Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
adversarial attacks
biblio
Adversarial Examples Against Image-based Malware Classification Systems
Submitted by grigby1 on Thu, 10/29/2020 - 10:13am
learning (artificial intelligence)
visualization
Robustness
Resiliency
resilience
pubcrawl
privacy
Perturbation methods
Metrics
malware files
malware classification
malware
mal-ware classification techniques
machine learning
adversarial attack
invasive software
image-based malware classification systems
image classification
Human behavior
DL-based classification systems
data visualisation
convolutional neural networks
convolutional neural network malware classifiers
convolutional neural nets
convolution neural network
computer vision
adversarial attacks
biblio
Robustness Analysis of CNN-based Malware Family Classification Methods Against Various Adversarial Attacks
Submitted by grigby1 on Thu, 10/29/2020 - 10:12am
image-based classification methods
security
Robustness
Resiliency
resilience
pubcrawl
privacy
Microsoft malware dataset
Metrics
malware family classification
malware classification
malware
invasive software
input image
imperceptible nonrandom perturbations
adversarial attacks
image colour analysis
Image color analysis
image classification
Human behavior
feature extraction
convolutional neural networks
convolutional neural network-based malware family classification methods
convolutional neural nets
Conferences
CNN-based malware family classification method
CNN-based classification methods
Analytical models
adversarial example
biblio
Evaluating Resilience of Grid Load Predictions under Stealthy Adversarial Attacks
Submitted by aekwall on Mon, 10/05/2020 - 10:47am
iterative attack method
adversarial perturbation
DeepForge
distributed sensor fusion
distributed smart meters
domain-specific deep-learning
Dynamic Pricing
grid maintenance
GridLAB-D
inference predictors
power distribution planning
load forecasting
load forecasting systems
model-based design
power distribution network
resilience evaluation
smart grid load prediction systems
synthetic norm-bounded modifications
testbed
CPS resilience
smart power grids
Data Security
cyber-physical systems
learning (artificial intelligence)
machine learning
Resiliency
pubcrawl
Iterative methods
optimization problem
optimisation
security of data
cyber physical systems
adversarial attacks
power engineering computing
power distribution control
sensor fusion
information processing
power systems
smart meters
distributed sensors
biblio
Semi-black-box Attacks Against Speech Recognition Systems Using Adversarial Samples
Submitted by grigby1 on Fri, 09/04/2020 - 3:10pm
automatic speech recognition systems
Black Box Security
targeted ASR systems
semiblack-box attack
semi-black-box attacks
security vulnerabilities
Kaldi
high attack success rate
gradient-independent genetic algorithm
gradient descent algorithm
adversary-expected transcript texts
adversarial samples
adversarial attacks
white-box attacks
Speech recognition
gradient methods
security of data
Deep Neural Network
Perturbation methods
deep neural networks
Statistics
Sociology
genetic algorithms
neural nets
resilience
Resiliency
Metrics
composability
pubcrawl
Hidden Markov models
Computational modeling
biblio
Symbolic Execution for Attribution and Attack Synthesis in Neural Networks
Submitted by grigby1 on Fri, 08/28/2020 - 11:22am
DNN validation
Symbolic Execution
pubcrawl
program analysis
neural nets
Metrics
Importance Analysis
Image resolution
image classification
Human behavior
adversarial attacks
DNN
DeepCheck lightweight symbolic analysis
deep neural networks
core ideas
composability
attribution
attack synthesis
adversarial generation
biblio
Node Copying for Protection Against Graph Neural Network Topology Attacks
Submitted by aekwall on Mon, 08/17/2020 - 10:18am
Topology
similarity structure
semi-supervised learning
prediction capability
node copying
graph topology
graph neural network topology attacks
graph convolutional networks
graph based machine
downstream learning task
detection problem
deep learning models
corruption
attack graphs
graph connectivity
Predictive Metrics
security of data
adversarial attacks
network topology
network theory (graphs)
Training
Prediction algorithms
Neural networks
neural nets
Computational modeling
graph theory
composability
pubcrawl
Resiliency
learning (artificial intelligence)
Task Analysis
biblio
Feature Denoising for Improving Adversarial Robustness
Submitted by grigby1 on Fri, 04/17/2020 - 9:58am
image classification systems
White Box Security
security of data
retrieval
Resiliency
resilience
Recognition: Detection
pubcrawl
pattern classification
nonlocal means
network architectures
Metrics
learning (artificial intelligence)
Iterative methods
image denoising
10-iteration PGD white-box attacks
image classification
feature extraction
feature denoising
deep learning
convolutional networks
Compositionality
composability
categorization
black-box attack settings
Adversarial training
Adversarial robustness
adversarial perturbations
adversarial attacks
2000-iteration PGD white-box attacks
biblio
Towards Understanding Limitations of Pixel Discretization Against Adversarial Attacks
Submitted by grigby1 on Tue, 02/18/2020 - 10:52am
neural nets
white-box attacks
white box cryptography
Training
Robustness
Resiliency
resilience
pubcrawl
preprocessing defense methods
preprocessing defense
pixel discretization defense method
pixel discretization
Perturbation methods
Neural networks
adversarial attacks
MNIST
Metrics
Measurement
machine learning
low computational overhead
ImageNet
Image Processing
deep learning
Data models
Cryptography
composability
Artificial Neural Networks
file
Robustifying Machine Learning for Cyber-Physical Systems
Submitted by Soumik Sarkar on Thu, 01/16/2020 - 2:28pm. Contributor:
Soumik Sarkar
Robust machine learning
adversarial attacks
defense
CNN
Deep RL
Posters
1845969
CPS PI Meeting 2020
2020
NSF
U.S. Government
Poster
biblio
Attack and Defense of Dynamic Analysis-Based, Adversarial Neural Malware Detection Models
Submitted by aekwall on Mon, 06/24/2019 - 1:43pm
Human behavior
Training
static analysis-based malware classifiers
Resiliency
pubcrawl
program diagnostics
pattern classification
Neural networks
Metrics
malware detection
malware classification accuracy
Malware Analysis
malware
learning (artificial intelligence)
Jacobian matrices
invasive software
adversarial attacks
Engines
Dynamic Malware Classification
dynamic analysis-based
deep learning-based systems
deep learning classification systems
deep learning
crafting adversarial samples
computer security
classification algorithm
anti-malware engine
anti-malware companies
adversarial neural malware detection models
adversarial learning-based attacks
adversarial learning
« first
‹ previous
1
2
3
4
next ›
last »