Zhongyuan Hau
Cited by
Cited by
Object Removal Attacks on LiDAR-based 3D Object Detectors
Z Hau, KT Co, S Demetriou, EC Lupu
Workshop on Automotive and Autonomous Vehicle Security (AutoSec) 2021, 2021
Shadow-Catcher: Looking into shadows to detect ghost objects in autonomous vehicle 3d sensing
Z Hau, S Demetriou, L Munoz-González, EC Lupu
European Symposium on Research in Computer Security, 691-711, 2021
Temporal consistency checks to detect lidar spoofing attacks on autonomous vehicle perception
C You, Z Hau, S Demetriou
Proceedings of the 1st Workshop on Security and Privacy for Mobile AI, 13-18, 2021
Exploiting correlations to detect false data injections in low-density wireless sensor networks
Z Hau, EC Lupu
Proceedings of the 5th on Cyber-Physical System Security Workshop, 1-12, 2019
Heat transfer from an immersed tube in a bubbling fluidized bed
Z Hau, EWC Lim
Industrial & Engineering Chemistry Research 55 (33), 9040-9053, 2016
Evaluating Cascading Impact of Attacks on Resilience of Industrial Control Systems: A Design-Centric Modeling Approach
Z Hau, JH Castellanos, J Zhou
Proceedings of the 6th ACM on Cyber-Physical System Security Workshop, 42-53, 2020
Using 3D Shadows to Detect Object Hiding Attacks on Autonomous Vehicle Perception
Z Hau, S Demetriou, EC Lupu
2022 IEEE Security and Privacy Workshops (SPW), 229-235, 2022
HA-grid: security aware hazard analysis for smart grids
L Castiglione, Z Hau, P Ge, K Co, L Munoz Gonzalez, F Teng, E Lupu
In 2022 IEEE International Conference on Communications, Control, and …, 2022
Jacobian Ensembles Improve Robustness Trade-Offs to Adversarial Attacks
KT Co, D Martinez-Rego, Z Hau, EC Lupu
International Conference on Artificial Neural Networks, 680-691, 2022
Adversarial 3D Virtual Patches using Integrated Gradients
C You, Z Hau, B Xu, S Demetriou
arXiv preprint arXiv:2406.00282, 2024
The system can't perform the operation now. Try again later.
Articles 1–10