ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2003.05631
  4. Cited By
ConAML: Constrained Adversarial Machine Learning for Cyber-Physical
  Systems

ConAML: Constrained Adversarial Machine Learning for Cyber-Physical Systems

12 March 2020
Jiangnan Li
Yingyuan Yang
Jinyuan Stella Sun
K. Tomsovic
Jin Young Lee
    AAML
ArXivPDFHTML

Papers citing "ConAML: Constrained Adversarial Machine Learning for Cyber-Physical Systems"

20 / 20 papers shown
Title
EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability
  Detection
EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability Detection
Shigang Liu
Di Cao
Junae Kim
Tamas Abraham
Paul Montague
S. Çamtepe
Jun Zhang
Yang Xiang
AAML
29
1
0
27 Jul 2024
Risks of Practicing Large Language Models in Smart Grid: Threat Modeling and Validation
Risks of Practicing Large Language Models in Smart Grid: Threat Modeling and Validation
Jiangnan Li
Yingyuan Yang
Jinyuan Stella Sun
57
4
0
10 May 2024
LESSON: Multi-Label Adversarial False Data Injection Attack for Deep
  Learning Locational Detection
LESSON: Multi-Label Adversarial False Data Injection Attack for Deep Learning Locational Detection
Jiwei Tian
Chao Shen
Buhong Wang
Xiaofang Xia
Meng Zhang
Chenhao Lin
Qian Li
38
36
0
29 Jan 2024
Vulnerability of Machine Learning Approaches Applied in IoT-based Smart
  Grid: A Review
Vulnerability of Machine Learning Approaches Applied in IoT-based Smart Grid: A Review
Zhenyong Zhang
Mengxiang Liu
Mingyang Sun
Ruilong Deng
Peng Cheng
Dusit Niyato
Mo-Yuen Chow
Jiming Chen
38
38
0
30 Aug 2023
Adversarial Attacks on Leakage Detectors in Water Distribution Networks
Adversarial Attacks on Leakage Detectors in Water Distribution Networks
Paul Stahlhofen
André Artelt
L. Hermes
Barbara Hammer
AAML
18
2
0
25 May 2023
The Case for the Anonymization of Offloaded Computation
The Case for the Anonymization of Offloaded Computation
Md Washik Al Azad
Shifat Sarwar
Sifat Ut Taki
Spyridon Mastorakis
14
0
0
12 May 2023
Robustness Testing of Data and Knowledge Driven Anomaly Detection in
  Cyber-Physical Systems
Robustness Testing of Data and Knowledge Driven Anomaly Detection in Cyber-Physical Systems
Xugui Zhou
Maxfield Kouzel
H. Alemzadeh
OOD
AAML
8
12
0
20 Apr 2022
On The Empirical Effectiveness of Unrealistic Adversarial Hardening
  Against Realistic Adversarial Attacks
On The Empirical Effectiveness of Unrealistic Adversarial Hardening Against Realistic Adversarial Attacks
Salijona Dyrmishi
Salah Ghamizi
Thibault Simonetto
Yves Le Traon
Maxime Cordy
AAML
14
16
0
07 Feb 2022
A Unified Framework for Adversarial Attack and Defense in Constrained
  Feature Space
A Unified Framework for Adversarial Attack and Defense in Constrained Feature Space
Thibault Simonetto
Salijona Dyrmishi
Salah Ghamizi
Maxime Cordy
Yves Le Traon
AAML
19
21
0
02 Dec 2021
A Practical Adversarial Attack on Contingency Detection of Smart Energy
  Systems
A Practical Adversarial Attack on Contingency Detection of Smart Energy Systems
Moein Sabounchi
Jin Wei-Kocsis
AAML
14
1
0
13 Sep 2021
Neural Network Guided Evolutionary Fuzzing for Finding Traffic
  Violations of Autonomous Vehicles
Neural Network Guided Evolutionary Fuzzing for Finding Traffic Violations of Autonomous Vehicles
Ziyuan Zhong
Gail E. Kaiser
Baishakhi Ray
18
70
0
13 Sep 2021
Learning-Based Vulnerability Analysis of Cyber-Physical Systems
Learning-Based Vulnerability Analysis of Cyber-Physical Systems
Amir Khazraei
S. Hallyburton
Qitong Gao
Yu Wang
Miroslav Pajic
AAML
8
17
0
10 Mar 2021
Towards Adversarial-Resilient Deep Neural Networks for False Data
  Injection Attack Detection in Power Grids
Towards Adversarial-Resilient Deep Neural Networks for False Data Injection Attack Detection in Power Grids
Jiangnan Li
Yingyuan Yang
Jinyuan Stella Sun
K. Tomsovic
Hairong Qi
AAML
31
14
0
17 Feb 2021
Secure Planning Against Stealthy Attacks via Model-Free Reinforcement
  Learning
Secure Planning Against Stealthy Attacks via Model-Free Reinforcement Learning
A. Bozkurt
Yu Wang
Miroslav Pajic
6
15
0
03 Nov 2020
Exploiting Vulnerabilities of Deep Learning-based Energy Theft Detection
  in AMI through Adversarial Attacks
Exploiting Vulnerabilities of Deep Learning-based Energy Theft Detection in AMI through Adversarial Attacks
Jiangnan Li
Yingyuan Yang
Jinyuan Stella Sun
AAML
15
7
0
16 Oct 2020
Adversarial Machine Learning Attacks and Defense Methods in the Cyber
  Security Domain
Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain
Ishai Rosenberg
A. Shabtai
Yuval Elovici
Lior Rokach
AAML
26
12
0
05 Jul 2020
SearchFromFree: Adversarial Measurements for Machine Learning-based
  Energy Theft Detection
SearchFromFree: Adversarial Measurements for Machine Learning-based Energy Theft Detection
Jiangnan Li
Yingyuan Yang
Jinyuan Stella Sun
AAML
17
19
0
02 Jun 2020
Adversarial Machine Learning at Scale
Adversarial Machine Learning at Scale
Alexey Kurakin
Ian Goodfellow
Samy Bengio
AAML
261
3,110
0
04 Nov 2016
Adversarial examples in the physical world
Adversarial examples in the physical world
Alexey Kurakin
Ian Goodfellow
Samy Bengio
SILM
AAML
287
5,837
0
08 Jul 2016
The Loss Surfaces of Multilayer Networks
The Loss Surfaces of Multilayer Networks
A. Choromańska
Mikael Henaff
Michaël Mathieu
Gerard Ben Arous
Yann LeCun
ODL
179
1,185
0
30 Nov 2014
1