What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Ryan M. Gerdes
Google Scholar
32
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
Investigating Physical Latency Attacks Against Camera-Based Perception.
Raymond Muller
Ruoyu Song
Chenyi Wang
Yuxia Zhan
Jean-Philippe Monteuuis
Yanmao Man
Ming Li
Ryan M. Gerdes
Jonathan Petit
Z. Berkay Celik
2025
conf/asiaccs
From Transients to Flips: Hardware-level Bit Manipulation of In-Vehicle Serial Communication.
Abdullah Zubair Mohammed
Ryan M. Gerdes
2025
conf/icics
Domain Adaptation for Cross-Device Profiled ML Side-Channel Attacks.
Ian Y. Garrett
Ryan M. Gerdes
2025
conf/uss
From Threat to Trust: Exploiting Attention Mechanisms for Attacks and Defenses in Cooperative Perception.
Chenyi Wang
Raymond Muller
Ruoyu Song
Jean-Philippe Monteuuis
Jonathan Petit
Yanmao Man
Ryan M. Gerdes
Z. Berkay Celik
Ming Li
2024
conf/uss
VOGUES: Validation of Object Guise using Estimated Components.
Raymond Muller
Yanmao Man
Ming Li
Ryan M. Gerdes
Jonathan Petit
Z. Berkay Celik
2024
conf/eurosp
The IEMI Effect: On the Efficacy of PCB-Level Countermeasures in Adversarial Environments.
Abdullah Zubair Mohammed
Louis Jenkins
Rees R. Hatch
Gökçen Yilmaz Dayanikli
Craig Simpson
Ryan M. Gerdes
Hongjie Wang
2024
conf/acsac
Physical ID-Transfer Attacks against Multi-Object Tracking via Adversarial Trajectory.
Chenyi Wang
Yanmao Man
Raymond Muller
Ming Li
Z. Berkay Celik
Ryan M. Gerdes
Jonathan Petit
2023
conf/uss
That Person Moves Like A Car: Misclassification Attack Detection for Autonomous Systems Using Spatiotemporal Consistency.
Yanmao Man
Raymond Muller
Ming Li
Z. Berkay Celik
Ryan M. Gerdes
2022
conf/ccs
Physical Hijacking Attacks against Object Trackers.
Raymond Muller
Yanmao Man
Z. Berkay Celik
Ming Li
Ryan M. Gerdes
2022
conf/uss
Physical-Layer Attacks Against Pulse Width Modulation-Controlled Actuators.
Gökçen Yilmaz Dayanikli
Sourav Sinha
Devaprakash Muniraj
Ryan M. Gerdes
Mazen Farhood
Mani Mina
2022
conf/sp
Towards Wireless Spiking of Smart Locks.
Abdullah Zubair Mohammed
Alok K. Singh
Gökçen Yilmaz Dayanikli
Ryan M. Gerdes
Mani Mina
Ming Li
2022
conf/asiaccs
Wireless Manipulation of Serial Communication.
Gökçen Yilmaz Dayanikli
Abdullah Zubair Mohammed
Ryan M. Gerdes
Mani Mina
2022
conf/wisec
Passive Drone Localization Using LTE Signals.
Mingshun Sun
Zhiwu Guo
Ming Li
Ryan M. Gerdes
2021
conf/host
Contrastive Graph Convolutional Networks for Hardware Trojan Detection in Third Party IP Cores.
Nikhil Muralidhar
Abdullah Zubair
Nathanael R. Weidler
Ryan M. Gerdes
Naren Ramakrishnan
2020
conf/sp
Electromagnetic Sensor and Actuator Attacks on Power Converters for Electric Vehicles.
Gökçen Yilmaz Dayanikli
Rees R. Hatch
Ryan M. Gerdes
Hongjie Wang
Regan Zane
2020
conf/cns
On the Feasibility of Exploiting Traffic Collision Avoidance System Vulnerabilities.
Paul M. Berges
Basavesh Ammanaghatta Shivakumar
Timothy Graziano
Ryan M. Gerdes
Z. Berkay Celik
2020
conf/wisec
SVM: secure vehicle motion verification with a single wireless receiver.
Mingshun Sun
Yanmao Man
Ming Li
Ryan M. Gerdes
2020
conf/wisec
Spotr: GPS spoofing detection via device fingerprinting.
Mahsa Foruhandeh
Abdullah Zubair Mohammed
Gregor Kildow
Paul Berges
Ryan M. Gerdes
2019
conf/acsac
SIMPLE: single-frame based physical layer identification for intrusion detection and prevention on in-vehicle networks.
Mahsa Foruhandeh
Yanmao Man
Ryan M. Gerdes
Ming Li
Thidapat Chantem
2019
conf/wisec
Crowdsourced measurements for device fingerprinting.
Seth Andrews
Ryan M. Gerdes
Ming Li
2018
conf/ccs
Electromagnetic Induction Attacks Against Embedded Systems.
Jayaprakash Selvaraj
Gökçen Yilmaz Dayanikli
Neelam Prabhu Gaunkar
David Ware
Ryan M. Gerdes
Mani Mina
2018
conf/cns
Truth-aware Optimal Decision-making Framework with Driver Preferences for V2V Communications.
Mingshun Sun
Ming Li
Ryan M. Gerdes
2017
conf/cns
Towards physical layer identification of cognitive radio devices.
Seth Andrews
Ryan M. Gerdes
Ming Li
2017
conf/cns
A data trust framework for VANETs enabling false data detection and secure vehicle tracking.
Mingshun Sun
Ming Li
Ryan M. Gerdes
2017
conf/dsn
Regular: Attacker-Induced Traffic Flow Instability in a Stream of Semi-Automated Vehicles.
Daniel D. Dunn
Samuel A. Mitchell
Imran Sajjad
Ryan M. Gerdes
Rajnikant Sharma
Ming Li
2015
conf/ccs
Message Integrity Protection over Wireless Channel by Countering Signal Cancellation: Theory and Practice.
Yantian Hou
Ming Li
Ruchir Chauhan
Ryan M. Gerdes
Kai Zeng
2015
conf/ccs
Attack Mitigation in Adversarial Platooning Using Detection-Based Sliding Mode Control.
Imran Sajjad
Daniel D. Dunn
Rajnikant Sharma
Ryan M. Gerdes
2015
conf/ccs
Vehicular Platooning in an Adversarial Environment.
Soodeh Dadras
Ryan M. Gerdes
Rajnikant Sharma
2014
conf/ccs
POSTER: Analysis and Comparison of Secure Localization Schemes for Intelligent Transportation Systems.
Bhaswati Deka
Ryan M. Gerdes
Ming Li
Kevin P. Heaslip
2013
conf/acsac
CPS: an efficiency-motivated attack against autonomous vehicular transportation.
Ryan M. Gerdes
Chris Winstead
Kevin P. Heaslip
2012
journals/tifs
Physical-Layer Identification of Wired Ethernet Devices.
Ryan M. Gerdes
Mani Mina
Steve Russell
Thomas E. Daniels
2006
conf/ndss
Device Identification via Analog Signal Fingerprinting: A Matched Filter Approach.
Ryan M. Gerdes
Thomas E. Daniels
Mani Mina
Steve Russell
Coauthors
Abdullah Zubair
(1)
Abdullah Zubair Mohammed
(5)
Alok K. Singh
(1)
Basavesh Ammanaghatta Shivakumar
(1)
Bhaswati Deka
(1)
Chenyi Wang
(3)
Chris Winstead
(1)
Craig Simpson
(1)
Daniel D. Dunn
(2)
David Ware
(1)
Devaprakash Muniraj
(1)
Gökçen Yilmaz Dayanikli
(6)
Gregor Kildow
(1)
Hongjie Wang
(2)
Ian Y. Garrett
(1)
Imran Sajjad
(2)
Jayaprakash Selvaraj
(1)
Jean-Philippe Monteuuis
(2)
Jonathan Petit
(4)
Kai Zeng
(1)
Kevin P. Heaslip
(2)
Louis Jenkins
(1)
Mahsa Foruhandeh
(2)
Mani Mina
(6)
Mazen Farhood
(1)
Ming Li
(17)
Mingshun Sun
(4)
Naren Ramakrishnan
(1)
Nathanael R. Weidler
(1)
Neelam Prabhu Gaunkar
(1)
Nikhil Muralidhar
(1)
Paul Berges
(1)
Paul M. Berges
(1)
Rajnikant Sharma
(3)
Raymond Muller
(6)
Rees R. Hatch
(2)
Regan Zane
(1)
Ruchir Chauhan
(1)
Ruoyu Song
(1)
Ruoyu Song
(1)
Ryan M. Gerdes
(32)
Samuel A. Mitchell
(1)
Seth Andrews
(2)
Soodeh Dadras
(1)
Sourav Sinha
(1)
Steve Russell
(2)
Thidapat Chantem
(1)
Thomas E. Daniels
(2)
Timothy Graziano
(1)
Yanmao Man
(8)
Yantian Hou
(1)
Yuxia Zhan
(1)
Z. Berkay Celik
(7)
Zhiwu Guo
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to