Picture for Andrea Ceccarelli

Andrea Ceccarelli

Detection Latencies of Anomaly Detectors: An Overlooked Perspective ?

Add code
Feb 14, 2024
Figure 1 for Detection Latencies of Anomaly Detectors: An Overlooked Perspective ?
Figure 2 for Detection Latencies of Anomaly Detectors: An Overlooked Perspective ?
Figure 3 for Detection Latencies of Anomaly Detectors: An Overlooked Perspective ?
Figure 4 for Detection Latencies of Anomaly Detectors: An Overlooked Perspective ?
Viaarxiv icon

ROSpace: Intrusion Detection Dataset for a ROS2-Based Cyber-Physical System

Add code
Feb 13, 2024
Figure 1 for ROSpace: Intrusion Detection Dataset for a ROS2-Based Cyber-Physical System
Figure 2 for ROSpace: Intrusion Detection Dataset for a ROS2-Based Cyber-Physical System
Figure 3 for ROSpace: Intrusion Detection Dataset for a ROS2-Based Cyber-Physical System
Figure 4 for ROSpace: Intrusion Detection Dataset for a ROS2-Based Cyber-Physical System
Viaarxiv icon

Ensembling Uncertainty Measures to Improve Safety of Black-Box Classifiers

Add code
Aug 23, 2023
Viaarxiv icon

On the Efficacy of Metrics to Describe Adversarial Attacks

Add code
Jan 30, 2023
Figure 1 for On the Efficacy of Metrics to Describe Adversarial Attacks
Figure 2 for On the Efficacy of Metrics to Describe Adversarial Attacks
Figure 3 for On the Efficacy of Metrics to Describe Adversarial Attacks
Figure 4 for On the Efficacy of Metrics to Describe Adversarial Attacks
Viaarxiv icon

Safety-aware metrics for object detectors in autonomous driving

Add code
Mar 04, 2022
Figure 1 for Safety-aware metrics for object detectors in autonomous driving
Figure 2 for Safety-aware metrics for object detectors in autonomous driving
Figure 3 for Safety-aware metrics for object detectors in autonomous driving
Figure 4 for Safety-aware metrics for object detectors in autonomous driving
Viaarxiv icon

Prepare for Trouble and Make it Double. Supervised and Unsupervised Stacking for AnomalyBased Intrusion Detection

Add code
Feb 28, 2022
Figure 1 for Prepare for Trouble and Make it Double. Supervised and Unsupervised Stacking for AnomalyBased Intrusion Detection
Figure 2 for Prepare for Trouble and Make it Double. Supervised and Unsupervised Stacking for AnomalyBased Intrusion Detection
Figure 3 for Prepare for Trouble and Make it Double. Supervised and Unsupervised Stacking for AnomalyBased Intrusion Detection
Figure 4 for Prepare for Trouble and Make it Double. Supervised and Unsupervised Stacking for AnomalyBased Intrusion Detection
Viaarxiv icon

Attacks and Faults Injection in Self-Driving Agents on the Carla Simulator -- Experience Report

Add code
Feb 25, 2022
Figure 1 for Attacks and Faults Injection in Self-Driving Agents on the Carla Simulator -- Experience Report
Figure 2 for Attacks and Faults Injection in Self-Driving Agents on the Carla Simulator -- Experience Report
Figure 3 for Attacks and Faults Injection in Self-Driving Agents on the Carla Simulator -- Experience Report
Figure 4 for Attacks and Faults Injection in Self-Driving Agents on the Carla Simulator -- Experience Report
Viaarxiv icon

On failures of RGB cameras and their effects in autonomous driving applications

Add code
Aug 13, 2020
Figure 1 for On failures of RGB cameras and their effects in autonomous driving applications
Figure 2 for On failures of RGB cameras and their effects in autonomous driving applications
Figure 3 for On failures of RGB cameras and their effects in autonomous driving applications
Figure 4 for On failures of RGB cameras and their effects in autonomous driving applications
Viaarxiv icon