Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Generative Neural Network-Based Defe...
~
Salek, M. Sabbir.
Linked to FindBook
Google Book
Amazon
博客來
Generative Neural Network-Based Defense Methods Against Cyberattacks for Connected and Autonomous Vehicles.
Record Type:
Electronic resources : Monograph/item
Title/Author:
Generative Neural Network-Based Defense Methods Against Cyberattacks for Connected and Autonomous Vehicles./
Author:
Salek, M. Sabbir.
Published:
Ann Arbor : ProQuest Dissertations & Theses, : 2023,
Description:
140 p.
Notes:
Source: Dissertations Abstracts International, Volume: 85-07, Section: B.
Contained By:
Dissertations Abstracts International85-07B.
Subject:
Software. -
Online resource:
https://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=31014187
ISBN:
9798381372410
Generative Neural Network-Based Defense Methods Against Cyberattacks for Connected and Autonomous Vehicles.
Salek, M. Sabbir.
Generative Neural Network-Based Defense Methods Against Cyberattacks for Connected and Autonomous Vehicles.
- Ann Arbor : ProQuest Dissertations & Theses, 2023 - 140 p.
Source: Dissertations Abstracts International, Volume: 85-07, Section: B.
Thesis (Ph.D.)--Clemson University, 2023.
The rapid advancement of communication and artificial intelligence technologies is propelling the development of connected and autonomous vehicles (CAVs), revolutionizing the transportation landscape. However, increased connectivity and automation also present heightened potential for cyber threats. Recently, the emergence of generative neural networks (NNs) has unveiled a myriad of opportunities for complementing CAV applications, including generative NN-based cybersecurity measures to protect the CAVs in a transportation cyber-physical system (TCPS) from known and unknown cyberattacks. The goal of this dissertation is to explore the utility of the generative NNs for devising cyberattack detection and mitigation strategies for CAVs. To this end, the author developed (i) a hybrid quantum-classical restricted Boltzmann machine (RBM)-based framework for in-vehicle network intrusion detection for connected vehicles and (ii) a generative adversarial network (GAN)-based defense method for the traffic sign classification system within the perception module of autonomous vehicles. The author evaluated the hybrid quantum-classical RBM-based intrusion detection framework on three separate real-world Fuzzy attack datasets and compared its performance with a similar but classical-only approach (i.e., a classical computer-based data preprocessing and RBM training). The results showed that the hybrid quantum-classical RBM-based intrusion detection framework achieved an average intrusion detection accuracy of 98%, whereas the classical-only approach achieved an average accuracy of 90%. For the second study, the author evaluated the GAN-based adversarial defense method for traffic sign classification against different white-box adversarial attacks, such as the fast gradient sign method, the DeepFool, the Carlini and Wagner, and the projected gradient descent attacks. The author compared the performance of the GAN-based defense method with several traditional benchmark defense methods, such as Gaussian augmentation, JPEG compression, feature squeezing, and spatial smoothing. The findings indicated that the GAN-based adversarial defense method for traffic sign classification outperformed all the benchmark defense methods under all the white-box adversarial attacks the author considered for evaluation. Thus, the contribution of this dissertation lies in utilizing the generative ability of existing generative NNs to develop novel high-performing cyberattack detection and mitigation strategies that are feasible to deploy in CAVs in a TCPS environment.
ISBN: 9798381372410Subjects--Topical Terms:
619355
Software.
Generative Neural Network-Based Defense Methods Against Cyberattacks for Connected and Autonomous Vehicles.
LDR
:03687nmm a2200361 4500
001
2400377
005
20240924103854.5
006
m o d
007
cr#unu||||||||
008
251215s2023 ||||||||||||||||| ||eng d
020
$a
9798381372410
035
$a
(MiAaPQ)AAI31014187
035
$a
(MiAaPQ)Clemsonalldissertations4475
035
$a
AAI31014187
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Salek, M. Sabbir.
$3
3770346
245
1 0
$a
Generative Neural Network-Based Defense Methods Against Cyberattacks for Connected and Autonomous Vehicles.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2023
300
$a
140 p.
500
$a
Source: Dissertations Abstracts International, Volume: 85-07, Section: B.
500
$a
Advisor: Chowdhury, Mashrur.
502
$a
Thesis (Ph.D.)--Clemson University, 2023.
520
$a
The rapid advancement of communication and artificial intelligence technologies is propelling the development of connected and autonomous vehicles (CAVs), revolutionizing the transportation landscape. However, increased connectivity and automation also present heightened potential for cyber threats. Recently, the emergence of generative neural networks (NNs) has unveiled a myriad of opportunities for complementing CAV applications, including generative NN-based cybersecurity measures to protect the CAVs in a transportation cyber-physical system (TCPS) from known and unknown cyberattacks. The goal of this dissertation is to explore the utility of the generative NNs for devising cyberattack detection and mitigation strategies for CAVs. To this end, the author developed (i) a hybrid quantum-classical restricted Boltzmann machine (RBM)-based framework for in-vehicle network intrusion detection for connected vehicles and (ii) a generative adversarial network (GAN)-based defense method for the traffic sign classification system within the perception module of autonomous vehicles. The author evaluated the hybrid quantum-classical RBM-based intrusion detection framework on three separate real-world Fuzzy attack datasets and compared its performance with a similar but classical-only approach (i.e., a classical computer-based data preprocessing and RBM training). The results showed that the hybrid quantum-classical RBM-based intrusion detection framework achieved an average intrusion detection accuracy of 98%, whereas the classical-only approach achieved an average accuracy of 90%. For the second study, the author evaluated the GAN-based adversarial defense method for traffic sign classification against different white-box adversarial attacks, such as the fast gradient sign method, the DeepFool, the Carlini and Wagner, and the projected gradient descent attacks. The author compared the performance of the GAN-based defense method with several traditional benchmark defense methods, such as Gaussian augmentation, JPEG compression, feature squeezing, and spatial smoothing. The findings indicated that the GAN-based adversarial defense method for traffic sign classification outperformed all the benchmark defense methods under all the white-box adversarial attacks the author considered for evaluation. Thus, the contribution of this dissertation lies in utilizing the generative ability of existing generative NNs to develop novel high-performing cyberattack detection and mitigation strategies that are feasible to deploy in CAVs in a TCPS environment.
590
$a
School code: 0050.
650
4
$a
Software.
$2
gtt.
$3
619355
650
4
$a
Intrusion detection systems.
$3
3694290
650
4
$a
Communication.
$3
524709
650
4
$a
Optimization techniques.
$3
3681622
650
4
$a
Computers.
$3
544777
650
4
$a
Autonomous vehicles.
$3
2179092
650
4
$a
Sensors.
$3
3549539
650
4
$a
Neural networks.
$3
677449
650
4
$a
Automobile safety.
$3
3681451
650
4
$a
Traffic control.
$3
3686354
650
4
$a
Connectivity.
$3
3560754
650
4
$a
Algorithms.
$3
536374
650
4
$a
Computer science.
$3
523869
650
4
$a
Automotive engineering.
$3
2181195
690
$a
0800
690
$a
0459
690
$a
0540
690
$a
0543
690
$a
0984
710
2
$a
Clemson University.
$3
997173
773
0
$t
Dissertations Abstracts International
$g
85-07B.
790
$a
0050
791
$a
Ph.D.
792
$a
2023
793
$a
English
856
4 0
$u
https://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=31014187
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9508697
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login