Zhongyuan Hau
Zhongyuan Hau
Verified email at
Cited by
Cited by
Shadow-Catcher: Looking into shadows to detect ghost objects in autonomous vehicle 3d sensing
Z Hau, S Demetriou, L Munoz-González, EC Lupu
European Symposium on Research in Computer Security, 691-711, 2021
Exploiting correlations to detect false data injections in low-density wireless sensor networks
Z Hau, EC Lupu
Proceedings of the 5th on Cyber-Physical System Security Workshop, 1-12, 2019
Heat transfer from an immersed tube in a bubbling fluidized bed
Z Hau, EWC Lim
Industrial & Engineering Chemistry Research 55 (33), 9040-9053, 2016
Object Removal Attacks on LiDAR-based 3D Object Detectors
Z Hau, KT Co, S Demetriou, EC Lupu
Workshop on Automotive and Autonomous Vehicle Security (AutoSec) 2021, 2021
Temporal Consistency Checks to Detect LiDAR Spoofing Attacks on Autonomous Vehicle Perception
C You, Z Hau, S Demetriou
Proceedings of the 1st Workshop on Security and Privacy for Mobile AI, 13-18, 2021
Evaluating Cascading Impact of Attacks on Resilience of Industrial Control Systems: A Design-Centric Modeling Approach
Z Hau, JH Castellanos, J Zhou
Proceedings of the 6th ACM on Cyber-Physical System Security Workshop, 42-53, 2020
Using 3D Shadows to Detect Object Hiding Attacks on Autonomous Vehicle Perception
Z Hau, S Demetriou, EC Lupu
2022 IEEE Security and Privacy Workshops (SPW), 229-235, 2022
Jacobian Ensembles Improve Robustness Trade-offs to Adversarial Attacks
KT Co, D Martinez-Rego, Z Hau, EC Lupu
arXiv preprint arXiv:2204.08726, 2022
The system can't perform the operation now. Try again later.
Articles 1–8