Auto-Encoding Robot State Against Sensor Spoofing Attacks
暂无分享,去创建一个
[1] Khalil M. Ahmad Yousef,et al. Analyzing Cyber-Physical Threats on Robotic Platforms † , 2018, Sensors.
[2] Robert C. Bolles,et al. Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography , 1981, CACM.
[3] Yong Haur Tay,et al. Abnormal Event Detection in Videos using Spatiotemporal Autoencoder , 2017, ISNN.
[4] R. M. Suresh Babu,et al. Indigenous Mobile Robot for Surveillance and Mapping , 2019 .
[5] Enrique Soriano,et al. Quantitative analysis of security in distributed robotic frameworks , 2018, Robotics Auton. Syst..
[6] Pascal Vincent,et al. Stacked Denoising Autoencoders: Learning Useful Representations in a Deep Network with a Local Denoising Criterion , 2010, J. Mach. Learn. Res..
[7] 김종영. 구글 TensorFlow 소개 , 2015 .
[8] Jürgen Schmidhuber,et al. Long Short-Term Memory , 1997, Neural Computation.
[9] Peng Liu,et al. Exploiting Physical Dynamics to Detect Actuator and Sensor Attacks in Mobile Robots , 2017, ArXiv.
[10] Diane J. Cook,et al. Robot-enabled support of daily activities in smart home environments , 2019, Cognitive Systems Research.
[11] Hao Wu,et al. Controlling UAVs with Sensor Input Spoofing Attacks , 2016, WOOT.
[12] Jonathan Petit,et al. Remote Attacks on Automated Vehicles Sensors : Experiments on Camera and LiDAR , 2015 .
[13] Prateek Kapoor,et al. Detecting and Mitigating Spoofing Attack Against an Automotive Radar , 2018, 2018 IEEE 88th Vehicular Technology Conference (VTC-Fall).
[14] Chen Yan. Can You Trust Autonomous Vehicles : Contactless Attacks against Sensors of Self-driving Vehicle , 2016 .
[15] Andreas E. Savakis,et al. Anomaly Detection in Video Using Predictive Convolutional Long Short-Term Memory Networks , 2016, ArXiv.
[16] Sean Rivera,et al. ROS-Defender: SDN-Based Security Policy Enforcement for Robotic Applications , 2019, 2019 IEEE Security and Privacy Workshops (SPW).
[17] Shayok Mukhopadhyay,et al. Autonomous robotic exploration based on multiple rapidly-exploring randomized trees , 2017, 2017 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS).
[18] Neminath Hubballi,et al. An event based technique for detecting spoofed IP packets , 2017, J. Inf. Secur. Appl..
[19] Sean Rivera,et al. ROSploit: Cybersecurity Tool for ROS , 2019, 2019 Third IEEE International Conference on Robotic Computing (IRC).
[20] Yongdae Kim,et al. The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate Systems , 2009, SecureComm.
[21] Yongdae Kim,et al. Illusion and Dazzle: Adversarial Optical Channel Exploits Against Lidars for Automotive Applications , 2017, CHES.