Pritam Dash

Orcid: 0000-0002-9818-4922

According to our database1, Pritam Dash authored at least 13 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SpecGuard: Specification Aware Recovery for Robotic Autonomous Vehicles from Physical Attacks.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Diagnosis-guided Attack Recovery for Securing Robotic Vehicles from Sensor Deception Attacks.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
ICS-Sniper: A Targeted Blackhole Attack on Encrypted ICS Traffic.
CoRR, 2023

SwarmFuzz: Discovering GPS Spoofing Attacks in Drone Swarms.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

Beyond Detection: Securing Robotic Vehicles.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023

Jujutsu: A Two-stage Defense against Adversarial Patch Attacks on Deep Neural Networks.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
Replay-based Recovery for Autonomous Robotic Vehicles from Sensor Deception Attacks.
CoRR, 2022

Poster: May the Swarm Be With You: Sensor Spoofing Attacks Against Drone Swarms.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Stealthy Attacks against Robotic Vehicles Protected by Control-based Intrusion Detection Techniques.
DTRAP, 2021

Turning Your Strength against You: Detecting and Mitigating Robust and Universal Adversarial Patch Attack.
CoRR, 2021

PID-Piper: Recovering Robotic Vehicles from Physical Attacks.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

2019
Out of control: stealthy attacks against robotic vehicles protected by control-based techniques.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2017
Towards Privacy-Preserving and User-Centric Identity Management as a Service.
Proceedings of the Open Identity Summit 2017, 2017


  Loading...