Cited By
View all- Malviya VMinn WShar LJiang L(2025)Fuzzing drones for anomaly detectionComputers and Security10.1016/j.cose.2024.104157148:COnline publication date: 1-Jan-2025
- Feng SYe YShi QCheng ZXu XCheng SChoi HZhang XFilkov VRay BZhou M(2024)ROCAS: Root Cause Analysis of Autonomous Driving Accidents via Cyber-Physical Co-mutationProceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering10.1145/3691620.3695530(1620-1632)Online publication date: 27-Oct-2024
- Curran NCho MFeng RLiu LTang BMohajerAnsari PDomeke APesé MShin KFritz MKrauß CHof H(2024)Achieving the Safety and Security of the End-to-End AV PipelineProceedings of the 2024 Cyber Security in CarS Workshop10.1145/3689936.3694694(13-24)Online publication date: 20-Nov-2024
- Show More Cited By


