1 |
Christian Szegedy, Wojeciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, I.J. Goodfellow, and Rob Fergus, "Intriguing properties of neural networks," arXiv preprint, Dec. 2013.
|
2 |
S.H. Kim and Y.S. Kim, "Control area network security technology trends," The Magazine of the IEIE, 42(8), pp. 46-53, 2015.
|
3 |
H.M. Song, Jiyoung Woo, and H.K Kim, "In-vehicle network intrusion detection using deep convolutional neural network," Vehicular Communications 21, vol. 21, pp. 1-13, Jan. 2020.
|
4 |
M.J. Kang and J.W. Kang, "Intrusion detection system using deep neural network for in-vehicle network security," PloS one, vol. 11, no. 6, Jun. 2016.
|
5 |
I.J. Goodfellow, J.P. Abadie, Mehdi Mirza, et. al., "Generative adversarial nets," Advances in Neural Information Processing Systems 2014, vol. 2, pp. 2672-2680, Jun. 2014.
|
6 |
K-CyberSecuri tyChal lenge2020, "K-cyber security challenge," http://datachallenge.kr/challenge20/car/rules/, Aug. 2021.
|
7 |
Martin Arjovsky, Soumith Chintala, and Leon Bottou, "Wasserstein generative adversarial networks," Proceedings of the 34th International Conference on Machine Learning, vol. 70, pp. 214-223, 2017.
|
8 |
Geoffrey Hinton, Li Deng, Dong Yu, G.E. Dahl, et. al., "Deep neural networks for acoustic modeling in speech recognition: the shared views of four research groups," IEEE Signal Processing Magazine, vol 29, no. 6, pp. 82-97, Nov. 2012.
DOI
|
9 |
Jian Wang, Yameng Shao, Yuming Ge, and Rundong Yu, "A survey of vehicle to everything(V2X) testing," Sensors 2019, vol. 19, no. 2, Jan. 2019.
|
10 |
Eunbi Seo, H.M. Song, and H.K. Kim, "GIDS: GAN based Intrusion detection system for in-vehicle network," 16th Annual Conference on Privacy, Security and Trust(PST), vol. 1, pp. 1-6, Aug. 2018.
|
11 |
A.R. Javed, S.U. Rehman, M.U. Khan, and Mamoun Alazab, "CANintelliIDS: detecting in-vehicle intrusion attacks on a controller area network using CNN and attention-Based GRU," 2021 3rd International Cyber Resilience Conference(CRC), vol. 8, no. 2, pp. 1456-1466, Jan. 2021.
|
12 |
Dowan Kim and Daeseon Choi, "GAN based adversarial CAN packet generation method for evading IDS," Conference on Information Security and Cryptography Summer 2021, pp. 74-77, Jun. 2021.
|
13 |
R.S. Pressman and B.R. Maxim, Software engineering a practitioner's approach, ISBN-10: 1259872971, 3rd Ed. McGraw Hill, Sep. 2019.
|
14 |
G.E. Hinton, Simon Osindero, and Y.W. Teh, "A fast learning algorithm for deep belief nets," Neural Computation, vol. 18, no. 7, pp. 1527-1554, Jul. 2006.
DOI
|
15 |
T.K. Ho, "Random decision forest," Proceeding of 3rd International Conference on Document Analysis and Recognition, vol. 1, pp. 278-282, Aug. 1995.
|
16 |
Zilong Lin, Yong Shi, and Zhi Xue, "IDSGAN: generative adversarial networks for attack generation against intrusion detection," arXiv preprint, Sep. 2018.
|
17 |
Alex Krizhevsky, Ilya Sutskever, and G.E. Hinton, "ImageNet classification with deep convolutional neural networks," Advances in Neural Information Processing Systems 2012, vol. 1, pp. 1097-1105, Dec. 2012.
|
18 |
Zhewen Niu, Zeyuan Yu, Wenhu Tang, Qinghua Wu, and Marek Reformat, "Wind power forecasting using attention-based gated recurrent unit network," Energy, vol. 196, Apr. 2020.
|
19 |
R.B. GmbH, "CAN specification version 2.0," Sep. 1991.
|
20 |
"Taxonomy and definitions for term related to driving automation systems for on-road motor vehicles," SAE International in United States, Apr. 2021.
|
21 |
Nicholas Carlini and David Wagner, "Towards evaluating the robustness of neural networks," 2017 IEEE Symposium Security and Privacy, vol. 1, pp. 39-57, May. 2017.
|
22 |
Hyunjae Kang, B.I. Kwak, Y.H. Lee, Hwejae Lee, and H.K. Kim, "Car hacking and defense competition on in-vehicle network," Workshop on Automotive and Autonomous Vehicle Security, pp. 1-6, Feb. 2021.
|
23 |
I.J. Goodfellow, Jonathon Shlens, and Christian Szegedy, "Explaining and Harnessing Adversarial Examples," arXiv preprint, Dec. 2014.
|