-
公开(公告)号:US20240426979A1
公开(公告)日:2024-12-26
申请号:US18584834
申请日:2024-02-22
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: Girish Shivalingappa REVADIGAR , Zhuo WEI , Suk In KANG , Kang Uk SEO , Hwejae LEE , Byung IL KWAK , Huy Kang KIM , Seonghoon JEONG
Abstract: Embodiments of this application provide a method for detecting anomalies of LiDAR point cloud data and related device, the method including: obtaining a first position information, wherein the first position information indicating a position of a target data point in the LiDAR point cloud data; determining a second position information corresponding to the target data point according specifications of a LiDAR sensor; determining the target data point is an anomaly point or a normal point according to the first position information and the second position information. The above-mentioned technical solution can detect the anomaly point efficiently.
-
公开(公告)号:US20230231864A1
公开(公告)日:2023-07-20
申请号:US18186040
申请日:2023-03-17
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: Rehana Yasmin , Zhuo Wei , Suk In KANG , Feng Geng
CPC classification number: H04L63/1425 , H04L63/1416 , H04L12/40013 , H04L2012/40215
Abstract: The present disclosure provides an intrusion monitoring system, an intrusion monitoring method and related products. The intrusion monitoring system includes: a first monitoring component deployed in a controller area network, a second monitoring component deployed in an Ethernet network, and a first control component; the first monitoring component is configured to obtain first CAN reporting information on data traffic in the system and transmit the first CAN reporting information to the first control component; the second monitoring component is configured to obtain second Ethernet reporting information on the data traffic and transmit the second Ethernet reporting information to the first control component; and the first control component is configured to receive the first CAN reporting information from the first monitoring component and the second Ethernet reporting information from the second monitoring component, and determine whether the data traffic is an attack.
-