Michael Clifford

Orcid: 0000-0002-8316-4929

According to our database1, Michael Clifford authored at least 13 papers between 1998 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Invisible Reflections: Leveraging Infrared Laser Reflections to Target Traffic Sign Perception.
CoRR, 2024

2023
G-VARS: Towards Personalized Risk Assessments by Analyzing Gun Violence Susceptibility with Personal Knowledge Graphs.
IEEE Data Eng. Bull., 2023

SoK: Modeling Explainability in Security Analytics for Interpretability, Trustworthiness, and Usability.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Explaining RADAR features for detecting spoofing attacks in Connected Autonomous Vehicles.
CoRR, 2022

Local perception and BSM based misbehavior detection in Intelligent Transportation System.
Proceedings of the 96th Vehicular Technology Conference, 2022

Autonomous Vehicle Security: Composing Attack, Defense, and Policy Surfaces.
Proceedings of the 2022 New Security Paradigms Workshop, 2022

Alternative Route-Based Attacks in Metropolitan Traffic Systems.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

2018
A 2×20W 0.0013% THD+N Class-D audio amplifier with consistent performance up to maximum power level.
Proceedings of the 2018 IEEE International Solid-State Circuits Conference, 2018

2011
Trust of medical devices, applications, and users in pervasive healthcare.
Proceedings of the PETRA 2011, 2011

2010
Modeling and Analyzing Faults to Improve Election Process Robustness.
Proceedings of the 2010 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2010

2003
Miracle Cures and Toner Cartridges: Finding Solutions to the Spam Problem.
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003

2002
Networking in The Solar Trust Model: Determining Optimal Trust Paths in a Decentralized Trust Network.
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002

1998
The Solar Trust Model: Authentication Without Limitation.
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998


  Loading...