Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
2003.05631
Cited By
ConAML: Constrained Adversarial Machine Learning for Cyber-Physical Systems
12 March 2020
Jiangnan Li
Yingyuan Yang
Jinyuan Stella Sun
K. Tomsovic
Jin Young Lee
AAML
Re-assign community
ArXiv
PDF
HTML
Papers citing
"ConAML: Constrained Adversarial Machine Learning for Cyber-Physical Systems"
20 / 20 papers shown
Title
EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability Detection
Shigang Liu
Di Cao
Junae Kim
Tamas Abraham
Paul Montague
S. Çamtepe
Jun Zhang
Yang Xiang
AAML
29
1
0
27 Jul 2024
Risks of Practicing Large Language Models in Smart Grid: Threat Modeling and Validation
Jiangnan Li
Yingyuan Yang
Jinyuan Stella Sun
57
4
0
10 May 2024
LESSON: Multi-Label Adversarial False Data Injection Attack for Deep Learning Locational Detection
Jiwei Tian
Chao Shen
Buhong Wang
Xiaofang Xia
Meng Zhang
Chenhao Lin
Qian Li
38
36
0
29 Jan 2024
Vulnerability of Machine Learning Approaches Applied in IoT-based Smart Grid: A Review
Zhenyong Zhang
Mengxiang Liu
Mingyang Sun
Ruilong Deng
Peng Cheng
Dusit Niyato
Mo-Yuen Chow
Jiming Chen
38
38
0
30 Aug 2023
Adversarial Attacks on Leakage Detectors in Water Distribution Networks
Paul Stahlhofen
André Artelt
L. Hermes
Barbara Hammer
AAML
18
2
0
25 May 2023
The Case for the Anonymization of Offloaded Computation
Md Washik Al Azad
Shifat Sarwar
Sifat Ut Taki
Spyridon Mastorakis
14
0
0
12 May 2023
Robustness Testing of Data and Knowledge Driven Anomaly Detection in Cyber-Physical Systems
Xugui Zhou
Maxfield Kouzel
H. Alemzadeh
OOD
AAML
8
12
0
20 Apr 2022
On The Empirical Effectiveness of Unrealistic Adversarial Hardening Against Realistic Adversarial Attacks
Salijona Dyrmishi
Salah Ghamizi
Thibault Simonetto
Yves Le Traon
Maxime Cordy
AAML
14
16
0
07 Feb 2022
A Unified Framework for Adversarial Attack and Defense in Constrained Feature Space
Thibault Simonetto
Salijona Dyrmishi
Salah Ghamizi
Maxime Cordy
Yves Le Traon
AAML
19
21
0
02 Dec 2021
A Practical Adversarial Attack on Contingency Detection of Smart Energy Systems
Moein Sabounchi
Jin Wei-Kocsis
AAML
14
1
0
13 Sep 2021
Neural Network Guided Evolutionary Fuzzing for Finding Traffic Violations of Autonomous Vehicles
Ziyuan Zhong
Gail E. Kaiser
Baishakhi Ray
18
70
0
13 Sep 2021
Learning-Based Vulnerability Analysis of Cyber-Physical Systems
Amir Khazraei
S. Hallyburton
Qitong Gao
Yu Wang
Miroslav Pajic
AAML
8
17
0
10 Mar 2021
Towards Adversarial-Resilient Deep Neural Networks for False Data Injection Attack Detection in Power Grids
Jiangnan Li
Yingyuan Yang
Jinyuan Stella Sun
K. Tomsovic
Hairong Qi
AAML
31
14
0
17 Feb 2021
Secure Planning Against Stealthy Attacks via Model-Free Reinforcement Learning
A. Bozkurt
Yu Wang
Miroslav Pajic
6
15
0
03 Nov 2020
Exploiting Vulnerabilities of Deep Learning-based Energy Theft Detection in AMI through Adversarial Attacks
Jiangnan Li
Yingyuan Yang
Jinyuan Stella Sun
AAML
15
7
0
16 Oct 2020
Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain
Ishai Rosenberg
A. Shabtai
Yuval Elovici
Lior Rokach
AAML
26
12
0
05 Jul 2020
SearchFromFree: Adversarial Measurements for Machine Learning-based Energy Theft Detection
Jiangnan Li
Yingyuan Yang
Jinyuan Stella Sun
AAML
17
19
0
02 Jun 2020
Adversarial Machine Learning at Scale
Alexey Kurakin
Ian Goodfellow
Samy Bengio
AAML
261
3,110
0
04 Nov 2016
Adversarial examples in the physical world
Alexey Kurakin
Ian Goodfellow
Samy Bengio
SILM
AAML
287
5,837
0
08 Jul 2016
The Loss Surfaces of Multilayer Networks
A. Choromańska
Mikael Henaff
Michaël Mathieu
Gerard Ben Arous
Yann LeCun
ODL
179
1,185
0
30 Nov 2014
1