-
2
-
-
33745827782
-
SURF: Speeded up robust features
-
H. Bay, T. Tuytelaars, and L.V. Gool. Surf: Speeded up robust features. In In ECCV, pages 404–417, 2006.
-
(2006)
ECCV
, pp. 404-417
-
-
Bay, H.1
Tuytelaars, T.2
Gool, L.V.3
-
4
-
-
84929455322
-
Outdoor downward-facing optical flow odometry with commodity sensors
-
Springer
-
M. Dille, B. Grocholsky, and S. Singh. Outdoor downward-facing optical flow odometry with commodity sensors. In Field and Service Robotics, pages 183–193. Springer, 2010.
-
(2010)
Field and Service Robotics
, pp. 183-193
-
-
Dille, M.1
Grocholsky, B.2
Singh, S.3
-
5
-
-
0019574599
-
Random sample consensus: A paradigm for model fitting with applications to image analysis and automated cartography
-
M.A. Fischer and R.C. Bolles. Random sample consensus: A paradigm for model fitting with applications to image analysis and automated cartography. In Comm. of the ACM, pages 381–395, 1981.
-
(1981)
Comm. of the ACM
, pp. 381-395
-
-
Fischer, M.A.1
Bolles, R.C.2
-
6
-
-
84881257572
-
Ghost talk: Mitigating EMI signal injection attacks against analog sensors
-
May
-
Denis Foo Kune, John Backes, Shane S. Clark, Daniel B. Kramer, Matthew R. Reynolds, Kevin Fu, Yongdae Kim, and Wenyuan Xu. Ghost talk: Mitigating EMI signal injection attacks against analog sensors. In Proceedings of the 34th Annual IEEE Symposium on Security and Privacy, May 2013.
-
(2013)
Proceedings of the 34th Annual IEEE Symposium on Security and Privacy
-
-
Kune, D.F.1
Backes, J.2
Clark, S.S.3
Kramer, D.B.4
Reynolds, M.R.5
Fu, K.6
Kim, Y.7
Xu, W.8
-
10
-
-
84874555938
-
Cyber security threat analysis and modeling of an unmanned aerial vehicle system
-
IEEE
-
A.Y. Javaid, W. Sun, V.K. Devabhaktuni, and M. Alam. Cyber security threat analysis and modeling of an unmanned aerial vehicle system. In Homeland Security (HST), 2012 IEEE Conference on Technologies for, pages 585–590. IEEE, 2012.
-
(2012)
Homeland Security (HST), 2012 IEEE Conference on Technologies for
, pp. 585-590
-
-
Javaid, A.Y.1
Sun, W.2
Devabhaktuni, V.K.3
Alam, M.4
-
11
-
-
84896742137
-
-
December Accessed: 2014-05-16
-
S. Kamkar. SkyJack. http://www.samy.pl/ skyjack, December 2013. Accessed: 2014-05-16.
-
(2013)
SkyJack
-
-
Kamkar, S.1
-
12
-
-
3042535216
-
Distinctive image features from scale-invariant keypoints
-
November
-
D.G. Lowe. Distinctive image features from scale-invariant keypoints. Int. J. Comput. Vision, 60(2):91–110, November 2004.
-
(2004)
Int. J. Comput. Vision
, vol.60
, Issue.2
, pp. 91-110
-
-
Lowe, D.G.1
-
13
-
-
0019647180
-
An iterative image registration technique with an application to stereo vision
-
San Francisco, CA, USA, Morgan Kaufmann Publishers Inc
-
B.D. Lucas and T. Kanade. An iterative image registration technique with an application to stereo vision. In Proceedings of the 7th International Joint Conference on Artificial Intelligence - Volume 2, IJ-CAI’81, pages 674–679, San Francisco, CA, USA, 1981. Morgan Kaufmann Publishers Inc.
-
(1981)
Proceedings of the 7th International Joint Conference on Artificial Intelligence - Volume 2, IJ-CAI’81
, pp. 674-679
-
-
Lucas, B.D.1
Kanade, T.2
-
14
-
-
84869431271
-
Gps software attacks
-
New York, NY, USA, ACM
-
T. Nighswander, B. Ledvina, J. Diamond, R. Brumley, and D. Brumley. Gps software attacks. In Proceedings of the 2012 ACM conference on Computer and communications security, CCS’12, pages 450–461, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS’12
, pp. 450-461
-
-
Nighswander, T.1
Ledvina, B.2
Diamond, J.3
Brumley, R.4
Brumley, D.5
-
16
-
-
84978047763
-
The limitations of deep learning in adversarial settings
-
Nicolas Papernot, Patrick McDaniel, Somesh Jha, Matt Fredrikson, Z. Berkay Celik, and Ananthram Swami. The limitations of deep learning in adversarial settings. In IEEE European Symposium on Security and Privacy, EuroS&P 2016, Saarbrücken, Germany, March 21-24, 2016, pages 372–387, 2016.
-
(2016)
IEEE European Symposium on Security and Privacy, EuroS&P 2016, Saarbrücken, Germany, March 21-24, 2016
, pp. 372-387
-
-
Papernot, N.1
McDaniel, P.2
Jha, S.3
Fredrikson, M.4
Berkay Celik, Z.5
Swami, A.6
-
17
-
-
84978047763
-
The limitations of deep learning in adversarial settings
-
San Jose, California, May 23-25
-
Nicolas Papernot, Patrick McDaniel, Xi Wu, Somesh Jha, and Ananthram Swami. The limitations of deep learning in adversarial settings. In IEEE Symposium on Security and Privacy, S&P 2016, San Jose, California, May 23-25, 2016, pages 372–387.
-
(2016)
IEEE Symposium on Security and Privacy, S&P 2016
, pp. 372-387
-
-
Papernot, N.1
McDaniel, P.2
Wu, X.3
Jha, S.4
Swami, A.5
-
20
-
-
85063376042
-
Rocking drones with intentional sound noise on gyroscopic sensors
-
Washington, D.C, USENIX Association
-
Yunmok Son, Hocheol Shin, Dongkwan Kim, Youngseok Park, Juhwan Noh, Kibum Choi, Jung-woo Choi, and Yongdae Kim. Rocking drones with intentional sound noise on gyroscopic sensors. In 24th USENIX Security Symposium (USENIX Security 15), pages 881–896, Washington, D.C., 2015. USENIX Association.
-
(2015)
24th USENIX Security Symposium (USENIX Security 15)
, pp. 881-896
-
-
Son, Y.1
Shin, H.2
Kim, D.3
Park, Y.4
Noh, J.5
Choi, K.6
Choi, J.-W.7
Kim, Y.8
-
21
-
-
85083953343
-
Intriguing properties of neural networks
-
Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian J. Goodfellow, and Rob Fergus. Intriguing properties of neural networks. Proceedings of the 2015 International Conference on Learning Representations, 2014.
-
(2014)
Proceedings of the 2015 International Conference on Learning Representations
-
-
Szegedy, C.1
Zaremba, W.2
Sutskever, I.3
Bruna, J.4
Erhan, D.5
Goodfellow, I.J.6
Fergus, R.7
|