1 code implementation • 28 Apr 2023 • Zhiyuan Cheng, Hongjun Choi, James Liang, Shiwei Feng, Guanhong Tao, Dongfang Liu, Michael Zuzak, Xiangyu Zhang
We argue that the weakest link of fusion models depends on their most vulnerable modality, and propose an attack framework that targets advanced camera-LiDAR fusion-based 3D object detection models through camera-only adversarial attacks.
no code implementations • 12 Apr 2023 • Hongye Xu, Dongfang Liu, Cory Merkel, Michael Zuzak
If an incorrect secret key is used, a set of deterministic errors is produced in locked modules, restricting unauthorized use.
no code implementations • 7 Jan 2021 • Yuntao Liu, Michael Zuzak, Yang Xie, Abhishek Chakraborty, Ankur Srivastava
(3) Our experiments show that SAS and RSAS exhibit better SAT resilience than SFLL and have similar effectiveness.
Cryptography and Security Hardware Architecture Formal Languages and Automata Theory