Alert button
Picture for Gautam Raj Mode

Gautam Raj Mode

Alert button

RobustPdM: Designing Robust Predictive Maintenance against Adversarial Attacks

Add code
Bookmark button
Alert button
Jan 25, 2023
Ayesha Siddique, Ripan Kumar Kundu, Gautam Raj Mode, Khaza Anuarul Hoque

Figure 1 for RobustPdM: Designing Robust Predictive Maintenance against Adversarial Attacks
Figure 2 for RobustPdM: Designing Robust Predictive Maintenance against Adversarial Attacks
Figure 3 for RobustPdM: Designing Robust Predictive Maintenance against Adversarial Attacks
Figure 4 for RobustPdM: Designing Robust Predictive Maintenance against Adversarial Attacks
Viaarxiv icon

Crafting Adversarial Examples for Deep Learning Based Prognostics (Extended Version)

Add code
Bookmark button
Alert button
Sep 28, 2020
Gautam Raj Mode, Khaza Anuarul Hoque

Figure 1 for Crafting Adversarial Examples for Deep Learning Based Prognostics (Extended Version)
Figure 2 for Crafting Adversarial Examples for Deep Learning Based Prognostics (Extended Version)
Figure 3 for Crafting Adversarial Examples for Deep Learning Based Prognostics (Extended Version)
Figure 4 for Crafting Adversarial Examples for Deep Learning Based Prognostics (Extended Version)
Viaarxiv icon

Adversarial Examples in Deep Learning for Multivariate Time Series Regression

Add code
Bookmark button
Alert button
Sep 24, 2020
Gautam Raj Mode, Khaza Anuarul Hoque

Figure 1 for Adversarial Examples in Deep Learning for Multivariate Time Series Regression
Figure 2 for Adversarial Examples in Deep Learning for Multivariate Time Series Regression
Figure 3 for Adversarial Examples in Deep Learning for Multivariate Time Series Regression
Figure 4 for Adversarial Examples in Deep Learning for Multivariate Time Series Regression
Viaarxiv icon

False Data Injection Attacks in Internet of Things and Deep Learning enabled Predictive Analytics

Add code
Bookmark button
Alert button
Oct 03, 2019
Gautam Raj Mode, Prasad Calyam, Khaza Anuarul Hoque

Figure 1 for False Data Injection Attacks in Internet of Things and Deep Learning enabled Predictive Analytics
Figure 2 for False Data Injection Attacks in Internet of Things and Deep Learning enabled Predictive Analytics
Figure 3 for False Data Injection Attacks in Internet of Things and Deep Learning enabled Predictive Analytics
Figure 4 for False Data Injection Attacks in Internet of Things and Deep Learning enabled Predictive Analytics
Viaarxiv icon