Cited By
View all- Lu PZhang LLiu MSridhar KSokolsky OKong FLee I(2024)Recovery from Adversarial Attacks in Cyber-physical Systems: Shallow, Deep, and Exploratory WorksACM Computing Surveys10.1145/365397456:8(1-31)Online publication date: 26-Apr-2024
- Minn WTun YShar LJiang LRoychoudhury APaiva AAbreu RStorey M(2024)DronLomaly: Runtime Log-based Anomaly Detector for DJI DronesProceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings10.1145/3639478.3640042(6-10)Online publication date: 14-Apr-2024
- Park SKim YLee D(2023)SCVMON: Data-oriented attack recovery for RVs based on safety-critical variable monitoringProceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3607199.3607221(547-563)Online publication date: 16-Oct-2023
- Show More Cited By