Low Complexity Dynamic Obstacle Detection for Intelligent Road Infrastructure
We present a new lightweight algorithm for detecting the points related to dynamic obstacles within LIDAR point clouds.
In this page you will be able to find the scientific publications related to SELFY project published by partners
We present a new lightweight algorithm for detecting the points related to dynamic obstacles within LIDAR point clouds.
We propose a novel architecture for a Vehicle Security Operations Center (VSOC) in a Cooperative, Connected, and Automated Mobility (CCAM) environment.
Despite the ever-growing importance of SOCs, there is little academic and fundamental research. This paper closes part of the gap and provides a suitable research base regarding people and technologies.
This article first highlights the gaps identified in performance analysis before closing them with a dedicated measurement campaign. Next, it combines these findings with related research to design a straightforward V2X field rating metric.
This paper aims to explain what envisions our tool called Audit Box, which is developed by Applus IDIADA and EURECAT and pretends to audit the vehicles while they are circulating in a smart city informing to the Vehicle Security Operations Center (VSOC) (or corresponding OEM or Traffic Management Center) if a vulnerability or jamming situation has been encountered.
We propose a new approach to generate finite automata from an expressive interaction language with operators such as the concurrent region. Our approach leverages an operational semantics to compute derivatives of an interaction and assimilate them to states of a finite automata. In addition, we use term rewriting to merge states on-the-fly so as to obtain small automata without relying on costly a-posteriori minimization techniques.
We extended a state-of-the-art (SOTA) automated driving (AD) platform with CA/CP functionality in our work. We then deployed it on two street-legal AD demonstrators (ADDs) and did an extensive field test to acquire data.
For distributed systems, it is generally not possible to characterize executions in the form of global traces. To account for this, we model executions as collections of local traces called multi-traces, with one local trace per group of co-localized actors that share a common clock.
This article proposes a novel strategy based on control input filtering for mitigating the effects of deception attacks on control and sensor measurement signals.
This paper addresses the problem of synthesizing distorting mechanisms that maximize infinite horizon privacy for Networked Control Systems (NCSs)
This paper presents a modelling framework that allows us to systematically compute outer ellipsoidal approximations of reachable sets induced by attacks..
This paper proposes a vehicular platoon control approach under Denial-of-Service (DoS) attacks and external disturbances.
This paper presents a Fail-Safe decision architecture formulated within the framework of the SELFY project.
With quantum computing advancements, traditional public key cryptography becomes susceptible, emphasizing the need for quantum-resistant algorithms to assure long-term automotive cybersecurity.
SELFY envisions an agnostic toolbox for the self-management of security and resilience of the CCAM (Connected, Cooperative and Automated Mobility) ecosystem, providing self-awareness, self-resilience and self-healing mechanisms and enhancing trust between stakeholders
The prioritization of passenger safety and comfort in the automotive sector lead to the research and development of technologies such as seat belts, airbags, driving assistants, and autonomous driving. These technologies bring advantages and new, unique dangers in the area of Information Technology (IT) security.
Fail-Safe Decision Architecture for Positioning Failures on Automated VehiclesProceedings of the IEEE Autonomous and Trusted Vehicles Conference by Mario Rodríguez-Arozamena (TECNALIA, Basque Research and Technology Alliance, University of the Basque Country (UPV/EHU); Iñigo Aranguren-Mendieta; Joshué Pérez; Asier Zubizarreta (TECNALIA, Basque Research and Technology Alliance) Abstract Precise localization is essential for the operation of Connected and…
Interaction-based Offline Runtime Verification of Distributed SystemsProceedings of the Fundamentals of Software Engineering Conference (FSEN) by Erwan Mahe; Boutheina Bannour; Christophe Gaston; Arnault Lapitre (Université Paris-Saclay, CEA List), and Pascale Le Gall (Université Paris-Saclay, CentraleSupéle) Abstract Interactions are formal models describing asynchronous communications within a distributed system. They can be drawn in the fashion of…
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
Cookie | Duration | Description |
---|---|---|
_pk_id.20.dd88 | 1 year | This cookie is installed by Matomo. The cookie is used to calculate visitor, session, camapign data and keep track of site usage for the site's analytics report. The cookies store information anonymously and assigns a randoly generated number to identify unique visitors. |
_pk_ses.20.dd88 | 30 minutes | This cookie is installed by Matomo. The cookie is used to calculate visitor, session, camapign data and keep track of site usage for the site's analytics report. The cookies store information anonymously and assigns a randoly generated number to identify unique visitors. |
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-advertisement | 1 year | Set by the GDPR Cookie Consent plugin, this cookie is used to record the user consent for the cookies in the "Advertisement" category . |
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |