Sign in

Constraining Attackers and Enabling Operators via Actuation Limits.

Sahand Hadizadeh KafashNavid HashemiCarlos MurguiaJustin Ruths
Published in: CDC (2018)
Keyphrases
  • malicious attacks
  • morphological operators
  • data structure
  • degrees of freedom
  • database
  • real world
  • machine learning
  • genetic algorithm
  • artificial intelligence
  • image processing
  • website