Picture for Stefan Rass

Stefan Rass

RobotPerf: An Open-Source, Vendor-Agnostic, Benchmarking Suite for Evaluating Robotics Computing System Performance

Add code
Sep 17, 2023
Viaarxiv icon

ExploitFlow, cyber security exploitation routes for Game Theory and AI research in robotics

Add code
Aug 04, 2023
Figure 1 for ExploitFlow, cyber security exploitation routes for Game Theory and AI research in robotics
Figure 2 for ExploitFlow, cyber security exploitation routes for Game Theory and AI research in robotics
Figure 3 for ExploitFlow, cyber security exploitation routes for Game Theory and AI research in robotics
Figure 4 for ExploitFlow, cyber security exploitation routes for Game Theory and AI research in robotics
Viaarxiv icon

Metricizing the Euclidean Space towards Desired Distance Relations in Point Clouds

Add code
Nov 07, 2022
Viaarxiv icon

HoneyCar: A Framework to Configure HoneypotVulnerabilities on the Internet of Vehicles

Add code
Nov 03, 2021
Figure 1 for HoneyCar: A Framework to Configure HoneypotVulnerabilities on the Internet of Vehicles
Figure 2 for HoneyCar: A Framework to Configure HoneypotVulnerabilities on the Internet of Vehicles
Figure 3 for HoneyCar: A Framework to Configure HoneypotVulnerabilities on the Internet of Vehicles
Figure 4 for HoneyCar: A Framework to Configure HoneypotVulnerabilities on the Internet of Vehicles
Viaarxiv icon

Supervised Machine Learning with Plausible Deniability

Add code
Jun 08, 2021
Figure 1 for Supervised Machine Learning with Plausible Deniability
Figure 2 for Supervised Machine Learning with Plausible Deniability
Figure 3 for Supervised Machine Learning with Plausible Deniability
Figure 4 for Supervised Machine Learning with Plausible Deniability
Viaarxiv icon

Cybersecurity in Robotics: Challenges, Quantitative Modeling, and Practice

Add code
Mar 16, 2021
Figure 1 for Cybersecurity in Robotics: Challenges, Quantitative Modeling, and Practice
Figure 2 for Cybersecurity in Robotics: Challenges, Quantitative Modeling, and Practice
Figure 3 for Cybersecurity in Robotics: Challenges, Quantitative Modeling, and Practice
Figure 4 for Cybersecurity in Robotics: Challenges, Quantitative Modeling, and Practice
Viaarxiv icon

alurity, a toolbox for robot cybersecurity

Add code
Oct 16, 2020
Figure 1 for alurity, a toolbox for robot cybersecurity
Figure 2 for alurity, a toolbox for robot cybersecurity
Figure 3 for alurity, a toolbox for robot cybersecurity
Viaarxiv icon

Can ROS be used securely in industry? Red teaming ROS-Industrial

Add code
Sep 17, 2020
Figure 1 for Can ROS be used securely in industry? Red teaming ROS-Industrial
Figure 2 for Can ROS be used securely in industry? Red teaming ROS-Industrial
Figure 3 for Can ROS be used securely in industry? Red teaming ROS-Industrial
Figure 4 for Can ROS be used securely in industry? Red teaming ROS-Industrial
Viaarxiv icon