Pritam Dash, Mehdi Karimibiuki, and Karthik Pattabiraman (University of British Columbia)
Demo #6: Impact of Stealthy Attacks on Autonomous Robotic Vehicle Missions
View More Papers
What Remains Uncaught?: Characterizing Sparsely Detected Malicious URLs on...
Sayak Saha Roy, Unique Karanjit, Shirin Nilizadeh (The University of Texas at Arlington)
Read MoreFrom Library Portability to Para-rehosting: Natively Executing Microcontroller Software...
Wenqiang Li (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences; Department of Computer Science, the University of Georgia, USA; School of Cyber Security, University of Chinese Academy of Sciences; Department of Electrical Engineering and Computer Science, the University of Kansas, USA), Le Guan (Department of Computer Science, the University…
Read MoreTime-Based CAN Intrusion Detection Benchmark
Deborah Blevins (University of Kentucky), Pablo Moriano, Robert Bridges, Miki Verma, Michael Iannacone, and Samuel Hollifield (Oak Ridge National Laboratory)
Read MoreManipulating the Byzantine: Optimizing Model Poisoning Attacks and Defenses...
Virat Shejwalkar (UMass Amherst), Amir Houmansadr (UMass Amherst)
Read More