Picture for Jinyuan Stella Sun

Jinyuan Stella Sun

Smart Driver Monitoring Robotic System to Enhance Road Safety : A Comprehensive Review

Add code
Jan 28, 2024
Viaarxiv icon

Towards Adversarial-Resilient Deep Neural Networks for False Data Injection Attack Detection in Power Grids

Add code
Feb 17, 2021
Figure 1 for Towards Adversarial-Resilient Deep Neural Networks for False Data Injection Attack Detection in Power Grids
Figure 2 for Towards Adversarial-Resilient Deep Neural Networks for False Data Injection Attack Detection in Power Grids
Figure 3 for Towards Adversarial-Resilient Deep Neural Networks for False Data Injection Attack Detection in Power Grids
Figure 4 for Towards Adversarial-Resilient Deep Neural Networks for False Data Injection Attack Detection in Power Grids
Viaarxiv icon

Exploiting Vulnerabilities of Deep Learning-based Energy Theft Detection in AMI through Adversarial Attacks

Add code
Oct 16, 2020
Figure 1 for Exploiting Vulnerabilities of Deep Learning-based Energy Theft Detection in AMI through Adversarial Attacks
Figure 2 for Exploiting Vulnerabilities of Deep Learning-based Energy Theft Detection in AMI through Adversarial Attacks
Figure 3 for Exploiting Vulnerabilities of Deep Learning-based Energy Theft Detection in AMI through Adversarial Attacks
Figure 4 for Exploiting Vulnerabilities of Deep Learning-based Energy Theft Detection in AMI through Adversarial Attacks
Viaarxiv icon

SearchFromFree: Adversarial Measurements for Machine Learning-based Energy Theft Detection

Add code
Jun 02, 2020
Figure 1 for SearchFromFree: Adversarial Measurements for Machine Learning-based Energy Theft Detection
Figure 2 for SearchFromFree: Adversarial Measurements for Machine Learning-based Energy Theft Detection
Figure 3 for SearchFromFree: Adversarial Measurements for Machine Learning-based Energy Theft Detection
Figure 4 for SearchFromFree: Adversarial Measurements for Machine Learning-based Energy Theft Detection
Viaarxiv icon

ConAML: Constrained Adversarial Machine Learning for Cyber-Physical Systems

Add code
Mar 12, 2020
Figure 1 for ConAML: Constrained Adversarial Machine Learning for Cyber-Physical Systems
Figure 2 for ConAML: Constrained Adversarial Machine Learning for Cyber-Physical Systems
Figure 3 for ConAML: Constrained Adversarial Machine Learning for Cyber-Physical Systems
Figure 4 for ConAML: Constrained Adversarial Machine Learning for Cyber-Physical Systems
Viaarxiv icon