KimHyungSub / CPS-papersLinks
☆15Updated last week
Alternatives and similar repositories for CPS-papers
Users that are interested in CPS-papers are comparing it to the libraries listed below
Sorting:
- ☆21Updated 7 months ago
- ☆12Updated 7 months ago
- ☆20Updated 4 years ago
- Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach☆14Updated 4 years ago
- Cyber-Physical Inconsistency Identification for Safety Checks in Robotic Vehicles☆10Updated 2 years ago
- Stealthy Attacks against Robotic Vehicles. Please read the following paper before trying out the attacks.☆14Updated 2 years ago
- Policy-Guided Fuzzing for Robotic Vehicles☆35Updated last year
- DeepCrime - Mutation Testing Tool for Deep Learning Systems☆15Updated last year
- Tool Competion on Testing Unmanned Aerial Vehicles☆13Updated 5 months ago
- ☆24Updated last year
- Seminar 2022☆21Updated last month
- A state-aware defense framework against vehicular message injection attacks.☆34Updated 3 years ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆172Updated last week
- DriveTester: A Unified Platform for Simulation-Based Autonomous Driving Testing☆25Updated 7 months ago
- Deadline countdowns for academic conferences in Security and Privacy☆745Updated this week
- Search-based Testing Approach of Reinforcement Learning Agent☆13Updated 9 months ago
- ☆24Updated 10 months ago
- Fuzzing framework for Robot Operating System (ROS) and ROS-based robotic systems☆27Updated last month
- ☆19Updated 2 years ago
- ☆29Updated 11 months ago
- The repository hosts the code for the SBFT CPS Tool competition for testing autonomous cars.☆17Updated 9 months ago
- -☆11Updated 2 years ago
- DRSM: De-Randomized Smoothing on Malware Classifier Providing Certified Robustness (ICLR 2024)☆14Updated last year
- ☆40Updated last month
- CC: Causality-Aware Coverage Criterion for Deep Neural Networks☆12Updated 2 years ago
- ☆10Updated 2 years ago
- A curated list of Meachine learning Security & Privacy papers published in security top-4 conferences (IEEE S&P, ACM CCS, USENIX Security…☆286Updated 9 months ago
- ☆27Updated last year
- NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces☆72Updated last year
- Coverage-Guided Testing of Long Short-Term Memory (LSTM) Networks☆19Updated 4 years ago