Remote Attacks on Drones Vision Sensors: An Empirical Study
暂无分享,去创建一个
Zhangjie Fu | Shouling Ji | Yueyan Zhi | Xingming Sun | S. Ji | Zhangjie Fu | Yueyan Zhi | Xingming Sun
[1] Mianxiong Dong,et al. Big Data on the Fly: UAV-Mounted Mobile Edge Computing for Disaster Management , 2020, IEEE Transactions on Network Science and Engineering.
[2] Kevin Fu,et al. Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems , 2020, USENIX Security Symposium.
[3] Mianxiong Dong,et al. DeSVig: Decentralized Swift Vigilance Against Adversarial Attacks in Industrial Artificial Intelligence Systems , 2020, IEEE Transactions on Industrial Informatics.
[4] Kaoru Ota,et al. Vehicles joint UAVs to acquire and analyze data for topology discovery in large-scale IoT systems , 2020, Peer-to-Peer Netw. Appl..
[5] Wu Yang,et al. UAV Sensor Spoofing Detection Algorithm Based on GPS and Optical Flow Fusion , 2020, ICCSP.
[6] Quanfu Fan,et al. Adversarial T-Shirt! Evading Person Detectors in a Physical World , 2019, ECCV.
[7] Kai Chen,et al. RoLMA: A Practical Adversarial Attack Against Deep Learning-Based LPR Systems , 2019, Inscrypt.
[8] Kevin Fu,et al. Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving , 2019, CCS.
[9] Adi Shamir,et al. Drones' Cryptanalysis - Smashing Cryptography with a Flicker , 2019, 2019 IEEE Symposium on Security and Privacy (SP).
[10] Toon Goedemé,et al. Fooling Automated Surveillance Cameras: Adversarial Patches to Attack Person Detection , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[11] Mianxiong Dong,et al. Location Privacy in Usage-Based Automotive Insurance: Attacks and Countermeasures , 2019, IEEE Transactions on Information Forensics and Security.
[12] Xiong Li,et al. Optimizing the Coverage via the UAVs With Lower Costs for Information-Centric Internet of Things , 2019, IEEE Access.
[13] Wenyuan Xu,et al. Analyzing and Enhancing the Security of Ultrasonic Sensors for Autonomous Vehicles , 2018, IEEE Internet of Things Journal.
[14] Gang Wang,et al. All Your GPS Are Belong To Us: Towards Stealthy Manipulation of Road Navigation Systems , 2018, USENIX Security Symposium.
[15] Atul Prakash,et al. Robust Physical-World Attacks on Deep Learning Visual Classification , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[16] Ajmal Mian,et al. Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey , 2018, IEEE Access.
[17] Romit Roy Choudhury,et al. Inaudible Voice Commands: The Long-Range Attack and Defense , 2018, NSDI.
[18] Yongdae Kim,et al. Illusion and Dazzle: Adversarial Optical Channel Exploits Against Lidars for Automotive Applications , 2017, CHES.
[19] Wenyuan Xu,et al. DolphinAttack: Inaudible Voice Commands , 2017, CCS.
[20] Nick Feamster,et al. Spying on the Smart Home: Privacy Attacks and Defenses on Encrypted IoT Traffic , 2017, ArXiv.
[21] Michael Blumenstein,et al. A study on detecting drones using deep convolutional neural networks , 2017, 2017 14th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS).
[22] Mohsen Guizani,et al. Communication Security of Unmanned Aerial Vehicles , 2017, IEEE Wireless Communications.
[23] Atul Prakash,et al. Robust Physical-World Attacks on Machine Learning Models , 2017, ArXiv.
[24] Romit Roy Choudhury,et al. BackDoor: Making Microphones Hear Inaudible Sounds , 2017, MobiSys.
[25] Nick Feamster,et al. A Smart Home is No Castle: Privacy Vulnerabilities of Encrypted IoT Traffic , 2017, ArXiv.
[26] Wenyuan Xu,et al. WALNUT: Waging Doubt on the Integrity of MEMS Accelerometers with Acoustic Injection Attacks , 2017, 2017 IEEE European Symposium on Security and Privacy (EuroS&P).
[27] Hao Liu,et al. Drone Detection Based on an Audio-Assisted Camera Array , 2017, 2017 IEEE Third International Conference on Multimedia Big Data (BigMM).
[28] Ivan Martinovic,et al. Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones , 2017, NDSS.
[29] Ian F. Akyildiz,et al. Help from the Sky: Leveraging UAVs for Disaster Management , 2017, IEEE Pervasive Computing.
[30] Lujo Bauer,et al. Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition , 2016, CCS.
[31] Vitor Guizilini,et al. The Impact of DoS Attacks on the AR.Drone 2.0 , 2016, 2016 XIII Latin American Robotics Symposium and IV Brazilian Robotics Symposium (LARS/SBR).
[32] Micah Sherr,et al. Hidden Voice Commands , 2016, USENIX Security Symposium.
[33] Hao Wu,et al. Controlling UAVs with Sensor Input Spoofing Attacks , 2016, WOOT.
[34] Yongdae Kim,et al. This Ain't Your Dose: Sensor Spoofing Attack on Medical Infusion Pump , 2016, WOOT.
[35] Chen Yan. Can You Trust Autonomous Vehicles : Contactless Attacks against Sensors of Self-driving Vehicle , 2016 .
[36] Peter Wellig,et al. Detection and tracking of drones using advanced acoustic cameras , 2015, SPIE Security + Defence.
[37] Yongdae Kim,et al. Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors , 2015, USENIX Security Symposium.
[38] Micah Sherr,et al. Cocaine Noodles: Exploiting the Gap between Human and Machine Speech Recognition , 2015, WOOT.
[39] Jonathan Petit,et al. Remote Attacks on Automated Vehicles Sensors : Experiments on Camera and LiDAR , 2015 .
[40] Todd E. Humphreys,et al. Unmanned Aircraft Capture and Control Via GPS Spoofing , 2014, J. Field Robotics.
[41] Michael Felsberg,et al. Adaptive Color Attributes for Real-Time Visual Tracking , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.
[42] Dhiren Patel,et al. A Survey on Internet of Things: Security and Privacy Issues , 2014 .
[43] Xiaojiang Du,et al. Security threats to mobile multimedia applications: Camera-based attacks on mobile phones , 2014, IEEE Communications Magazine.
[44] Reiner Creutzburg,et al. Hacking and securing the AR.Drone 2.0 quadcopter: investigations for improving the security of a toy , 2014, Electronic Imaging.
[45] Michael Felsberg,et al. Accurate Scale Estimation for Robust Visual Tracking , 2014, BMVC.
[46] Paulo Tabuada,et al. Non-invasive Spoofing Attacks for Anti-lock Braking Systems , 2013, CHES.
[47] Gérard Lachapelle,et al. GPS Vulnerability to Spoofing Threats and a Review of Antispoofing Techniques , 2012 .
[48] Jana Dittmann,et al. AR.Drone: security threat analysis and exemplary attack to track persons , 2012, Electronic Imaging.
[49] Srdjan Capkun,et al. On the requirements for successful GPS spoofing attacks , 2011, CCS '11.
[50] George T. Flowers,et al. A Characterization of the Performance of a MEMS Gyroscope in Acoustically Harsh Environments , 2011, IEEE Transactions on Industrial Electronics.
[51] G.T. Flowers,et al. On the Degradation of MEMS Gyroscope Performance in the Presence of High Power Acoustic Noise , 2007, 2007 IEEE International Symposium on Industrial Electronics.
[52] George T. Flowers,et al. Influence of Acoustic Noise on the Dynamic Performance of MEMS Gyroscopes , 2007 .
[53] A. El Gamal,et al. CMOS image sensors , 2005, IEEE Circuits and Devices Magazine.