Cited By
View all- Wang SKo RBai GDong NChoi TZhang Y(2024)Evasion Attack and Defense on Machine Learning Models in Cyber-Physical Systems: A SurveyIEEE Communications Surveys & Tutorials10.1109/COMST.2023.334480826:2(930-966)Online publication date: Oct-2025
- Rocco CMoronta JBarker K(2024)Topology change detection in networks due to false data injections: a priori assessment based on graph matching techniquesLife Cycle Reliability and Safety Engineering10.1007/s41872-024-00247-9Online publication date: 10-Apr-2024
- Kang YCho T(2023)False Report Injection And Remote Attack Detection Method using Security Trajectory in WSN-based Fire Detection IoTProceedings of the 2023 6th Artificial Intelligence and Cloud Computing Conference10.1145/3639592.3639616(173-178)Online publication date: 16-Dec-2023
- Show More Cited By