Computer security paper
Paper list
Paper list
880
Phantom of the ADAS: Securing Advanced Driver-Assistance Systems from Split-Second Phantom Attacks
Autonomous Vehicle
Camera
Tesla
Mobileye
1016
I Can See the Light: Attacks on Autonomous Vehicles Using Invisible Lights
Autonomous Vehicle
Object detection
Traffic light detection
Localization
IR lights
Camera
Tesla
SLAM