No abstract available.
Proceeding Downloads
Increasing pedestrian detection performance through weighting of detection impairing factors
Object detection is a matured technique, converging to the detection performance of human vision. This paper presents a method to further close the remaining gap of detection capability by investigating visual factors impairing the detectability of ...
SynPeDS: A Synthetic Dataset for Pedestrian Detection in Urban Traffic Scenes
- Thomas Stauner,
- Frederik Blank,
- Michael Fürst,
- Johannes Günther,
- Korbinian Hagn,
- Philipp Heidenreich,
- Markus Huber,
- Bastian Knerr,
- Thomas Schulik,
- Karl-Ferdinand Leiß
We introduce the Synthetic Pedestrian Dataset (SynPeDS) which was designed to support a systematic safety analysis for pedestrian detection tasks in urban scenes. The dataset was generated synthetically with a real-time and a physically-based rendering ...
Evaluation of Level 2 Automated Driving Artificial Intelligence Readiness in Simulated Scenarios
Recent advances in state-of-the-art camera-based AI mechanisms in the automated driving field have leveraged great progress in the installation and widespread use of this technology along the recent years. However, vehicles with automated driving ...
Predictive Uncertainty Quantification of Deep Neural Networks using Dirichlet Distributions
Advancements in deep neural networks have made it a prominent approach for most of the complex computer vision tasks. A key aspect for the deployment of deep neural networks in several applications, like automotive and medical, has been its ability to ...
Challenges and Directions for Automated Driving Security
Security for automated driving systems brings new challenges that are not typically considered in automotive cybersecurity of conventional non-automated systems. The game changers behind these challenges are missing driver supervision, increased ...
Systematic Evaluation of Automotive Intrusion Detection Datasets
Some current and next generation security solutions employ machine learning and related technologies. Due to the nature of these applications, correct use of machine learning can be critical. One area that is of particular interest in this regard is the ...
More Secure Collaborative APIs resistant to Flush-Based Cache Attacks on Cortex-A9 Based Automotive System
Flush-based cache attacks seriously threaten the security of automotive system based on ARM Cortex-A9 MPCore. Most of the proposed defense schemes have limited detection capabilities or can’t detect the malicious attacks fast enough. The method of ...
Steering Your Car With Electromagnetic Fields
Several advanced driver assistance systems require a reliable angle of the steering wheel as input for their control-loop cycle. This research investigates attacks on the steering wheel angle sensor with electromagnetic fields. We present measurement ...
Analysis of the DoIP Protocol for Security Vulnerabilities
DoIP, which is defined in ISO 13400, is a transport protocol stack for diagnostic data. Diagnostic data is a potential attack vector at vehicles, so secure transmission must be guaranteed to protect sensitive data and the vehicle. Previous work ...
A Data Protection-Oriented System Model Enforcing Purpose Limitation for Connected Mobility
Cars are getting rapidly connected with their environment allowing all kind of mobility services based on the data from various sensors in the car. Data privacy is in many cases only ensured by legislation, i. e., the European General Data Protection ...
Lightweight Privacy-Preserving Ride-Sharing Protocols for Autonomous Cars
Ride-sharing is a popular way of transportation that reduces traffic and the costs of the trip. Emerge of autonomous vehicles makes ride-sharing more popular because these vehicles do not require a driver’s effort. Therefore, in order to find a ...
Combined Safety and Cybersecurity Testing Methodology for Autonomous Driving Algorithms
Combined safety and cybersecurity testing are critical for assessing the reliability and optimisation of autonomous driving (AD) algorithms. However, safety and cybersecurity testing is often conducted in isolation, leading to a lack of evaluation of ...