Alert button
Picture for Xenofon Koutsoukos

Xenofon Koutsoukos

Alert button

Detection of Dataset Shifts in Learning-Enabled Cyber-Physical Systems using Variational Autoencoder for Regression

Add code
Bookmark button
Alert button
Apr 14, 2021
Feiyang Cai, Ali I. Ozdagli, Xenofon Koutsoukos

Figure 1 for Detection of Dataset Shifts in Learning-Enabled Cyber-Physical Systems using Variational Autoencoder for Regression
Figure 2 for Detection of Dataset Shifts in Learning-Enabled Cyber-Physical Systems using Variational Autoencoder for Regression
Figure 3 for Detection of Dataset Shifts in Learning-Enabled Cyber-Physical Systems using Variational Autoencoder for Regression
Figure 4 for Detection of Dataset Shifts in Learning-Enabled Cyber-Physical Systems using Variational Autoencoder for Regression
Viaarxiv icon

Byzantine Resilient Distributed Multi-Task Learning

Add code
Bookmark button
Alert button
Oct 25, 2020
Jiani Li, Waseem Abbas, Xenofon Koutsoukos

Figure 1 for Byzantine Resilient Distributed Multi-Task Learning
Figure 2 for Byzantine Resilient Distributed Multi-Task Learning
Figure 3 for Byzantine Resilient Distributed Multi-Task Learning
Figure 4 for Byzantine Resilient Distributed Multi-Task Learning
Viaarxiv icon

Detecting Adversarial Examples in Learning-Enabled Cyber-Physical Systems using Variational Autoencoder for Regression

Add code
Bookmark button
Alert button
Mar 21, 2020
Feiyang Cai, Jiani Li, Xenofon Koutsoukos

Figure 1 for Detecting Adversarial Examples in Learning-Enabled Cyber-Physical Systems using Variational Autoencoder for Regression
Figure 2 for Detecting Adversarial Examples in Learning-Enabled Cyber-Physical Systems using Variational Autoencoder for Regression
Figure 3 for Detecting Adversarial Examples in Learning-Enabled Cyber-Physical Systems using Variational Autoencoder for Regression
Figure 4 for Detecting Adversarial Examples in Learning-Enabled Cyber-Physical Systems using Variational Autoencoder for Regression
Viaarxiv icon

Trusted Confidence Bounds for Learning Enabled Cyber-Physical Systems

Add code
Bookmark button
Alert button
Mar 11, 2020
Dimitrios Boursinos, Xenofon Koutsoukos

Figure 1 for Trusted Confidence Bounds for Learning Enabled Cyber-Physical Systems
Figure 2 for Trusted Confidence Bounds for Learning Enabled Cyber-Physical Systems
Figure 3 for Trusted Confidence Bounds for Learning Enabled Cyber-Physical Systems
Figure 4 for Trusted Confidence Bounds for Learning Enabled Cyber-Physical Systems
Viaarxiv icon

Real-time Out-of-distribution Detection in Learning-Enabled Cyber-Physical Systems

Add code
Bookmark button
Alert button
Jan 28, 2020
Feiyang Cai, Xenofon Koutsoukos

Figure 1 for Real-time Out-of-distribution Detection in Learning-Enabled Cyber-Physical Systems
Figure 2 for Real-time Out-of-distribution Detection in Learning-Enabled Cyber-Physical Systems
Figure 3 for Real-time Out-of-distribution Detection in Learning-Enabled Cyber-Physical Systems
Figure 4 for Real-time Out-of-distribution Detection in Learning-Enabled Cyber-Physical Systems
Viaarxiv icon

Assurance Monitoring of Cyber-Physical Systems with Machine Learning Components

Add code
Bookmark button
Alert button
Jan 14, 2020
Dimitrios Boursinos, Xenofon Koutsoukos

Figure 1 for Assurance Monitoring of Cyber-Physical Systems with Machine Learning Components
Figure 2 for Assurance Monitoring of Cyber-Physical Systems with Machine Learning Components
Figure 3 for Assurance Monitoring of Cyber-Physical Systems with Machine Learning Components
Figure 4 for Assurance Monitoring of Cyber-Physical Systems with Machine Learning Components
Viaarxiv icon

Adversarial Regression for Detecting Attacks in Cyber-Physical Systems

Add code
Bookmark button
Alert button
Apr 30, 2018
Amin Ghafouri, Yevgeniy Vorobeychik, Xenofon Koutsoukos

Figure 1 for Adversarial Regression for Detecting Attacks in Cyber-Physical Systems
Figure 2 for Adversarial Regression for Detecting Attacks in Cyber-Physical Systems
Figure 3 for Adversarial Regression for Detecting Attacks in Cyber-Physical Systems
Figure 4 for Adversarial Regression for Detecting Attacks in Cyber-Physical Systems
Viaarxiv icon

Optimal Detection of Faulty Traffic Sensors Used in Route Planning

Add code
Bookmark button
Alert button
Mar 16, 2017
Amin Ghafouri, Aron Laszka, Abhishek Dubey, Xenofon Koutsoukos

Figure 1 for Optimal Detection of Faulty Traffic Sensors Used in Route Planning
Figure 2 for Optimal Detection of Faulty Traffic Sensors Used in Route Planning
Figure 3 for Optimal Detection of Faulty Traffic Sensors Used in Route Planning
Figure 4 for Optimal Detection of Faulty Traffic Sensors Used in Route Planning
Viaarxiv icon