Abstract: We propose a general attack framework based on evolutionary algorithms to quickly and efficiently generate low-perturbation adversarial samples for 3D point cloud data. Specifically, we ...
Abstract: Intercepting a saturation attack from a loitering munition (LM) swarm with a swarm of autonomous aerial vehicles (AAVs) is a complex challenge. In this study, we developed a specific ...
This repository contains local lab programs for the 5th Semester Computer Networks course. The programs cover network simulations using NS-2 (TCL) and network protocols/algorithms implemented in Java.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results