
Emerging Threats in Deep Learning-Based Autonomous Driving
actions performed by the human experts at the same
time. 𝐴𝑖is used as a label to form a training data set
𝐷∶ (𝑠1, 𝑎1),(𝑠2, 𝑎2),(𝑠3, 𝑎3), .... Using specific imi-
tation learning algorithms, artificial intelligence mod-
els are trained and used to make future driving deci-
sions. The famous imitation learning methods include
the E2E autonomous driving algorithm based on con-
ditional imitation learning [46], and the ChauffeurNet[47].
•Deep Reinforcement Learning. Deep reinforcement
learning simulates the self-learning model of organ-
isms in nature. To be concrete, an agent monitors its
own behavior and the resulting environmental changes,
sets the reward value for different changes, and then
continuously optimizes the model and its own behav-
ior based on this. In 2013, Mnih et al.[48] combined
deep learning with reinforcement learning and pro-
posed the Deep Q Learning(DQN) method. DQN is
based on a set of Q values in a reward table. The sys-
tem’s driving status 𝑆𝑖and the driving operation 𝑎𝑖to
obtain the corresponding reward value 𝑟𝑖, which auto-
matically generates training data 𝐷∶ ((𝑠1, 𝑎1), 𝑟1),((𝑠2, 𝑎2), 𝑟2),((𝑠3, 𝑎3), 𝑟3), ....
The reinforcement learning model is then trained by
specific algorithms, while reinforcement learning is
supplemented with current operational data to con-
tinuously optimize the model. Nowadays, deep re-
inforcement learning has been rapidly developed and
widely used, with subsequently emerged Deep Recur-
rent Q Networks (DRQNs)[49], attention mechanism
deep recurrent Q networks[50], asynchronous/synchronous
dominant actor-critic (A3C/A2C)[51], and reinforce-
ment learning for unsupervised and unassisted tasks[52],
which are widely used in e-Sports, health & medicine,
recommendation system and other fields. There are
some surveys of deep reinforcement learning[53,54].
A variety of deep reinforcement learning frameworks
and algorithms are widely used in the field of autonomous
driving vehicles. For example, Feng et al.[55], Al-
izadeh et al.[56], Mirchevska et al.[57], and Quek et
al.[58] apply deep reinforcement learning techniques
to driving decisions; Holen et al.[59] use deep rein-
forcement learning for autonomous driving roadway
recognition; Feng et al.[60] utilize deep reinforcement
learning techniques for traffic light optimization con-
trol. Some researchers have also proposed an autonomous
driving solution with the fusion of imitation learning
and reinforcement learning[61,62].
1.6. Vehicle Networks
With the development of communications and AI tech-
nology, vehicle networks are increasingly playing an impor-
tant role in autonomous driving, especially the vehicle net-
works construction, which supports a distributed AI model
and provides a novel type of AI technology in autonomous
driving, while also bringing new security risks.
•Vehicle-to-Everything (V2X). V2X is a multi-layered
network system designed to enhance collaboration be-
tween pedestrians, vehicles and transport infrastruc-
ture. It is universally composed of Vehicle-to-Vehicle
(V2V) networks, Vehicle-to-Infrastructure (V2I) net-
works, Vehicle-to-Pedestrian (V2P) networks and Vehicle-
to-Road side units (V2R) networks[63]. The commu-
nication technologies used in the vehicular internet of
things can be broadly classified into two categories,
Dedicated Short Range Communication (DSRC) and
Long-Term Evolution (LTE) cellular communication,
called cellular-V2X or C-V2X for short[64].
•Federated Learning. The vehicular internet of things
provides the network foundation for distributed artifi-
cial intelligence. Federated Learning is a distributed
AI framework that replaces sensitive data interactions
with model interactions, enabling more efficient and
better privacy for knowledge sharing and transition.
Based on the V2X, the federated learning can provide
distributed and interactive AI services[65,66,67] for
autonomous driving system. This paper focuses on
the novel security risks posed by Federated Learning
in the vehicular internet of things, and reviews related
security technology developments.
1.7. Summary
We concluded the major AI application used in autonomous
driving in Table1
2. Emerging Threats in Sensors
Sensors are foundational part for the autonomous driv-
ing system, which provide raw environmental information
for autonomous driving decision-making. The security of
sensors directly affects the safety of autonomous driving sys-
tem. We classify attacks against sensors into two categories,
where attacks that aim to compromise the usability of the
sensing are classified as Jamming Attacks and attacks that
aim to compromise the integrity of the information collected
by the sensors are classified as Spoofing Attacks.
2.1. Jamming Attacks
The Jamming Attack means that attackers take some ac-
tions to reduce the quality of data collected by the sensor,
even making sensor unavailable. In 2015, Petit et al.[114]
attempted a jamming attack on autonomous driving sensors
by artificially setting up bright light interference that could
"blind" the camera. In 2016, Yan et al.[115] experimented
with blind attacks on ultrasonic sensors. Similarly, a va-
riety of in-vehicle sensors such as RGB cameras, LiDAR,
RaDAR, gyroscopic sensors and GPS sensors could be sub-
ject to jamming attacks[116,117,118,119].
2.2. Spoofing Attacks
The Spoofing Attacks means that attackers injecting fake
signals to affect the normal behaviour of the autonomous
driving system. In 2015, Petit et al.[114] attempted to send
specific spoofed laser signals, causing the LiDAR systems
Hui Cao et al.: Preprint submitted to Elsevier Page 5 of 28