Secure Routing Based on Social Similarity in Opportunistic Networks L Yao, Y Man, Z Huang, J Deng, X Wang IEEE Transactions on Wireless Communications 15 (1), 594-605, 2016 | 116 | 2016 |
SIMPLE: Single-Frame based Physical Layer Identification for Intrusion Detection and Prevention on In-Vehicle Networks M Foruhandeh, Y Man, R Gerdes, M Li, T Chantem (ACSAC '19) The 35th Annual Computer Security Applications Conference, 2019 | 80* | 2019 |
{GhostImage}: Remote perception attacks against camera-based image classification systems Y Man, M Li, R Gerdes 23rd International Symposium on Research in Attacks, Intrusions and Defenses …, 2020 | 37 | 2020 |
That Person Moves Like A Car: Misclassification Attack Detection for Autonomous Systems Using Spatiotemporal Consistency Y Man, R Muller, M Li, ZB Celik, R Gerdes USENIX Security Symposium, 2023 | 14 | 2023 |
SVM: secure vehicle motion verification with a single wireless receiver M Sun, Y Man, M Li, R Gerdes (WiSec '20) Proceedings of the 13th ACM Conference on Security and Privacy …, 2020 | 14 | 2020 |
Poster: Perceived Adversarial Examples Y Man, M Li, R Gerdes (S&P '19) IEEE Symposium of Security and Privacy 2019, 2019 | 11 | 2019 |
Physical hijacking attacks against object trackers R Muller, Y Man, ZB Celik, M Li, R Gerdes (ACM CCS) Proceedings of the 2022 ACM SIGSAC Conference on Computer and …, 2022 | 9 | 2022 |
DRIVETRUTH: Automated Autonomous Driving Dataset Generation for Security Applications R Muller, Y Man, ZB Celik, M Li, R Gerdes NDSS Workshop on Automotive and Autonomous Vehicle Security (AutoSec), 2022 | 8 | 2022 |
Ghostimage: Perception domain attacks against vision-based object classification systems Y Man, M Li, R Gerdes arXiv preprint arXiv:2001.07792, 2020 | 7 | 2020 |
Physical Layer Data Manipulation Attacks on the CAN Bus AZ Mohammed, Y Man, R Gerdes, M Li, ZB Celik NDSS Workshop on Automotive and Autonomous Vehicle Security (AutoSec), 2022 | 6 | 2022 |
Evaluating perception attacks on prediction and planning of autonomous vehicles Y Man, R Muller, M Li, ZB Celik, R Gerdes USENIX Security Symposium Poster Session, 2022 | 4 | 2022 |
Remote Perception Attacks against Camera-based Object Recognition Systems and Countermeasures Y Man, M Li, R Gerdes ACM Transactions on Cyber-Physical Systems, 2023 | 2 | 2023 |
HQuad: Statistics of Hamiltonian Cycles in Wireless Rechargeable Sensor Networks Y Man, J Deng, GT Amariucai, S Wei Proc. of the 25th International Conference on Telecommunications (ICT '18), 2018 | 2 | 2018 |
Physically Hijacking Object Trackers R Muller, Y Man, ZB Celik, M Li, R Gerdes Inaugural Symposium on Vehicle Security and Privacy, 2023 | | 2023 |
Attacks and Defenses on Autonomous Vehicles: From Sensor Perception to Control Area Networks Y Man The University of Arizona, 2022 | | 2022 |
{GhostImage}: Remote Perception Attacks against Camera-based Image Classification Systems Y Man, M Li, R Gerdes (USENIX RAID 2020) 23rd International Symposium on Research in Attacks …, 2020 | | 2020 |
Information Distribution and Recharging Dispatch Strategy in Large Wireless Networks Y Man The University of North Carolina at Greensboro, 2017 | | 2017 |
VOGUES: Validation of Object Guise using Estimated Components R Muller, Y Man, M Li, R Gerdes, J Petit, ZB Celik, OD OD | | |