default search action
Jonathan Petit
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Jonathan Petit, Gérard Le Lann:
Next Generation Vehicles, Safety, and Cybersecurity - The CMX Framework. IEEE Trans. Intell. Transp. Syst. 25(2): 1333-1345 (2024) - [c35]Jean-Philippe Monteuuis, Jonathan Petit, Cong Chen, Soumya Das, Mohammad Nekoui, Seung Yang:
V2X Misbehavior in Decentralized Notification Basic Service: Considerations for Standardization. CSCS 2024: 76-84 - [c34]Zoltán Ádám Mann, Jonathan Petit, Sarah M. Thornton, Michael Buchholz, Jason Millar:
SPIDER: Interplay Assessment Method for Privacy and Other Values. EuroS&P Workshops 2024: 1-8 - [c33]Ala'a Al-Momani, David Balenson, Zoltán Ádám Mann, Sebastian Pape, Jonathan Petit, Christoph Bösch:
Navigating Privacy Patterns in the Era of Robotaxis. EuroS&P Workshops 2024: 32-39 - [c32]Md Hasan Shahriar, Mohammad Raashid Ansari, Jean-Philippe Monteuuis, Cong Chen, Jonathan Petit, Y. Thomas Hou, Wenjing Lou:
Vehigan:Generative Adversarial Networks for Adversarially Robust V2X Misbehavior Detection Systems. ICDCS 2024: 1294-1305 - [c31]Chong Xiang, Tong Wu, Sihui Dai, Jonathan Petit, Suman Jana, Prateek Mittal:
PatchCURE: Improving Certifiable Robustness, Model Utility, and Computation Efficiency of Adversarial Patch Defenses. USENIX Security Symposium 2024 - [c30]Raymond Muller, Yanmao Man, Ming Li, Ryan M. Gerdes, Jonathan Petit, Z. Berkay Celik:
VOGUES: Validation of Object Guise using Estimated Components. USENIX Security Symposium 2024 - 2023
- [j12]Mohammed Lamine Bouchouia, Houda Labiod, Ons Jelassi, Jean-Philippe Monteuuis, Wafa Ben Jaballah, Jonathan Petit, Zonghua Zhang:
A survey on misbehavior detection for connected and autonomous vehicles. Veh. Commun. 41: 100586 (2023) - [i4]Chong Xiang, Tong Wu, Sihui Dai, Jonathan Petit, Suman Jana, Prateek Mittal:
PatchCURE: Improving Certifiable Robustness, Model Utility, and Computation Efficiency of Adversarial Patch Defenses. CoRR abs/2310.13076 (2023) - 2022
- [j11]Badis Hammi, Jean-Philippe Monteuuis, Jonathan Petit:
PKIs in C-ITS: Security functions, architectures and projects: A survey. Veh. Commun. 38: 100531 (2022) - [c29]Jean-Philippe Monteuuis, Jonathan Petit, Mohammad Raashid Ansari, Cong Chen, Seung Yang:
V2X Misbehavior in Maneuver Sharing and Coordination Service: Considerations for Standardization. CSCN 2022: 194-199 - [i3]Jean-Philippe Monteuuis, Jonathan Petit, Mohammad Raashid Ansari, Cong Chen, Seung Yang:
V2X Misbehavior in Maneuver Sharing and Coordination Service: Considerations for Standardization. CoRR abs/2211.02579 (2022) - 2021
- [c28]Mohammad Raashid Ansari, Jean-Philippe Monteuuis, Jonathan Petit, Cong Chen:
V2X Misbehavior and Collective Perception Service: Considerations for Standardization. CSCN 2021: 1-6 - [c27]Mohammed Lamine Bouchouia, Jean-Philippe Monteuuis, Ons Jelassi, Houda Labiod, Wafa Ben Jaballah, Jonathan Petit:
Spatial and Temporal Cross-Validation Approach for Misbehavior Detection in C-ITS. RCIS 2021: 452-468 - [i2]Mohammad Raashid Ansari, Jean-Philippe Monteuuis, Jonathan Petit, Cong Chen:
V2X Misbehavior and Collective Perception Service: Considerations for Standardization. CoRR abs/2112.02184 (2021) - 2020
- [j10]Joseph Kamel, Mohammad Raashid Ansari, Jonathan Petit, Arnaud Kaiser, Inès Ben Jemaa, Pascal Urien:
Simulation Framework for Misbehavior Detection in Vehicular Networks. IEEE Trans. Veh. Technol. 69(6): 6631-6643 (2020)
2010 – 2019
- 2019
- [c26]Steven So, Jonathan Petit, David Starobinski:
Physical layer plausibility checks for misbehavior detection in V2X networks. WiSec 2019: 84-93 - 2018
- [j9]David Förster, Hans Löhr, Anne Gratz, Jonathan Petit, Frank Kargl:
An Evaluation of Pseudonym Changes for Vehicular Networks in Large-Scale, Realistic Traffic Scenarios. IEEE Trans. Intell. Transp. Syst. 19(10): 3400-3405 (2018) - [c25]Steven So, Prinkle Sharma, Jonathan Petit:
Integrating Plausibility Checks and Machine Learning for Misbehavior Detection in VANET. ICMLA 2018: 564-571 - [c24]Jean-Philippe Monteuuis, Jonathan Petit, Jun Zhang, Houda Labiod, Stefano Mafrica, Alain Servel:
"My autonomous car is an elephant": A Machine Learning based Detector for Implausible Dimension. SSIC 2018: 1-8 - [c23]Prinkle Sharma, Jonathan Petit, Hong Liu:
Pearson Correlation Analysis to Detect Misbehavior in VANET. VTC Fall 2018: 1-5 - [r1]Jonathan Petit, Stefan Dietzel, Frank Kargl:
Privacy of Connected Vehicles. Handbook of Mobile Data Privacy 2018: 229-251 - 2017
- [c22]Virendra Kumar, Jonathan Petit, William Whyte:
Binary hash tree based certificate access management for connected vehicles. WISEC 2017: 145-155 - [i1]Virendra Kumar, Jonathan Petit, William Whyte:
Binary Hash Tree based Certificate Access Management. IACR Cryptol. ePrint Arch. 2017: 744 (2017) - 2015
- [j8]Jonathan Petit, Florian Schaub, Michael Feiri, Frank Kargl:
Pseudonym Schemes in Vehicular Networks: A Survey. IEEE Commun. Surv. Tutorials 17(1): 228-255 (2015) - [j7]Jonathan Petit, Steven E. Shladover:
Potential Cyberattacks on Automated Vehicles. IEEE Trans. Intell. Transp. Syst. 16(2): 546-556 (2015) - [c21]Marco Caselli, Emmanuele Zambon, Jonathan Petit, Frank Kargl:
Modeling Message Sequences for Intrusion Detection in Industrial Control Systems. Critical Infrastructure Protection 2015: 49-71 - [c20]William Whyte, Jonathan Petit, Virendra Kumar, John Moring, Richard Roy:
Threat and Countermeasures Analysis for WAVE Service Advertisement. ITSC 2015: 1061-1068 - [c19]Stefan Dietzel, Rens W. van der Heijden, Jonathan Petit, Frank Kargl:
Context-adaptive detection of insider attacks in VANET information dissemination schemes. VNC 2015: 287-294 - [c18]Michael Feiri, Rolf Pielage, Jonathan Petit, Nicola Zannone, Frank Kargl:
Pre-Distribution of Certificates for Pseudonymous Broadcast Authentication in VANET. VTC Spring 2015: 1-5 - 2014
- [j6]Stefan Dietzel, Jonathan Petit, Frank Kargl, Björn Scheuermann:
In-Network Aggregation for Vehicular Ad Hoc Networks. IEEE Commun. Surv. Tutorials 16(4): 1909-1932 (2014) - [c17]Michael Feiri, Jonathan Petit, Frank Kargl:
Formal model of certificate omission schemes in VANET. VNC 2014: 41-44 - [c16]Jonathan Petit, Michael Feiri, Frank Kargl:
Revisiting attacker model for smart vehicles. WiVeC 2014: 1-5 - 2013
- [j5]Jonathan Petit, Zoubir Mammeri:
Authentication and consensus overhead in vehicular ad hoc networks. Telecommun. Syst. 52(4): 2699-2712 (2013) - [j4]Nabila Labraoui, Abdelhak Mourad Guéroui, Makhlouf Aliouat, Jonathan Petit:
Reactive and adaptive monitoring to secure aggregation in wireless sensor networks. Telecommun. Syst. 54(1): 3-17 (2013) - [j3]Stefan Dietzel, Jonathan Petit, Geert J. Heijenk, Frank Kargl:
Graph-Based Metrics for Insider Attack Detection in VANET Multihop Data Dissemination Protocols. IEEE Trans. Veh. Technol. 62(4): 1505-1518 (2013) - [c15]Michael Feiri, Jonathan Petit, Frank Kargl:
Efficient and secure storage of private keys for pseudonymous vehicular communication. CyCAR@CCS 2013: 9-18 - [c14]Christina Höfer, Jonathan Petit, Robert Karl Schmidt, Frank Kargl:
POPCORN: privacy-preserving charging for emobility. CyCAR@CCS 2013: 37-48 - [c13]Stéphanie Lefevre, Jonathan Petit, Ruzena Bajcsy, Christian Laugier, Frank Kargl:
Impact of V2X privacy strategies on Intersection Collision Avoidance systems. VNC 2013: 71-78 - [c12]Michael Feiri, Jonathan Petit, Robert Karl Schmidt, Frank Kargl:
The impact of security on cooperative awareness in VANET. VNC 2013: 127-134 - [c11]Norbert Bissmeyer, Klaus Henrik Schroder, Jonathan Petit, Sebastian Mauthofer, Kpatcha M. Bayarou:
Short paper: Experimental analysis of misbehavior detection and prevention in VANETs. VNC 2013: 198-201 - [c10]Norbert Bißmeyer, Jonathan Petit, Kpatcha M. Bayarou:
Copra: Conditional pseudonym resolution algorithm in VANETs. WONS 2013: 9-16 - 2012
- [c9]Norbert Bißmeyer, Joël Njeukam, Jonathan Petit, Kpatcha M. Bayarou:
Central misbehavior evaluation for VANETs based on mobility data plausibility. VANET@MOBICOM 2012: 73-82 - [c8]Stefan Dietzel, Jonathan Petit, Frank Kargl, Geert Heijenk:
Analyzing dissemination redundancy to achieve data consistency in VANETs. VANET@MOBICOM 2012: 131-134 - [c7]Michael Feiri, Jonathan Petit, Frank Kargl:
Congestion-based certificate omission in VANETs. VANET@MOBICOM 2012: 135-138 - [c6]Jonathan Petit, Christoph Bösch, Michael Feiri, Frank Kargl:
On the potential of PUF for pseudonym generation in vehicular networks. VNC 2012: 94-100 - [c5]Michael Feiri, Jonathan Petit, Frank Kargl:
Evaluation of congestion-based certificate omission in VANETs. VNC 2012: 101-108 - 2011
- [b1]Jonathan Petit:
Surcoût de l'authentification et du consensus dans la sécurité des réseaux sans fil véhiculaires. (Authentication and Consensus Overhead in Vehicular Ad Hoc Networks). Paul Sabatier University, Toulouse, France, 2011 - [j2]Alexey V. Vinel, Claudia Campolo, Jonathan Petit, Yevgeni Koucheryavy:
Trustworthy Broadcasting in IEEE 802.11p/WAVE Vehicular Networks: Delay Analysis. IEEE Commun. Lett. 15(9): 1010-1012 (2011) - [j1]Nabila Labraoui, Abdelhak Mourad Guéroui, Makhlouf Aliouat, Jonathan Petit:
RAHIM: Robust Adaptive Approach Based on Hierarchical Monitoring Providing Trust Aggregation for Wireless Sensor Networks. J. Univers. Comput. Sci. 17(11): 1550-1571 (2011) - [c4]Jonathan Petit, Michael Feiri, Frank Kargl:
Spoofed data detection in VANETs using dynamic thresholds. VNC 2011: 25-32 - [c3]Jonathan Petit, Zoubir Mammeri:
Dynamic consensus for secured vehicular ad hoc networks. WiMob 2011: 1-8 - 2010
- [c2]Jonathan Petit, Zoubir Mammeri:
Analysis of authentication overhead in vehicular networks. WMNC 2010: 1-6
2000 – 2009
- 2009
- [c1]Jonathan Petit:
Analysis of ECDSA Authentication Processing in VANETs. NTMS 2009: 1-5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint