Sunandan Adhikary
Indian Institute of Technology Kharagpur
H-index: 2
Asia-India
Top articles of Sunandan Adhikary
Adaptive CUSUM-Based Residue Analysis for Stealthy Attack Detection in Cyber-Physical Systems
2023/5/9
Sunandan Adhikary
H-Index: 0
Soumyajit Dey
H-Index: 5
Optimizing RSU Placements for Securing Vehicle Platoon Against False Data Injection Attacks
2023/5/9
Sunandan Adhikary
H-Index: 0
Soumyajit Dey
H-Index: 5
Design and Deployment of Resilient Control Execution Patterns: A Prediction, Mitigation Approach
2023/5/9
Sunandan Adhikary
H-Index: 0
Soumyajit Dey
H-Index: 5
Resource Aware Synthesis of Automotive Security Primitives
2023/3/27
Soumyajit Dey
H-Index: 5
Sunandan Adhikary
H-Index: 0
A Learning Assisted Method for Uncovering Power Grid Generation and Distribution System Vulnerabilities
arXiv preprint arXiv:2306.09057
2023/6/15
Concealing CAN Message Sequences to Prevent Schedule-based Bus-off Attacks
arXiv preprint arXiv:2306.09206
2023/6/15
Work-in-Progress: Securing Safety-Critical Control Tasks with Attack-aware Multi-Rate Scheduling
2023/5/9
Work-in-Progress: Control Skipping Sequence Synthesis to Counter Schedule-based Attacks
2022/12/5
Sunandan Adhikary
H-Index: 0
Soumyajit Dey
H-Index: 5
A Framework for Evaluating Connected Vehicle Security against False Data Injection Attacks
2022/8/31
Sunandan Adhikary
H-Index: 0
Soumyajit Dey
H-Index: 5
Exploring The Resilience of Control Execution Skips against False Data Injection Attacks
arXiv preprint arXiv:2207.08005
2022/7/16
Sunandan Adhikary
H-Index: 0
Soumyajit Dey
H-Index: 5
A CAD Framework for Simulation of Network Level Attack on Platoons
arXiv preprint arXiv:2205.00769
2022/5/2
Sunandan Adhikary
H-Index: 0
Soumyajit Dey
H-Index: 5
Catch me if you learn: real-time attack detection and mitigation in learning enabled CPS
2021/12/7
Sunandan Adhikary
H-Index: 0
Soumyajit Dey
H-Index: 5
An RL-based adaptive detection strategy to secure cyber-physical systems
arXiv preprint arXiv:2103.02872
2021/3/4
Sunandan Adhikary
H-Index: 0
Soumyajit Dey
H-Index: 5
Skip to secure: Securing cyber-physical control loops with intentionally skipped executions
2020/11/9
Sunandan Adhikary
H-Index: 0
Saurav Kumar Ghosh
H-Index: 2
Sumana Ghosh
H-Index: 5
Soumyajit Dey
H-Index: 5
Debdeep Mukhopadhyay
H-Index: 31
SMT-based verification of safety-critical embedded control software
IEEE Embedded Systems Letters
2020/11/3