{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T19:02:51Z","timestamp":1775502171757,"version":"3.50.1"},"reference-count":138,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,9,1]],"date-time":"2026-09-01T00:00:00Z","timestamp":1788220800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,9,1]],"date-time":"2026-09-01T00:00:00Z","timestamp":1788220800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,9,1]],"date-time":"2026-09-01T00:00:00Z","timestamp":1788220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,9,1]],"date-time":"2026-09-01T00:00:00Z","timestamp":1788220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,9,1]],"date-time":"2026-09-01T00:00:00Z","timestamp":1788220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,9,1]],"date-time":"2026-09-01T00:00:00Z","timestamp":1788220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,9,1]],"date-time":"2026-09-01T00:00:00Z","timestamp":1788220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Advanced Engineering Informatics"],"published-print":{"date-parts":[[2026,9]]},"DOI":"10.1016\/j.aei.2026.104598","type":"journal-article","created":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T10:07:54Z","timestamp":1774433274000},"page":"104598","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"PA","title":["Joint Embedding Predictive Architecture for autonomous vehicle safety and security: A comprehensive survey"],"prefix":"10.1016","volume":"74","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8833-2274","authenticated-orcid":false,"given":"Md Meftahul","family":"Ferdaus","sequence":"first","affiliation":[]},{"given":"Tanmoy","family":"Dam","sequence":"additional","affiliation":[]},{"given":"Md Rasel","family":"Sarkar","sequence":"additional","affiliation":[]},{"given":"Sreenatha G.","family":"Anavatti","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.aei.2026.104598_b1","series-title":"Taxonomy and Definitions for Terms Related to Driving Automation Systems for On-Road Motor Vehicles","author":"On-Road Automated Driving (ORAD) Committee","year":"2021"},{"issue":"3","key":"10.1016\/j.aei.2026.104598_b2","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1002\/rob.21918","article-title":"A survey of deep learning techniques for autonomous driving","volume":"37","author":"Grigorescu","year":"2020","journal-title":"J. Field Robot."},{"issue":"1","key":"10.1016\/j.aei.2026.104598_b3","doi-asserted-by":"crossref","first-page":"15","DOI":"10.4271\/2016-01-0128","article-title":"Challenges in autonomous vehicle testing and validation","volume":"4","author":"Koopman","year":"2016","journal-title":"SAE Int. J. Transp. Saf."},{"issue":"2","key":"10.1016\/j.aei.2026.104598_b4","first-page":"546","article-title":"Potential cyberattacks on automated vehicles","volume":"16","author":"Petit","year":"2015","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.aei.2026.104598_b5","first-page":"182","article-title":"Driving to safety: How many miles of driving would it take to demonstrate autonomous vehicle reliability?","volume":"94","author":"Kalra","year":"2016","journal-title":"Transp. Res. A: Policy Pract."},{"key":"10.1016\/j.aei.2026.104598_b6","article-title":"A path towards autonomous machine intelligence version 0.9. 2, 2022-06-27","volume":"62","author":"LeCun","year":"2022","journal-title":"Open Rev."},{"key":"10.1016\/j.aei.2026.104598_b7","doi-asserted-by":"crossref","unstructured":"M. Assran, Q. Duval, I. Misra, P. Bojanowski, P. Vincent, M. Rabbat, Y. LeCun, N. Ballas, Self-supervised learning from images with a joint-embedding predictive architecture, in: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2023, pp. 15619\u201315629.","DOI":"10.1109\/CVPR52729.2023.01499"},{"key":"10.1016\/j.aei.2026.104598_b8","unstructured":"A. Bardes, J. Ponce, Y. LeCun, VICReg: Variance-invariance-covariance regularization for self-supervised learning, in: International Conference on Learning Representations, 2022."},{"key":"10.1016\/j.aei.2026.104598_b9","series-title":"Revisiting feature prediction for learning visual representations from video","author":"Bardes","year":"2024"},{"key":"10.1016\/j.aei.2026.104598_b10","series-title":"AD-L-JEPA: Self-Supervised spatial world models with joint embedding predictive architecture for autonomous driving with LiDAR data","author":"Zhu","year":"2025"},{"key":"10.1016\/j.aei.2026.104598_b11","series-title":"Guidelines for Performing Systematic Literature Reviews in Software Engineering","author":"Kitchenham","year":"2007"},{"key":"10.1016\/j.aei.2026.104598_b12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.infsof.2015.03.007","article-title":"Guidelines for conducting systematic mapping studies in software engineering: An update","volume":"64","author":"Petersen","year":"2015","journal-title":"Inf. Softw. Technol."},{"issue":"7","key":"10.1016\/j.aei.2026.104598_b13","doi-asserted-by":"crossref","DOI":"10.1371\/journal.pmed.1000097","article-title":"Preferred reporting items for systematic reviews and meta-analyses: the PRISMA statement","volume":"6","author":"Moher","year":"2009","journal-title":"PLoS Med."},{"key":"10.1016\/j.aei.2026.104598_b14","series-title":"Guidelines for performing systematic literature reviews in software engineering","author":"Keele","year":"2007"},{"key":"10.1016\/j.aei.2026.104598_b15","series-title":"International Conference on Computer Safety, Reliability, and Security","first-page":"5","article-title":"Making the case for safety of machine learning in highly automated driving","author":"Burton","year":"2017"},{"issue":"11","key":"10.1016\/j.aei.2026.104598_b16","doi-asserted-by":"crossref","first-page":"2898","DOI":"10.1109\/TITS.2017.2665968","article-title":"Cyber threats facing autonomous and connected vehicles: Future challenges","volume":"18","author":"Parkinson","year":"2017","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.aei.2026.104598_b17","series-title":"ISO 26262-1:2018 Road vehicles \u2013 Functional safety \u2013 Part 1: Vocabulary","year":"2018"},{"key":"10.1016\/j.aei.2026.104598_b18","series-title":"Road vehicles \u2014 Safety of the intended functionality","year":"2019"},{"key":"10.1016\/j.aei.2026.104598_b19","series-title":"Concrete problems in AI safety","author":"Amodei","year":"2016"},{"issue":"4","key":"10.1016\/j.aei.2026.104598_b20","first-page":"105","article-title":"Research priorities for robust and beneficial artificial intelligence","volume":"36","author":"Russell","year":"2015","journal-title":"AI Mag."},{"issue":"7524","key":"10.1016\/j.aei.2026.104598_b21","doi-asserted-by":"crossref","first-page":"1064","DOI":"10.1136\/bmj.38636.593461.68","article-title":"Effectiveness and efficiency of search methods in systematic reviews of complex evidence: audit of primary sources","volume":"331","author":"Greenhalgh","year":"2005","journal-title":"Bmj"},{"issue":"2","key":"10.1016\/j.aei.2026.104598_b22","doi-asserted-by":"crossref","DOI":"10.2307\/4132319","article-title":"Analyzing the past to prepare for the future: Writing a literature review","volume":"26","author":"Webster","year":"2002","journal-title":"MIS Q."},{"key":"10.1016\/j.aei.2026.104598_b23","series-title":"Research Synthesis and Meta-Analysis: A Step-by-Step Approach","author":"Cooper","year":"2015"},{"issue":"2","key":"10.1016\/j.aei.2026.104598_b24","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1111\/j.1471-1842.2009.00848.x","article-title":"A typology of reviews: an analysis of 14 review types and associated methodologies","volume":"26","author":"Grant","year":"2009","journal-title":"Health Inf. Libr. J."},{"key":"10.1016\/j.aei.2026.104598_b25","series-title":"DBLP computer science bibliography","author":"DBLP","year":"2023"},{"issue":"6","key":"10.1016\/j.aei.2026.104598_b26","doi-asserted-by":"crossref","first-page":"1157","DOI":"10.1002\/asi.23044","article-title":"Arxiv E-prints and the journal of record: An analysis of roles and relationships","volume":"65","author":"Larivi\u00e8re","year":"2014","journal-title":"J. Assoc. Inf. Sci. Technol."},{"key":"10.1016\/j.aei.2026.104598_b27","series-title":"Systematic Reviews in the Social Sciences: A Practical Guide","author":"Petticrew","year":"2006"},{"key":"10.1016\/j.aei.2026.104598_b28","series-title":"Cochrane Handbook for Systematic Reviews of Interventions","volume":"vol. 4(1002)","author":"Chandler","year":"2019"},{"key":"10.1016\/j.aei.2026.104598_b29","series-title":"Systematic Approaches to a Successful Literature Review","author":"Booth","year":"2021"},{"key":"10.1016\/j.aei.2026.104598_b30","series-title":"International Conference on Machine Learning","first-page":"1597","article-title":"A simple framework for contrastive learning of visual representations","author":"Chen","year":"2020"},{"issue":"1\u20133","key":"10.1016\/j.aei.2026.104598_b31","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1561\/0600000079","article-title":"Computer vision for autonomous vehicles: Problems, datasets and state of the art","volume":"12","author":"Janai","year":"2020","journal-title":"Found. Trends Comput. Graph. Vis."},{"key":"10.1016\/j.aei.2026.104598_b32","series-title":"Publication bias in meta-analysis: prevention, assessment and adjustments","author":"Rothstein","year":"2005"},{"issue":"2","key":"10.1016\/j.aei.2026.104598_b33","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1017\/S0266462312000086","article-title":"English-language restriction in systematic reviews of health care interventions: a systematic review of systematic reviews","volume":"28","author":"Morrison","year":"2012","journal-title":"Int. J. Technol. Assess. Health Care"},{"key":"10.1016\/j.aei.2026.104598_b34","series-title":"An Introduction to Systematic Reviews","author":"Gough","year":"2017"},{"key":"10.1016\/j.aei.2026.104598_b35","doi-asserted-by":"crossref","unstructured":"K. He, X. Chen, S. Xie, Y. Li, P. Doll\u00e1r, R. Girshick, Masked autoencoders are scalable vision learners, in: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2022, pp. 16000\u201316009.","DOI":"10.1109\/CVPR52688.2022.01553"},{"key":"10.1016\/j.aei.2026.104598_b36","unstructured":"A. Dosovitskiy, L. Beyer, A. Kolesnikov, D. Weissenborn, X. Zhai, T. Unterthiner, M. Dehghani, M. Minderer, G. Heigold, S. Gelly, et al., An image is worth 16x16 words: Transformers for image recognition at scale, in: International Conference on Learning Representations, 2021."},{"key":"10.1016\/j.aei.2026.104598_b37","doi-asserted-by":"crossref","unstructured":"H. Caesar, V. Bankiti, A.H. Lang, S. Vora, V.E. Liong, Q. Xu, A. Krishnan, Y. Pan, G. Baldan, O. Beijbom, nuScenes: A multimodal dataset for autonomous driving, in: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2020, pp. 11621\u201311631.","DOI":"10.1109\/CVPR42600.2020.01164"},{"key":"10.1016\/j.aei.2026.104598_b38","series-title":"Are we ready for autonomous driving? the kitti vision benchmark suite","first-page":"3354","author":"Geiger","year":"2012"},{"issue":"8","key":"10.1016\/j.aei.2026.104598_b39","doi-asserted-by":"crossref","first-page":"1798","DOI":"10.1109\/TPAMI.2013.50","article-title":"Representation learning: A review and new perspectives","volume":"35","author":"Bengio","year":"2013","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10.1016\/j.aei.2026.104598_b40","series-title":"Deep Learning","author":"Goodfellow","year":"2016"},{"key":"10.1016\/j.aei.2026.104598_b41","series-title":"End to end learning for self-driving cars","author":"Bojarski","year":"2016"},{"key":"10.1016\/j.aei.2026.104598_b42","doi-asserted-by":"crossref","unstructured":"C. Chen, A. Seff, A. Kornhauser, J. Xiao, DeepDriving: Learning affordance for direct perception in autonomous driving, in: Proceedings of the IEEE International Conference on Computer Vision, 2015, pp. 2722\u20132730.","DOI":"10.1109\/ICCV.2015.312"},{"issue":"7553","key":"10.1016\/j.aei.2026.104598_b43","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep learning","volume":"521","author":"LeCun","year":"2015","journal-title":"Nature"},{"issue":"11","key":"10.1016\/j.aei.2026.104598_b44","doi-asserted-by":"crossref","first-page":"4037","DOI":"10.1109\/TPAMI.2020.2992393","article-title":"Self-supervised visual feature learning with deep neural networks: A survey","volume":"43","author":"Jing","year":"2020","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"1","key":"10.1016\/j.aei.2026.104598_b45","first-page":"857","article-title":"Self-supervised learning: Generative or contrastive","volume":"35","author":"Liu","year":"2021","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"1","key":"10.1016\/j.aei.2026.104598_b46","doi-asserted-by":"crossref","first-page":"693","DOI":"10.1146\/annurev-psych-122414-033437","article-title":"Scientific misconduct","volume":"67","author":"Gross","year":"2016","journal-title":"Annu. Rev. Psychol."},{"issue":"10","key":"10.1016\/j.aei.2026.104598_b47","doi-asserted-by":"crossref","first-page":"3","DOI":"10.3102\/0013189X005010003","article-title":"Primary, secondary, and meta-analysis of research","volume":"5","author":"Glass","year":"1976","journal-title":"Educ. Res."},{"issue":"9074","key":"10.1016\/j.aei.2026.104598_b48","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1016\/S0140-6736(97)02419-7","article-title":"Language bias in randomised controlled trials published in English and German","volume":"350","author":"Egger","year":"1997","journal-title":"Lancet"},{"issue":"1","key":"10.1016\/j.aei.2026.104598_b49","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1186\/1741-7015-10-124","article-title":"The anatomy of open access publishing: a study of longitudinal development and internal structure","volume":"10","author":"Laakso","year":"2012","journal-title":"BMC Med."},{"key":"10.1016\/j.aei.2026.104598_b50","article-title":"AMSTAR 2: a critical appraisal tool for systematic reviews that include randomised or non-randomised studies of healthcare interventions, or both","volume":"358","author":"Shea","year":"2017","journal-title":"Bmj"},{"issue":"1","key":"10.1016\/j.aei.2026.104598_b51","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1177\/001316446002000104","article-title":"A coefficient of agreement for nominal scales","volume":"20","author":"Cohen","year":"1960","journal-title":"Educ. Psychol. Meas."},{"issue":"10","key":"10.1016\/j.aei.2026.104598_b52","first-page":"e1","article-title":"The PRISMA statement for reporting systematic reviews and meta-analyses of studies that evaluate health care interventions: explanation and elaboration","volume":"339","author":"Liberati","year":"2009","journal-title":"Bmj"},{"issue":"1","key":"10.1016\/j.aei.2026.104598_b53","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1001\/jama.295.1.90","article-title":"The history and meaning of the journal impact factor","volume":"295","author":"Garfield","year":"2006","journal-title":"Jama"},{"key":"10.1016\/j.aei.2026.104598_b54","series-title":"Standard quality assessment criteria for evaluating primary research papers from a variety of fields","author":"Kmet","year":"2004"},{"issue":"1","key":"10.1016\/j.aei.2026.104598_b55","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/0197-2456(95)00134-4","article-title":"Assessing the quality of reports of randomized clinical trials: is blinding necessary?","volume":"17","author":"Jadad","year":"1996","journal-title":"Controlled Clin. Trials"},{"issue":"6060","key":"10.1016\/j.aei.2026.104598_b56","doi-asserted-by":"crossref","first-page":"1226","DOI":"10.1126\/science.1213847","article-title":"Reproducible research in computational science","volume":"334","author":"Peng","year":"2011","journal-title":"Science"},{"key":"10.1016\/j.aei.2026.104598_b57","first-page":"1","article-title":"Statistical comparisons of classifiers over multiple data sets","volume":"7","author":"Dem\u0161ar","year":"2006","journal-title":"J. Mach. Learn. Res."},{"issue":"46","key":"10.1016\/j.aei.2026.104598_b58","doi-asserted-by":"crossref","first-page":"16569","DOI":"10.1073\/pnas.0507655102","article-title":"An index to quantify an individual\u2019s scientific research output","volume":"102","author":"Hirsch","year":"2005","journal-title":"Proc. Natl. Acad. Sci."},{"key":"10.1016\/j.aei.2026.104598_b59","series-title":"Adam: A method for stochastic optimization","author":"Kingma","year":"2014"},{"key":"10.1016\/j.aei.2026.104598_b60","doi-asserted-by":"crossref","first-page":"58443","DOI":"10.1109\/ACCESS.2020.2983149","article-title":"A survey of autonomous driving: Common practices and emerging technologies","volume":"8","author":"Yurtsever","year":"2020","journal-title":"IEEE Access"},{"issue":"5","key":"10.1016\/j.aei.2026.104598_b61","doi-asserted-by":"crossref","first-page":"4909","DOI":"10.1109\/TITS.2021.3054625","article-title":"Deep reinforcement learning for autonomous driving: Datasets, methods, and challenges","volume":"23","author":"Kiran","year":"2022","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"2","key":"10.1016\/j.aei.2026.104598_b62","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1191\/1478088706qp063oa","article-title":"Using thematic analysis in psychology","volume":"3","author":"Braun","year":"2006","journal-title":"Qual. Res. Psychol."},{"key":"10.1016\/j.aei.2026.104598_b63","series-title":"Guidance on the conduct of narrative synthesis in systematic reviews, A product from the ESRC methods programme Version 1","first-page":"b92","author":"Popay","year":"2006"},{"key":"10.1016\/j.aei.2026.104598_b64","series-title":"MobileNets: Efficient convolutional neural networks for mobile vision applications","author":"Howard","year":"2017"},{"key":"10.1016\/j.aei.2026.104598_b65","series-title":"Benchmarking neural network robustness to common corruptions and perturbations","author":"Hendrycks","year":"2019"},{"issue":"6","key":"10.1016\/j.aei.2026.104598_b66","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/TDSC.2004.2","article-title":"Deep reinforcement learning for autonomous driving: a survey","volume":"1","author":"Avizienis","year":"2004","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"issue":"7359","key":"10.1016\/j.aei.2026.104598_b67","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1038\/476145a","article-title":"Arxiv at 20","volume":"476","author":"Ginsparg","year":"2011","journal-title":"Nature"},{"key":"10.1016\/j.aei.2026.104598_b68","series-title":"International Conference on Transport Systems Telematics","first-page":"53","article-title":"Challenges in object detection under rainy weather conditions","author":"Hasirlioglu","year":"2018"},{"issue":"10","key":"10.1016\/j.aei.2026.104598_b69","doi-asserted-by":"crossref","first-page":"5913","DOI":"10.1109\/TGRS.2017.2716984","article-title":"Detection of cars in High-Resolution aerial images of complex urban environments","volume":"55","author":"ElMikaty","year":"2017","journal-title":"IEEE Trans. Geosci. Remote Sens."},{"key":"10.1016\/j.aei.2026.104598_b70","series-title":"Road vehicles \u2014 Safety of the intended functionality","year":"2019"},{"key":"10.1016\/j.aei.2026.104598_b71","doi-asserted-by":"crossref","first-page":"87456","DOI":"10.1109\/ACCESS.2020.2993730","article-title":"Survey on scenario-based safety assessment of automated vehicles","volume":"8","author":"Riedmaier","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.aei.2026.104598_b72","unstructured":"S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Savage, K. Koscher, A. Czeskis, F. Roesner, T. Kohno, et al., Comprehensive experimental analyses of automotive attack surfaces, in: USENIX Security Symposium, 2011."},{"key":"10.1016\/j.aei.2026.104598_b73","series-title":"Black Hat USA","first-page":"1","article-title":"Remote exploitation of an unaltered passenger vehicle","author":"Miller","year":"2015"},{"key":"10.1016\/j.aei.2026.104598_b74","series-title":"DEF CON","article-title":"Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle","volume":"Vol. 24","author":"Yan","year":"2016"},{"key":"10.1016\/j.aei.2026.104598_b75","doi-asserted-by":"crossref","unstructured":"Y. Cao, C. Xiao, B. Cyr, Y. Zhou, W. Park, S. Rampazzi, Q.A. Chen, K. Fu, Z.M. Mao, Adversarial sensor attack on lidar-based perception in autonomous driving, in: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019, pp. 2267\u20132281.","DOI":"10.1145\/3319535.3339815"},{"key":"10.1016\/j.aei.2026.104598_b76","doi-asserted-by":"crossref","unstructured":"K. Eykholt, I. Evtimov, E. Fernandes, B. Li, A. Rahmati, C. Xiao, A. Prakash, T. Kohno, D. Song, Robust physical-world attacks on deep learning visual classification, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2018, pp. 1625\u20131634.","DOI":"10.1109\/CVPR.2018.00175"},{"key":"10.1016\/j.aei.2026.104598_b77","doi-asserted-by":"crossref","unstructured":"N.O. Tippenhauer, C. P\u00f6pper, K.B. Rasmussen, S. Capkun, On the requirements for successful GPS spoofing attacks, in: Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011, pp. 75\u201386.","DOI":"10.1145\/2046707.2046719"},{"key":"10.1016\/j.aei.2026.104598_b78","series-title":"IEEE Symposium on Security and Privacy","first-page":"447","article-title":"Experimental security analysis of a modern automobile","author":"Koscher","year":"2010"},{"issue":"2","key":"10.1016\/j.aei.2026.104598_b79","first-page":"993","article-title":"A practical wireless attack on the connected car and security protocol for in-vehicle CAN","volume":"16","author":"Woo","year":"2015","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"3","key":"10.1016\/j.aei.2026.104598_b80","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2971482","article-title":"Connected car: technologies, issues, future trends","volume":"49","author":"Coppola","year":"2016","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.aei.2026.104598_b81","doi-asserted-by":"crossref","unstructured":"J. Redmon, S. Divvala, R. Girshick, A. Farhadi, You only look once: Unified, real-time object detection, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2016, pp. 779\u2013788.","DOI":"10.1109\/CVPR.2016.91"},{"key":"10.1016\/j.aei.2026.104598_b82","series-title":"European Conference on Computer Vision","first-page":"21","article-title":"SSD: Single shot multibox detector","author":"Liu","year":"2016"},{"issue":"5","key":"10.1016\/j.aei.2026.104598_b83","doi-asserted-by":"crossref","first-page":"901","DOI":"10.1109\/21.44007","article-title":"Multisensor integration and fusion in intelligent systems","volume":"19","author":"Luo","year":"1989","journal-title":"IEEE Trans. Syst. Man Cybern."},{"key":"10.1016\/j.aei.2026.104598_b84","doi-asserted-by":"crossref","unstructured":"C.R. Qi, W. Liu, C. Wu, H. Su, L.J. Guibas, Frustum pointnets for 3d object detection from rgb-d data, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2018, pp. 918\u2013927.","DOI":"10.1109\/CVPR.2018.00102"},{"key":"10.1016\/j.aei.2026.104598_b85","article-title":"Attention is all you need","volume":"30","author":"Vaswani","year":"2017","journal-title":"Adv. Neural Inf. Process. Syst."},{"issue":"7540","key":"10.1016\/j.aei.2026.104598_b86","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1038\/nature14236","article-title":"Human-level control through deep reinforcement learning","volume":"518","author":"Mnih","year":"2015","journal-title":"Nature"},{"key":"10.1016\/j.aei.2026.104598_b87","series-title":"IEEE\/RSJ International Conference on Intelligent Robots and Systems","first-page":"1","article-title":"Safe reinforcement learning on autonomous vehicles","author":"Isele","year":"2018"},{"key":"10.1016\/j.aei.2026.104598_b88","doi-asserted-by":"crossref","unstructured":"K. He, H. Fan, Y. Wu, S. Xie, R. Girshick, Momentum contrast for unsupervised visual representation learning, in: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2020, pp. 9729\u20139738.","DOI":"10.1109\/CVPR42600.2020.00975"},{"key":"10.1016\/j.aei.2026.104598_b89","series-title":"Advances in Neural Information Processing Systems","first-page":"9912","article-title":"Unsupervised learning of visual features by contrasting cluster assignments","volume":"Vol. 33","author":"Caron","year":"2020"},{"key":"10.1016\/j.aei.2026.104598_b90","doi-asserted-by":"crossref","unstructured":"M. Caron, H. Touvron, I. Misra, H. J\u00e9gou, J. Mairal, P. Bojanowski, A. Joulin, Emerging properties in self-supervised vision transformers, in: Proceedings of the IEEE\/CVF International Conference on Computer Vision, 2021, pp. 9650\u20139660.","DOI":"10.1109\/ICCV48922.2021.00951"},{"key":"10.1016\/j.aei.2026.104598_b91","series-title":"Advances in Neural Information Processing Systems","first-page":"3407","article-title":"Demystifying contrastive self-supervised learning: Invariances, augmentations and dataset biases","volume":"Vol. 33","author":"Purushwalkam","year":"2020"},{"key":"10.1016\/j.aei.2026.104598_b92","doi-asserted-by":"crossref","unstructured":"A. Srinivas, T.-Y. Lin, N. Parmar, J. Shlens, A. Vaswani, P. Abbeel, Bottleneck transformers for visual recognition, in: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2021, pp. 16519\u201316529.","DOI":"10.1109\/CVPR46437.2021.01625"},{"key":"10.1016\/j.aei.2026.104598_b93","unstructured":"M. Mathieu, C. Couprie, Y. LeCun, Deep multi-scale video prediction beyond mean square error, in: International Conference on Learning Representations, 2016."},{"key":"10.1016\/j.aei.2026.104598_b94","unstructured":"W. Lotter, G. Kreiman, D. Cox, Deep predictive coding networks for video prediction and unsupervised learning, in: International Conference on Learning Representations, 2017."},{"key":"10.1016\/j.aei.2026.104598_b95","series-title":"International Conference on Machine Learning","first-page":"2555","article-title":"Learning latent dynamics for planning from pixels","author":"Hafner","year":"2019"},{"key":"10.1016\/j.aei.2026.104598_b96","series-title":"Predicting Structured Data","article-title":"A tutorial on energy-based learning","author":"LeCun","year":"2006"},{"key":"10.1016\/j.aei.2026.104598_b97","series-title":"Advances in Neural Information Processing Systems","first-page":"21271","article-title":"Bootstrap your own latent-a new approach to self-supervised learning","volume":"Vol. 33","author":"Grill","year":"2020"},{"key":"10.1016\/j.aei.2026.104598_b98","series-title":"Advances in Neural Information Processing Systems","article-title":"Stand-alone self-attention in vision models","volume":"Vol. 32","author":"Ramachandran","year":"2019"},{"key":"10.1016\/j.aei.2026.104598_b99","doi-asserted-by":"crossref","unstructured":"D. Pathak, P. Krahenbuhl, J. Donahue, T. Darrell, A.A. Efros, Context encoders: Feature learning by inpainting, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2016, pp. 2536\u20132544.","DOI":"10.1109\/CVPR.2016.278"},{"key":"10.1016\/j.aei.2026.104598_b100","series-title":"European Conference on Computer Vision","first-page":"649","article-title":"Colorful image colorization","author":"Zhang","year":"2016"},{"key":"10.1016\/j.aei.2026.104598_b101","doi-asserted-by":"crossref","unstructured":"J. Devlin, M.-W. Chang, K. Lee, K. Toutanova, BERT: Pre-training of deep bidirectional transformers for language understanding, in: Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics, 2019, pp. 4171\u20134186.","DOI":"10.18653\/v1\/N19-1423"},{"key":"10.1016\/j.aei.2026.104598_b102","doi-asserted-by":"crossref","unstructured":"B. Zhou, A. Khosla, A. Lapedriza, A. Oliva, A. Torralba, Learning deep features for discriminative localization, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2016, pp. 2921\u20132929.","DOI":"10.1109\/CVPR.2016.319"},{"key":"10.1016\/j.aei.2026.104598_b103","series-title":"DINOv2: Learning robust visual features without supervision","author":"Oquab","year":"2023"},{"key":"10.1016\/j.aei.2026.104598_b104","doi-asserted-by":"crossref","unstructured":"D. Tran, H. Wang, L. Torresani, J. Ray, Y. LeCun, M. Paluri, A closer look at spatiotemporal convolutions for action recognition, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2018, pp. 6450\u20136459.","DOI":"10.1109\/CVPR.2018.00675"},{"key":"10.1016\/j.aei.2026.104598_b105","series-title":"V-JEPA 2: Self-Supervised video models enable understanding, prediction and planning","author":"Assran","year":"2025"},{"key":"10.1016\/j.aei.2026.104598_b106","series-title":"Advances in Neural Information Processing Systems","first-page":"12449","article-title":"Wav2vec 2.0: A framework for self-supervised learning of speech representations","volume":"Vol. 33","author":"Baevski","year":"2020"},{"key":"10.1016\/j.aei.2026.104598_b107","series-title":"Wav2vec: Unsupervised pre-training for speech recognition","author":"Schneider","year":"2019"},{"key":"10.1016\/j.aei.2026.104598_b108","series-title":"IEEE International Conference on Acoustics, Speech and Signal Processing","first-page":"776","article-title":"Audio set: An ontology and human-labeled dataset for audio events","author":"Gemmeke","year":"2017"},{"key":"10.1016\/j.aei.2026.104598_b109","series-title":"International Conference on Machine Learning","first-page":"8748","article-title":"Learning transferable visual models from natural language supervision","author":"Radford","year":"2021"},{"key":"10.1016\/j.aei.2026.104598_b110","doi-asserted-by":"crossref","unstructured":"A. Saito, P. Kudeshia, J. Poovvancheri, Point-JEPA: A Joint Embedding Predictive Architecture for Self-Supervised Learning on Point Cloud, in: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision, WACV, 2025, pp. 7348\u20137357.","DOI":"10.1109\/WACV61041.2025.00714"},{"key":"10.1016\/j.aei.2026.104598_b111","series-title":"VL-JEPA: Joint embedding predictive architecture for Vision-Language","author":"Chen","year":"2025"},{"key":"10.1016\/j.aei.2026.104598_b112","series-title":"LLM-JEPA: Large language models meet joint embedding predictive architectures","author":"Huang","year":"2025"},{"key":"10.1016\/j.aei.2026.104598_b113","series-title":"Causal-JEPA: Learning world models through Object-Level latent interventions","author":"Nam","year":"2026"},{"key":"10.1016\/j.aei.2026.104598_b114","series-title":"LeJEPA: Provable and scalable Self-Supervised learning without the heuristics","author":"Balestriero","year":"2025"},{"key":"10.1016\/j.aei.2026.104598_b115","series-title":"Advances in Neural Information Processing Systems","first-page":"2672","article-title":"Generative adversarial nets","author":"Goodfellow","year":"2014"},{"key":"10.1016\/j.aei.2026.104598_b116","unstructured":"D.P. Kingma, M. Welling, Auto-encoding variational bayes, in: International Conference on Learning Representations, 2014."},{"key":"10.1016\/j.aei.2026.104598_b117","series-title":"Advances in Neural Information Processing Systems","article-title":"Generating diverse high-fidelity images with VQ-VAE-2","volume":"Vol. 32","author":"Razavi","year":"2019"},{"key":"10.1016\/j.aei.2026.104598_b118","doi-asserted-by":"crossref","unstructured":"T. Karras, S. Laine, M. Aittala, J. Hellsten, J. Lehtinen, T. Aila, Analyzing and improving the image quality of StyleGAN, in: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2020, pp. 8110\u20138119.","DOI":"10.1109\/CVPR42600.2020.00813"},{"key":"10.1016\/j.aei.2026.104598_b119","doi-asserted-by":"crossref","unstructured":"R. Qian, T. Meng, B. Gong, M.-H. Yang, H. Wang, S. Belongie, Y. Cui, Spatiotemporal contrastive video representation learning, in: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2021, pp. 6964\u20136974.","DOI":"10.1109\/CVPR46437.2021.00689"},{"key":"10.1016\/j.aei.2026.104598_b120","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"9653","article-title":"SimMIM: A simple framework for masked image modeling","author":"Xie","year":"2022"},{"key":"10.1016\/j.aei.2026.104598_b121","doi-asserted-by":"crossref","DOI":"10.1016\/j.sigpro.2024.109619","article-title":"Enhancing autonomous driving safety: A robust traffic sign detection and recognition model TSD-YOLO","volume":"225","author":"Zhao","year":"2024","journal-title":"Signal Process."},{"key":"10.1016\/j.aei.2026.104598_b122","doi-asserted-by":"crossref","DOI":"10.1016\/j.cviu.2024.104200","article-title":"WGS-YOLO: A Real-Time object detector based on YOLO framework for autonomous driving","volume":"249","author":"Yue","year":"2024","journal-title":"Comput. Vis. Image Underst."},{"key":"10.1016\/j.aei.2026.104598_b123","series-title":"YOLO-Vehicle-Pro: A Cloud-Edge collaborative framework for object detection in autonomous driving under adverse weather conditions","author":"Li","year":"2024"},{"key":"10.1016\/j.aei.2026.104598_b124","series-title":"A survey of vision transformers in autonomous driving: Current trends and future directions","author":"Lai","year":"2024"},{"key":"10.1016\/j.aei.2026.104598_b125","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"7077","article-title":"Multi-Modal fusion transformer for End-to-End autonomous driving","author":"Prakash","year":"2021"},{"key":"10.1016\/j.aei.2026.104598_b126","series-title":"2021 IEEE International Conference on Consumer Electronics and Computer Engineering","first-page":"565","article-title":"Resnet-based model for autonomous vehicles trajectory prediction","author":"Zhang","year":"2021"},{"key":"10.1016\/j.aei.2026.104598_b127","doi-asserted-by":"crossref","DOI":"10.1007\/s11432-019-2761-y","article-title":"Motion trajectory prediction based on a CNN-LSTM sequential model","volume":"63","author":"Xie","year":"2020","journal-title":"Sci. China Inf. Sci."},{"key":"10.1016\/j.aei.2026.104598_b128","doi-asserted-by":"crossref","unstructured":"C. Chen, A. Seff, A. Kornhauser, J. Xiao, DeepDriving: Learning Affordance for Direct Perception in Autonomous Driving, in: Proceedings of the IEEE International Conference on Computer Vision, 2015, pp. 2722\u20132730.","DOI":"10.1109\/ICCV.2015.312"},{"key":"10.1016\/j.aei.2026.104598_b129","series-title":"World models","author":"Ha","year":"2018"},{"key":"10.1016\/j.aei.2026.104598_b130","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1109\/OJVT.2023.3265363","article-title":"Cybersecurity of autonomous vehicles: A systematic literature review of adversarial attacks and defense models","volume":"4","author":"Girdhar","year":"2023","journal-title":"IEEE Open J. Veh. Technol."},{"key":"10.1016\/j.aei.2026.104598_b131","series-title":"2020 IEEE International Conference on Software Maintenance and Evolution","first-page":"1","article-title":"An analysis of adversarial attacks and defenses on autonomous driving models","author":"Deng","year":"2020"},{"key":"10.1016\/j.aei.2026.104598_b132","series-title":"2022 IEEE Intelligent Vehicles Symposium","first-page":"1011","article-title":"Adversarial attack and defense of YOLO detectors in autonomous driving scenarios","author":"Choi","year":"2022"},{"issue":"13","key":"10.1016\/j.aei.2026.104598_b133","doi-asserted-by":"crossref","first-page":"2654","DOI":"10.3390\/electronics13132654","article-title":"Cybersecurity in autonomous vehicles\u2014Are we ready for the challenge?","volume":"13","author":"Durlik","year":"2024","journal-title":"Electronics"},{"key":"10.1016\/j.aei.2026.104598_b134","doi-asserted-by":"crossref","first-page":"15284","DOI":"10.1109\/ACCESS.2023.3244883","article-title":"Autonomous vehicles with a 6G-based intelligent cybersecurity model","volume":"11","author":"Algarni","year":"2023","journal-title":"IEEE Access"},{"issue":"4","key":"10.1016\/j.aei.2026.104598_b135","doi-asserted-by":"crossref","first-page":"2356","DOI":"10.1109\/COMST.2023.3309864","article-title":"Intrusion detection in the automotive domain: A comprehensive review","volume":"25","author":"Lampe","year":"2023","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"10.1016\/j.aei.2026.104598_b136","series-title":"Autonomous vehicle security: A deep dive into threat modeling","author":"Youssef","year":"2024"},{"issue":"1","key":"10.1016\/j.aei.2026.104598_b137","doi-asserted-by":"crossref","first-page":"2485","DOI":"10.1109\/TIV.2023.3332675","article-title":"Federated learning for connected and automated vehicles: A survey of existing approaches and challenges","volume":"9","author":"Chellapandi","year":"2024","journal-title":"IEEE Trans. Intell. Veh."},{"key":"10.1016\/j.aei.2026.104598_b138","doi-asserted-by":"crossref","first-page":"1906","DOI":"10.1109\/COMST.2025.3576176","article-title":"Large Model-Based agents: State-of-the-Art, cooperation paradigms, security and privacy, and future trends","volume":"28","author":"Wang","year":"2026","journal-title":"IEEE Commun. Surv. Tutor."}],"container-title":["Advanced Engineering Informatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1474034626002909?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1474034626002909?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T18:01:17Z","timestamp":1775498477000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1474034626002909"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,9]]},"references-count":138,"alternative-id":["S1474034626002909"],"URL":"https:\/\/doi.org\/10.1016\/j.aei.2026.104598","relation":{},"ISSN":["1474-0346"],"issn-type":[{"value":"1474-0346","type":"print"}],"subject":[],"published":{"date-parts":[[2026,9]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Joint Embedding Predictive Architecture for autonomous vehicle safety and security: A comprehensive survey","name":"articletitle","label":"Article Title"},{"value":"Advanced Engineering Informatics","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.aei.2026.104598","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Published by Elsevier Ltd.","name":"copyright","label":"Copyright"}],"article-number":"104598"}}