winterwindwang/Physical-Adversarial-Attacks-SurveyPublic NotificationsYou must be signed in to change notification settings Fork3 Star25 Code Issues main 1Branch 0Tags Code Latest commit Cannot retrieve latest commit at this time. History 2 Commits ...
Representation learning for knowledge fusion and reasoning in Cyber–Physical–Social Systems: Survey and perspectives JingYang, ...YanLu, inInformation Fusion, 2023 1Introduction The digital integration of cyber space, physical space and social space facilitates the natural formation of Cyber–Physical–...
We start this survey with an overview of the smart grid security from the CP perspective, and then focuses on prominent CP attack schemes with significant impact on the smart grid operation and corresponding defense solutions. With an in-depth review of the attacks and defences, we then discuss...
However, currently, several side-channel attack models coexist, such as "probing" and "bounded moment" models, at bit or word levels. From a defensive standpoint, it is thus unclear which protection strategy is the most relevant to adopt. In this survey article, we review adversarial ...
Gertler, Janos J., “Survey of model-based failure detection and isolation in complex plants”, (Dec. 1998), 3-11. Giray, S., “Anatomy of Umanned Aerial Vehicle Hijacking with Signal Spoofing”, IEEE—Recent Advances in Space Technologies (RAST), 2013 6th International Conference, (Jun. ...
Digital image steganography: Survey and analysis of current methods. Signal Processing, 90(3), 2010. 2 [10] Shang-Tse Chen, Cory Cornelius, Jason Martin, and Duen Horng Polo Chau. Shapeshifter: Robust physical adversarial attack on faster r-cnn object detector. In Joint Europ...
297Citations 7Altmetric Metrics Abstract A physical unclonable function (PUF) is a device that exploits inherent randomness introduced during manufacturing to give a physical entity a unique ‘fingerprint’ or trust anchor. These devices are of potential use in a variety of applications from anti-cou...
This paper is concerned with the resilient control under denial-of-service attack launched by the intelligent attacker. The resilient control system is mod... Y Yuan,F Sun,H Liu - 《International Journal of Systems Science》 被引量: 28发表: 2016年 Adversarial Regression for Detecting Attacks in...
transferable to also fool Faster R-CNN. However, they did not reveal the algorithm used to create the sticker and only show a video of indoor experiment with short distance. For other threat models and adversarial attacks in computer vision, we refer the interested readers to the survey of [...
against some integrity attacks. We present two adversary models that can evade the Mo et al. detector. These adversaries are classified based on the algorithm used to obtain the knowledge of the system dynamics in order to carry out the attack (non-parametric [3] and parametric adversaries [6...