Pritam Dash, Mehdi Karimibiuki, and Karthik Pattabiraman (University of British Columbia)
Demo #6: Impact of Stealthy Attacks on Autonomous Robotic Vehicle Missions
View More Papers
Work in Progress: Programmable In-Network Obfuscation of DNS Traffic
Liang Wang, Hyojoon Kim, Prateek Mittal, Jennifer Rexford (Princeton University)
Read MoreDemo #3: Detecting Illicit Drone Video Filming Using Cryptanalysis
Ben Nassi, Raz Ben-Netanel (Ben-Gurion University of the Negev), Adi Shamir (Weizmann Institute of Science), and Yuval Elovic (Ben-Gurion University of the Negev)
Read MoreRaising Trust in the Food Supply Chain
Alexander Krumpholz, Marthie Grobler, Raj Gaire, Claire Mason, Shanae Burns (CSIRO Data61)
Read MoreDemo #15: Remote Adversarial Attack on Automated Lane Centering
Yulong Cao (University of Michigan), Yanan Guo (University of Pittsburgh), Takami Sato (UC Irvine), Qi Alfred Chen (UC Irvine), Z. Morley Mao (University of Michigan) and Yueqiang Cheng (NIO)
Read More