[1] CHEN Y, CHEN T, JIN L. Development strategy research on intelligent and connected vehicle of America[C]//Proceedings of IET International Conference on Intelligent&Connected Vehicles. Washington D. C., USA:IEEE Press, 2016:457-468. [2] 腾讯科恩实验室.Autopilot的几个软件漏洞被发现了[EB/OL].[2023-05-11].https://www.guancha.cn/qiche/2019_04_02_496109.shtml. Tencent Cohen Laboratory. Several software vulnerabilities in Autopilot have been discovered[EB/OL].[2023-05-11].https://www.guancha.cn/qiche/2019_04_02_496109.shtml.(in Chinese) [3] 汽车前沿.SiriusXM车联网服务曝高危漏洞[EB/OL].[2023-05-11]. https://www.hfyili.cn/a/349443. Automotive Frontiers. SiriusXM connected car service exposed a high risk vulnerability[EB/OL].[2023-56-11]. https://www.hfyili.cn/a/349443.(in Chinese) [4] 新浪科技.19岁黑客连续破解25辆特斯拉[EB/OL].[2023-05-11]. https://36kr.com/p/1572012375527304. Sina Technology. 19-year-old hacker cracked 25 Tesla vehicles in a row[EB/OL].[2023-05-11]. https://36kr.com/p/1572012375527304. (in Chinese) [5] 彭锦峰,申德荣,寇月,等.基于多视角的多类型错误全面检测方法[J].软件学报, 2023, 34(3):1049-1064. PENG J F, SHEN D R, KOU Y, et al. Comprehensive error detection method for multiple types errors based on multiple views[J]. Journal of Software, 2023, 34(3):1049-1064.(in Chinese) [6] WANG Y Y, MASOUD N, KHOJANDI A. Real-time sensor anomaly detection and recovery in connected automated vehicle sensors[J]. IEEE Transactions on Intelligent Transportation Systems, 2021, 22(3):1411-1421. [7] DING N, MA H X, ZHAO C G, et al. Driver's emotional state-based data anomaly detection for vehicular ad hoc networks[C]//Proceedings of IEEE International Conference on Smart Internet of Things. Washington D. C.,USA:IEEE Press, 2019:121-126. [8] RANAWEERA M, SENEVIRATNE A, REY D, et al. Anomalous data detection in vehicular networks using traffic flow theory[C]//Proceedings of the 90th IEEE Vehicular Technology Conference. Honolulu, USA:IEEE Press, 2019:1-5. [9] 张海春,姜荣帅,王颉,等.基于熵的车载CAN总线异常检测研究[J].汽车工程, 2021, 43(10):1543-1548. ZHANG H C, JIANG R S, WANG J, et al. Research on anomaly detection of in-vehicle CAN bus based on entropy[J]. Automotive Engineering, 2021, 43(10):1543-1548.(in Chinese) [10] ARSHAD M, ULLAH Z, KHALID M, et al. Beacon trust management system and fake data detection in vehicular ad-hoc networks[J]. IET Intelligent Transport Systems, 2019, 13(5):780-788. [11] KHATTAK Z H, FONTAINE M D, LI W, et al. Investigating the relation between instantaneous driving decisions and safety critical events in naturalistic driving environment[J]. Accident Analysis⪻evention, 2021, 156:106086. [12] MAERIVOSE S, DE MOOR B. Traffic flow theory[EB/OL].[2023-05-11]. https://arxiv.org/abs/0507126. [13] XING Z C, LIU X L, FANG R, et al. Research on qualitative classification method of drivers'driving style[C]//Proceedings of IEEE International Conference on Advances in Electrical Engineering and Computer Applications. Washington D. C., USA:IEEE Press, 2021:709-716. [14] ZYLIUS G. Investigation of route-independent aggressive and safe driving features obtained from accelerometer signals[J]. IEEE Intelligent Transportation Systems Magazine, 2017, 9(2):103-113. [15] XIA N Y, YAN Y B, TANG X Q, et al. Research on driving style recognition model considering different traffic density and driving behavior[C]//Proceedings of the 6th CAA International Conference on Vehicular Control and Intelligence. Washington D. C.,USA:IEEE Press, 2022:1-8. [16] MURPHEY Y L, MILTON R, KILIARIS L. Driver's style classification using jerk analysis[C]//Proceedings of IEEE Workshop on Computational Intelligence in Vehicles and Vehicular Systems. Nashville, USA:IEEE Press, 2009:23-28. [17] GREENSHIELDS B D, BIBBINS J R, CHANNING W S, et al. A study of traffic capacity[J]. Highway Research Board Proceedings, 1935, 14(1):448-477. [18] 曹栋发,李勇,胡创业,等.基于用户画像以及Stackelberg博弈的交通环岛通行策略[J].计算机工程, 2023, 49(9):208-216. CAO D F, LI Y, HU C Y, et al. Traffic strategy of roundabout based on user portrait and Stackelberg game[J]. Computer engineering, 2023, 49(9):208-216.(in Chinese) [19] BEN-HUR A, HORN D, SIEGELMANN H T, et al. A support vector clustering method[C]//Proceedings of the 15th International Conference on Pattern Recognition. Barcelona, Spain:IEEE Press, 2000:724-727. [20] KENNEDY J, EBERHART R. Particle swarm optimization[C]//Proceedings of International Conference on Neural Networks. Perth, Australia:IEEE Press, 1995:1942-1948. [21] OSBAND I, BLUNDELL C, PRITZEL A, et al. Deep exploration via bootstrapped DQN[C]//Proceedings of Advances in Neural Information Processing Systems. Cambridge, USA:MIT Press, 2016:4033-4041. [22] 崔景洋,陈振国,田立勤,等.基于机器学习的用户与实体行为分析技术综述[J].计算机工程, 2022, 48(2):10-24. CUI J Y, CHEN Z G, TIAN L Q, et al. Overview of user and entity behavior analytics technology based on machine learning[J]. Computer Engineering, 2022, 48(2):10-24.(in Chinese) [23] CHANDOLA V, BANERJEE A, KUMAR V. Anomaly detection:a survey[J]. ACM Computing Surveys, 2009, 41(3):15. [24] KRAJEWSKI R, BOCK J, KLOEKER L, et al. The highD dataset:a drone dataset of naturalistic vehicle trajectories on German highways for validation of highly automated driving systems[C]//Proceedings of the 21st International Conference on Intelligent Transportation Systems. New York, USA:ACM Press, 2018:2118-2125. [25] 国家工业信息安全发展研究中心.自动驾驶数据安全白皮书(2020)[EB/OL].[2023-05-11].https://m.sohu.com/a/453643278_653604. National Industrial Information Security Development research Center. Autonomous driving data security white paper (2020)[EB/OL].[2023-05-11].https://m.sohu.com/a/453643278_653604. (in Chinese) [26] ABBAS M, SAFAR M, SALEM A. Anomaly detection system for altered signal values within the intra-vehicle network[C]//Proceedings of the 15th Design&Technology of Integrated Systems in Nanoscale Era. Marrakech, Morocco:IEEE Press, 2020:1-6. [27] REN G, ZHU S. Parameter calibration of traffic flow speed-density model based on k-means clustering algorithm and least square method[C]//Proceedings of CICTP'21. Reston, USA:American Society of Civil Engineers, 2021:66-76. |