Zhongyuan Hau

According to our database1, Zhongyuan Hau authored at least 11 papers between 2019 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Adversarial 3D Virtual Patches using Integrated Gradients.
Proceedings of the IEEE Security and Privacy, 2024

2022
Using 3D Shadows to Detect Object Hiding Attacks on Autonomous Vehicle Perception.
Proceedings of the 43rd IEEE Security and Privacy, 2022

HA-Grid: Security Aware Hazard Analysis for Smart Grids.
Proceedings of the IEEE International Conference on Communications, 2022

Jacobian Ensembles Improve Robustness Trade-Offs to Adversarial Attacks.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2022, 2022

2021
Temporal Consistency Checks to Detect LiDAR Spoofing Attacks on Autonomous Vehicle Perception.
CoRR, 2021

Object Removal Attacks on LiDAR-based 3D Object Detectors.
CoRR, 2021

Shadow-Catcher: Looking into Shadows to Detect Ghost Objects in Autonomous Vehicle 3D Sensing.
Proceedings of the Computer Security - ESORICS 2021, 2021

2020
GhostBuster: Looking Into Shadows to Detect Ghost Objects in Autonomous Vehicle 3D Sensing.
CoRR, 2020

Evaluating Cascading Impact of Attacks on Resilience of Industrial Control Systems: A Design-Centric Modeling Approach.
Proceedings of the 6th ACM Workshop on Cyber-Physical System Security, 2020

2019
Evaluating Cascading Effects of Attacks on Resilience of Industrial Control Systems: A Design-Centric Modeling Approach.
CoRR, 2019

Exploiting Correlations to Detect False Data Injections in Low-Density Wireless Sensor Networks.
Proceedings of the 5th ACM on Cyber-Physical System Security Workshop, 2019


  Loading...