Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
gradient methods
biblio
Supervised Max Hashing for Similarity Image Retrieval
Submitted by grigby1 on Fri, 06/12/2020 - 12:08pm
resilience
hashing
image retrieval
k-ary base
labeled image datasets
learning (artificial intelligence)
mathematically differentiable approximation
nearest neighbor search
pubcrawl
Quantization (signal)
Hash functions
Resiliency
rich feature vectors
Semantics
similarity image retrieval
storage efficiency
supervised hashing methods
supervised max hashing
Training
feature vector generation
-Learning-to-Hash
-Winner-Take-All-Hash-Family
Approximation algorithms
argmax function
Compositionality
convolutional neural nets
convolutional neural networks
deep neural network architecture
feature extraction
-Convolutional-Neural-Networks
file organisation
gradient descent methods
gradient methods
hand-crafted feature vectors
hash algorithm
hash algorithms
hash code
Hash Function
biblio
Node Identification in Wireless Network Based on Convolutional Neural Network
Submitted by grigby1 on Fri, 05/08/2020 - 3:01pm
wireless network
Neural Network Security
stochastic gradient descent method
softmax model
principal component analysis
node identification
local feature extraction
convolutional neural networks
convolutional neural network
Ad-Hoc Network
gradient methods
wireless networks
computational complexity
Metrics
learning (artificial intelligence)
Ad hoc networks
deep learning
wireless sensor networks
Resiliency
resilience
policy-based governance
pubcrawl
convolutional neural nets
convolution
feature extraction
collaboration
Training
biblio
Comprehensive Privacy Analysis of Deep Learning: Passive and Active White-Box Inference Attacks against Centralized and Federated Learning
Submitted by grigby1 on Tue, 02/18/2020 - 11:52am
Resiliency
Inference-Attacks
learning (artificial intelligence)
Membership-Inference
Metrics
neural nets
privacy
privacy leakage
pubcrawl
resilience
inference mechanisms
stochastic gradient descent algorithm
Stochastic processes
Stochastic-Gradient-Descent
Training
Training data
white box cryptography
White Box Security
white-box membership inference attacks
data privacy
active white-box inference attacks
black-box attacks
centralized learning
CIFAR dataset
composability
comprehensive privacy analysis
Computational modeling
Data models
active membership inference attacks
deep learning
deep learning models
deep neural networks
Deep-learning
federated learning setting
Federated-Learning
gradient methods
Inference algorithms
biblio
Applying Machine Learning to Anomaly-Based Intrusion Detection Systems
Submitted by aekwall on Mon, 01/20/2020 - 11:56am
NSL-KDD dataset
unsupervised anomaly traffic detection techniques
telecommunication traffic
Support vector machines
support vector machine
stochastic gradient decent
sequential model
security of data
Resiliency
regression analysis
random forests
random forest classifier
pubcrawl
anomaly-based Intrusion Detection Systems
NSL-KDD
Malicious Traffic
machine learning techniques
machine learning
logistic regression
intrusive traffics
Intrusion Detection systems (IDSs)
Intrusion Detection Systems
Internet-based traffic
internet
gradient methods
composability
biblio
SECO: A Scalable Accuracy Approximate Exponential Function Via Cross-Layer Optimization
Submitted by aekwall on Mon, 01/20/2020 - 11:49am
pubcrawl
exponential operation
exponentiation
fault tolerant control
gradient methods
intrinsic error resilience
neural nets
Nickel
Observers
optimisation
power consumption
exponential function unit
Resiliency
runtime optimization method
Scalability
scalable accuracy approximate exponential function
SECO
signal processing
signal processing applications
Silicon
spiking neuron models
Taylor expansion
Design Time
approximate computing
approximate EFU designs
approximation theory
arithmetic units
convergence
Cross-Layer Approximation
cross-layer design method
Cross-layer optimization
deep neural networks
design space
adaptive exponential integrate-fire neuron model
Dynamic Accuracy Scaling
Eigenvalues and eigenfunctions
energy-accuracy-optimal approximate multiplier
energy-efficient computing
Error analysis
error analysis method
Error Modeling
error-resilient applications
Exponential Function
biblio
Designing Subspecies of Hardware Trojans and Their Detection Using Neural Network Approach
Submitted by grigby1 on Fri, 03/15/2019 - 11:58am
learning (artificial intelligence)
true positive rate
Trojan horses
trojan horse detection
trigger circuits
TPR
third-party vendors
pubcrawl
outsourcing
neural-network based hardware-Trojan detection method
neural network approach
neural network
neural nets
machine-learning-based hardware-Trojan detection method
machine learning
Logic gates
Artificial Neural Networks
invasive software
integrated circuit design
high-performance hardware device
hardware trojan subspecies designing
hardware trojan
hardware devices mass-production
Hardware
gradient methods
gate-level netlist
feature extraction
electronic engineering computing
electric devices
Design Time
Benchmark testing
biblio
Accelerated Stochastic Gradient Method for Support Vector Machines Classification with Additive Kernel
Submitted by grigby1 on Tue, 05/01/2018 - 11:38am
machine learning
Training
testing
SVM classification
support vector machines classification
Support vector machines (SVMs)
Support vector machines
Stochastic processes
Resiliency
resilience
pubcrawl
polynomials
pattern classification
Nesterov's acceleration strategy
mini-batch stochastic gradient descent
Metrics
accelerated mini-batch stochastic gradient descent algorithm
linear classifier
learning (artificial intelligence)
Kernel
gradient methods
gradient approximation
Data mining
composability
Classification algorithms
Additives
additive kernel version
additive kernel
acceleration strategy
Acceleration
accelerated stochastic gradient method
biblio
A Gradient-Based Pixel-Domain Attack against SVM Detection of Global Image Manipulations
Submitted by grigby1 on Mon, 03/19/2018 - 1:51pm
Nonlinear distortion
image enhancement
image filtering
limited knowledge
LK
median filtering
median filters
Metrics
noise figure 50 dB to 70 dB
Histograms
PSNR
pubcrawl
resilience
Resiliency
Scalability
Support vector machines
SVM detection
adaptive filtering
histogram stretching
high-dimensional SPAM features
gradient-based pixel-domain attack
gradient methods
gradient estimation
gradient descent methodology
global image manipulations
Forensics
forensic techniques
feature extraction
estimation theory
equalisers
Detectors
computational complexity
adaptive histogram equalization
biblio
A First Estimation of the Proportion of Cybercriminal Entities in the Bitcoin Ecosystem Using Supervised Machine Learning
Submitted by grigby1 on Mon, 03/05/2018 - 1:14pm
Public key
learning (artificial intelligence)
machine learning
malware
Metrics
pattern classification
Peer-to-peer computing
peer-to-peer payment system
proportion estimation
pubcrawl
illicit activities
Ransomware
resilience
Resiliency
security of data
supervised learning
supervised learning classifiers
supervised machine learning
uncategorised observations
Cybercrime
bitcoin
Bitcoin ecosystem
Bitcoin transactions
blockchain
composability
Computer crime
cryptocurrency
cyber-criminal entities
Bagging classifiers
cybercrime-related categories
cybercriminal entities
Ecosystem
Ecosystems
financial data processing
Gradient Boosting classifiers
gradient methods
illegal goods trading
biblio
Top Rank Supervised Binary Coding for Visual Search
Submitted by grigby1 on Wed, 03/08/2017 - 1:55pm
large-scale computer vision applications
visualization
visual search
training time cost reduction
Top-RSBC
top rank supervised binary coding
surrogate objective optimization
supervised information
stochastic programming
stochastic gradient descent method
pubcrawl170110
precision optimization
optimization
online learning algorithm
learning (artificial intelligence)
Binary codes
image search accuracy
image retrieval
image datasets
Image coding
Hamming-distance ranking list
Hamming distance
Hamming codes
gradient methods
encoding
discrete optimization
data sample compression
computer vision
coding quality enhancement
coding functions
« first
‹ previous
1
2
3
4
next ›
last »