Pritam Dash, Mehdi Karimibiuki, and Karthik Pattabiraman (University of British Columbia)
Demo #6: Impact of Stealthy Attacks on Autonomous Robotic Vehicle Missions
View More Papers
Demo #3: Detecting Illicit Drone Video Filming Using Cryptanalysis
Ben Nassi, Raz Ben-Netanel (Ben-Gurion University of the Negev), Adi Shamir (Weizmann Institute of Science), and Yuval Elovic (Ben-Gurion University of the Negev)
Read More(Short) WIP: Deployability Improvement, Stealthiness User Study, and Safety...
Takami Sato, Junjie Shen, Ningfei Wang (UC Irvine), Yunhan Jia (ByteDance), Xue Lin (Northeastern University), and Qi Alfred Chen (UC Irvine)
Read MoreDemo #5: Securing Heavy Vehicle Diagnostics
Jeremy Daily, David Nnaji, and Ben Ettlinger (Colorado State University)
Read MoreTime-Based CAN Intrusion Detection Benchmark
Deborah Blevins (University of Kentucky), Pablo Moriano, Robert Bridges, Miki Verma, Michael Iannacone, and Samuel Hollifield (Oak Ridge National Laboratory)
Read More