Hau, Zhongyuan
14  Ergebnisse:
Personensuche X
?
1

Using 3D Shadows to Detect Object Hiding Attacks on Autonom..:

, In: 2022 IEEE Security and Privacy Workshops (SPW),
 
?
2

HA-Grid: Security Aware Hazard Analysis for Smart Grids:

, In: 2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm),
 
?
3

Jacobian Ensembles Improve Robustness Trade-Offs to Adversa..:

, In: Lecture Notes in Computer Science; Artificial Neural Networks and Machine Learning – ICANN 2022,
 
?
4

Shadow-Catcher: Looking into Shadows to Detect Ghost Object..:

, In: Computer Security – ESORICS 2021; Lecture Notes in Computer Science,
 
?
5

Temporal Consistency Checks to Detect LiDAR Spoofing Attack..:

, In: Proceedings of the 1st Workshop on Security and Privacy for Mobile AI,
 
?
6

Evaluating Cascading Impact of Attacks on Resilience of Ind..:

, In: Proceedings of the 6th ACM on Cyber-Physical System Security Workshop,
 
?
7

Exploiting Correlations to Detect False Data Injections in ..:

, In: Proceedings of the 5th on Cyber-Physical System Security Workshop,
Hau, Zhongyuan ; Lupu, Emil C. - p. 1-12 , 2019
 
?
8

Heat Transfer from an Immersed Tube in a Bubbling Fluidized..:

Hau, Zhongyuan ; Lim, Eldin Wee Chuan
Industrial & Engineering Chemistry Research.  55 (2016)  33 - p. 9040-9053 , 2016
 
1-14