no code implementations • 3 Apr 2024 • Yeongjun Jang, Joowon Lee, Junsoo Kim, Hyungbo Shim
Implementing anomaly detection on encrypted control systems has been a challenge because it is hard to detect an anomaly from the encrypted residue signal without the secret key.