Safety and Security of Autonomous Vehicles
Saru Kumari,Hu Xiong,Lyes Khoukhi,Joel J. P. C. Rodrigues
DOI: https://doi.org/10.1002/ett.4880
IF: 3.6
2023-01-01
Transactions on Emerging Telecommunications Technologies
Abstract:Transactions on Emerging Telecommunications TechnologiesVolume 34, Issue 11 e4880 EDITORIAL Safety and security of autonomous vehicles Saru Kumari, Corresponding Author Saru Kumari [email protected] Department of Mathematics, Chaudhary Charan Singh University, Meerut, India Correspondence Saru Kumari, Department of Mathematics, Chaudhary Charan Singh University, Meerut, India. Email: [email protected]Search for more papers by this authorHu Xiong, Hu Xiong School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, ChinaSearch for more papers by this authorLyes Khoukhi, Lyes Khoukhi GREYC Lab/SAFE Team, ENSICAEN, Normandie University, Caen, FranceSearch for more papers by this authorJoel J. P. C. Rodrigues, Joel J. P. C. Rodrigues COPELABS, Lusófona University, Lisbon, PortugalSearch for more papers by this author Saru Kumari, Corresponding Author Saru Kumari [email protected] Department of Mathematics, Chaudhary Charan Singh University, Meerut, India Correspondence Saru Kumari, Department of Mathematics, Chaudhary Charan Singh University, Meerut, India. Email: [email protected]Search for more papers by this authorHu Xiong, Hu Xiong School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, ChinaSearch for more papers by this authorLyes Khoukhi, Lyes Khoukhi GREYC Lab/SAFE Team, ENSICAEN, Normandie University, Caen, FranceSearch for more papers by this authorJoel J. P. C. Rodrigues, Joel J. P. C. Rodrigues COPELABS, Lusófona University, Lisbon, PortugalSearch for more papers by this author First published: 19 October 2023 https://doi.org/10.1002/ett.4880Read the full textAboutPDF ToolsRequest permissionExport citationAdd to favoritesTrack citation ShareShare Give accessShare full text accessShare full-text accessPlease review our Terms and Conditions of Use and check box below to share full-text version of article.I have read and accept the Wiley Online Library Terms and Conditions of UseShareable LinkUse the link below to share a full-text version of this article with your friends and colleagues. Learn more.Copy URL Share a linkShare onEmailFacebookTwitterLinkedInRedditWechat No abstract is available for this article. REFERENCES 1Tang B, Da H, Wang B, Wang J. MUDROID: Android Malware Detection and Classification Based on Permission and Behavior for Autonomous Vehicles. 2Deverajan GG, Thirunnavukkarasan M, Sardar Irfanullah A, Vignesh T, Sivaraman A. An Integrated Security Approach for Vehicular Networks in Smart Cities. 3Liu S, Yu H, Ren Y, zhao Y, Jiang H, Liu R. Reducing hysteresis and over-smoothing in traffic estimation: A multi-stream spatial-temporal graph convolutional network. 4Taylor S, Ahmad F, Nguyen HN, Shaikh SA, Bryans J, Wartnaby CE. A Comparative Analysis of Multi-Criteria Decision Methods for Secure Beacon Selection in Vehicular Platoons. 5Wu T-Y, Chen C-M, Miao Q, Kumar S. Privacy-Preserving Authentication Scheme for Digital Twin-enabled Autonomous Vehicle Environments. 6Li X, Wu F. Cloud-assisted Authentication Scheme Supporting Dynamic Pseudo-identity for Autonomous Vehicles. 7Zhou j, Cao Z, Dong X. Dynamic identity-based broadcast proxy re-encryption for data sharing in autonomous vehicles. 8Liang Y, Ren Y, Feng X, zhao Y, Zhao J, Yu H. A Participant Selection based Vehicle Platoon Asynchronous Federated Learning Framework. Volume34, Issue11Special Issue: ‘Future of Wireless Access Technologies and Frameworks for Internet of Things Applications’ and ‘Safety and Security of Autonomous Vehicles’November 2023e4880 ReferencesRelatedInformation