Computer Science ›› 2021, Vol. 48 ›› Issue (1): 34-39.doi: 10.11896/jsjkx.200900181
• Intelligent Edge Computing • Previous Articles Next Articles
YU Tian-qi1, HU Jian-ling1, JIN Jiong2, YANG Jian-feng1
CLC Number:
[1] LIU Z,ZHANG T.Research on automatic lane change method based on vehicle network information[J].Journal of Chongqing University of Technology (Natural Science),2020,34(4):11-17. [2] CHEN L,ZHANG D,LIANG J.The Driving active service selection method based on QoS for Internet of Vehicle environment[J].Journal of Chongqing University of Technology (Na-tural Science),2019,33(12):8-17. [3] LI Y,LUO Q,LIU J,et al.TSP security in intelligent and connected vehicles:challenges and solutions [J].IEEE Wireless Communications,2019,26(3):125-131. [4] WU W,LI R,XIE G,et al.A survey of intrusion detection for in-vehicle networks [J].IEEE Transactions on Intelligent Transportation System,2020,13(3):919-933. [5] MILLER C,VALASEK C.Remote exploitation of an unaltered passenger vehicle [R].BlackHat USA,2015. [6] KEEN SECURITY LAB.Car hacking research:Remote attack Tesla motors [EB/OL].[2020-09-24].https://www.blackhat.com/docs/us-17/thursday/us-17-Nie-Free-Fall-Hacking-Tesla-From-Wireless-To-CAN-Bus.pdf. [7] YOUNG C,ZAMBRENO J,OLUFOWOBI H,et al.Survey of automotive controller area network intrusion detection systems [J].IEEE Design & Test,2019,36(6):48-55. [8] CHOI W,JOO K,JO H J,et al.VoltageIDS:Low-level communication characteristics for automotive intrusion detection system[J].IEEE Transactions on Information Forensics Security,2018,13(8):2114-2129. [9] CHO K T,SHIN K G.Fingerprinting electronic control units for vehicle intrusion detection[C]//25th USENIX Conference on Security Symposium.2016:911-927. [10] SHIN K G,CHO K T.Viden:Attacker identification on in-vehicle networks[C]//ACM SIGSAC Conference on Computer Communication Security.2017:1109-1123. [11] SONG H M,KIM H R,KIM H K.Intrusion detection system based on the analysis of time intervals of CAN messages for in-vehicle network[C]//International Conference on Information Networks (ICOIN).2016:63-68. [12] LEE H,JEONG S H,KIM H K.OTIDS:A novel intrusion detection system for in-vehicle network by using remote frame[C]//15th IEEE PST.2017:5709-5757. [13] MÜTER M,ASAJ N.Entropy-based anomaly detection for in-vehicle networks[C]//IEEE Intelligent Vehicles Symposium.2011:1110-1115. [14] YU H,QIN G H,SUN M H,et al.Cyber security and anomaly detection method for in-vehicle CAN[J].Journal of Jilin University (Engineering Edition),2016,46(4):1246-1253. [15] WU W,HUANG Y,KURACHI R,et al.Sliding window optimized information entropy analysis method for intrusion detection on in-vehicle networks[J].IEEE Access,2018,6:45233-45245. [16] YU C,LIN B,GUI P,et al.Deployment and dimensioning of fog computing-based Internet of Vehicle infrastructure for autonomous driving[J].IEEE Internet of Things Journal,2019,6(1):149-160. [17] YU X,LIU Y,SHI X,et al.Mobile edge computing offloading strategy under Internet of Vehicles scenario[J].Computer Engineering,2020,46(11):29-34,41. [18] LING F,DUAN J,LI C,et al.Research on dynamic load balancing algorithm for C-V2X edge server[J].Computer Enginee-ring,2020,46(12):201-206,221. [19] TAX M J D,DUIN P W R.Support Vector Data Description[J].Machine Learning,2004,54:45-66. [20] Support Vector Data Description (SVDD) Toolkit [EB/OL].[2020-09-24].https://github.com/iqiukp/SVDD. |
[1] | LIANG Jun-bin, TIAN Feng-sen, JIANG Chan, WANG Tian-shu. Survey on Task Offloading Techniques for Mobile Edge Computing with Multi-devices and Multi-servers in Internet of Things [J]. Computer Science, 2021, 48(1): 16-25. |
[2] | MAO Ying-chi, ZHOU Tong, LIU Peng-fei. Multi-user Task Offloading Based on Delayed Acceptance [J]. Computer Science, 2021, 48(1): 49-57. |
[3] | LI Rui-xiang, MAO Ying-chi, HAO Shuai. Cache Management Method in Mobile Edge Computing Based on Approximate Matching [J]. Computer Science, 2021, 48(1): 96-102. |
[4] | GUO Fei-yan, TANG Bing. Mobile Edge Server Placement Method Based on User Latency-aware [J]. Computer Science, 2021, 48(1): 103-110. |
[5] | HU Jin-tian, WANG Gao-cai, XU Xiao-tong. Task Migration Strategy with Energy Optimization in Mobile Edge Computing [J]. Computer Science, 2020, 47(6): 260-265. |
[6] | TIAN Xian-zhong, YAO Chao, ZHAO Chen, DING Jun. 5G Network-oriented Mobile Edge Computation Offloading Strategy [J]. Computer Science, 2020, 47(11A): 286-290. |
[7] | WANG Chun-dong, LUO Wan-wei, MO Xiu-liang, YANG Wen-jun. Survey on Mutual Trust Authentication and Secure Communication of Internet of Vehicles [J]. Computer Science, 2020, 47(11): 1-9. |
[8] | LIU Dan. Fog Computing and Self-assessment Based Clustering and Cooperative Perception for VANET [J]. Computer Science, 2020, 47(10): 55-62. |
[9] | GU Xiao-hui,ZHANG Guo-an. Survey of SDN Applications in Vehicular Networks [J]. Computer Science, 2020, 47(1): 237-244. |
[10] | XUE Ling-ling, FAN Xiu-mei. Cognitive Spectrum Allocation Mechanism in Internet of Vehicles Based on Clustering Structure [J]. Computer Science, 2019, 46(9): 143-149. |
[11] | YIN Jia, GUAN Xin-jie, BAI Guang-wei. Task Offloading and Cooperative Load Balancing Mechanism Based on Mobile Edge Computing [J]. Computer Science, 2019, 46(12): 126-131. |
[12] | CHENG Xian-yi, SHI Quan, ZHU Jian-xin, CHEN Feng-mei, DAI Ran-ran. VID Model of Vehicles-infrastructure-driver Collaborative Control in Big Data Environment [J]. Computer Science, 2019, 46(11A): 185-188. |
[13] | DONG Si-qi, LI Hai-long, QU Yu-ben, ZHANG Zhao, HU Lei. Survey of Research on Computation Unloading Strategy in Mobile Edge Computing [J]. Computer Science, 2019, 46(11): 32-40. |
[14] | ZHANG Jun-hui, LI Qing and CHEN Da-peng. Implementation Method and System for EV Self-diagnosis [J]. Computer Science, 2016, 43(Z6): 34-36. |
[15] | HUA Hui-you, CHEN Qi-mai, LIU Hai, ZHANG Yang and YUAN Pei-quan. Hybrid Kmeans with KNN for Network Intrusion Detection Algorithm [J]. Computer Science, 2016, 43(3): 158-162. |
|