期刊文献+

智能汽车中人工智能算法应用及其安全综述 被引量:22

A Survey:Artificial Intelligence and its Security in Intelligent Vehicle
下载PDF
导出
摘要 随着人工智能(AI)技术的发展,以智能驾驶汽车、智能机器人为代表的智能系统逐渐代替或辅助人类从事各种场景中简单或复杂的工作。该文从智能汽车中的智能算法出发,总结了在智能汽车中人工智能感知算法、决策算法的研究进展;讨论了智能算法的不确定性问题;并从智能算法的不确定性带来的安全问题角度,讨论了预期功能安全的意义及发展,最后讨论了人机共驾对当前智能驾驶汽车解决预期功能安全的必要性。 With the development of artificial intelligence(AI)technology,intelligent systems,such as intelligent driving cars and intelligent robots,gradually replace or assist human beings to do simple or complex work in various scenes.Starting from the intelligent algorithm in intelligent vehicle,this paper summarizes the research progress of artificial intelligence perception algorithm and decision algorithm in intelligent vehicle.Secondly,the uncertainty of intelligent algorithm is discussed.Finally,from the point of view of the security problems brought by the uncertainty of the intelligent algorithm,this paper discusses the significance and development of the expected functional security,and discusses the necessity of human-computer co driving to solve the expected functional security of the current intelligent driving vehicle.
作者 翟强 程洪 黄瑞 詹慧琴 赵洋 李骏 ZHAI Qiang;CHENG Hong;HUANG Rui;ZHAN Hui-qin;ZHAO Yang;LI Jun(Center for Robotics,University of Electronic Science and Technology of China Chengdu 611731;School of Vehicle and Mobility,Tsinghua University Haidian Beijing 100091)
出处 《电子科技大学学报》 EI CAS CSCD 北大核心 2020年第4期490-498,510,共10页 Journal of University of Electronic Science and Technology of China
基金 国家自然科学基金(U1964203)。
关键词 人工智能 人机共驾 智能驾驶 预期功能安全 统计模式识别 AI human-computer co-driving intelligent driving SOTIF statistical pattern recognition
  • 相关文献

参考文献12

二级参考文献36

  • 1宁世发,冯忠祥.道路交通事故成因分析[J].交通标准化,2006,34(10):152-155. 被引量:16
  • 2赵冬梅,马建峰,王跃生.信息系统的模糊风险评估模型[J].通信学报,2007,28(4):51-56. 被引量:63
  • 3李力,王飞跃,郑南宁,张毅.驾驶行为智能分析的研究与发展[J].自动化学报,2007,33(10):1014-1022. 被引量:34
  • 4李红霞.人工智能的发展综述[J].甘肃科技纵横,2007,36(5):17-18. 被引量:18
  • 5国家质量技术监督局.GB/T17859-1999,计算机信息系统安全保护等级划分准则[S].北京:中国标准出版社.1999:4-7.
  • 6BELL D E,LAPADULA L J.Secure Computer Systems:Mathematical Foundations,M74-244[R].Bedford:Mass Mitre Corp,1973:66-79.
  • 7BELL D E.Looking back at the Bell-La Padula model[C]//21st Annual Computer Security Applications Conference.Tucson,Arizona:[s.n.],2005:337-351.
  • 8DENNING P.Third generation computer systems[J].Computer Surveys,1971,3(4):175-216.
  • 9SANDHU R S,COYNE E J,FEINSTEIN H L.Role-based access control models[J].IEEE Computer,1996,29(2):38-47.
  • 10WANG C,CHEN X Y,LI N.An access control mode based on information flow graph[C]//Proceedings of the International Conference on Computational Intelligence and Security.Sanya:[s.n.],2011:998-1000.

共引文献257

同被引文献251

引证文献22

二级引证文献69

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部