IJSMT Journal

International Journal of Science, Strategic Management and Technology

An International, Peer-Reviewed, Open Access Scholarly Journal Indexed in recognized academic databases · DOI via Crossref The journal adheres to established scholarly publishing, peer-review, and research ethics guidelines set by the UGC

ISSN: 3108-1762 (Online)
webp (1)

Plagiarism Passed
Peer reviewed
Open Access

ADVERSARIAL ATTACKS AND DEFENSE MECHANISMS IN AUTONOMOUS VEHICLES

AUTHORS:
Antony Adwin Luiz
Mentor
Sudha D
Affiliation
Department of Computer Applications, SCMS School of Technology & Management
CC BY 4.0 License:
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract

The integration of deep learning (DL) and artificial intelligence (AI) has significantly advanced the capabilities of autonomous vehicles (AVs), enabling intelligent perception, planning, and decision-making. However, these enhancements have also introduced new cybersecurity vulnerabilities, particularly in the form of adversarial attacks. This review focuses on four key adversarial attack types—Fast Gradient Sign Method (FGSM), Projected Gradient Descent (PGD), physical adversarial patch attacks, and sensor spoofing—that pose serious threats to AV safety. It further explores advanced and practical defense mechanisms such as hybrid deep learning models, patch-based occlusion-aware detection, autoencoders with memory modules, and sensor fusion-based spoofing detection frameworks. The review is supported by recent research papers and highlights both theoretical and applied perspectives, covering classification and perception tasks, sensor vulnerabilities, and real-world validation. Through detailed analysis of attack mechanisms, impacts, and mitigation strategies, the urgent need for scalable, real-time, and integrated defense systems threats is emphasized to secure AI-driven transportation from evolving adversarial.

Keywords
Article Metrics
Article Views
70
PDF Downloads
1
HOW TO CITE
APA

MLA

Chicago

Copy

Luiz, A. A. (2026). Adversarial Attacks and Defense Mechanisms in Autonomous Vehicles. International Journal of Science, Strategic Management and Technology, 02(05). https://doi.org/10.55041/ijsmt.v2i5.125

Luiz, Antony. "Adversarial Attacks and Defense Mechanisms in Autonomous Vehicles." International Journal of Science, Strategic Management and Technology, vol. 02, no. 05, 2026, pp. . doi:https://doi.org/10.55041/ijsmt.v2i5.125.

Luiz, Antony. "Adversarial Attacks and Defense Mechanisms in Autonomous Vehicles." International Journal of Science, Strategic Management and Technology 02, no. 05 (2026). https://doi.org/https://doi.org/10.55041/ijsmt.v2i5.125.

References
1.. Ibrahum A.D.M., Hussain M., Hong J.E., “Deep Learning Adversarial Attacks and Defenses in Autonomous Vehicles: A Systematic Literature Review from a Safety Perspective”, Artificial Intelligence Review, 2025, 58 (1), 1–53.

2.Girdhar M., Hong J., Moore J., “Cybersecurity of Autonomous Vehicles: A Systematic Literature Review of Adversarial Attacks and Defense Models”, IEEE Open Journal of Vehicular Technology, 2023, 4, 417–437.

3.Deng Y., et al., “Deep Learning-Based Autonomous Driving Systems: A Survey of Attacks and Defenses”, IEEE Transactions on Industrial Informatics, 2021, 17 (12), 7897–7912.

4.Mahima K.T.Y., Ayoob M., Poravi G., “Adversarial Attacks and Defense Technologies on Autonomous Vehicles: A Review”, Applied Computer Systems, 2021, 26 (2), 96–106.

5.Almutairi S., Barnawi A., “Securing DNN for Smart Vehicles: An Overview of Adversarial Attacks, Defenses, and Frameworks”, Journal of Engineering and Applied Science, 2023, 70 (1), 16.

6.Khan Z., Chowdhury M., Khan S.M., “A Hybrid Defense Method Against Adversarial Attacks on Traffic Sign Classifiers in Autonomous Vehicles”, arXiv preprint, 2022. https://arxiv.org/abs/2205.01225

7.Badjie B., Cecílio J., Casimiro A., “Adversarial Attacks and Countermeasures on Image Classification-Based Deep Learning Models in Autonomous Driving Systems: A Systematic Review”, ACM Computing Surveys, 2024, 57 (1), 1–52.

8.Shibly K.H., et al., “Towards Autonomous Driving Model Resistant to Adversarial Attack”, Applied Artificial Intelligence, 2023, 37 (1), 2193461.

9.Gupta S., Maple C., Passerone R., “An Investigation of Cyber-Attacks and Security Mechanisms for Connected and Autonomous Vehicles”, IEEE Access, 2023, 11, 90641–90669.

 

  1. Choi J., Tian Q., “Adversarial Attack and Defense of YOLO Detectors in Autonomous Driving Scenarios”, IEEE Intelligent Vehicles Symposium, 2022.

Ethics and Compliance
✓ All ethical standards met
This article has undergone plagiarism screening and double-blind peer review. Editorial policies have been followed. Authors retain copyright under CC BY-NC 4.0 license. The research complies with ethical standards and institutional guidelines.
Indexed In
Similar Articles
AI-Based Multilingual Complaint Analysis and Emotion-Aware Priority Prediction System
string(9) "T. Kabila" Kabila, T.
(2026)
DOI: 10.55041/ijsmt.v2i3.224
Design and Development of an AI–IOT Enabled Smart Vacuum Cleaner using Blower-Based Adaptive Suction Mechanism
string(19) "Ms Shravani Nilange" Nilange, M. S.
(2026)
DOI: 10.55041/ijsmt.v2i4.058
Smart Time Table Generator using Constraint-Based Scheduling
string(18) "Vaibhav.D.Verulkar" Vaibhav.D.Verulkar, et al.
(2026)
DOI: 10.55041/ijsmt.v2i4.090
Scroll to Top