no code implementations • 11 Mar 2021 • Guangyuan Hu, Zecheng He, Ruby B. Lee
Impostors are attackers who take over a smartphone and gain access to the legitimate user's confidential and private information.
no code implementations • 18 Jun 2018 • Zecheng He, Aswin Raghavan, Guangyuan Hu, Sek Chai, Ruby Lee
Specifically, we first train a temporal deep learning model, using only normal HPC readings from legitimate processes that run daily in these power-grid systems, to model the normal behavior of the power-grid controller.