Abstract: This article studies the issues of data-driven attack detection and identification for cyber-physical systems under sparse sensor attacks. First, based on the available input and output ...
Abstract: Currently, Human Activity Recognition (HAR) applications need a large volume of data to be able to generalize to new users and environments. However, the availability of labeled data is ...