Secure Routing Based on Social Similarity in Opportunistic Networks L Yao, Y Man, Z Huang, J Deng, X Wang IEEE Transactions on Wireless Communications 15 (1), 594-605, 2016 | 116 | 2016 |
SIMPLE: Single-Frame based Physical Layer Identification for Intrusion Detection and Prevention on In-Vehicle Networks M Foruhandeh, Y Man, R Gerdes, M Li, T Chantem (ACSAC '19) The 35th Annual Computer Security Applications Conference, 2019 | 96* | 2019 |
{GhostImage}: Remote perception attacks against camera-based image classification systems Y Man, M Li, R Gerdes 23rd International Symposium on Research in Attacks, Intrusions and Defenses …, 2020 | 54 | 2020 |
That Person Moves Like A Car: Misclassification Attack Detection for Autonomous Systems Using Spatiotemporal Consistency Y Man, R Muller, M Li, ZB Celik, R Gerdes USENIX Security Symposium, 2023 | 27 | 2023 |
Physical hijacking attacks against object trackers R Muller, Y Man, ZB Celik, M Li, R Gerdes (ACM CCS) Proceedings of the 2022 ACM SIGSAC Conference on Computer and …, 2022 | 22 | 2022 |
SVM: secure vehicle motion verification with a single wireless receiver M Sun, Y Man, M Li, R Gerdes (WiSec '20) Proceedings of the 13th ACM Conference on Security and Privacy …, 2020 | 14 | 2020 |
DRIVETRUTH: Automated Autonomous Driving Dataset Generation for Security Applications R Muller, Y Man, ZB Celik, M Li, R Gerdes NDSS Workshop on Automotive and Autonomous Vehicle Security (AutoSec), 2022 | 12 | 2022 |
Poster: Perceived Adversarial Examples Y Man, M Li, R Gerdes (S&P '19) IEEE Symposium of Security and Privacy 2019, 2019 | 12 | 2019 |
Ghostimage: Perception domain attacks against vision-based object classification systems Y Man, M Li, R Gerdes arXiv preprint arXiv:2001.07792, 2020 | 10 | 2020 |
Physical Layer Data Manipulation Attacks on the CAN Bus AZ Mohammed, Y Man, R Gerdes, M Li, ZB Celik NDSS Workshop on Automotive and Autonomous Vehicle Security (AutoSec), 2022 | 9 | 2022 |
Remote perception attacks against camera-based object recognition systems and countermeasures Y Man, M Li, R Gerdes ACM Transactions on Cyber-Physical Systems 8 (2), 1-27, 2024 | 8 | 2024 |
Evaluating perception attacks on prediction and planning of autonomous vehicles Y Man, R Muller, M Li, ZB Celik, R Gerdes USENIX Security Symposium Poster Session, 2022 | 5 | 2022 |
HQuad: Statistics of Hamiltonian Cycles in Wireless Rechargeable Sensor Networks Y Man, J Deng, GT Amariucai, S Wei Proc. of the 25th International Conference on Telecommunications (ICT '18), 2018 | 2 | 2018 |
VOGUES: Validation of Object Guise using Estimated Components R Muller, Y Man, M Li, R Gerdes, J Petit, ZB Celik USENIX Security Symposium, 2024 | 1 | 2024 |
Physical ID-Transfer Attacks against Multi-Object Tracking via Adversarial Trajectory C Wang, Y Man, R Muller, M Li, ZB Celik, R Gerdes, J Petit (ACSAC) Annual Computer Security Applications Conference, 2024 | | 2024 |
Physically Hijacking Object Trackers R Muller, Y Man, ZB Celik, M Li, R Gerdes Inaugural Symposium on Vehicle Security and Privacy, 2023 | | 2023 |
Attacks and Defenses on Autonomous Vehicles: From Sensor Perception to Control Area Networks Y Man The University of Arizona, 2022 | | 2022 |
Information Distribution and Recharging Dispatch Strategy in Large Wireless Networks Y Man The University of North Carolina at Greensboro, 2017 | | 2017 |