- Home
- Search Results
- Page 1 of 1
Search for: All records
-
Total Resources5
- Resource Type
-
0004000001000000
- More
- Availability
-
50
- Author / Contributor
- Filter by Author / Creator
-
-
Gerdes, Ryan (5)
-
Li, Ming (5)
-
Man, Yanmao (4)
-
Sun, Mingshun (2)
-
Al-Hashimi, Ali (1)
-
Chantem, Thidapat (1)
-
Foruhandeh, Mahsa (1)
-
#Tyler Phillips, Kenneth E. (0)
-
#Willis, Ciara (0)
-
& Abreu-Ramos, E. D. (0)
-
& Abramson, C. I. (0)
-
& Abreu-Ramos, E. D. (0)
-
& Adams, S.G. (0)
-
& Ahmed, K. (0)
-
& Ahmed, Khadija. (0)
-
& Aina, D.K. Jr. (0)
-
& Akcil-Okan, O. (0)
-
& Akuom, D. (0)
-
& Aleven, V. (0)
-
& Andrews-Larson, C. (0)
-
- Filter by Editor
-
-
& Spizer, S. M. (0)
-
& . Spizer, S. (0)
-
& Ahn, J. (0)
-
& Bateiha, S. (0)
-
& Bosch, N. (0)
-
& Brennan K. (0)
-
& Brennan, K. (0)
-
& Chen, B. (0)
-
& Chen, Bodong (0)
-
& Drown, S. (0)
-
& Ferretti, F. (0)
-
& Higgins, A. (0)
-
& J. Peters (0)
-
& Kali, Y. (0)
-
& Ruiz-Arias, P.M. (0)
-
& S. Spitzer (0)
-
& Sahin. I. (0)
-
& Spitzer, S. (0)
-
& Spitzer, S.M. (0)
-
(submitted - in Review for IEEE ICASSP-2024) (0)
-
-
Have feedback or suggestions for a way to improve these results?
!
Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
Sun, Mingshun; Man, Yanmao; Li, Ming; Gerdes, Ryan (, SVM: Secure Vehicle Motion Verification with a Single Wireless Receiver)
-
Sun, Mingshun; Al-Hashimi, Ali; Li, Ming; Gerdes, Ryan (, IEEE Transactions on Vehicular Technology)
-
Foruhandeh, Mahsa; Man, Yanmao; Gerdes, Ryan; Li, Ming; Chantem, Thidapat (, ACSAC '19: Proceedings of the 35th Annual Computer Security Applications Conference)
-
Man, Yanmao; Li, Ming; Gerdes, Ryan (, IEEE Symposium on Security and Privacy)Adversarial examples in deep learning were first discovered for the digital domain and later effected in the physical domain. In this work, we demonstrate adversarial examples in the perception domain; i.e., adversarial examples that are introduced by compromising the sensing mechanism of an image sensor. Our proposed attack relies on the injection of electromagnetic interference in a remote manner, and does not require physical modifications to the object, which makes the attack easier to launch and harder to detect.more » « less
An official website of the United States government

Full Text Available