Author of the publication

A Reinforcement Learning Approach for GNSS Spoofing Attack Detection of Autonomous Vehicles.

, , and . CoRR, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Vision-based Pedestrian Alert Safety System (PASS) for Signalized Intersections., , , , , and . CoRR, (2019)An Evaluation Framework of End-to-End 5G Millimeter Wave Communication for Connected Vehicle Applications., , , , and . CoRR, (2020)Improving the Efficacy of Car-Following Models With a New Stochastic Parameter Estimation and Calibration Method., , , and . IEEE Trans. Intell. Transp. Syst., 16 (5): 2687-2699 (2015)FairPlay: Fraud and Malware Detection in Google Play., , , and . CoRR, (2017)Grey models for short-term queue length predictions for adaptive traffic signal control., , , and . Expert Syst. Appl., (2021)Mediawiki Administrators' Tutorial Guide: Install, Manage, and Customize Your Mediawiki Installation. (2007)A Review on Cybersecurity of Cloud Computing for Supporting Connected Vehicle Applications., , , , , , , and . IEEE Internet Things J., 9 (11): 8250-8268 (2022)A Transportation Digital-Twin Approach for Adaptive Traffic Control Systems., , , , and . CoRR, (2021)The Suitability of the Java Language for Computer-Graphics and Visualisation Research., and . IV, page 273-. IEEE Computer Society, (2002)Search Rank Fraud De-Anonymization in Online Systems., , , and . HT, page 174-182. ACM, (2018)