Needle in a Haystack: Detecting Subtle Malicious Edits to Additive Manufacturing G-code Files
Authors: Caleb Beckwith, Harsh Sankar Naicker, Svara Mehta, Viba R. Udupa, Nghia Tri Nim, Varun Gadre, Hammond Pearce, Gary Mac, Nikhil Gupta | Published: 2021-11-24
Dataset evaluation
Data Integrity Constraints
Machine Learning Application