Hyungsub Kim (Purdue University), Muslum Ozgur Ozmen (Purdue University), Antonio Bianchi (Purdue University), Z. Berkay Celik (Purdue University) and Dongyan Xu (Purdue University)
Demo #2: Policy-based Discovery and Patching of Logic Bugs in Robotic Vehicles
View More Papers
Binary Search in Secure Computation
Marina Blanton (University at Buffalo (SUNY)), Chen Yuan (University at Buffalo (SUNY))
Read MoreEvaluating Euler: Experimental Results of Network Anomaly Detection Models
Isaiah J. King (The George Washington University)
Read MoreDemo #9: Attacking Multi-Sensor Fusion based Localization in High-Level...
Junjie Shen, Jun Yeon Won, Zeyuan Chen and Qi Alfred Chen (UC Irvine)
Read More(Short) Spoofing Mobileye 630’s Video Camera Using a Projector
Ben Nassi, Dudi Nassi, Raz Ben Netanel and Yuval Elovici (Ben-Gurion University of the Negev)
Read More