hongjun9 / CPS_InvariantLinks
Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach
☆15Updated 5 years ago
Alternatives and similar repositories for CPS_Invariant
Users that are interested in CPS_Invariant are comparing it to the libraries listed below
Sorting:
- ☆21Updated 5 years ago
- ☆21Updated 11 months ago
- Cyber-Physical Inconsistency Identification for Safety Checks in Robotic Vehicles☆10Updated 3 years ago
- Stealthy Attacks against Robotic Vehicles. Please read the following paper before trying out the attacks.☆15Updated 3 years ago
- Policy-Guided Fuzzing for Robotic Vehicles☆40Updated 2 years ago
- DLFuzz: An Efficient Fuzzing Testing Framework of Deep Learning Systems☆52Updated 7 years ago
- A state-aware defense framework against vehicular message injection attacks.☆35Updated 4 years ago
- ☆10Updated 2 years ago
- ☆38Updated 3 months ago
- ☆31Updated last year
- ☆11Updated last year
- Learning Security Classifiers with Verified Global Robustness Properties (CCS'21) https://arxiv.org/pdf/2105.11363.pdf☆28Updated 4 years ago
- Prototype system for the paper "OAT: Attesting Operation Integrity of Embedded Devices"(Oakland'20)☆16Updated 5 years ago
- Code for the paper entitled "Dirty Road Can Attack: Security of Deep Learning based Automated Lane Centering under Physical-World Attack"…☆38Updated 4 years ago
- ☆18Updated 3 months ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆207Updated 2 months ago
- ☆21Updated last year
- Reward Guided Test Generation for Deep Learning☆21Updated last year
- A curated list of malware-related papers.☆34Updated last year
- Recent Paper About Bug Detection☆31Updated 6 years ago
- Seminar 2022☆23Updated this week
- ☆28Updated 3 years ago
- ☆32Updated 2 years ago
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆47Updated 3 years ago
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆48Updated 2 years ago
- ☆42Updated 3 months ago
- NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces☆72Updated last year
- CC: Causality-Aware Coverage Criterion for Deep Neural Networks☆12Updated 2 years ago
- Building relation graph of Android APIs to catch the semantics between APIs, and used to enhancing Android malware detectors☆93Updated 3 years ago
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆75Updated last year