CERES
CERES TEST Only!
  • Communities & Collections
  • Browse CERES
  • Library Staff Log In
    New user? Click here to register. Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "Yuan, Jinsheng"

Now showing 1 - 1 of 1
Results Per Page
Sort Options
  • Loading...
    Thumbnail Image
    ItemOpen Access
    A survey of artificial intelligence-related cybersecurity risks and countermeasures in Mobility-as-a-Service
    (Institute of Electrical and Electronics Engineers (IEEE), 2024-11) Chu, Kai-Fung; Yuan, Haiyue; Yuan, Jinsheng; Guo, Weisi; Balta-Ozkan, Nazmiye; Li, Shujun
    Mobility-as-a-service (MaaS) integrates different transport modalities and can support more personalization of travelers’ journey planning based on their individual preferences, behaviors and wishes. To fully achieve the potential of MaaS, a range of artificial intelligence (AI) (including machine learning and data mining) algorithms are needed to learn personal requirements and needs to optimize the journey planning of each traveler and all travelers as a whole, to help transport service operators and relevant governmental bodies to operate and plan their services, and to detect and prevent cyberattacks from various threat actors, including dishonest and malicious travelers and transport operators. The increasing use of different AI and data processing algorithms in both centralized and distributed settings opens the MaaS ecosystem up to diverse cyber and privacy attacks at both the AI algorithm level and the connectivity surfaces. In this article, we present the first comprehensive review on the coupling between AI-driven MaaS design and the diverse cybersecurity challenges related to cyberattacks and countermeasures. In particular, we focus on how current and emerging AI-facilitated privacy risks (profiling, inference, and third-party threats) and adversarial AI attacks (evasion, extraction, and gamification) may impact the MaaS ecosystem. These risks often combine novel attacks (e.g., inverse learning) with traditional attack vectors (e.g., man-in-the-middle attacks), exacerbating the risks for the wider participation actors and the emergence of new business models.

Quick Links

  • About our Libraries
  • Cranfield Research Support
  • Cranfield University

Useful Links

  • Accessibility Statement
  • CERES Takedown Policy

Contacts-TwitterFacebookInstagramBlogs

Cranfield Campus
Cranfield, MK43 0AL
United Kingdom
T: +44 (0) 1234 750111
  • Cranfield University at Shrivenham
  • Shrivenham, SN6 8LA
  • United Kingdom
  • Email us: researchsupport@cranfield.ac.uk for REF Compliance or Open Access queries

Cranfield University copyright © 2002-2025
Cookie settings | Privacy policy | End User Agreement | Send Feedback