Search Results for author: Yingyuan Yang

Found 4 papers, 1 papers with code

Exploiting Vulnerabilities of Deep Learning-based Energy Theft Detection in AMI through Adversarial Attacks

no code implementations16 Oct 2020 Jiangnan Li, Yingyuan Yang, Jinyuan Stella Sun

In this work, we study the vulnerabilities of DL-based energy theft detection through adversarial attacks, including single-step attacks and iterative attacks.

ConAML: Constrained Adversarial Machine Learning for Cyber-Physical Systems

no code implementations12 Mar 2020 Jiangnan Li, Yingyuan Yang, Jinyuan Stella Sun, Kevin Tomsovic, Hairong Qi

We study the potential vulnerabilities of ML applied in CPSs by proposing Constrained Adversarial Machine Learning (ConAML), which generates adversarial examples that satisfy the intrinsic constraints of the physical systems.

BIG-bench Machine Learning

Cannot find the paper you are looking for? You can Submit a new open access paper.