Search

Your search keyword '"Mao, Z. Morley"' showing total 320 results

Search Constraints

Start Over You searched for: Author "Mao, Z. Morley" Remove constraint Author: "Mao, Z. Morley"
320 results on '"Mao, Z. Morley"'

Search Results

1. FATH: Authentication-based Test-time Defense against Indirect Prompt Injection Attacks

2. Cocoon: Robust Multi-Modal Perception with Uncertainty-Aware Sensor Fusion

3. Compute Or Load KV Cache? Why Not Both?

4. Safeguard is a Double-edged Sword: Denial-of-service Attack on Large Language Models

5. Eagle: Efficient Training-Free Router for Multi-LLM Inference

6. AutoSpec: Automated Generation of Neural Network Specifications

7. Adaptive Skeleton Graph Decoding

8. Learn To be Efficient: Build Structured Sparsity in Large Language Models

9. ADoPT: LiDAR Spoofing Attack Detection Based on Point-Level Temporal Consistency

10. QUIC is not Quick Enough over Fast Internet

11. VPA: Fully Test-Time Visual Prompt Adaptation

12. On Data Fabrication in Collaborative Vehicular Perception: Attacks and Countermeasures

13. CALICO: Self-Supervised Camera-LiDAR Contrastive Pre-training for BEV Perception

14. Partial-Information, Longitudinal Cyber Attacks on LiDAR in Autonomous Vehicles

15. You Can't See Me: Physical Removal Attacks on LiDAR-based Autonomous Vehicles Driving Frameworks

16. PointDP: Diffusion-driven Purification against Adversarial Attacks on 3D Point Cloud Recognition

17. A Cooperative Perception Environment for Traffic Operations and Control

18. Benchmarking Robustness of 3D Point Cloud Recognition Against Common Corruptions

19. On Adversarial Robustness of Trajectory Prediction for Autonomous Vehicles

20. Certified Adversarial Defenses Meet Out-of-Distribution Corruptions: Benchmarking Robustness and Simple Baselines

21. Adversarial Unlearning of Backdoors via Implicit Hypergradient

22. Sensor Adversarial Traits: Analyzing Robustness of 3D Object Detection Sensor Fusion Models

23. Security Analysis of Camera-LiDAR Fusion Against Black-Box Attacks on Autonomous Vehicles

24. Rethinking the Backdoor Attacks' Triggers: A Frequency Perspective

25. On Adversarial Robustness of 3D Point Cloud Classification under Adaptive Attacks

26. Impact Evaluation of Falsified Data Attacks on Connected Vehicle Based Traffic Signal Control

27. Towards Robust LiDAR-based Perception in Autonomous Driving: General Black-box Adversarial Sensor Attack and Countermeasures

28. Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving

29. A Spectral View of Randomized Smoothing Under Common Corruptions: Benchmarking and Improving Certified Robustness

30. Towards Secure and Safe Appified Automated Vehicles

32. OASIS

33. Leveraging Context-Triggered Measurements to Characterize LTE Handover Performance

36. The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities

37. Performance Analysis of Location Profile Routing

38. Aggregate Characterization of User Behavior in Twitter and Analysis of the Retweet Graph

41. Android UI Deception Revisited: Attacks and Defenses

44. RadioProphet: Intelligent Radio Resource Deallocation for Cellular Networks

45. Mobile Network Performance from User Devices: A Longitudinal, Multidimensional Analysis

46. Diagnosing Path Inflation of Mobile Client Traffic

49. How to Reduce Smartphone Traffic Volume by 30%?

50. Designing Scalable and Effective Decision Support for Mitigating Attacks in Large Enterprise Networks

Catalog

Books, media, physical & digital resources