Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Linear programming
biblio
Influence Based Defense Against Data Poisoning Attacks in Online Learning
Submitted by grigby1 on Thu, 06/22/2023 - 4:13pm
data integrity
online learning
Influence Function
data poisoning
Resiliency
Data Sanitization
Adversarial Machine Learning
Degradation
Linear programming
machine learning
Training data
Compositionality
composability
Data models
Filtering
resilience
pubcrawl
biblio
Two-Stage Optimization Framework for Detecting and Correcting Parameter Cyber-Attacks in Power System State Estimation
Submitted by grigby1 on Fri, 05/19/2023 - 2:11pm
cyber-physical security
two-stage optimization
Real-time monitoring
false data injections
CPS modeling
Linear programming
power grids
simulation
composability
security
Databases
state estimation
Software
Resiliency
resilience
Metrics
pubcrawl
biblio
Design of an Advance Intrusion Detection System for IoT Networks
Submitted by aekwall on Thu, 01/05/2023 - 5:08pm
Robustness
Support vector machines
Computational modeling
Intrusion Detection
machine learning
pubcrawl
composability
Compositionality
Classification algorithms
intrusion detection system
IoT security
Biological system modeling
Linear programming
Swarm Intelligence
biblio
Multi-objective Gray Wolf Optimization Algorithm for Multi-agent Pathfinding Problem
Submitted by aekwall on Thu, 01/05/2023 - 5:08pm
security
Computational modeling
Heuristic algorithms
Sociology
Statistics
pubcrawl
composability
particle swarm optimization
Compositionality
Linear programming
Swarm Intelligence
multi-agent pathfinding
multi-objective gray wolf optimization
biblio
SPA: An Efficient Adversarial Attack on Spiking Neural Networks using Spike Probabilistic
Submitted by aekwall on Tue, 12/20/2022 - 5:21pm
Perturbation methods
white-box
White Box Security
transferability
Spiking Neural Networks
SNNs
security
Resiliency
pubcrawl
Probabilistic logic
adversarial attacks
perturbation
Neural networks
Metrics
Medical diagnosis
Linear programming
Degradation
composability
black-box
biblio
IDS To Detect Worst Parent Selection Attack In RPL-Based IoT Network
Submitted by grigby1 on Tue, 12/06/2022 - 2:51pm
LLN
Worst parent selection
System performance
simulation
RPL network
Routing protocols
routing attacks
Routing
performance evaluation
Of0)
Ob-jective Function (MRHOF
6LoWPAN
Linear programming
IoT network
Intrusion Detection
IDS
Contiki-Cooja
pubcrawl
composability
resilience
Resiliency
biblio
An augmented MDP approach for solving Stochastic Security Games
Submitted by grigby1 on Thu, 10/20/2022 - 3:38pm
security
pubcrawl
resilience
Scalability
Games
Linear programming
Markov processes
Stochastic Computing Security
Resiliency
Observability
intelligent robots
biblio
Research on risk severity decision of cluster supply chain based on data flow fuzzy clustering
Submitted by grigby1 on Fri, 09/09/2022 - 3:55pm
risk management
feature extraction
pubcrawl
Metrics
Indexes
Big Data
analytic hierarchy process
Clustering algorithms
Linear programming
supply chains
Cluster Supply Chain
fuzzy clustering algorithm for data flow
high-dimensional risk assessment index
Risk severity decision
supply chain risk assessment
biblio
Secure Outsourcing of Fuzzy Linear Regression in Cloud Computing
Submitted by grigby1 on Fri, 08/26/2022 - 11:09am
tools
Cloud Computing
machine learning
security
pubcrawl
Protocols
Metrics
Linear programming
Computing Theory
outsourcing
linear regression
fuzzy linear regression
Secure computing
transformational approach
biblio
A New Evolutionary Computation Framework for Privacy-Preserving Optimization
Submitted by grigby1 on Wed, 08/10/2022 - 2:46pm
Neural networks
Artificial Intelligence
pubcrawl
privacy
Cryptography
composability
Compositionality
evolutionary computation
computational intelligence
Linear programming
scheduling
Processor scheduling
privacy preserving optimization problem
rank-based cryptographic function
1
2
3
4
5
6
7
8
next ›
last »