ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1811.03538
  4. Cited By
Integrating Security in Resource-Constrained Cyber-Physical Systems

Integrating Security in Resource-Constrained Cyber-Physical Systems

8 November 2018
Marcos A. C. Oliveira
M. Macedo
C. Bastos-Filho
ArXiv (abs)PDFHTML

Papers citing "Integrating Security in Resource-Constrained Cyber-Physical Systems"

5 / 5 papers shown
Title
Constructing Adversarial Examples for Vertical Federated Learning:
  Optimal Client Corruption through Multi-Armed Bandit
Constructing Adversarial Examples for Vertical Federated Learning: Optimal Client Corruption through Multi-Armed Bandit
Duanyi Yao
Songze Li
Ye Xue
Jin Liu
FedMLAAML
78
1
0
08 Aug 2024
Learning-Based Vulnerability Analysis of Cyber-Physical Systems
Learning-Based Vulnerability Analysis of Cyber-Physical Systems
Amir Khazraei
S. Hallyburton
Qitong Gao
Yu Wang
Miroslav Pajic
AAML
126
18
0
10 Mar 2021
An RL-Based Adaptive Detection Strategy to Secure Cyber-Physical Systems
An RL-Based Adaptive Detection Strategy to Secure Cyber-Physical Systems
Ipsita Koley
Sunandan Adhikary
Soumyajit Dey
105
0
0
04 Mar 2021
Skip to Secure: Securing Cyber-physical Control Loops with Intentionally
  Skipped Executions
Skip to Secure: Securing Cyber-physical Control Loops with Intentionally Skipped Executions
Sunandan Adhikary
Ipsita Koley
Sumana Ghosh
S. Ghosh
Soumyajit Dey
Debdeep Mukhopadhyay
75
9
0
16 Jul 2020
CANOA: CAN Origin Authentication Through Power Side-Channel Monitoring
CANOA: CAN Origin Authentication Through Power Side-Channel Monitoring
Shailja Thakur
Carlos Moreno
S. Fischmeister
115
5
0
12 Jun 2020
1