Search Results for author: Saman Zonouz

Found 9 papers, 1 papers with code

Why Don't You Clean Your Glasses? Perception Attacks with Dynamic Optical Perturbations

no code implementations24 Jul 2023 Yi Han, Matthew Chan, Eric Wengrowski, Zhuohuan Li, Nils Ole Tippenhauer, Mani Srivastava, Saman Zonouz, Luis Garcia

We demonstrate that the dynamic nature of EvilEye enables attackers to adapt adversarial examples across a variety of objects with a significantly higher ASR compared to state-of-the-art physical world attack frameworks.

CSTAR: Towards Compact and STructured Deep Neural Networks with Adversarial Robustness

no code implementations4 Dec 2022 Huy Phan, Miao Yin, Yang Sui, Bo Yuan, Saman Zonouz

Considering the co-importance of model compactness and robustness in practical applications, several prior works have explored to improve the adversarial robustness of the sparse neural networks.

Adversarial Robustness Model Compression

Robot Motion Planning as Video Prediction: A Spatio-Temporal Neural Network-based Motion Planner

no code implementations24 Aug 2022 Xiao Zang, Miao Yin, Lingyi Huang, Jingjin Yu, Saman Zonouz, Bo Yuan

Despite the current development in this direction, the efficient capture and processing of important sequential and spatial information, in a direct and simultaneous way, is still relatively under-explored.

Motion Planning Video Prediction

CHIP: CHannel Independence-based Pruning for Compact Neural Networks

1 code implementation NeurIPS 2021 Yang Sui, Miao Yin, Yi Xie, Huy Phan, Saman Zonouz, Bo Yuan

Filter pruning has been widely used for neural network compression because of its enabled practical acceleration.

Neural Network Compression

Multi-Source Data Fusion for Cyberattack Detection in Power Systems

no code implementations18 Jan 2021 Abhijeet Sahu, Zeyu Mao, Patrick Wlazlo, Hao Huang, Katherine Davis, Ana Goulart, Saman Zonouz

We perform multi-source data fusion for training IDS in a cyber-physical power system testbed where we collect cyber and physical side data from multiple sensors emulating real-world data sources that would be found in a utility and synthesizes these into features for algorithms to detect intrusions.

Imputation Intrusion Detection

On-board Deep-learning-based Unmanned Aerial Vehicle Fault Cause Detection and Identification

no code implementations3 Apr 2020 Vidyasagar Sadhu, Saman Zonouz, Dario Pompili

With the increase in use of Unmanned Aerial Vehicles (UAVs)/drones, it is important to detect and identify causes of failure in real time for proper recovery from a potential crash-like scenario or post incident forensics analysis.

HCFContext: Smartphone Context Inference via Sequential History-based Collaborative Filtering

no code implementations21 Apr 2019 Vidyasagar Sadhu, Saman Zonouz, Vincent Sritapan, Dario Pompili

Furthermore, since privacy is a concern in collaborative filtering, a privacy-preserving method is proposed to derive HCFContext model parameters based on the concepts of homomorphic encryption.

Collaborative Filtering Privacy Preserving

Cannot find the paper you are looking for? You can Submit a new open access paper.