Ryan M. Gerdes
Orcid: 0000-0003-0876-1181
According to our database1,
Ryan M. Gerdes
authored at least 75 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Remote Perception Attacks against Camera-based Object Recognition Systems and Countermeasures.
ACM Trans. Cyber Phys. Syst., April, 2024
Sensors, April, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
The IEMI Effect: On the Efficacy of PCB-Level Countermeasures in Adversarial Environments.
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024
2023
Learning Based Longitudinal Vehicle Platooning Threat Detection, Identification and Mitigation.
IEEE Trans. Intell. Veh., January, 2023
That Person Moves Like A Car: Misclassification Attack Detection for Autonomous Systems Using Spatiotemporal Consistency.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 31st International Conference on Real-Time Networks and Systems, 2023
Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware Security, 2023
2022
ACM Trans. Embed. Comput. Syst., 2022
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 43rd IEEE Security and Privacy, 2022
Proceedings of the Security and Privacy in Communication Networks, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
IEEE Trans. Intell. Veh., 2021
On the Limitations of Obfuscating Redundant Circuits in Frustrating Hardware Trojan Implantation.
J. Hardw. Syst. Secur., 2021
Intelligent Transportation System Security: Impact-Oriented Risk Assessment of in-Vehicle Networks.
IEEE Intell. Transp. Syst. Mag., 2021
Survey of Control-Flow Integrity Techniques for Embedded and Real-Time Embedded Systems.
CoRR, 2021
Contrastive Graph Convolutional Networks for Hardware Trojan Detection in Third Party IP Cores.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2021
2020
Impacts of Constrained Sensing and Communication Based Attacks on Vehicular Platoons.
IEEE Trans. Veh. Technol., 2020
Message Integrity Protection Over Wireless Channel: Countering Signal Cancellation via Channel Randomization.
IEEE Trans. Dependable Secur. Comput., 2020
GhostImage: Perception Domain Attacks against Vision-based Object Classification Systems.
CoRR, 2020
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020
Electromagnetic Sensor and Actuator Attacks on Power Converters for Electric Vehicles.
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020
Proceedings of the 28th International Conference on Real Time Networks and Systems, 2020
GhostImage: Remote Perception Attacks against Camera-based Image Classification Systems.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020
Secure Traffic Lights: Replay Attack Detection for Model-based Smart Traffic Controllers.
Proceedings of the AutoSec@CODASPY '20: Proceedings of the Second ACM Workshop on Automotive and Aerial Vehicle Security, 2020
Linear-Quadratic Game Theoretic Analysis for Securing Battery Management Power Converter Systems.
Proceedings of the AutoSec@CODASPY '20: Proceedings of the Second ACM Workshop on Automotive and Aerial Vehicle Security, 2020
Proceedings of the AutoSec@CODASPY '20: Proceedings of the Second ACM Workshop on Automotive and Aerial Vehicle Security, 2020
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
2019
Sustain. Comput. Informatics Syst., 2019
Survey on Vehicular Ad Hoc Networks and Its Access Technologies Security Vulnerabilities and Countermeasures.
CoRR, 2019
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Proceedings of the First IEEE International Conference on Trust, 2019
Proceedings of the Security and Privacy in Communication Networks, 2019
Proceedings of the 27th International Conference on Real-Time Networks and Systems, 2019
On the Pitfalls and Vulnerabilities of Schedule Randomization Against Schedule-Based Attacks.
Proceedings of the 25th IEEE Real-Time and Embedded Technology and Applications Symposium, 2019
Learning-based adversarial agent detection and identification in cyber physical systems applied to autonomous vehicular platoon.
Proceedings of the 5th International Workshop on Software Engineering for Smart Cyber-Physical Systems, 2019
An Intermittent Learning Algorithm for High-Speed Autonomous Driving in Unknown Environments.
Proceedings of the 2019 American Control Conference, 2019
SIMPLE: single-frame based physical layer identification for intrusion detection and prevention on in-vehicle networks.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
Analysis of Friendly Jamming for Secure Location Verification of Vehicles for Intelligent Highways.
IEEE Trans. Veh. Technol., 2018
Examining Cybersecurity of Cyberphysical Systems for Critical Infrastructures Through Work Domain Analysis.
Hum. Factors, 2018
Proceedings of the 2018 IEEE Military Communications Conference, 2018
Truth-aware Optimal Decision-making Framework with Driver Preferences for V2V Communications.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
2017
CoRR, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Viability of Using Shadows Cast by Vehicles for Position Verification in Vehicle Platooning.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017
Regular: Attacker-Induced Traffic Flow Instability in a Stream of Semi-Automated Vehicles.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
Proceedings of the 1st International Workshop on Safe Control of Connected and Autonomous Vehicles, 2017
A data trust framework for VANETs enabling false data detection and secure vehicle tracking.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
Visual distance estimation for pure pursuit based platooning with a monocular camera.
Proceedings of the 2017 American Control Conference, 2017
2016
Proceedings of the Digital Fingerprinting, 2016
2015
Proceedings of the Security and Privacy in Communication Networks, 2015
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015
Attack Mitigation in Adversarial Platooning Using Detection-Based Sliding Mode Control.
Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy, 2015
Message Integrity Protection over Wireless Channel by Countering Signal Cancellation: Theory and Practice.
Proceedings of the 10th ACM Symposium on Information, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
POSTER: Analysis and Comparison of Secure Localization Schemes for Intelligent Transportation Systems.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Proceedings of the Annual Computer Security Applications Conference, 2013
2012
IEEE Trans. Inf. Forensics Secur., 2012
Towards a Framework for Evaluating the Security of Physical-Layer Identification Systems.
Proceedings of the Security and Privacy in Communication Networks, 2012
2008
Proceedings of the 2008 IEEE International Conference on Electro/Information Technology, 2008
2006
Proceedings of the Network and Distributed System Security Symposium, 2006