18. 18
Computer Vision -
Slight alterations to an image, invisible to humans
can result in wildly different interpretations from a machine learning algorithm
28. 28
V2X Revocation Protocol
▪ Revocation of misbehaving vehicles in a V2X network
▪ Vehicles that perform harmful cyber security activities
▪ messages with spoofed positions, incorrect speeds, etc.