Author of the publication

Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors.

, , , , , , , and . USENIX Security Symposium, page 881-896. USENIX Association, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The System That Cried Wolf: Sensor Security Analysis of Wide-area Smoke Detectors for Critical Infrastructure., , , and . IACR Cryptol. ePrint Arch., (2020)Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors., , , , , , , and . USENIX Security Symposium, page 881-896. USENIX Association, (2015)Data-Driven Prediction of Configurational Stability of Molecule-Adsorbed Heterogeneous Catalysts., and . J. Chem. Inf. Model., 63 (19): 5981-5995 (October 2023)Lightbox: Sensor Attack Detection for Photoelectric Sensors via Spectrum Fingerprinting., , , , , and . ACM Trans. Priv. Secur., 26 (4): 46:1-46:30 (November 2023)GyrosFinger: Fingerprinting Drones for Location Tracking Based on the Outputs of MEMS Gyroscopes., , , and . ACM Trans. Priv. Secur., 21 (2): 10:1-10:25 (2018)Un-Rocking Drones: Foundations of Acoustic Injection Attacks and Recovery Thereof., , , , , and . NDSS, The Internet Society, (2023)Path-Aware and Structure-Preserving Generation of Synthetically Accessible Molecules., , , , , , and . ICML, volume 162 of Proceedings of Machine Learning Research, page 16952-16968. PMLR, (2022)Inverse design of crystals using generalized invertible crystallographic representation., , , , , , , , , and 3 other author(s). CoRR, (2020)Uncertainty-Quantified Hybrid Machine Learning/Density Functional Theory High Throughput Screening Method for Crystals., , , and . J. Chem. Inf. Model., 60 (4): 1996-2003 (2020)Tractor Beam: Safe-hijacking of Consumer Drones with Adaptive GPS Spoofing., , , , , , and . ACM Trans. Priv. Secur., 22 (2): 12:1-12:26 (2019)