Abstract: This article studies the issues of data-driven attack detection and identification for cyber-physical systems under sparse sensor attacks. First, based on the available input and output ...
Abstract: Currently, Human Activity Recognition (HAR) applications need a large volume of data to be able to generalize to new users and environments. However, the availability of labeled data is ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results