{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T16:06:36Z","timestamp":1756310796848,"version":"3.28.0"},"reference-count":41,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1109\/dsn48063.2020.00030","type":"proceedings-article","created":{"date-parts":[[2020,7,31]],"date-time":"2020-07-31T16:52:43Z","timestamp":1596214363000},"page":"113-124","source":"Crossref","is-referenced-by-count":19,"title":["ML-Driven Malware that Targets AV Safety"],"prefix":"10.1109","author":[{"given":"Saurabh","family":"Jha","sequence":"first","affiliation":[]},{"given":"Shengkun","family":"Cui","sequence":"additional","affiliation":[]},{"given":"Subho","family":"Banerjee","sequence":"additional","affiliation":[]},{"given":"James","family":"Cyriac","sequence":"additional","affiliation":[]},{"given":"Timothy","family":"Tsai","sequence":"additional","affiliation":[]},{"given":"Zbigniew","family":"Kalbarczyk","sequence":"additional","affiliation":[]},{"given":"Ravishankar K.","family":"Iyer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/SIECPC.2011.5876939"},{"journal-title":"Nuvo-6108GC GPU Computing Platform | NVIDIA RTX 2080-GTX 1080TI-TITANX","year":"0","key":"ref38"},{"journal-title":"Apollo 5 0","year":"0","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2014.2357531"},{"key":"ref31","article-title":"Implementing Scalable CAN Security with CANcrypt","author":"pfeiffer","year":"2017","journal-title":"Embedded Systems Academy"},{"journal-title":"Common Attacks Against Car Infotainment systems","year":"2019","author":"lin","key":"ref30"},{"journal-title":"The config file specifying these sensor parameters can be accessed at","year":"0","key":"ref37"},{"key":"ref36","doi-asserted-by":"crossref","DOI":"10.1201\/9781315106946","author":"gregory","year":"2017","journal-title":"3D Game Engine Architecture"},{"journal-title":"Unity Engine","year":"0","key":"ref35"},{"journal-title":"Modified Apollo 5 0","year":"0","key":"ref34"},{"journal-title":"LGSVL Simulator","year":"2018","key":"ref10"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2007.4317844"},{"journal-title":"Ad-versarial Objects Against LiDAR-Based Autonomous Driving Systems","year":"2019","author":"cao","key":"ref11"},{"journal-title":"Attacking Vision-based Perception in End-to-End Autonomous Driving Models","year":"2019","author":"boloor","key":"ref12"},{"journal-title":"Robust physical-world attacks on deep learning models","year":"2017","author":"eykholt","key":"ref13"},{"journal-title":"Adversarial Examples that Fool Detectors","year":"2017","author":"lu","key":"ref14"},{"journal-title":"Fooling Detection Alone is Not Enough First Adversarial Attack Against Multiple Object Tracking","year":"2019","author":"jia","key":"ref15"},{"journal-title":"No need to worry about adversarial examples in object detection in autonomous vehicles","year":"2017","author":"lu","key":"ref16"},{"key":"ref17","volume":"2","author":"astrom","year":"1995","journal-title":"PID Controllers Theory Design and Tuning"},{"journal-title":"Multiple object tracking A review","year":"2014","author":"luo","key":"ref18"},{"journal-title":"YOLOv3 An Incremental Improvement","year":"2018","author":"redmon","key":"ref19"},{"journal-title":"IEEE 802 1 802 1ba - Audio Video Bridging (AVB) Systems","year":"0","key":"ref28"},{"key":"ref4","article-title":"Kayotee: A Fault Injection-based System to Assess the Safety and Reliability of Autonomous Vehicles to Faults and Errors","author":"jha","year":"2018","journal-title":"Third IEEE International Workshop on Automotive Reliability & Test"},{"journal-title":"Hacking Automotive Ethernet Cameras","year":"2018","author":"rezvani","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2018.00066"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2019.00025"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.7249\/RR2654"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3183519.3183534"},{"key":"ref8","first-page":"7","article-title":"Approximation with artificial neural networks","volume":"24","author":"cs\u00e1ji","year":"2001","journal-title":"Faculty of Sciences Etvs Lornd University Hungary"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26250-1_26"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-W.2018.00027"},{"journal-title":"Apollo Open Platform","year":"0","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2014.6803166"},{"key":"ref20","first-page":"91","article-title":"Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks","author":"ren","year":"2015","journal-title":"Proceedings of Advances in Neural Information Processing Systems"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88688-4_58"},{"journal-title":"An Introduction to the Kalman Filter Los Angeles CA","year":"1995","author":"welch","key":"ref21"},{"journal-title":"Design and Evaluation of a Driving Mode Decision Algorithm for Automated Driving Vehicle on a Motorway","year":"0","author":"suh","key":"ref24"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1177\/1548512915575803"},{"journal-title":"Shared vehicle control using safe driving envelopes for obstacle avoidance and stability","year":"2015","author":"erlien","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"ref25","first-page":"911","article-title":"Fingerprinting Electronic Control Units for Vehicle Intrusion Detection","author":"cho","year":"2016","journal-title":"25th USENIX Security Symposium"}],"event":{"name":"2020 50th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)","start":{"date-parts":[[2020,6,29]]},"location":"Valencia, Spain","end":{"date-parts":[[2020,7,2]]}},"container-title":["2020 50th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9145511\/9153352\/09153375.pdf?arnumber=9153375","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T11:55:36Z","timestamp":1656330936000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9153375\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/dsn48063.2020.00030","relation":{},"subject":[],"published":{"date-parts":[[2020,6]]}}}