≥ G r,1 min and tG r,1 ≤ G r,1 max then (19) Delay r � f(r, planP r,0 , planP r,1 , tG r,0 , tG r,1 , x j , A t,k ) //Calculated by Algorithm 2 (20) if Delay r < optV r then (21) optV r � Delay r (22) optG r,0 � tG r,0 (23) optG r,1 � tG r,1 (24) end if (25) end if (26) end for (27) : end for (28) else (29) v j � 99999 (30)…”
Section: High-level Image Feature-based Congestion Attackmentioning
confidence: 99%
“…We do not suggest providing two alternative versions of EVLS (i.e., one for high and one for low PR, respectively). Although we analyzed a car-following model in work [21], we believe that a more useful model with a collaboration mechanism should be studied; this will make the estimation of EVLS more accurate as well as COP security more robust.…”
Section: Defense Suggestionsmentioning
confidence: 99%