Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
optimisation
biblio
Trust-Region Minimization Algorithm for Training Responses (TRMinATR): The Rise of Machine Learning Techniques
Submitted by grigby1 on Mon, 10/05/2020 - 2:11pm
Scalability
Neural networks
Newton method
nonconvex functions
optimisation
optimization
pubcrawl
Quasi-Newton methods
resilience
Resiliency
memory storage
security
Signal processing algorithms
storage management
Training
training responses
TRMinATR
Trust-region methods
trust-region minimization algorithm
Hessian matrices
computational complexity
computer architecture
computer theory
deep learning
Europe
gradient descent methods
gradient methods
Hessian approximations
approximation theory
Hessian matrix inversion
Human Factors
learning (artificial intelligence)
limited memory BFGS quasiNewton method
Limited-memory BFGS
Line-search methods
machine learning
matrix inversion
biblio
Evaluating Resilience of Grid Load Predictions under Stealthy Adversarial Attacks
Submitted by aekwall on Mon, 10/05/2020 - 11:47am
iterative attack method
adversarial perturbation
DeepForge
distributed sensor fusion
distributed smart meters
domain-specific deep-learning
Dynamic Pricing
grid maintenance
GridLAB-D
inference predictors
power distribution planning
load forecasting
load forecasting systems
model-based design
power distribution network
resilience evaluation
smart grid load prediction systems
synthetic norm-bounded modifications
testbed
CPS resilience
smart power grids
Data Security
cyber-physical systems
learning (artificial intelligence)
machine learning
Resiliency
pubcrawl
Iterative methods
optimization problem
optimisation
security of data
cyber physical systems
adversarial attacks
power engineering computing
power distribution control
sensor fusion
information processing
power systems
smart meters
distributed sensors
biblio
Detecting Centralized Architecture-Based Botnets using Travelling Salesperson Non-Deterministic Polynomial-Hard problem-TSP-NP Technique
Submitted by grigby1 on Fri, 09/11/2020 - 12:08pm
Botnet detection
botnet
TSP-NP hard problem
travelling salesperson nondeterministic polynomial-hard problem-TSP-NP technique
travelling salesman problems
traveling salesperson person
NP-hard problem
nondeterministic polynomial-time hardness
deterministic
Detecting
centralized botnet architecture
centralized architecture-based botnets
Centralized
botnet developers
botnet detection accuracy
pubcrawl
botmaster
attack techniques
combinatorial optimization
Compositionality
optimisation
Metrics
DDoS Attacks
botnets
invasive software
Computer crime
architecture
internet
computer network security
Resiliency
biblio
Optimization Strategy of Flow Table Storage Based on “Betweenness Centrality”
Submitted by aekwall on Tue, 09/08/2020 - 10:15am
policy governance
virtualisation
telecommunication switching
telecommunication network topology
telecommunication control
Switches
software defined networking
Software Defined Network
SDN switch
SDN Flow table optimization
Roads
Resiliency
pubcrawl
Protocols
betweenness centrality
optimization
optimisation
network virtualization
network technology
network architecture
Metrics
Human behavior
flow table storage
Flow Table Optimization
Cloud Computing
clean slate
Big Data
biblio
An Image Encryption Schema Based on Hybrid Optimized Chaotic System
Submitted by aekwall on Tue, 09/08/2020 - 10:12am
image encryption
probability density
optimized henon mapping
optimized henon
new 2d-logistic chaotic System
Lyapunov exponents
image encryption schema
image cryptosystem
hybrid optimized chaotic system
henon chaotic system
compounded chaotic system
chaotic image encryption algorithm
2D logistic chaotic system
Henon mapping
chaotic cryptography
Cryptography
Histograms
chaotic communication
chaos
Predictive Metrics
Security analysis
Image coding
Correlation
optimisation
Logistics
composability
pubcrawl
Resiliency
encryption
biblio
Distributed Black-Box optimization via Error Correcting Codes
Submitted by grigby1 on Fri, 09/04/2020 - 4:11pm
convergence
Black Box Security
structured search directions
structured exploration methods
stragglers
Optimization methods
objective function
Linear programming
evolution strategies
error correcting codes
distributed black-box optimization
derivative-free optimization framework
deep convolutional neural networks
decoding step
telecommunication security
black-box adversarial attacks
Perturbation methods
Iterative methods
error correction codes
neural nets
encoding
Decoding
resilience
Resiliency
Metrics
composability
pubcrawl
optimisation
biblio
A Black-Box Approach to Generate Adversarial Examples Against Deep Neural Networks for High Dimensional Input
Submitted by grigby1 on Fri, 09/04/2020 - 4:11pm
linear regression model
black-box setting
CNNs
data science
extensive recent works
generate adversarial examples
generating adversarial samples
high dimensional
image classification
learning models
linear fine-grained search
black-box approach
minimizing noncontinuous function
model parameters
noncontinuous step function problem
numerous advanced image classifiers
queries
white-box setting
Zeroth order
zeroth order optimization algorithm
zeroth-order optimization method
Black Box Security
Cyberspace
query processing
Conferences
optimisation
pubcrawl
composability
Metrics
Resiliency
resilience
learning (artificial intelligence)
neural nets
security of data
machine-to-machine communications
regression analysis
Iterative methods
deep neural networks
face recognition
adversarial perturbations
gradient methods
adversarial examples
approximation theory
biblio
On the Design of Black-Box Adversarial Examples by Leveraging Gradient-Free Optimization and Operator Splitting Method
Submitted by grigby1 on Fri, 09/04/2020 - 4:10pm
distortion metrics
advanced AI platforms
alternating direction method of multipliers
Bayesian optimization
black-box adversarial attack generation methods
black-box adversarial examples
black-box attacks
BO-ADMM
competitive attack success rates
Convex functions
ADMM solution framework
gradient-free optimization
gradient-free regime
operator splitting method
query complexities
Robust machine learning
zeroth-order optimization
ZO-ADMM
Black Box Security
Complexity theory
optimisation
pubcrawl
composability
Metrics
Resiliency
resilience
learning (artificial intelligence)
optimization
security of data
distortion
Perturbation methods
image classification
Bayes methods
image retrieval
black-box adversarial attacks
Measurement
estimation
biblio
Black Box Explanation Guided Decision-Based Adversarial Attacks
Submitted by grigby1 on Fri, 09/04/2020 - 4:10pm
Training data
Black Box Security
targeted deep neural networks
performing decision-based black-box attacks
imperceptive adversarial perturbation
imperceptible adversarial example
derivative-free and constraint optimization problem
decision-based black-box adversarial attack
decision-based adversarial attacks
Constraint optimization
boundary attack
black box explanation guided decision-based adversarial attacks
black box explanation
attack efficiency
artificial intelligence security
Logistics
Cryptography
Perturbation methods
neural nets
Neural networks
learning (artificial intelligence)
resilience
Resiliency
Metrics
composability
pubcrawl
search problems
Artificial Intelligence
optimisation
telecommunication security
Cats
Computational modeling
biblio
Optimized Activation Function on Deep Belief Network for Attack Detection in IoT
Submitted by aekwall on Mon, 08/24/2020 - 1:37pm
optimisation
Proposed Feature Extraction
operational security
Lion Algorithm
higher-order statistical features
feature extraction process
feature classification process
DP management
attack detection system
activation function optimization
Deep Belief Network
belief networks
Attack detection
classification
statistical analysis
IoT
Training
pattern classification
Neurons
optimization
composability
pubcrawl
Resiliency
feature extraction
Classification algorithms
security
Internet of Things
Conferences
security of data
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »