Passive Drone Localization Using LTE Signals | 0 | 0.34 | 2022 |
Physical Hijacking Attacks against Object Trackers | 0 | 0.34 | 2022 |
Low Cost, Open-Source Platform to Enable Full-Sized Automated Vehicle Research | 0 | 0.34 | 2021 |
Secure Traffic Lights - Replay Attack Detection for Model-based Smart Traffic Controllers. | 1 | 0.34 | 2020 |
Message Integrity Protection over Wireless Channel: Countering Signal Cancellation via Channel Randomization | 1 | 0.37 | 2020 |
GhostImage - Remote Perception Attacks against Camera-based Image Classification Systems. | 0 | 0.34 | 2020 |
Impacts of Constrained Sensing and Communication based Attacks on Vehicular Platoons | 2 | 0.35 | 2020 |
Survey on Vehicular Ad Hoc Networks and Its Access Technologies Security Vulnerabilities and Countermeasures. | 0 | 0.34 | 2019 |
SIMPLE: single-frame based physical layer identification for intrusion detection and prevention on in-vehicle networks | 2 | 0.36 | 2019 |
Return-oriented programming on a resource constrained device | 1 | 0.35 | 2019 |
Learning-based adversarial agent detection and identification in cyber physical systems applied to autonomous vehicular platoon | 0 | 0.34 | 2019 |
Crowdsourced measurements for device fingerprinting | 0 | 0.34 | 2019 |
The Disbanding Attack: Exploiting Human-In-The-Loop Control In Vehicular Platooning | 0 | 0.34 | 2019 |
On the Pitfalls and Vulnerabilities of Schedule Randomization Against Schedule-Based Attacks | 2 | 0.37 | 2019 |
Truth-aware Optimal Decision-making Framework with Driver Preferences for V2V Communications. | 0 | 0.34 | 2018 |
Clustering Learned Cnn Features From Raw I/Q Data For Emitter Identification | 4 | 0.39 | 2018 |
Vehicle Security: Risk Assessment in Transportation. | 0 | 0.34 | 2018 |
Electromagnetic Induction Attacks Against Embedded Systems. | 0 | 0.34 | 2018 |
Analysis of Friendly Jamming for Secure Location Verification of Vehicles for Intelligent Highways. | 0 | 0.34 | 2018 |
Examining Cybersecurity of Cyberphysical Systems for Critical Infrastructures Through Work Domain Analysis. | 0 | 0.34 | 2018 |
Towards physical layer identification of cognitive radio devices. | 0 | 0.34 | 2017 |
Visual Distance Estimation For Pure Pursuit Based Platooning With A Monocular Camera | 0 | 0.34 | 2017 |
Multi-vehicle Path Following using Modified Trajectory Shaping Guidance. | 0 | 0.34 | 2017 |
A Game-Theoretic Approach and Evaluation of Adversarial Vehicular Platooning. | 0 | 0.34 | 2017 |
Return-Oriented Programming On A Cortex-M Processor | 0 | 0.34 | 2017 |
Regular: Attacker-Induced Traffic Flow Instability in a Stream of Semi-Automated Vehicles | 0 | 0.34 | 2017 |
Analysis Of Authentication Parameters In Uplink Scenario Of Heterogeneous Networks | 1 | 0.34 | 2017 |
Low Cost, Open-Source Testbed to Enable Full-Sized Automated Vehicle Research. | 0 | 0.34 | 2017 |
Viability of Using Shadows Cast by Vehicles for Position Verification in Vehicle Platooning | 0 | 0.34 | 2017 |
A data trust framework for VANETs enabling false data detection and secure vehicle tracking. | 2 | 0.37 | 2017 |
Vehicular Platooning in an Adversarial Environment | 19 | 0.88 | 2015 |
Physical-Layer Detection of Hardware Keyloggers. | 0 | 0.34 | 2015 |
Remote Activation of Hardware Trojans via a Covert Temperature Channel. | 0 | 0.34 | 2015 |
Message Integrity Protection over Wireless Channel by Countering Signal Cancellation: Theory and Practice | 3 | 0.38 | 2015 |
Attack Mitigation in Adversarial Platooning Using Detection-Based Sliding Mode Control | 3 | 0.43 | 2015 |