1. Ahmad Al Khas and Ihsan Cicek. 2019. SHA-512 based wireless authentication scheme for smart battery management systems. In 2019 8th International Conference on Renewable Energy Research and Applications (ICRERA). IEEE, 968--972.
2. Marco Alecci, Mauro Conti, Francesco Marchiori, Luca Martinelli, and Luca Pajola. 2023. Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability. arXiv preprint arXiv:2306.15363 (2023).
3. Giovanni Apruzzese, Hyrum S Anderson, Savino Dambra, David Freeman, Fabio Pierazzi, and Kevin A Roundy. 2022. "Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice. arXiv preprint arXiv:2212.14315 (2022).
4. Evading Botnet Detectors Based on Flows and Random Forest with Adversarial Samples
5. Peter M Attia, Aditya Grover, Norman Jin, Kristen A Severson, Todor M Markov, Yang-Hung Liao, Michael H Chen, Bryan Cheong, Nicholas Perkins, Zi Yang, et al. 2020. Closed-loop optimization of fast-charging protocols for batteries with machine learning. Nature, Vol. 578, 7795 (2020), 397--402.