Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
adversarial attacks
biblio
When Deep Learning Meets Steganography: Protecting Inference Privacy in the Dark
Submitted by grigby1 on Fri, 02/03/2023 - 4:58pm
deep learning
pubcrawl
Metrics
privacy
data privacy
Cloud Computing
composability
Perturbation methods
edge computing
Image edge detection
Weapons
adversarial attacks
Steganography
steganography detection
inference privacy
biblio
SPA: An Efficient Adversarial Attack on Spiking Neural Networks using Spike Probabilistic
Submitted by aekwall on Tue, 12/20/2022 - 5:21pm
Perturbation methods
white-box
White Box Security
transferability
Spiking Neural Networks
SNNs
security
Resiliency
pubcrawl
Probabilistic logic
adversarial attacks
perturbation
Neural networks
Metrics
Medical diagnosis
Linear programming
Degradation
composability
black-box
biblio
Resiliency of SNN on Black-Box Adversarial Attacks
Submitted by grigby1 on Fri, 11/18/2022 - 5:44pm
neural network resiliency
SpiNNaker
spiking neural network
Neuromorphics
black-box attacks
Deep Neural Network
Robustness
adversarial attacks
Hardware
Software
Conferences
Resiliency
resilience
pubcrawl
Neural networks
machine learning
biblio
Attacking Black-box Recommendations via Copying Cross-domain User Profiles
Submitted by grigby1 on Fri, 07/15/2022 - 12:22pm
deep learning
Neural networks
pubcrawl
Human behavior
resilience
Resiliency
Conferences
Scalability
Data models
adversarial attacks
recommender systems
Reinforcement learning
Data engineering
data poisoning attacks
black-box attacks
cross-domain
biblio
Adversarial Attacks to API Recommender Systems: Time to Wake Up and Smell the Coffee?
Submitted by grigby1 on Fri, 07/15/2022 - 12:19pm
pubcrawl
Human behavior
resilience
Resiliency
Scalability
Task Analysis
Training data
adversarial attacks
Adversarial Machine Learning
recommender systems
software engineering
Open Source Software
codes
API mining
biblio
Adversarial Attacks on Deep Learning Based Power Allocation in a Massive MIMO Network
Submitted by aekwall on Fri, 07/01/2022 - 9:46am
deep learning
Perturbation methods
tools
Wireless communication
pubcrawl
Scalability
Resiliency
Artificial Neural Networks
resource management
wireless security
Neural networks
adversarial attacks
precoding
massive MIMO
power allocation
Chained Attacks
biblio
Resilient Machine Learning for Networked Cyber Physical Systems: A Survey for Machine Learning Security to Securing Machine Learning for CPS
Submitted by grigby1 on Wed, 04/20/2022 - 11:28am
adversarial attacks
Computers
computer security
CPS resilience
cps resiliency
Cybersecurity
machine learning
pubcrawl
resilience
resiliency in cyber physical systems
security
Sensor Systems
wireless sensor networks
biblio
Introducing K-Anonymity Principles to Adversarial Attacks for Privacy Protection in Image Classification Problems
Submitted by grigby1 on Wed, 02/09/2022 - 2:49pm
privacy
Perturbation methods
Metrics
machine learning
k-anonymity
Human behavior
composability
anonymity
adversarial attacks
visualization
Training
signal processing
Robustness
Resiliency
resilience
pubcrawl
biblio
Securing Deep Spiking Neural Networks against Adversarial Attacks through Inherent Structural Parameters
Submitted by aekwall on Mon, 01/31/2022 - 4:13pm
analysis
White Box Security
Threshold voltage
structural engineering
Spiking Neural Networks
SNN
Problem-solving
parameters
Neuromorphic
Firing
security
adversarial attacks
composability
Resiliency
Metrics
pubcrawl
optimization
machine learning
deep learning
Robustness
biblio
Beating White-Box Defenses with Black-Box Attacks
Submitted by aekwall on Mon, 01/31/2022 - 4:12pm
Neural networks
deep learning
Perturbation methods
feature extraction
pubcrawl
Metrics
Resiliency
composability
adversarial attacks
Evolutionary algorithms
White Box Security
1
2
3
4
next ›
last »