The space of adversarial strategies

R Sheatsley, B Hoak, E Pauley… - 32nd USENIX Security …, 2023 - usenix.org
Adversarial examples, inputs designed to induce worst-case behavior in machine learning
models, have been extensively studied over the past decade. Yet, our understanding of this …

Optimal feature selection for malware detection in cyber physical systems using graph convolutional network

A Daniel, R Deebalakshmi, R Thilagavathy… - Computers and …, 2023 - Elsevier
Due to the fast growth of Internet of Things (IoT) technology, the detection and analysis of
malware have become a challenge for industrial applications of Cyber-Physical System …

Swarm robotics for ultra-violet sterilization robot

RB Dushing, SA Jagtap, P Kumar… - 2022 International …, 2022 - ieeexplore.ieee.org
Swarm robotics is a technical approach of multiple robots working together and solving
multiple problems at a time. Enormous and complex work cannot be done using …