Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Pinyao Guo"'
Publikováno v:
EAI Endorsed Transactions on Security and Safety, Vol 4, Iss 14, Pp 1-12 (2018)
Users are often educated to follow advices from security experts. For example, using a password manager is considered an effective way to maintain a unique and strong password for every website. However, user surveys reveal that most users are not wi
Externí odkaz:
https://doaj.org/article/326e22a0c7e141e6b7750ed67b4f4248
Publikováno v:
ACC
This paper studies attack-resilient Gaussian process regression of partially unknown nonlinear dynamic systems subject to sensor attacks and actuator attacks. The problem is formulated as the joint estimation of states, attack vectors, and system fun
Publikováno v:
EAI Endorsed Transactions on Security and Safety, Vol 4, Iss 14, Pp 1-12 (2018)
Users are often educated to follow advices from security experts. For example, using a password manager is considered an effective way to maintain a unique and strong password for every website. However, user surveys reveal that most users are not wi
Publikováno v:
Automatica. 111:108588
This paper investigates simultaneous input and state estimation for a class of nonlinear stochastic systems. We propose a recursive filter to concurrently estimate system states and unknown inputs. We show that the estimation errors of the proposed f
Publikováno v:
DSN
Mobile robots such as unmanned vehicles integrate heterogeneous capabilities in sensing, computation, and control. They are representative cyber-physical systems where the cyberspace and the physical world are strongly coupled. However, the safety of
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783319788128
SecureComm
SecureComm
Users are often educated to follow different forms of advice from security experts. For example, using a password manager is considered an effective way to maintain a unique and strong password for every important website. However, user surveys revea
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1b3c565124a346987952fb4234b72a47
https://doi.org/10.1007/978-3-319-78813-5_35
https://doi.org/10.1007/978-3-319-78813-5_35
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783319788128
SecureComm
SecureComm
Modern urban vehicles adopt sensing, communication and computing modules into almost every functioning aspect to assist humans in driving. However, the advanced technologies are inherently vulnerable to attacks, exposing vehicles to severe security r
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8a211539c005334094e68666d42c0856
https://doi.org/10.1007/978-3-319-78813-5_19
https://doi.org/10.1007/978-3-319-78813-5_19
Publikováno v:
ACC
This paper studies attack-resilient estimation of a class of switched nonlinear systems subject to stochastic process and measurement noises. The systems are threatened by both of signal attacks and switching attacks. The problem is formulated as the
Publikováno v:
MTD@CCS
This demo paper describes an approach to detect memory corruption attacks using artificial diversity. Our approach conducts offline symbolic execution of multiple variants of a system to identify paths which diverge in different variants. In addition