Research ArticleEVOLUTIONARY BIOLOGY

The evolution of anti-bat sensory illusions in moths

See allHide authors and affiliations

Science Advances  04 Jul 2018:
Vol. 4, no. 7, eaar7428
DOI: 10.1126/sciadv.aar7428

eLetters is an online forum for ongoing peer review. Submission of eLetters are open to all . Please read our guidelines before submitting your own eLetter.

Compose eLetter

Plain text

  • Plain text
    No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.
Author Information
First or given name, e.g. 'Peter'.
Your last, or family, name, e.g. 'MacMoody'.
Your email address, e.g. higgs-boson@gmail.com
Your role and/or occupation, e.g. 'Orthopedic Surgeon'.
Your organization or institution (if applicable), e.g. 'Royal Free Hospital'.
Statement of Competing Interests
CAPTCHA

This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.

Image CAPTCHA
Enter the characters shown in the image.

Vertical Tabs

  • Moths spoofing against bats can be used as adversarial attacks against autonomous vehicles

    It is amazing that Moths can protect their lives by spoofing against bats (1). There are three kinds of adversarial attacks against autonomous vehicles (2,3,4,5): jamming (generating noise) causes “denial of service”, spoofing (crafting fake ultrasonic echo pulses) causes altering distance, and quieting (diminishing original ultrasonic echoes) causes hiding obstacles. The discovered fact published in the paper (1) is equivalent to the second adversarial spoofing attack. In nature, quieting/jamming technology can be discovered in the near future?

    References:
    1. Juliette J. Rubin et al., The evolution of anti-bat sensory illusions in moths, Science Advances 04 Jul 2018: Vol. 4, no. 7, eaar7428
    2. Y. Takefuji, http://science.sciencemag.org/content/361/6399/215/tab-e-letters
    3. Y. Takefuji, http://science.sciencemag.org/content/361/6397/36/tab-e-letters
    4. Y. Takefuji, “Connected vehicle security vulnerabilities”, IEEE Technology and Society, pp15-18, March 2018
    5. Y. Takefuji, http://science.sciencemag.org/content/358/6369/1370/tab-e-letters

    Competing Interests: None declared.

Navigate This Article