Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
Free, publicly-accessible full text available October 1, 2025
-
Free, publicly-accessible full text available December 1, 2025
-
Commercial autonomous machines is a thriving sector, one that is likely the next ubiquitous computing platform, after Personal Computers (PC), cloud computing, and mobile computing. Nevertheless, a suitable computing substrate for autonomous machines is missing, and many companies are forced to develop ad hoc computing solutions that are neither principled nor extensible. By analyzing the demands of autonomous machine computing, this article proposes Dataflow Accelerator Architecture (DAA), a modern instantiation of the classic dataflow principle, that matches the characteristics of autonomous machine software.more » « lessFree, publicly-accessible full text available October 27, 2025
-
Trajectory prediction forecasts nearby agents’ moves based on their historical trajectories. Accurate trajectory prediction (or prediction in short) is crucial for autonomous vehicles (AVs). Existing attacks compromise the prediction model of a victim AV by directly manipulating the historical trajectory of an attacker AV, which has limited real-world applicability. This paper, for the first time, explores an indirect attack approach that induces prediction errors via attacks against the perception module of a victim AV. Although it has been shown that physically realizable attacks against LiDAR-based perception are possible by placing a few objects at strategic locations, it is still an open challenge to find an object location from the vast search space in order to launch effective attacks against prediction under varying victim AV velocities. Through analysis, we observe that a prediction model is prone to an attack focusing on a single point in the scene. Consequently, we propose a novel two-stage attack framework to realize the single-point attack. The first stage of predictionside attack efficiently identifies, guided by the distribution of detection results under object-based attacks against perception, the state perturbations for the prediction model that are effective and velocity-insensitive. In the second stage of location matching, we match the feasible object locations with the found state perturbations. Our evaluation using a public autonomous driving dataset shows that our attack causes a collision rate of up to 63% and various hazardous responses of the victim AV. The effectiveness of our attack is also demonstrated on a real testbed car 1. To the best of our knowledge, this study is the first security analysis spanning from LiDARbased perception to prediction in autonomous driving, leading to a realistic attack on prediction. To counteract the proposed attack, potential defenses are discussed.more » « lessFree, publicly-accessible full text available August 14, 2025
-
Free, publicly-accessible full text available May 1, 2025
-
Free, publicly-accessible full text available May 1, 2025
-
Abstract We observed five clusters of upper‐level compact intracloud discharges (CIDs) moving positive charge up over land and over water in Florida. The clusters each contained 3 to 6 CIDs, and the overall cluster duration ranged from 27 to 58 s. On average, the CIDs in a given cluster occurred 11 s apart and were separated by a 3D distance of about 1.5 km. All the clustered CIDs were located above the tropopause and were likely associated with convective surges that penetrated the stratosphere. The average periodicity of CID occurrence within a cluster (every 11 s) was comparable to the periodicity at which the average cluster area is expected to be bombarded by ≥1016 eV cosmic‐ray particles (every 5 s). Each of such energetic particles gives rise to a cosmic ray shower (CRS) and, in the presence of sufficiently strong electric field over a sufficiently large distance, to a relativistic runaway electron avalanche (RREA). We infer that each of our upper‐level CIDs is likely to be caused by a CRS‐RREA traversing, at nearly the speed of light, the electrified overshooting convective surge and triggering, within a few microseconds, a multitude of streamer flashes along its path, over a distance of the order of hundreds of meters (as per the mechanism recently proposed for lightning initiation by Kostinskiy et al., 2020,
https://doi.org/10.1029/2020JD033191 ). The upper‐level CID clustering was likely made possible by the recurring action of energetic cosmic rays and the rapid recovery of the negative screening charge layer at stratospheric altitudes.Free, publicly-accessible full text available April 28, 2025 -
Free, publicly-accessible full text available April 1, 2025
-
Free, publicly-accessible full text available April 1, 2025
-
Free, publicly-accessible full text available May 7, 2025