Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
gradient methods
biblio
Attribution Based Approach for Adversarial Example Generation
Submitted by aekwall on Thu, 05/13/2021 - 11:50am
attribution
Metrics
composability
Classification algorithms
deep architecture
gradient methods
Human behavior
Iterative algorithms
Neural networks
Perturbation methods
pubcrawl
Systematics
biblio
A Game-Theoretic Analysis of Cyber Attack-Mitigation in Centralized Feeder Automation System
Submitted by aekwall on Mon, 03/29/2021 - 11:48am
FA
game theoretic security
gradient methods
distribution network
attack resources
bayesian attack graph
centralized FA system
centralized feeder automation system
cyber attack-mitigation
distribution networks
Predictive Metrics
fault-tolerant location
fault-tolerant location technique
game-theoretic analysis
generalized reduced gradient algorithm
intelligent electronic devices
PSO.
security resources
three-stage game-theoretic framework
two-level zero-sum game model
Economics
Scalability
game theory
Bayes methods
Resiliency
pubcrawl
simulation
particle swarm optimisation
particle swarm optimization
cyber-attacks
security of data
automation
probability
power engineering computing
power system security
fault tolerance
Games
cyber security
Human Factors
Fault tolerant systems
biblio
Fooling A Deep-Learning Based Gait Behavioral Biometric System
Submitted by grigby1 on Thu, 03/04/2021 - 2:34pm
Metrics
FGSM
FGSM iterations
gait behavioral biometrics
gradient methods
LSTM
machine learning algorithms
machine learning model
mature techniques
fast gradient sign method
privacy
pubcrawl
resilience
Resiliency
shadow model
Training
user behavioral information
white-box attacks
black-box attack
white box
security
adversarial learning attacks
Adversarial Machine Learning
authentication
authorisation
Biological system modeling
biometrics (access control)
White Box Security
Classification algorithms
composability
counter spoofing threats
deep learning (artificial intelligence)
Deep-learning
deep-learning based gait behavioral biometric system
end-user devices
extent FGSM
biblio
Link Prediction Adversarial Attack Via Iterative Gradient Attack
Submitted by aekwall on Mon, 01/25/2021 - 1:01pm
gradient information
attack graphs
adversarial attack
adversarial graph
deep models
defense
GAE
gradient attack (GA)
gradient attack strategy
gradient methods
graph autoencode
graph evolved tasks
iterative gradient attack
Link prediction
link prediction adversarial attack problem
node classification
real-world graphs
trained graph autoencoder model
Robustness
data privacy
Task Analysis
learning (artificial intelligence)
Resiliency
pubcrawl
composability
graph theory
privacy
security of data
neural nets
Prediction algorithms
security problem
Predictive models
Predictive Metrics
deep neural networks
Perturbation methods
biblio
Mathematical Model For Information Security System Effectiveness Evaluation Against Advanced Persistent Threat Attacks
Submitted by grigby1 on Fri, 01/22/2021 - 1:38pm
objective function
security investment maximization
mathematical programming
information security systems effectiveness
information security system effectiveness evaluation
information security controls optimization
generalized reduced gradient method
generalized efficiency criterion
formulated efficiency criterion
effectiveness evaluation
attack minimization
APT attacks
Investment
information security system
security of data
Mathematical model
advanced persistent threat attacks
APT attack
gradient methods
APT
advanced persistent threat
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
On the Effective Capacity of an Underwater Acoustic Channel under Impersonation Attack
Submitted by grigby1 on Wed, 01/20/2021 - 4:08pm
telecommunication computing
Markov processes
neural nets
probability
pubcrawl
Quality-of-Service
resilience
Resiliency
state-transition probabilities
markov chain
telecommunication security
threshold-based decoding error model
underwater acoustic
underwater acoustic channel
underwater acoustic communication
UWA channel
wireless channels
gradient methods
artificial neural network
Artificial Neural Networks
authentication
authentication constraints
channel coding
composability
effective capacity
feature-based authentication
Acoustic Fingerprints
gradient-descent technique
GTJ method
Human behavior
impersonation attack
Kuiper belt
malicious data
malicious node
biblio
Adversarial Perturbations Fool Deepfake Detectors
Submitted by grigby1 on Fri, 01/15/2021 - 12:02pm
adversarial perturbations
Lipschitz regularization
image restoration
generative convolutional neural networks
fast gradient sign method
Deepfakes
deepfake image enhancement
deepfake detectors
Deep Image Prior
faces
DeepFake
image enhancement
generative adversarial networks
Detectors
feature extraction
Training
gradient methods
resilience
Electronics packaging
Perturbation methods
Scalability
Resiliency
Metrics
Human Factors
Human behavior
pubcrawl
Neural networks
convolutional neural nets
Unsupervised Learning
biblio
Secure Federated Averaging Algorithm with Differential Privacy
Submitted by aekwall on Mon, 01/11/2021 - 1:42pm
convergence analysis
gradient methods
distributed machine learning
Gaussian noise
federated learning
message exchange
stochastic gradient descent
algorithm communication efficiency
client sensitive information
Stochastic processes
differential attacks
federating averaging algorithm
local model parameters
message obfuscation
Model averaging
secure FedAvg algorithm
secure federated averaging algorithm
composability
Scalability
Servers
data privacy
Data models
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
security of data
privacy
convergence
convergence rate
Prediction algorithms
Analytical models
client-server systems
differential privacy
biblio
The Value of Collaboration in Convex Machine Learning with Differential Privacy
Submitted by aekwall on Mon, 01/11/2021 - 1:41pm
financial datasets
financial data processing
privacy budget
multiple data owners
convex machine learning
credit card fraud detection
differentially-private gradient queries
differentially-private gradients
distributed datasets
distributed private data
fraud
fitness cost
loan interest rates
nonoverlapping training datasets
privacy-aware data owners
privacy-aware learning algorithms
Regression
Stochastic gradient algorithm.
stochastic gradient descent
privacy
data privacy
Data models
Support vector machines
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
composability
Scalability
Computational modeling
Prediction algorithms
Training
machine learning
regression analysis
collaboration
differential privacy
gradient methods
biblio
An Improved Collaborative Filtering Recommendation Algorithm Based on Differential Privacy
Submitted by aekwall on Mon, 01/11/2021 - 1:40pm
gradient methods
ε-differential privacy
stochastic gradient descent algorithm
recommendation systems
recommendation accuracy loss
potential characteristic matrix
noise matrix factorization model
Netflix
MovieLens
differential privacy matrix factorization model
differential privacy constraint
collaborative filtering recommendation model
centralized recommendation
matrix factorization
Matrix decomposition
differential privacy protection
Scalability
Perturbation methods
recommender systems
privacy protection
differential privacy
Predictive models
software engineering
Stochastic processes
Prediction algorithms
privacy
collaborative filtering
composability
pubcrawl
Human behavior
Resiliency
data privacy
1
2
3
4
next ›
last »