1 |
Vehicle Technologies Program : Advanced Vehicle Testing Activity Site ; http://www1.eere.energy.gov/vehiclesandfuels/avta/
|
2 |
Hydrogen Program : http://www.hydrogen.energy.gov
|
3 |
B. I. Kwak, J. Woo, and H. K. Kim. "Know your master: Driver profiling-based anti-theft method." Privacy, Security and Trust (PST), 2016 14th Annual Conference on. IEEE, 2016.
|
4 |
X. Meng, K. K. Lee, and Y. Xu, "Human driving behavior recognition based on hidden markov models," in Robotics and Biomimetics, 2006. ROBIO'06. IEEE International Conference on. IEEE, 2006, pp. 274-279.
|
5 |
S. Choi, J. Kim, D. Kwak, P. Angkititrakul, and J. H. Hansen, "Analysis and classification of driver behavior using in-vehicle can-bus information," in Biennial Workshop on DSP for In-Vehicle and Mobile Systems, 2007, pp. 17-19.
|
6 |
A. Wahab, C. Quek, C. K. Tan, and K. Takeda, "Driving profile modeling and recognition based on soft computing approach," Neural Networks, IEEE Transactions on, vol. 20, no. 4, pp. 563-582, 2009.
DOI
|
7 |
G. Kedar-Dongarkar and M. Das, "Driver classification for optimization of energy usage in a vehicle," Procedia Computer Science, vol. 8, pp. 388-393, 2012.
DOI
|
8 |
HyFLEET CUTE Project : http://www.h2moves.eu
|
9 |
C. Miyajima, Y. Nishiwaki, K. Ozawa, T.Wakita, K. Itou, K. Takeda, and F. Itakura, "Driver modeling based on driving behavior and its evaluation in driver identification," Proceedings of the IEEE, vol. 95, no. 2, pp. 427-437, 2007.
DOI
|
10 |
T. Wakita, K. Ozawa, C. Miyajima, K. Igarashi, I. Katunobu, K. Takeda, and F. Itakura, "Driver identification using driving behavior signals," IEICE TRANSACTIONS on Information and Systems, vol. 89, no. 3, pp. 1188-1194, 2006.
|
11 |
Y. Nishiwaki, K. Ozawa, T. Wakita, C. Miyajima, K. Itou, and K. Takeda, "Driver identification based on spectral analysis of driving behavioral signals," in Advances for In-Vehicle and Mobile Systems. Springer, 2007, pp. 25- 34.
|
12 |
M. Enev, A. Takakuwa, K. Koscher, and T. Kohno, "Automobile driver fingerprinting," Proceedings on Privacy Enhancing Technologies, vol. 2016, no. 1, pp. 34-50, 2016.
DOI
|