As the complexity of autonomous vehicles(AVs)continues to increase and artificial intelligence algorithms are becoming increasingly ubiquitous,a novel safety concern known as the safety of the intended functionality(S...As the complexity of autonomous vehicles(AVs)continues to increase and artificial intelligence algorithms are becoming increasingly ubiquitous,a novel safety concern known as the safety of the intended functionality(SOTIF)has emerged,presenting significant challenges to the widespread deployment of AVs.SOTIF focuses on issues arising from the functional insufficiencies of the AVs’intended functionality or its implementation,apart from conventional safety considerations.From the systems engineering standpoint,this study offers a comprehensive exploration of the SOTIF landscape by reviewing academic research,practical activities,challenges,and perspectives across the development,verification,validation,and operation phases.Academic research encompasses system-level SOTIF studies and algorithm-related SOTIF issues and solutions.Moreover,it encapsulates practical SOTIF activities undertaken by corporations,government entities,and academic institutions spanning international and Chinese contexts,focusing on the overarching methodologies and practices in different phases.Finally,the paper presents future challenges and outlook pertaining to the development,verification,validation,and operation phases,motivating stakeholders to address the remaining obstacles and challenges.展开更多
Intelligent and connected vehicles(ICVs)are confronted with critically complex traffic scenarios and safety challenges that have attracted increasing attention from academia and industry.The intelligent safety of ICVs...Intelligent and connected vehicles(ICVs)are confronted with critically complex traffic scenarios and safety challenges that have attracted increasing attention from academia and industry.The intelligent safety of ICVs involves several technologies and requires the common efforts of researchers and engineers,including the safety of the intended functionality(SOTIF),the safety of artificial intelligence,the intricacies of cybersecurity,and ethical dilemmas.Ensuring the intelligent safety of ICVs presents substantial chal-lenges in both research and commercialization,particularly SOTIF,which refers to the absence of unreasonable risk owing to hazards resulting from functional insufficiencies of the intended functiona-lity or reasonably foreseeable misuse by person.Because of the limited scene coverage ability of training samples and the practical application conditions without boundary restrictions,it is very dif-ficult to find the functional insufficiency of the intended function-ality and overcome it under dynamic unknown scenarios,which is also the source of SOTIF.展开更多
现有高级辅助驾驶系统(Advanced Driver Assistance Systems,ADAS)功能不断增多且系统复杂性不断提高,不可避免带来了预期功能安全(Safety of the Intended Functionality,SOTIF)问题。触发条件的识别与生成是预期功能安全活动中重要的...现有高级辅助驾驶系统(Advanced Driver Assistance Systems,ADAS)功能不断增多且系统复杂性不断提高,不可避免带来了预期功能安全(Safety of the Intended Functionality,SOTIF)问题。触发条件的识别与生成是预期功能安全活动中重要的一环,然而现有对触发条件识别仅借助系统过程理论分析方法(System Theoretic Process Analysis,STPA)进行分析,未充分考虑系统功能状态转换中存在的问题。本文以知识驱动的方式构建触发条件识别机制,将STPA及有限状态机(Finite State Machine,FSM)理论融合构建拓展型系统控制结构,针对拓展型控制架构及功能状态转换进行安全分析,根据系统存在的功能局限及人为误用,完成触发条件的识别、生成、规范化描述、分类及标签化。最后将本文提出的触发条件生成机制应用于集成式巡航辅助系统(Integrated Cruise Assistance,ICA),得到了该系统的触发条件及其分类,并将本文所提出的生成机制与现有相关触发条件生成方法进行对比分析,证明了本机制的实用性、可行性及有效性。展开更多
The method of extracting and describing the intended behavior of software precisely has become one of the key points in the fields of software behavior's dynamic and trusted authentication. In this paper, the author ...The method of extracting and describing the intended behavior of software precisely has become one of the key points in the fields of software behavior's dynamic and trusted authentication. In this paper, the author proposes a specified measure of extracting SIBDS (software intended behaviors describing sets) statically from the binary executable using the software's API functions invoking, and also introduces the definition of the structure used to store the SIBDS in detail. Experimental results demonstrate that the extracting method and the storage structure definition offers three strong properties: (i) it can describe the software's intended behavior accurately; (ii) it demands a small storage expense; (iii) it provides strong capability to defend against mimicry attack.展开更多
Spar hopes to establish a long-term strategic alliance with China Aerospace Corporation (CASC) toward the next century. This was reiterated by J. C. Mackay, Senior Vice President and General Manager of Spar Space Syst...Spar hopes to establish a long-term strategic alliance with China Aerospace Corporation (CASC) toward the next century. This was reiterated by J. C. Mackay, Senior Vice President and General Manager of Spar Space Systems, when he met April 4 with Bai Baier, Vice President of CASC. During the meeting Spar briefed their Chinese counterparts on the status of Radarsat-1, launched last November aboard Delta-2 rocket., the satellite, with Synthetic Aperture Radar (SAR) as its principal instrument, has just finished its commissioning phase and been declared operational by its user, the Canadian Space Agency (CSA). The quality of the images it generates exceeds their specifications with the highest resolution of展开更多
It is learned from the Special Meeting of Leaders on Cloths of Humen Garment Market by the journalist that, Humen Garment will, upon the construction of business circle, launch a big event and mainly intend to create ...It is learned from the Special Meeting of Leaders on Cloths of Humen Garment Market by the journalist that, Humen Garment will, upon the construction of business circle, launch a big event and mainly intend to create three garment business circles as follows:展开更多
基金supported by the National Science Foundation of China Project(52072215,U1964203,52242213,and 52221005)National Key Research and Development(R&D)Program of China(2022YFB2503003)State Key Laboratory of Intelligent Green Vehicle and Mobility。
文摘As the complexity of autonomous vehicles(AVs)continues to increase and artificial intelligence algorithms are becoming increasingly ubiquitous,a novel safety concern known as the safety of the intended functionality(SOTIF)has emerged,presenting significant challenges to the widespread deployment of AVs.SOTIF focuses on issues arising from the functional insufficiencies of the AVs’intended functionality or its implementation,apart from conventional safety considerations.From the systems engineering standpoint,this study offers a comprehensive exploration of the SOTIF landscape by reviewing academic research,practical activities,challenges,and perspectives across the development,verification,validation,and operation phases.Academic research encompasses system-level SOTIF studies and algorithm-related SOTIF issues and solutions.Moreover,it encapsulates practical SOTIF activities undertaken by corporations,government entities,and academic institutions spanning international and Chinese contexts,focusing on the overarching methodologies and practices in different phases.Finally,the paper presents future challenges and outlook pertaining to the development,verification,validation,and operation phases,motivating stakeholders to address the remaining obstacles and challenges.
文摘Intelligent and connected vehicles(ICVs)are confronted with critically complex traffic scenarios and safety challenges that have attracted increasing attention from academia and industry.The intelligent safety of ICVs involves several technologies and requires the common efforts of researchers and engineers,including the safety of the intended functionality(SOTIF),the safety of artificial intelligence,the intricacies of cybersecurity,and ethical dilemmas.Ensuring the intelligent safety of ICVs presents substantial chal-lenges in both research and commercialization,particularly SOTIF,which refers to the absence of unreasonable risk owing to hazards resulting from functional insufficiencies of the intended functiona-lity or reasonably foreseeable misuse by person.Because of the limited scene coverage ability of training samples and the practical application conditions without boundary restrictions,it is very dif-ficult to find the functional insufficiency of the intended function-ality and overcome it under dynamic unknown scenarios,which is also the source of SOTIF.
文摘现有高级辅助驾驶系统(Advanced Driver Assistance Systems,ADAS)功能不断增多且系统复杂性不断提高,不可避免带来了预期功能安全(Safety of the Intended Functionality,SOTIF)问题。触发条件的识别与生成是预期功能安全活动中重要的一环,然而现有对触发条件识别仅借助系统过程理论分析方法(System Theoretic Process Analysis,STPA)进行分析,未充分考虑系统功能状态转换中存在的问题。本文以知识驱动的方式构建触发条件识别机制,将STPA及有限状态机(Finite State Machine,FSM)理论融合构建拓展型系统控制结构,针对拓展型控制架构及功能状态转换进行安全分析,根据系统存在的功能局限及人为误用,完成触发条件的识别、生成、规范化描述、分类及标签化。最后将本文提出的触发条件生成机制应用于集成式巡航辅助系统(Integrated Cruise Assistance,ICA),得到了该系统的触发条件及其分类,并将本文所提出的生成机制与现有相关触发条件生成方法进行对比分析,证明了本机制的实用性、可行性及有效性。
基金the National Natural Science Foundation of China (60673071, 60743003, 90718005, 90718006)the National High Technology Research and Development Program of China (863 Program) (2006AA01Z442, 2007AA01Z411)
文摘The method of extracting and describing the intended behavior of software precisely has become one of the key points in the fields of software behavior's dynamic and trusted authentication. In this paper, the author proposes a specified measure of extracting SIBDS (software intended behaviors describing sets) statically from the binary executable using the software's API functions invoking, and also introduces the definition of the structure used to store the SIBDS in detail. Experimental results demonstrate that the extracting method and the storage structure definition offers three strong properties: (i) it can describe the software's intended behavior accurately; (ii) it demands a small storage expense; (iii) it provides strong capability to defend against mimicry attack.
文摘Spar hopes to establish a long-term strategic alliance with China Aerospace Corporation (CASC) toward the next century. This was reiterated by J. C. Mackay, Senior Vice President and General Manager of Spar Space Systems, when he met April 4 with Bai Baier, Vice President of CASC. During the meeting Spar briefed their Chinese counterparts on the status of Radarsat-1, launched last November aboard Delta-2 rocket., the satellite, with Synthetic Aperture Radar (SAR) as its principal instrument, has just finished its commissioning phase and been declared operational by its user, the Canadian Space Agency (CSA). The quality of the images it generates exceeds their specifications with the highest resolution of
文摘It is learned from the Special Meeting of Leaders on Cloths of Humen Garment Market by the journalist that, Humen Garment will, upon the construction of business circle, launch a big event and mainly intend to create three garment business circles as follows: