Movatterモバイル変換


[0]ホーム

URL:


Mynuddin et al., 2024 - Google Patents

Trojan attack and defense for deep learning-based navigation systems of unmanned aerial vehicles

Mynuddin et al., 2024

ViewPDF
Document ID
6811328318533961496
Author
Mynuddin M
Khan S
Ahmari R
Landivar L
Mahmoud M
Homaifar A
Publication year
Publication venue
IEEE Access

External Links

Snippet

As unmanned aerial vehicles (UAVs) become increasingly integrated across various domains, both military and civilian, safeguarding the security of their navigation systems becomes paramount. In the contemporary age, the prominence of cybersecurity for UAVs …
Continue reading atieeexplore.ieee.org (PDF) (other versions)

Classifications

The classifications are assigned by a computer and are not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the classifications listed.
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6268Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6288Fusion techniques, i.e. combining data from various sources, e.g. sensor fusion
    • G06K9/629Fusion techniques, i.e. combining data from various sources, e.g. sensor fusion of extracted features
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00624Recognising scenes, i.e. recognition of a whole field of perception; recognising scene-specific objects
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions

Similar Documents

PublicationPublication DateTitle
US20250272392A1 (en)Securing systems employing artificial intelligence
Tian et al.Deeptest: Automated testing of deep-neural-network-driven autonomous cars
US10699585B2 (en)Unmanned aerial system detection and mitigation
Mynuddin et al.Trojan attack and defense for deep learning-based navigation systems of unmanned aerial vehicles
Ghosh et al.An integrated approach of threat analysis for autonomous vehicles perception system
Raja et al.Adversarial attacks and defenses toward AI-assisted UAV infrastructure inspection
Li et al.Deep learning backdoors
US11386300B2 (en)Artificial intelligence adversarial vulnerability audit tool
Thakur et al.Artificial intelligence techniques in smart cities surveillance using UAVs: A survey
Zhang et al.Autonomous long-range drone detection system for critical infrastructure safety
Xie et al.On the adversarial robustness of camera-based 3d object detection
US20220245243A1 (en)Securing machine learning models against adversarial samples through model poisoning
Almutairi et al.Securing DNN for smart vehicles: An overview of adversarial attacks, defenses, and frameworks
Aloraini et al.Adversarial attacks on intrusion detection systems in in-vehicle networks of connected and autonomous vehicles
Arif et al.A deep reinforcement learning framework to evade black-box machine learning based IoT malware detectors using GAN-generated influential features
Balachandran et al.A novel approach to detect unmanned aerial vehicle using Pix2Pix generative adversarial network
Singh et al.An ensemble-based iot-enabled drones detection scheme for a safe community
Mahima et al.Toward robust 3D perception for autonomous vehicles: A review of adversarial attacks and countermeasures
Nguyen et al.A Survey and Evaluation of Adversarial Attacks in Object Detection
Wang et al.Beyond boundaries: A comprehensive survey of transferable attacks on ai systems
Mynuddin et al.Trojan triggers for poisoning unmanned aerial vehicles navigation: A deep learning approach
Kazmi et al.From Pixel to Peril: Investigating Adversarial Attacks on Aerial Imagery Through Comprehensive Review and Prospective Trajectories
Wang et al.On the vulnerability of deep reinforcement learning to backdoor attacks in autonomous vehicles
Wei et al.Rodad: Resilience oriented decentralized anomaly detection for urban air mobility networks
Young et al.SMU-DDI Cyber Autonomy Range

[8]
ページ先頭

©2009-2025 Movatter.jp