首页 > 最新文献

Proceedings of the 1st International Workshop on Safe Control of Connected and Autonomous Vehicles最新文献

英文 中文
Using ID-Hopping to Defend Against Targeted DoS on CAN 使用id跳码防御CAN上的目标DoS
Abdulmalik Humayed, Bo Luo
With the exponential growth of automotive security research, new security vulnerabilities and attacks have been revealed and new challenges have emerged. In recent years, various attacks ranging from replay attacks, through false information injection, to Denial of Service (DoS), have shown how fragile automotive security is. As a result, a number of security solutions have been proposed that rely on techniques like encryption and firewalls. However, most proposals require performance and computational overheads that would become an additional burden rather than a solution. In this paper, we propose a new automotive network algorithm, called ID-Hopping, that aims to prevent targeted DoS attacks in which attackers target certain functions by injecting special frames that would prevent a car's normal operations. We aim to raise the bar for attackers by randomizing the expected patterns in the automotive network. Such randomization hinders the attacker's ability to launch targeted DoS attacks. We built a testing platform and implemented the randomization mechanism to evaluate the algorithm's effectiveness. Based on the evaluation, the algorithm holds a promising solution for targeted DoS, and even reverse engineering, which automotive networks are most vulnerable to.
随着汽车安全研究的指数级增长,新的安全漏洞和攻击被揭示出来,新的挑战也出现了。近年来,从重放攻击、虚假信息注入到拒绝服务(DoS)等各种攻击表明,汽车安全是多么脆弱。因此,人们提出了许多依赖于加密和防火墙等技术的安全解决方案。然而,大多数提案需要性能和计算开销,这将成为额外的负担,而不是解决方案。在本文中,我们提出了一种新的汽车网络算法,称为ID-Hopping,旨在防止针对性的DoS攻击,攻击者通过注入特殊帧来攻击某些功能,从而阻止汽车的正常运行。我们的目标是通过随机化汽车网络中的预期模式来提高攻击者的门槛。这种随机化阻碍了攻击者发起有针对性的DoS攻击的能力。我们建立了一个测试平台,并实现了随机化机制来评估算法的有效性。基于评估,该算法为目标DoS甚至逆向工程提供了很好的解决方案,这是汽车网络最容易受到的攻击。
{"title":"Using ID-Hopping to Defend Against Targeted DoS on CAN","authors":"Abdulmalik Humayed, Bo Luo","doi":"10.1145/3055378.3055382","DOIUrl":"https://doi.org/10.1145/3055378.3055382","url":null,"abstract":"With the exponential growth of automotive security research, new security vulnerabilities and attacks have been revealed and new challenges have emerged. In recent years, various attacks ranging from replay attacks, through false information injection, to Denial of Service (DoS), have shown how fragile automotive security is. As a result, a number of security solutions have been proposed that rely on techniques like encryption and firewalls. However, most proposals require performance and computational overheads that would become an additional burden rather than a solution. In this paper, we propose a new automotive network algorithm, called ID-Hopping, that aims to prevent targeted DoS attacks in which attackers target certain functions by injecting special frames that would prevent a car's normal operations. We aim to raise the bar for attackers by randomizing the expected patterns in the automotive network. Such randomization hinders the attacker's ability to launch targeted DoS attacks. We built a testing platform and implemented the randomization mechanism to evaluate the algorithm's effectiveness. Based on the evaluation, the algorithm holds a promising solution for targeted DoS, and even reverse engineering, which automotive networks are most vulnerable to.","PeriodicalId":346760,"journal":{"name":"Proceedings of the 1st International Workshop on Safe Control of Connected and Autonomous Vehicles","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124800096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
A Game-Theoretic Approach to Secure Control of Communication-Based Train Control Systems Under Jamming Attacks 基于通信的列车控制系统在干扰攻击下安全控制的博弈论方法
Zhiheng Xu, Quanyan Zhu
To meet the growing railway-transportation demand, a new train control system, communication-based train control (CBTC) system, aims to maximize the ability of train lines by reducing the headway of each train. However, the wireless communications expose the CBTC system to new security threats. Due to the cyber-physical nature of the CBTC system, a jamming attack can damage the physical part of the train system by disrupting the communications. To address this issue, we develop a secure framework to mitigate the impact of the jamming attack based on a security criterion. At the cyber layer, we apply a multi-channel model to enhance the reliability of the communications and develop a zero-sum stochastic game to capture the interactions between the transmitter and jammer. We present analytical results and apply dynamic programming to find the equilibrium of the stochastic game. Finally, the experimental results are provided to evaluate the performance of the proposed secure mechanism.
为了满足日益增长的铁路运输需求,一种新的列车控制系统,基于通信的列车控制(CBTC)系统,旨在通过减少每列列车的车头距来最大限度地发挥列车线路的能力。然而,无线通信使CBTC系统面临新的安全威胁。由于CBTC系统的网络物理特性,干扰攻击可以通过中断通信来破坏列车系统的物理部分。为了解决这个问题,我们开发了一个安全框架,以减轻基于安全标准的干扰攻击的影响。在网络层,我们采用多信道模型来提高通信的可靠性,并开发了一个零和随机博弈来捕捉发射机和干扰机之间的相互作用。我们给出了分析结果,并应用动态规划方法求出了随机对策的平衡点。最后,给出了实验结果来评估所提出的安全机制的性能。
{"title":"A Game-Theoretic Approach to Secure Control of Communication-Based Train Control Systems Under Jamming Attacks","authors":"Zhiheng Xu, Quanyan Zhu","doi":"10.1145/3055378.3055381","DOIUrl":"https://doi.org/10.1145/3055378.3055381","url":null,"abstract":"To meet the growing railway-transportation demand, a new train control system, communication-based train control (CBTC) system, aims to maximize the ability of train lines by reducing the headway of each train. However, the wireless communications expose the CBTC system to new security threats. Due to the cyber-physical nature of the CBTC system, a jamming attack can damage the physical part of the train system by disrupting the communications. To address this issue, we develop a secure framework to mitigate the impact of the jamming attack based on a security criterion. At the cyber layer, we apply a multi-channel model to enhance the reliability of the communications and develop a zero-sum stochastic game to capture the interactions between the transmitter and jammer. We present analytical results and apply dynamic programming to find the equilibrium of the stochastic game. Finally, the experimental results are provided to evaluate the performance of the proposed secure mechanism.","PeriodicalId":346760,"journal":{"name":"Proceedings of the 1st International Workshop on Safe Control of Connected and Autonomous Vehicles","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121858250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Osiris: A Tool for Abstraction and Verification of Control Software with Lookup Tables Osiris:一个带有查找表的控制软件的抽象和验证工具
N. Aréchiga, Sumanth Dathathri, Shashank Vernekar, Nagesh Kathare, Sicun Gao, Shin'ichi Shiraishi
Some industrial systems are difficult to formally verify due to their large scale. In particular, the widespread use of lookup tables in embedded systems across diverse industries, such as aeronautics and automotive systems, create a critical obstacle to the scalability of formal verification. This paper presents Osiris, a tool that automatically computes abstractions of lookup tables. Osiris uses these abstractions to verify a property in first order logic. If the verification fails, Osiris uses a falsification heuristic to search for a violation of the specification. We validate our technique on a public benchmark of an adaptive cruise controller with lookup tables.
一些工业系统由于规模大,难以正式验证。特别是,查找表在不同行业(如航空和汽车系统)的嵌入式系统中的广泛使用,对形式化验证的可伸缩性造成了严重的障碍。本文介绍了一个自动计算查找表抽象的工具Osiris。Osiris使用这些抽象来验证一阶逻辑中的属性。如果验证失败,Osiris使用证伪启发式来搜索违反规范的情况。我们在带有查找表的自适应巡航控制器的公共基准上验证了我们的技术。
{"title":"Osiris: A Tool for Abstraction and Verification of Control Software with Lookup Tables","authors":"N. Aréchiga, Sumanth Dathathri, Shashank Vernekar, Nagesh Kathare, Sicun Gao, Shin'ichi Shiraishi","doi":"10.1145/3055378.3055384","DOIUrl":"https://doi.org/10.1145/3055378.3055384","url":null,"abstract":"Some industrial systems are difficult to formally verify due to their large scale. In particular, the widespread use of lookup tables in embedded systems across diverse industries, such as aeronautics and automotive systems, create a critical obstacle to the scalability of formal verification. This paper presents Osiris, a tool that automatically computes abstractions of lookup tables. Osiris uses these abstractions to verify a property in first order logic. If the verification fails, Osiris uses a falsification heuristic to search for a violation of the specification. We validate our technique on a public benchmark of an adaptive cruise controller with lookup tables.","PeriodicalId":346760,"journal":{"name":"Proceedings of the 1st International Workshop on Safe Control of Connected and Autonomous Vehicles","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124791215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Game-Theoretic Approach and Evaluation of Adversarial Vehicular Platooning 对抗性车辆队列的博弈论方法与评价
Imran Sajjad, Rajnikant Sharma, Ryan M. Gerdes
In this paper, we consider an attack on a string of automated vehicles, or platoons, from a game-theoretic standpoint. Game theory enables us to ask the question of optimality in an adversarial environment; what is the optimal strategy that an attacker can use to disrupt the operation of automated vehicles, considering that the defenders are also optimally trying to maintain normal operation. We formulate a zero-sum game and find optimal controllers for different game parameters. A platoon is then simulated and its closed loop stability is then evaluated in the presence of an optimal attack. It is shown that with the constraint of optimality, the attacker cannot significantly degrade the stability of a vehicle platoon in nominal cases. It is motivated that in order to have an optimal solution that is nearly unstable, the game has to be formulated almost unfairly in favor of the attacker.
在本文中,我们从博弈论的角度考虑对一系列自动车辆或车队的攻击。博弈论使我们能够在对抗环境中提出最优性问题;考虑到防御者也在最优地试图维持正常运行,攻击者可以用来破坏自动车辆运行的最佳策略是什么?我们制定了一个零和博弈,并找到了不同博弈参数的最优控制器。然后模拟一个排,然后在存在最优攻击的情况下评估其闭环稳定性。结果表明,在最优性约束下,攻击者在名义情况下不会显著降低车辆排的稳定性。为了获得一个近乎不稳定的最优解决方案,游戏必须以几乎不公平的方式支持攻击者。
{"title":"A Game-Theoretic Approach and Evaluation of Adversarial Vehicular Platooning","authors":"Imran Sajjad, Rajnikant Sharma, Ryan M. Gerdes","doi":"10.1145/3055378.3055383","DOIUrl":"https://doi.org/10.1145/3055378.3055383","url":null,"abstract":"In this paper, we consider an attack on a string of automated vehicles, or platoons, from a game-theoretic standpoint. Game theory enables us to ask the question of optimality in an adversarial environment; what is the optimal strategy that an attacker can use to disrupt the operation of automated vehicles, considering that the defenders are also optimally trying to maintain normal operation. We formulate a zero-sum game and find optimal controllers for different game parameters. A platoon is then simulated and its closed loop stability is then evaluated in the presence of an optimal attack. It is shown that with the constraint of optimality, the attacker cannot significantly degrade the stability of a vehicle platoon in nominal cases. It is motivated that in order to have an optimal solution that is nearly unstable, the game has to be formulated almost unfairly in favor of the attacker.","PeriodicalId":346760,"journal":{"name":"Proceedings of the 1st International Workshop on Safe Control of Connected and Autonomous Vehicles","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124087760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Challenges in Autonomous Vehicle Validation: Keynote Presentation Abstract 自动驾驶汽车验证的挑战:主题演讲摘要
P. Koopman
Developers of autonomous systems face distinct challenges in conforming to established methods of validating safety. It is well known that testing alone is insufficient to assure safety, because testing long enough to establish ultra-dependability is generally impractical. Thatfis why software safety standards emphasize high quality development processes. Testing then validates process execution rather than directly validating dependability. Two significant challenges arise in applying traditional safety processes to autonomous vehicles. First, simply gathering a complete set of system requirements is difficult because of the sheer number of combinations of possible scenarios and faults. Second, autonomy systems commonly use machine learning (ML) in a way that makes the requirements and design of the system opaque. After training, usually we know what an ML component will do for an input it has seen, but generally not what it will do for at least some other inputs until we try them. Both of these issues make it difficult to trace requirements and designs to testing as is required for executing a safety validation process. In other words, we are building systems that can not be validated due to incomplete or even unknown requirements and designs. Adaptation makes the problem even worse by making the system that must be validated a moving target. In the general case, it is impractical to validate all the possible adaptation states of an autonomy system using traditional safety design processes. An approach that can help with the requirements, design, and adaptation problems is basing a safety argument not on correctness of the autonomy functionality itself, but rather on conformance to a set of safety envelopes. Each safety envelope describes a boundary within the operational state space of the autonomy system. A system operating within a "safe" envelope knows that it is safe and can operate with full autonomy. A system operating within an "unsafe" envelope knows that it is unsafe, and must invoke a failsafe action. Multiple partial specifications can be used as an envelope set, with the intersection of safe envelopes permitting full autonomy, and the union of unsafe envelopes provoking validated, and potentially complex, failsafe responses. Envelope mechanisms can be implemented using traditional software engineering techniques, reducing the problems with requirements, design, and adaptation that would otherwise impede safety validation. Rather than attempting to prove that autonomy will always work correctly (which is still a valuable goal to improve availability), the envelope approach measures the behavior of one or more autonomous components to determine if the result is safe. While this is not necessarily an easy thing to do, there is reason to believe that checking autonomy behaviors for safety is easier than implementing perfect, optimized autonomy actions. This envelope approach might be used to detect faults during development and to trig
自主系统的开发人员在符合既定的安全验证方法方面面临着独特的挑战。众所周知,仅仅进行测试是不足以保证安全性的,因为进行足够长的测试以建立超可靠性通常是不切实际的。这就是为什么软件安全标准强调高质量的开发过程。然后测试验证流程执行,而不是直接验证可靠性。在将传统安全流程应用于自动驾驶汽车时,出现了两个重大挑战。首先,简单地收集一组完整的系统需求是很困难的,因为可能的场景和故障的组合非常多。其次,自治系统通常使用机器学习(ML),使系统的需求和设计不透明。在训练之后,我们通常知道ML组件将对它所看到的输入做什么,但通常不知道它将对至少一些其他输入做什么,直到我们尝试它们。这两个问题都使跟踪需求和测试设计变得困难,这是执行安全验证过程所必需的。换句话说,我们正在构建由于不完整甚至未知的需求和设计而无法验证的系统。适应使必须被验证的系统成为一个移动的目标,从而使问题变得更糟。通常情况下,使用传统的安全设计流程来验证自治系统的所有可能的自适应状态是不切实际的。一种可以帮助解决需求、设计和适应问题的方法是基于安全论证,而不是基于自治功能本身的正确性,而是基于对一组安全信封的一致性。每个安全包络描述了自治系统运行状态空间内的边界。在“安全”范围内运行的系统知道它是安全的,可以完全自主地运行。在“不安全”信封内运行的系统知道它是不安全的,并且必须调用故障安全操作。多个部分规范可以用作包络集,安全包络的交集允许完全自治,而不安全包络的联合则引发经过验证的、可能复杂的故障安全响应。包络机制可以使用传统的软件工程技术来实现,从而减少需求、设计和适应性方面的问题,否则这些问题将阻碍安全验证。信封方法不是试图证明自治总是能够正确工作(这仍然是提高可用性的一个有价值的目标),而是度量一个或多个自治组件的行为,以确定结果是否安全。虽然这并不一定是一件容易的事情,但我们有理由相信,检查自动驾驶行为的安全性比实现完美、优化的自动驾驶行为更容易。这种包络方法可用于在开发过程中检测故障,并触发车队车辆中的故障保护。在信封定义的简单性和容忍度之间不可避免地会存在紧张关系,更容忍度的信封定义可能更复杂。在“安全”和“不安全”之间的空白区域运行需要人工监督,因为自主系统不能确定它是安全的。从部分自治到完全自治的一种方法是,随着时间的推移,系统可以通过定义和扩大“安全”信封,缩小“不安全”信封以及消除任何间隙区域来增加容忍度。
{"title":"Challenges in Autonomous Vehicle Validation: Keynote Presentation Abstract","authors":"P. Koopman","doi":"10.1145/3055378.3055379","DOIUrl":"https://doi.org/10.1145/3055378.3055379","url":null,"abstract":"Developers of autonomous systems face distinct challenges in conforming to established methods of validating safety. It is well known that testing alone is insufficient to assure safety, because testing long enough to establish ultra-dependability is generally impractical. Thatfis why software safety standards emphasize high quality development processes. Testing then validates process execution rather than directly validating dependability. Two significant challenges arise in applying traditional safety processes to autonomous vehicles. First, simply gathering a complete set of system requirements is difficult because of the sheer number of combinations of possible scenarios and faults. Second, autonomy systems commonly use machine learning (ML) in a way that makes the requirements and design of the system opaque. After training, usually we know what an ML component will do for an input it has seen, but generally not what it will do for at least some other inputs until we try them. Both of these issues make it difficult to trace requirements and designs to testing as is required for executing a safety validation process. In other words, we are building systems that can not be validated due to incomplete or even unknown requirements and designs. Adaptation makes the problem even worse by making the system that must be validated a moving target. In the general case, it is impractical to validate all the possible adaptation states of an autonomy system using traditional safety design processes. An approach that can help with the requirements, design, and adaptation problems is basing a safety argument not on correctness of the autonomy functionality itself, but rather on conformance to a set of safety envelopes. Each safety envelope describes a boundary within the operational state space of the autonomy system. A system operating within a \"safe\" envelope knows that it is safe and can operate with full autonomy. A system operating within an \"unsafe\" envelope knows that it is unsafe, and must invoke a failsafe action. Multiple partial specifications can be used as an envelope set, with the intersection of safe envelopes permitting full autonomy, and the union of unsafe envelopes provoking validated, and potentially complex, failsafe responses. Envelope mechanisms can be implemented using traditional software engineering techniques, reducing the problems with requirements, design, and adaptation that would otherwise impede safety validation. Rather than attempting to prove that autonomy will always work correctly (which is still a valuable goal to improve availability), the envelope approach measures the behavior of one or more autonomous components to determine if the result is safe. While this is not necessarily an easy thing to do, there is reason to believe that checking autonomy behaviors for safety is easier than implementing perfect, optimized autonomy actions. This envelope approach might be used to detect faults during development and to trig","PeriodicalId":346760,"journal":{"name":"Proceedings of the 1st International Workshop on Safe Control of Connected and Autonomous Vehicles","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122150977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Vehicle Platooning Simulations with Functional Reactive Programming 基于函数响应式编程的车辆队列仿真
B. Finkbeiner, F. Klein, R. Piskac, Mark Santolucito
Functional languages have provided major benefits to the verification community. Although features such as purity, a strong type system, and computational abstractions can help guide programmers away from costly errors, these can present challenges when used in a reactive system. Functional Reactive Programming is a paradigm that allows users the benefits of functional languages and an easy interface to a reactive environment. We present a tool for building autonomous vehicle controllers in FRP using Haskell.
函数式语言为验证社区提供了主要的好处。尽管诸如纯粹性、强类型系统和计算抽象等特性可以帮助程序员远离代价高昂的错误,但在响应式系统中使用这些特性会带来挑战。函数式响应式编程是一种范式,它允许用户使用函数式语言的优点,并为响应式环境提供一个简单的接口。我们提出了一个使用Haskell在FRP中构建自动车辆控制器的工具。
{"title":"Vehicle Platooning Simulations with Functional Reactive Programming","authors":"B. Finkbeiner, F. Klein, R. Piskac, Mark Santolucito","doi":"10.1145/3055378.3055385","DOIUrl":"https://doi.org/10.1145/3055378.3055385","url":null,"abstract":"Functional languages have provided major benefits to the verification community. Although features such as purity, a strong type system, and computational abstractions can help guide programmers away from costly errors, these can present challenges when used in a reactive system. Functional Reactive Programming is a paradigm that allows users the benefits of functional languages and an easy interface to a reactive environment. We present a tool for building autonomous vehicle controllers in FRP using Haskell.","PeriodicalId":346760,"journal":{"name":"Proceedings of the 1st International Workshop on Safe Control of Connected and Autonomous Vehicles","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129554864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Controlling for Unsafe Events in Dense Traffic through Autonomous Vehicles: Invited Talk Abstract 通过自动驾驶汽车控制密集交通中的不安全事件:特邀演讲摘要
D. Work, Raphael E. Stern, Fangyu Wu, M. Churchill, Shumo Cui, H. Pohlmann, Benjamin Seibold, B. Piccoli, R. Bhadani, Matt Bunting, J. Sprinkle, M. D. Monache, Nathaniel P. Hamilton, R'mani Haulcy
This talk focuses on stop-and-go instabilities in dense traffic flows, and how autonomous vehicles can be applied to control for these instabilities.
这次演讲的重点是密集交通流中走走停停的不稳定性,以及如何应用自动驾驶汽车来控制这些不稳定性。
{"title":"Controlling for Unsafe Events in Dense Traffic through Autonomous Vehicles: Invited Talk Abstract","authors":"D. Work, Raphael E. Stern, Fangyu Wu, M. Churchill, Shumo Cui, H. Pohlmann, Benjamin Seibold, B. Piccoli, R. Bhadani, Matt Bunting, J. Sprinkle, M. D. Monache, Nathaniel P. Hamilton, R'mani Haulcy","doi":"10.1145/3055378.3055380","DOIUrl":"https://doi.org/10.1145/3055378.3055380","url":null,"abstract":"This talk focuses on stop-and-go instabilities in dense traffic flows, and how autonomous vehicles can be applied to control for these instabilities.","PeriodicalId":346760,"journal":{"name":"Proceedings of the 1st International Workshop on Safe Control of Connected and Autonomous Vehicles","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124637244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proceedings of the 1st International Workshop on Safe Control of Connected and Autonomous Vehicles 第一届网联与自动驾驶汽车安全控制国际研讨会论文集
Scav, P. Koopman, Matt Bunting, J. Sprinkle, M. D. Monache, N. Aréchiga, Sumanth Dathathri, Shashank Vernekar, Nagesh Kathare, B. Finkbeiner, F. Klein
{"title":"Proceedings of the 1st International Workshop on Safe Control of Connected and Autonomous Vehicles","authors":"Scav, P. Koopman, Matt Bunting, J. Sprinkle, M. D. Monache, N. Aréchiga, Sumanth Dathathri, Shashank Vernekar, Nagesh Kathare, B. Finkbeiner, F. Klein","doi":"10.1145/3055378","DOIUrl":"https://doi.org/10.1145/3055378","url":null,"abstract":"","PeriodicalId":346760,"journal":{"name":"Proceedings of the 1st International Workshop on Safe Control of Connected and Autonomous Vehicles","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132857694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Proceedings of the 1st International Workshop on Safe Control of Connected and Autonomous Vehicles
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1