Efficient Cross-Architecture Binary Function Embeddings through Knowledge Distillation
This paper presents an evaluation of the accuracy of our camera-based roadside infrastructure in the context of collision risk detection.
In this page you will be able to find the scientific publications related to SELFY project published by partners
This paper presents an evaluation of the accuracy of our camera-based roadside infrastructure in the context of collision risk detection.
This paper presents an evaluation of the accuracy of our camera-based roadside infrastructure in the context of collision risk detection.
This paper presents an evaluation of the accuracy of our camera-based roadside infrastructure in the context of collision risk detection.
The work in this thesis aims to provide a sound foundation for integrating and evaluating V2XaaS systems.
The work in this thesis aims to provide a sound foundation for integrating and evaluating V2XaaS systems.
The work in this thesis aims to provide a sound foundation for integrating and evaluating V2XaaS systems.
The work in this thesis aims to provide a sound foundation for integrating and evaluating V2XaaS systems.
The work in this thesis aims to provide a sound foundation for integrating and evaluating V2XaaS systems.
We present a new lightweight algorithm for detecting the points related to dynamic obstacles within LIDAR point clouds.
We propose a novel architecture for a Vehicle Security Operations Center (VSOC) in a Cooperative, Connected, and Automated Mobility (CCAM) environment.
Despite the ever-growing importance of SOCs, there is little academic and fundamental research. This paper closes part of the gap and provides a suitable research base regarding people and technologies.
This article first highlights the gaps identified in performance analysis before closing them with a dedicated measurement campaign. Next, it combines these findings with related research to design a straightforward V2X field rating metric.
This paper aims to explain what envisions our tool called Audit Box, which is developed by Applus IDIADA and EURECAT and pretends to audit the vehicles while they are circulating in a smart city informing to the Vehicle Security Operations Center (VSOC) (or corresponding OEM or Traffic Management Center) if a vulnerability or jamming situation has been encountered.
We propose a new approach to generate finite automata from an expressive interaction language with operators such as the concurrent region. Our approach leverages an operational semantics to compute derivatives of an interaction and assimilate them to states of a finite automata. In addition, we use term rewriting to merge states on-the-fly so as to obtain small automata without relying on costly a-posteriori minimization techniques.
We extended a state-of-the-art (SOTA) automated driving (AD) platform with CA/CP functionality in our work. We then deployed it on two street-legal AD demonstrators (ADDs) and did an extensive field test to acquire data.
For distributed systems, it is generally not possible to characterize executions in the form of global traces. To account for this, we model executions as collections of local traces called multi-traces, with one local trace per group of co-localized actors that share a common clock.
This article proposes a novel strategy based on control input filtering for mitigating the effects of deception attacks on control and sensor measurement signals.
This paper addresses the problem of synthesizing distorting mechanisms that maximize infinite horizon privacy for Networked Control Systems (NCSs)
This paper presents a modelling framework that allows us to systematically compute outer ellipsoidal approximations of reachable sets induced by attacks..
This paper proposes a vehicular platoon control approach under Denial-of-Service (DoS) attacks and external disturbances.
This paper presents a Fail-Safe decision architecture formulated within the framework of the SELFY project.
With quantum computing advancements, traditional public key cryptography becomes susceptible, emphasizing the need for quantum-resistant algorithms to assure long-term automotive cybersecurity.
SELFY envisions an agnostic toolbox for the self-management of security and resilience of the CCAM (Connected, Cooperative and Automated Mobility) ecosystem, providing self-awareness, self-resilience and self-healing mechanisms and enhancing trust between stakeholders
The prioritization of passenger safety and comfort in the automotive sector lead to the research and development of technologies such as seat belts, airbags, driving assistants, and autonomous driving. These technologies bring advantages and new, unique dangers in the area of Information Technology (IT) security.
Fail-Safe Decision Architecture for Positioning Failures on Automated VehiclesProceedings of the IEEE Autonomous and Trusted Vehicles Conference by Mario Rodríguez-Arozamena (TECNALIA, Basque Research and Technology Alliance, University of the Basque Country (UPV/EHU); Iñigo Aranguren-Mendieta; Joshué Pérez; Asier Zubizarreta (TECNALIA, Basque Research and Technology Alliance) Abstract Precise localization is essential for the operation of Connected and…
Interaction-based Offline Runtime Verification of Distributed SystemsProceedings of the Fundamentals of Software Engineering Conference (FSEN) by Erwan Mahe; Boutheina Bannour; Christophe Gaston; Arnault Lapitre (Université Paris-Saclay, CEA List), and Pascale Le Gall (Université Paris-Saclay, CentraleSupéle) Abstract Interactions are formal models describing asynchronous communications within a distributed system. They can be drawn in the fashion of…