Fig. 2From: Security strategy for autonomous vehicle cyber-physical systems using transfer learningAV simulation schemeBack to article page