Alert button
Picture for Nils Ole Tippenhauer

Nils Ole Tippenhauer

Alert button

Why Don't You Clean Your Glasses? Perception Attacks with Dynamic Optical Perturbations

Add code
Bookmark button
Alert button
Jul 27, 2023
Yi Han, Matthew Chan, Eric Wengrowski, Zhuohuan Li, Nils Ole Tippenhauer, Mani Srivastava, Saman Zonouz, Luis Garcia

Figure 1 for Why Don't You Clean Your Glasses? Perception Attacks with Dynamic Optical Perturbations
Figure 2 for Why Don't You Clean Your Glasses? Perception Attacks with Dynamic Optical Perturbations
Figure 3 for Why Don't You Clean Your Glasses? Perception Attacks with Dynamic Optical Perturbations
Figure 4 for Why Don't You Clean Your Glasses? Perception Attacks with Dynamic Optical Perturbations
Viaarxiv icon

No Need to Know Physics: Resilience of Process-based Model-free Anomaly Detection for Industrial Control Systems

Add code
Bookmark button
Alert button
Dec 07, 2020
Alessandro Erba, Nils Ole Tippenhauer

Figure 1 for No Need to Know Physics: Resilience of Process-based Model-free Anomaly Detection for Industrial Control Systems
Figure 2 for No Need to Know Physics: Resilience of Process-based Model-free Anomaly Detection for Industrial Control Systems
Figure 3 for No Need to Know Physics: Resilience of Process-based Model-free Anomaly Detection for Industrial Control Systems
Figure 4 for No Need to Know Physics: Resilience of Process-based Model-free Anomaly Detection for Industrial Control Systems
Viaarxiv icon

Real-time Evasion Attacks with Physical Constraints on Deep Learning-based Anomaly Detectors in Industrial Control Systems

Add code
Bookmark button
Alert button
Jul 17, 2019
Alessandro Erba, Riccardo Taormina, Stefano Galelli, Marcello Pogliani, Michele Carminati, Stefano Zanero, Nils Ole Tippenhauer

Figure 1 for Real-time Evasion Attacks with Physical Constraints on Deep Learning-based Anomaly Detectors in Industrial Control Systems
Figure 2 for Real-time Evasion Attacks with Physical Constraints on Deep Learning-based Anomaly Detectors in Industrial Control Systems
Figure 3 for Real-time Evasion Attacks with Physical Constraints on Deep Learning-based Anomaly Detectors in Industrial Control Systems
Figure 4 for Real-time Evasion Attacks with Physical Constraints on Deep Learning-based Anomaly Detectors in Industrial Control Systems
Viaarxiv icon

Detection of Unauthorized IoT Devices Using Machine Learning Techniques

Add code
Bookmark button
Alert button
Sep 14, 2017
Yair Meidan, Michael Bohadana, Asaf Shabtai, Martin Ochoa, Nils Ole Tippenhauer, Juan Davis Guarnizo, Yuval Elovici

Figure 1 for Detection of Unauthorized IoT Devices Using Machine Learning Techniques
Figure 2 for Detection of Unauthorized IoT Devices Using Machine Learning Techniques
Figure 3 for Detection of Unauthorized IoT Devices Using Machine Learning Techniques
Figure 4 for Detection of Unauthorized IoT Devices Using Machine Learning Techniques
Viaarxiv icon