Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Transforms
biblio
Malware Classification Using Recurrence Plots and Deep Neural Network
Submitted by grigby1 on Tue, 09/21/2021 - 2:56pm
pubcrawl
visualization
Transforms
transfer learning
Task Analysis
static analysis
Resiliency
resilience
Recurrence Plots
convolutional neural networks
programming
privacy
Metrics
malware classification
malware classication
malware
Human behavior
deep learning
biblio
A Conversational Agent for Database Query: A Use Case for Thai People Map and Analytics Platform
Submitted by aekwall on Tue, 09/07/2021 - 10:15am
Artificial Intelligence
chatbot
Complexity theory
conversational agent
conversational agents
data analysis
Data Analytics
Data visualization
Engines
Human behavior
Metrics
Poverty alleviation
pubcrawl
Scalability
Transforms
visual databases
biblio
LSTM-Based False Data Injection Attack Detection in Smart Grids
Submitted by grigby1 on Wed, 06/30/2021 - 2:20pm
Human behavior
Transforms
Smart Grids
Smart Grid
Resiliency
resilience
pubcrawl
Neural networks
LSTM
Human Factors
Classification algorithms
feature extraction
false data injection attack
False Data Detection
energy management systems
Data models
cyber-physical systems
cyber physical systems
composability
biblio
Pythia: Intellectual Property Verification in Zero-Knowledge
Submitted by aekwall on Mon, 06/28/2021 - 11:39am
Logic gates
intellectual property security
zero-knowledge proofs
trustworthy hardware
IP theft
intellectual property verification
Hardware design languages
Transforms
Hardware Security
IP networks
integrated circuits
Indexes
Cryptography
policy-based governance
composability
pubcrawl
Resiliency
biblio
Encryption Inspired Adversarial Defense For Visual Classification
Submitted by grigby1 on Thu, 05/20/2021 - 10:55am
encryption
Training
machine learning
pubcrawl
Metrics
resilience
Resiliency
composability
Perturbation methods
computer vision
Transforms
Adversarial Machine Learning
adversarial defense
perceptual image encryption
white box cryptography
biblio
Short and Squeezed: Accelerating the Computation of Antisparse Representations with Safe Squeezing
Submitted by grigby1 on Wed, 05/05/2021 - 11:41am
policy-based governance
Transforms
speech processing
signal processing
scaled projected gradient
safe squeezing
Safe Coding
Resiliency
resilience
pubcrawl
Acceleration
optimization
numerical simulation
Metrics
Human Factors
Human behavior
Geometry
convex optimization
collaboration
antisparse coding
biblio
Saffire: Context-sensitive Function Specialization against Code Reuse Attacks
Submitted by aekwall on Mon, 05/03/2021 - 12:05pm
Scalability
Runtime
Software
Resiliency
pubcrawl
composability
Libraries
Complexity theory
Human Factors
software reliability
Layout
return oriented programming
rop attacks
Transforms
return into libc
software debloating
biblio
Fixed Point Attack on Lin et al.’s Modified Hash Function Scheme based on SMALLPRESENT-[8] Algorithm
Submitted by aekwall on Mon, 03/29/2021 - 11:07am
Hash functions
SMALLPRESENT-[8] algorithm
SMALLPRESENT-[8]
mac
Lin et al.’s scheme
Lin et al.’s modified scheme
hash function message authentication codes block cipher based scheme
fixed point messages discovery
fixed point attack
Compression function
hash algorithms
Cryptography
scheduling
Transforms
Compositionality
Ciphers
pubcrawl
message authentication
authentication
Resiliency
Classification algorithms
encryption
biblio
Approximate Symbolic Explanation for Neural Network Enabled Water-Filling Power Allocation
Submitted by aekwall on Mon, 03/01/2021 - 4:03pm
fading channels
symbolic mapping
slow iterative search
OFDM sub-channels
NN power allocation solution
neural network enabled water-filling power allocation
Meijer G-function
iterative WF threshold search process
direct high-dimensional mapping
channel gain
approximate symbolic explanation
Search Space
OFDM modulation
Transforms
xai
Scalability
approximation theory
wireless
Artificial Neural Networks
telecommunication computing
neural nets
optimization
Iterative methods
Wireless communication
resource management
deep learning
pubcrawl
Resiliency
machine learning
biblio
Network Intrusion Detection Method Based on GAN Model
Submitted by grigby1 on Tue, 02/23/2021 - 1:45pm
performance indicators
Metrics
multi-classification model
network intrusion detection
network intrusion detection method
neural nets
original classification model
parameter setting
pattern classification
loss function
pubcrawl
resilience
security of data
supervised learning
supervised learning multiclassification model
Training
training method
Transforms
Gallium nitride
Resiliency
Predictive Metrics
Scalability
adversarial idea
binary classification model
composability
Computational modeling
detection accuracy
Generative Adversarial Learning
gan
GAN model
generated adversarial network
generative adversarial networks
label sample set
label samples
learning (artificial intelligence)
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »