US Department of Energy(DOE)under the project EEMS082:Validation of Connected and Automated Mobility System.
Communication delays within connected and autonomous vehicles(CAVs)pose significant risks.It is imperative to address these issues to ensure the safe and effective operation of CAVs.However,the exploration of communic...
Supported by National Natural Science Foundation of China(Grant Nos.52072212,52302410);China Postdoctoral Science Foundation(Grant No,2024T170489);Postdoctoral Fellowship Program of CPSF(Grant No.GZB20230354);Research and Development of Autonomous Driving Domain Controller and Its Algorithm(Grant No.2023Z070);Young Elite Scientists Sponsorship Program by CHINA-SAE;Shuimu Tsinghua Scholarship。
The emergence of connected and automated vehicles(CAV)indicates improved traffic mobility in future traffic transportation systems.This study addresses the research gap in macroscopic traffic modeling of mixed traffic...
supported by Open Fund of Hunan Key Laboratory of Smart Roadway and Cooperative Vehicle-Infrastructure Systems(Changsha University of Science&Technology)(Grant No.kfj220703).
Traffic flow mobility on expressway plays an important role in urban development.With the emergent technologies,connected vehicles,including both connected automated vehicles(CAVs)and connected regular vehicles(CRVs),...
jointly supported by the National Key Research and Development Program of China(No.2022ZD0115600);National Natural Science Foundation of China(No.52072067);Natural Science Foundation of Jiangsu Province(No.BK20210249);China Postdoctoral Science Foundation(No.2020M681466);Jiangsu Planned Projects for Postdoctoral Research Funds(No.SBK2021041144);Jiangsu Planned Projects for Postdoctoral Research Funds(No.2021K094A)。
Connected automated vehicles(CAVs)rely heavily on intelligent algorithms and remote sensors.If the control center or on-board sensors are under cyber-attack due to the security vulnerability of wireless communication,...
the rules and guidelines outlined by Swinburne’s Human Research Ethics Committee(SUHREC),approval reference 20226366-10982(15 September,2022);modification reference 20226366-11087(27 September,2022).
This study investigates the attitudes and concerns of the Australian public toward connected and autonomous vehicles(CAVs),and the factors influencing their willingness to adopt this technology.Through a comprehensive...
Project supported by the Fundamental Research Funds for Central Universities,China(Grant No.2022YJS065);the National Natural Science Foundation of China(Grant Nos.72288101 and 72371019).
With the development of intelligent and interconnected traffic system,a convergence of traffic stream is anticipated in the foreseeable future,where both connected automated vehicle(CAV)and human driven vehicle(HDV)wi...
Connected and automated vehicles(CAVs)have the potential to revolutionise the trans portation industry,with a plethora of research already revealing considerable gains in safety,travel time and mobility,as well as red...
supported by Natural Science Foundation of China(52302497,52272420)。
The progression toward automated driving and the latest advancement in vehicular networking have led to novel and natural human-vehicle-road systems,in which affective human-vehicle interaction is a crucial factor aff...
This work was supported by the National Natural Science Foundation of China(No.52272420);the Science and Technology Innovation Committee of Shenzhen(No.CJGJZD20200617102801005);the Tsinghua-Toyota Joint Research Institution.
Cooperative driving is widely viewed as a promising method to better utilize limited road resources and alleviate traffic congestion.In recent years,several cooperative driving approaches for idealized traffic scenari...
supported in part by the National Natural Science Foundation of China(62203064,62203065,62303069);the Open Fund of Institute of Ocean Research of Bohai University(BDHYYJY2023017)。
Dear Editor,This letter contributes to designing a resilient event-triggered controller for connected automated vehicles under cyber attacks,including denial-of-service(DoS)and deception attacks.To characterize the ef...