Search Results for author: Jinyuan Stella Sun

Found 7 papers, 1 papers with code

Effects of Real-Life Traffic Sign Alteration on YOLOv7- an Object Recognition Model

no code implementations9 May 2023 Farhin Farhad Riya, Shahinul Hoque, Md Saif Hassan Onim, Edward Michaud, Edmon Begoli, Jinyuan Stella Sun

The widespread adoption of Image Processing has propelled Object Recognition (OR) models into essential roles across various applications, demonstrating the power of AI and enabling crucial services.

Object object-detection +3

Graph Neural Network Framework for Security Assessment Informed by Topological Measures

no code implementations30 Jan 2023 Mojtaba Dezvarei, Kevin Tomsovic, Jinyuan Stella Sun, Seddik M. Djouadi

Electrical variables as input variables of the model are mainly considered to indicate the power system operation as secure or insecure, according to the reliability criteria for contingency scenarios.

Exploiting Vulnerabilities of Deep Learning-based Energy Theft Detection in AMI through Adversarial Attacks

no code implementations16 Oct 2020 Jiangnan Li, Yingyuan Yang, Jinyuan Stella Sun

In this work, we study the vulnerabilities of DL-based energy theft detection through adversarial attacks, including single-step attacks and iterative attacks.

ConAML: Constrained Adversarial Machine Learning for Cyber-Physical Systems

no code implementations12 Mar 2020 Jiangnan Li, Yingyuan Yang, Jinyuan Stella Sun, Kevin Tomsovic, Hairong Qi

We study the potential vulnerabilities of ML applied in CPSs by proposing Constrained Adversarial Machine Learning (ConAML), which generates adversarial examples that satisfy the intrinsic constraints of the physical systems.

BIG-bench Machine Learning

Cannot find the paper you are looking for? You can Submit a new open access paper.