Author of the publication

Insights on Using Deep Learning to Spoof Inertial Measurement Units for Stealthy Attacks on UAVs.

, , , , , , , , and . MILCOM, page 1065-1069. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TwinSync: A Digital Twin Synchronization Protocol for Bandwidth-Limited IoT Applications., , , , , , , , , and 3 other author(s). ICCCN, page 1. IEEE, (2023)Safe Decomposition of Startup Requirements: Verification and Synthesis., , , , and . TACAS (1), volume 12078 of Lecture Notes in Computer Science, page 155-172. Springer, (2020)Towards Effective Swarm-Based GPS Spoofing Detection in Disadvantaged Platforms., , , , , , and . MILCOM, page 722-728. IEEE, (2023)Acies-OS: A Content-Centric Platform for Edge AI Twinning and Orchestration., , , , , , , , , and 9 other author(s). ICCCN, page 1-9. IEEE, (2024)Analysis of Cyclic Fault Propagation via ASP., , , , and . LPNMR, volume 13416 of Lecture Notes in Computer Science, page 470-483. Springer, (2022)Evolving use of a system for education at a distance., , , , , and . CHI Extended Abstracts, page 274-275. ACM, (1999)Evolving Use of a System for Education at a Distance., , , , , and . HICSS, IEEE Computer Society, (2000)Requiem for a drone: a machine-learning based framework for stealthy attacks against unmanned autonomous vehicles., , , , , , and . CoRR, (2024)IoBT-OS: Optimizing the Sensing-to-Decision Loop for the Internet of Battlefield Things., , , , , , , , , and 4 other author(s). ICCCN, page 1-10. IEEE, (2022)Formal Design and Safety Analysis of AIR6110 Wheel Brake System., , , , , , , and . CAV (1), volume 9206 of Lecture Notes in Computer Science, page 518-535. Springer, (2015)