Security Analysis against Spoofing Attacks for Distributed UAVs
暂无分享,去创建一个
Sibin Mohan | Boxun Li | Ashish Kashinath | K. Kim | S. Nalluri | Y. Wang | Bo Li
[1] Daniel Svozil,et al. Introduction to multi-layer feed-forward neural networks , 1997 .
[2] Markus G. Kuhn,et al. An Asymmetric Security Mechanism for Navigation Signals , 2004, Information Hiding.
[3] Dennis M. Akos,et al. Who's Afraid of the Spoofer? GPS/GNSS Spoofing Detection via Automatic Gain Control (AGC) , 2012 .
[4] Todd E. Humphreys,et al. Detection Strategy for Cryptographic GNSS Anti-Spoofing , 2013, IEEE Transactions on Aerospace and Electronic Systems.
[5] Andrew L. Maas. Rectifier Nonlinearities Improve Neural Network Acoustic Models , 2013 .
[6] Gary J. Balas,et al. Model-Based and Data-Driven Fault Detection Performance for a Small UAV , 2013, IEEE/ASME Transactions on Mechatronics.
[7] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[8] Fei Hu,et al. Detection of Faults and Attacks Including False Data Injection Attack in Smart Grid Using Kalman Filter , 2014, IEEE Transactions on Control of Network Systems.
[9] Yongdae Kim,et al. Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors , 2015, USENIX Security Symposium.
[10] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[11] Zhu Han,et al. Real-Time Detection of False Data Injection in Smart Grid Networks: An Adaptive CUSUM Method and Analysis , 2016, IEEE Systems Journal.
[12] Westley Weimer,et al. An Uncrewed Aerial Vehicle Attack Scenario and Trustworthy Repair Architecture , 2016, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W).
[13] Srdjan Capkun,et al. SPREE: a spoofing resistant GPS receiver , 2016, MobiCom.
[14] Léon Bottou,et al. Wasserstein GAN , 2017, ArXiv.
[15] Min Lin,et al. Softmax GAN , 2017, ArXiv.
[16] Machine-Learning Space Applications on SmallSat Platforms with TensorFlow , 2018 .
[17] Insup Lee,et al. Injected and Delivered: Fabricating Implicit Control over Actuation Systems by Spoofing Inertial Sensors , 2018, USENIX Security Symposium.
[18] K. Pattabiraman,et al. Out of control: stealthy attacks against robotic vehicles protected by control-based techniques , 2019, ACSAC.