Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
neural nets
biblio
imdpGAN: Generating Private and Specific Data with Generative Adversarial Networks
Submitted by aekwall on Mon, 03/29/2021 - 10:57am
Predictive Metrics
Generative Adversarial Learning
Privacy-preserving Learning
learning latent representations
learned representations
information maximizing differentially private generative adversarial network
imdpGAN
end to end framework
personally identifiable information
binary classification
face recognition
privacy protection
private data
Scalability
differential privacy
deep learning
generative adversarial networks
Generators
Training
Data protection
pattern classification
neural nets
privacy
pubcrawl
Resiliency
learning (artificial intelligence)
biblio
Applying of Generative Adversarial Networks for Anomaly Detection in Industrial Control Systems
Submitted by aekwall on Mon, 03/29/2021 - 10:56am
Industrial Control Systems
Training
security of data
Scalability
Resiliency
pubcrawl
production engineering computing
Predictive Metrics
neural nets
Intrusion Detection
Integrated circuit modeling
information security
industrial processes anomaly detection
industrial process
industrial control systems (ICS)
ICS Anomaly Detection
industrial control
ICs
Generators
generative adversarial networks (GAN)
generative adversarial networks
Generative Adversarial Learning
deep learning
Data models
Cyber Attacks
control engineering computing
computer architecture
BiGAN architecture
Anomaly Detection
biblio
Deep Learning for Spectrum Anomaly Detection in Cognitive mmWave Radios
Submitted by aekwall on Mon, 03/15/2021 - 11:05am
millimetre wave communication
auxiliary classifier generative adversarial network
Cognitive mmWave Radios
Cognitive Radios
complex dynamic radio environment
conditional generative adversarial network
dynamic radio spectrum
Generative Models
Millimeter Wave
Millimeter Wave band
AC-GAN
mmWave dataset
mmWave spectrum
secure radios
shared access medium
spectrum anomalies
spectrum anomaly detection
variational auto encoder
Cognitive Radio Security
Anomaly Detection
telecommunication security
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
Communication system security
Wireless communication
neural nets
Training
Internet of Things
probability
telecommunication computing
generative adversarial networks
deep learning
radio spectrum management
Gallium nitride
cognitive radio
deep generative models
biblio
Neural Network Wiretap Code Design for Multi-Mode Fiber Optical Channels
Submitted by aekwall on Mon, 03/15/2021 - 10:55am
optical receivers
wiretap code
polar wiretap codes
Pareto improvement
neural network wiretap code design
mutual information leakage
multimode fiber wiretap channel
multimode fiber optical channel
multi-mode fiber
industrial machine type communication
finite blocklength
finite block length
fading channel
AWGN channel
Pareto optimisation
autoencoder
telecommunication security
telecommunication network reliability
secure code
polar codes
AWGN channels
physical layer security
eavesdropper
telecommunication computing
optical fibre networks
channel coding
neural nets
Metrics
composability
pubcrawl
Resiliency
biblio
Hybrid Deep Neural Networks to Infer State Models of Black-Box Systems
Submitted by aekwall on Tue, 03/09/2021 - 11:04am
inferred states
automated software engineering tasks
Black-box Model Inference
black-box systems
black-box techniques
black-box third-party libraries
C code
detection techniques
entire source code
existing dynamic model inference techniques
hybrid deep neural network
infer state models
888 random recent system-level test cases
inferring behavior model
program comprehension
recurrent layers
run-time traces
running software system
Specification Mining
state change points
state classification algorithm
traditional time series change
UAV auto-pilot solution
white-box
Anomaly Detection
Time measurement
Classification algorithms
learning (artificial intelligence)
Resiliency
pubcrawl
composability
Metrics
neural nets
pattern classification
program testing
testing
Task Analysis
software engineering
black box encryption
aerospace computing
deep learning
Instruments
inference mechanisms
time series
convolutional neural network
Time series analysis
recurrent neural network
convolutional layers
biblio
Performance Evaluation of Botnet Detection using Deep Learning Techniques
Submitted by grigby1 on Thu, 03/04/2021 - 1:57pm
Reliability
malicious activities
Metrics
Multilayer Perception
multilayer perceptrons
neural nets
neural network
performance evaluation
Performance Metrics
pubcrawl
Long short-term memory
reliable botnet detection
resilience
Resiliency
security
Sensitivity
traffic control
unknown botnet traffic
Zero day attacks
zero-day attack
Data models
botnet
botnet traffic detection
botnet traffic patterns
botnets
composability
computer network security
convolutional neural network
CTU-13 botnet traffic dataset
CTU-13 Dataset
basic network security goals
deep learning
deep learning-based approaches
defense
different deep learning models
hybrid CNN-LSTM
internet
invasive software
known botnet traffic
learning (artificial intelligence)
biblio
Evading Deepfake-Image Detectors with White- and Black-Box Attacks
Submitted by grigby1 on Thu, 03/04/2021 - 1:35pm
security of data
neural nets
neural network
optimization
Perturbation methods
popular forensic approach
pubcrawl
resilience
Resiliency
Robustness
Metrics
significant vulnerabilities
social networking (online)
state- of-the-art classifier
synthesizer
synthetic content
synthetically-generated content
target classifier
Training
Twitter
fraudulent social media profiles
white box
security
attack case studies
AUC
black-box attack
composability
deepfake-image detectors
disinformation campaigns
Forensics
White Box Security
Generators
image area
image classification
Image forensics
image generators
image representation
image sensors
image-forensic classifiers
learning (artificial intelligence)
biblio
Approximate Symbolic Explanation for Neural Network Enabled Water-Filling Power Allocation
Submitted by aekwall on Mon, 03/01/2021 - 4:03pm
fading channels
symbolic mapping
slow iterative search
OFDM sub-channels
NN power allocation solution
neural network enabled water-filling power allocation
Meijer G-function
iterative WF threshold search process
direct high-dimensional mapping
channel gain
approximate symbolic explanation
Search Space
OFDM modulation
Transforms
xai
Scalability
approximation theory
wireless
Artificial Neural Networks
telecommunication computing
neural nets
optimization
Iterative methods
Wireless communication
resource management
deep learning
pubcrawl
Resiliency
machine learning
biblio
Combating TCP Port Scan Attacks Using Sequential Neural Networks
Submitted by grigby1 on Tue, 02/23/2021 - 1:57pm
port scans
transport protocols
telecommunication traffic
TCP port scan attacks
TCP packet
TCP datagrams
sequential neural networks
Scalability
Resiliency
resilience
pubcrawl
attack reconnaissance tool
NMAP scan pcap files
Neural networks
neural nets
Network reconnaissance
learning (artificial intelligence)
general packetized traffic
computer network security
complex TCP classes
Communication networks
classification
biblio
Sagacious Intrusion Detection Strategy in Sensor Network
Submitted by grigby1 on Tue, 02/23/2021 - 1:47pm
smart appliances
Prediction algorithms
logistic regression
regression analysis
network intrusion detection
KNN
WSN
malicious attackers
support vector machine
neural nets
ANN
data corpus
external attacks
IDS methodology
Naive Bayes
sagacious intrusion detection strategy
time division multiple access
Support vector machines
Classification algorithms
service attacks
Floods
Denial of Service attacks
sensors
telecommunication computing
composability
wireless sensor networks
telecommunication security
computer network security
Resiliency
resilience
Metrics
pubcrawl
Intrusion Detection
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »