Zhongyuan Hau

According to our database1, Zhongyuan Hau authored at least 10 papers between 2019 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Using 3D Shadows to Detect Object Hiding Attacks on Autonomous Vehicle Perception.
Proceedings of the 43rd IEEE Security and Privacy, 2022

HA-Grid: Security Aware Hazard Analysis for Smart Grids.
Proceedings of the IEEE International Conference on Communications, 2022

Jacobian Ensembles Improve Robustness Trade-Offs to Adversarial Attacks.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2022, 2022

2021
Temporal Consistency Checks to Detect LiDAR Spoofing Attacks on Autonomous Vehicle Perception.
CoRR, 2021

Object Removal Attacks on LiDAR-based 3D Object Detectors.
CoRR, 2021

Shadow-Catcher: Looking into Shadows to Detect Ghost Objects in Autonomous Vehicle 3D Sensing.
Proceedings of the Computer Security - ESORICS 2021, 2021

2020
GhostBuster: Looking Into Shadows to Detect Ghost Objects in Autonomous Vehicle 3D Sensing.
CoRR, 2020

Evaluating Cascading Impact of Attacks on Resilience of Industrial Control Systems: A Design-Centric Modeling Approach.
Proceedings of the 6th ACM Workshop on Cyber-Physical System Security, 2020

2019
Evaluating Cascading Effects of Attacks on Resilience of Industrial Control Systems: A Design-Centric Modeling Approach.
CoRR, 2019

Exploiting Correlations to Detect False Data Injections in Low-Density Wireless Sensor Networks.
Proceedings of the 5th ACM on Cyber-Physical System Security Workshop, 2019


  Loading...