Skip to content

Commit

Permalink
Update BoostingAdversarialBoundary pub loc
Browse files Browse the repository at this point in the history
  • Loading branch information
Yustynn committed Jan 30, 2024
1 parent 3807994 commit f504142
Show file tree
Hide file tree
Showing 2 changed files with 21 additions and 21 deletions.
28 changes: 14 additions & 14 deletions _includes/pubs.html
Original file line number Diff line number Diff line change
Expand Up @@ -28,8 +28,6 @@
<td>
<span class="date">

<big><strong>2023</strong></big><br />




Expand All @@ -39,12 +37,12 @@
<span class="pubtitle">
<img src="img/pdficon_small.png" width="16"
height="16" alt="PDF" />
<a href="./papers/VitroBench.pdf">VitroBench: Manipulating In-vehicle Networks and COTS ECUs on Your Bench</a>.
<a href="./papers/BoostingAdversarialBoundary.pdf">Boosting Adversarial Training in Safety-Critical Systems Through Boundary Data Selection</a>.
</span><br />
<span class="authors">
Anthony Kee Teck Yeo, Matheus E. Garbelini, Sudipta Chattopadhyay, and Jianying Zhou.
Yifan Jia, Christopher M. Poskitt, Peixin Zhang, Jingyi Wang, Jun Sun, and Sudipta Chattopadhyay.
</span><br />
<span class="venuetype"></span><span class="venue">Vehicular Communications</span>.
<span class="venuetype"></span><span class="venue">2024 IEEE International Conference on Robotics and Automation (ICRA)/IEEE Robotics and Automation Letters (RA-L), Vol 8 Issue 12</span>.
<br />
<span class="links">
</span>
Expand All @@ -54,6 +52,8 @@
<td>
<span class="date">

<big><strong>2023</strong></big><br />




Expand All @@ -63,12 +63,12 @@
<span class="pubtitle">
<img src="img/pdficon_small.png" width="16"
height="16" alt="PDF" />
<a href="./papers/SmartCityThreatModelCyberCrime.pdf">Identifying Threats, Cybercrime and Digital Forensic Opportunities in Smart City Infrastructure via Threat Modeling</a>.
<a href="./papers/VitroBench.pdf">VitroBench: Manipulating In-vehicle Networks and COTS ECUs on Your Bench</a>.
</span><br />
<span class="authors">
Yee Ching Tok and Sudipta Chattopadhyay.
Anthony Kee Teck Yeo, Matheus E. Garbelini, Sudipta Chattopadhyay, and Jianying Zhou.
</span><br />
<span class="venuetype"></span><span class="venue">Elsevier Forensic Science International: Digital Investigation (FSIDIIN)</span>.
<span class="venuetype"></span><span class="venue">Vehicular Communications</span>.
<br />
<span class="links">
</span>
Expand All @@ -87,12 +87,12 @@
<span class="pubtitle">
<img src="img/pdficon_small.png" width="16"
height="16" alt="PDF" />
<a href="./papers/AEGIS.pdf">Towards Backdoor Attacks and Defense in Robust Machine Learning Models</a>.
<a href="./papers/SmartCityThreatModelCyberCrime.pdf">Identifying Threats, Cybercrime and Digital Forensic Opportunities in Smart City Infrastructure via Threat Modeling</a>.
</span><br />
<span class="authors">
Ezekiel Soremekun, Sakshi Udeshi, and Sudipta Chattopadhyay.
Yee Ching Tok and Sudipta Chattopadhyay.
</span><br />
<span class="venuetype"></span><span class="venue">Elsevier Journal of Computers and Security</span>.
<span class="venuetype"></span><span class="venue">Elsevier Forensic Science International: Digital Investigation (FSIDIIN)</span>.
<br />
<span class="links">
</span>
Expand All @@ -111,12 +111,12 @@
<span class="pubtitle">
<img src="img/pdficon_small.png" width="16"
height="16" alt="PDF" />
<a href="./papers/BoostingAdversarialBoundary.pdf">Boosting Adversarial Training in Safety-Critical Systems Through Boundary Data Selection</a>.
<a href="./papers/AEGIS.pdf">Towards Backdoor Attacks and Defense in Robust Machine Learning Models</a>.
</span><br />
<span class="authors">
Yifan Jia, Christopher M. Poskitt, Peixin Zhang, Jingyi Wang, Jun Sun, and Sudipta Chattopadhyay.
Ezekiel Soremekun, Sakshi Udeshi, and Sudipta Chattopadhyay.
</span><br />
<span class="venuetype"></span><span class="venue">IEEE Robotics and Automation Letters (RA-L), Vol 8 Issue 12</span>.
<span class="venuetype"></span><span class="venue">Elsevier Journal of Computers and Security</span>.
<br />
<span class="links">
</span>
Expand Down
14 changes: 7 additions & 7 deletions bib/pubs.bib
Original file line number Diff line number Diff line change
Expand Up @@ -5,6 +5,13 @@ @article{UFuzz
year = {2024},
}

@article{BoostingAdversarialBoundary,
title = {Boosting Adversarial Training in Safety-Critical Systems Through Boundary Data Selection},
author = {Yifan Jia and Christopher M. Poskitt and Peixin Zhang and Jingyi Wang and Jun Sun and Sudipta Chattopadhyay},
journal = {2024 IEEE International Conference on Robotics and Automation (ICRA)/IEEE Robotics and Automation Letters (RA-L), Vol 8 Issue 12},
year = {2024},
url = {./papers/BoostingAdversarialBoundary.pdf}
}

@article{VitroBench,
title = {VitroBench: Manipulating In-vehicle Networks and COTS ECUs on Your Bench},
Expand All @@ -30,13 +37,6 @@ @article{Aegis
url = {./papers/AEGIS.pdf}
}

@article{BoostingAdversarialBoundary,
title = {Boosting Adversarial Training in Safety-Critical Systems Through Boundary Data Selection},
author = {Yifan Jia and Christopher M. Poskitt and Peixin Zhang and Jingyi Wang and Jun Sun and Sudipta Chattopadhyay},
journal = {IEEE Robotics and Automation Letters (RA-L), Vol 8 Issue 12},
year = {2023},
url = {./papers/BoostingAdversarialBoundary.pdf}
}

@article{BrakTooth,
title = {BrakTooth: Causing Havoc on Bluetooth Link Manager via Directed Fuzzing},
Expand Down

0 comments on commit f504142

Please sign in to comment.