False claims against model ownership resolution
Abstract
References
Index Terms
- False claims against model ownership resolution
Recommendations
Does it sound as it claims: a detailed side-channel security analysis of QuadSeal countermeasure
CF '16: Proceedings of the ACM International Conference on Computing FrontiersVLSI systems often rely on embedded cryptographic cores for security when the confidentiality and authorization is a must. Such cores are theoretically sound but often vulnerable to physical attacks like side-channel analysis (SCA). Several ...
On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures
It is critical for a power system to estimate its operation state based on meter measurements in the field and the configuration of power grid networks. Recent studies show that the adversary can bypass the existing bad data detection schemes, posing ...
Two‐channel stealthy false data injection attacks design without estimator knowledge
AbstractThis paper primarily focuses on designing stealthy false data injection attacks targeting two communication channels in cyber‐physical systems equipped with state estimators and attack detectors. It introduces the concept of perfect attacks, ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Sponsors
- Bloomberg Engineering
- Google Inc.
- NSF
- Futurewei Technologies
- IBM
Publisher
USENIX Association
United States
Publication History
Qualifiers
- Research-article
- Research
- Refereed limited
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0