Mynuddin et al., 2024
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| US20250272392A1 (en) | Securing systems employing artificial intelligence | |
| Tian et al. | Deeptest: Automated testing of deep-neural-network-driven autonomous cars | |
| US10699585B2 (en) | Unmanned aerial system detection and mitigation | |
| Mynuddin et al. | Trojan attack and defense for deep learning-based navigation systems of unmanned aerial vehicles | |
| Ghosh et al. | An integrated approach of threat analysis for autonomous vehicles perception system | |
| Raja et al. | Adversarial attacks and defenses toward AI-assisted UAV infrastructure inspection | |
| Li et al. | Deep learning backdoors | |
| US11386300B2 (en) | Artificial intelligence adversarial vulnerability audit tool | |
| Thakur et al. | Artificial intelligence techniques in smart cities surveillance using UAVs: A survey | |
| Zhang et al. | Autonomous long-range drone detection system for critical infrastructure safety | |
| Xie et al. | On the adversarial robustness of camera-based 3d object detection | |
| US20220245243A1 (en) | Securing machine learning models against adversarial samples through model poisoning | |
| Almutairi et al. | Securing DNN for smart vehicles: An overview of adversarial attacks, defenses, and frameworks | |
| Aloraini et al. | Adversarial attacks on intrusion detection systems in in-vehicle networks of connected and autonomous vehicles | |
| Arif et al. | A deep reinforcement learning framework to evade black-box machine learning based IoT malware detectors using GAN-generated influential features | |
| Balachandran et al. | A novel approach to detect unmanned aerial vehicle using Pix2Pix generative adversarial network | |
| Singh et al. | An ensemble-based iot-enabled drones detection scheme for a safe community | |
| Mahima et al. | Toward robust 3D perception for autonomous vehicles: A review of adversarial attacks and countermeasures | |
| Nguyen et al. | A Survey and Evaluation of Adversarial Attacks in Object Detection | |
| Wang et al. | Beyond boundaries: A comprehensive survey of transferable attacks on ai systems | |
| Mynuddin et al. | Trojan triggers for poisoning unmanned aerial vehicles navigation: A deep learning approach | |
| Kazmi et al. | From Pixel to Peril: Investigating Adversarial Attacks on Aerial Imagery Through Comprehensive Review and Prospective Trajectories | |
| Wang et al. | On the vulnerability of deep reinforcement learning to backdoor attacks in autonomous vehicles | |
| Wei et al. | Rodad: Resilience oriented decentralized anomaly detection for urban air mobility networks | |
| Young et al. | SMU-DDI Cyber Autonomy Range |