Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
neural nets
biblio
Intrusion Detection Using Deep Learning and Statistical Data Analysis
Submitted by aekwall on Mon, 08/10/2020 - 10:37am
Mathematical model
statistical data analysis
KDD cup 99 datasets
binary classification model
deep learning algorithm
artificial neural network
deep learning
data classification
cyber physical systems
Artificial Neural Networks
computer networks
statistical analysis
Data mining
data analysis
Intrusion Detection
pattern classification
neural nets
machine learning
policy-based governance
pubcrawl
Resiliency
learning (artificial intelligence)
feature extraction
network security
Data models
Classification algorithms
computer network security
biblio
Selective Poisoning Attack on Deep Neural Network to Induce Fine-Grained Recognition Error
Submitted by aekwall on Mon, 08/10/2020 - 10:36am
MNIST
Training data
Training
Support vector machines
Speech recognition
selective poisoning attack
security of data
Resiliency
pubcrawl
policy-based governance
poisoning attack
Pattern recognition
nuclear facilities
Neurons
Neural networks
neural nets
AI Poisoning
malicious training data
machine learning library
machine learning
learning (artificial intelligence)
image recognition
fine-grained recognition error
DNN training process
DNN security
distortion
Deep Neural Network
Data models
cyber physical systems
CIFAR10
chosen class
Artificial Neural Networks
biblio
Use of Artificial Neural Networks to Identify Fake Profiles
Submitted by aekwall on Mon, 08/10/2020 - 10:36am
Artificial Neural Networks
social network page
social media
sigmoid function
malicious users
Identify Fake Profiles
fake profiles identification
Facebook friend request
artificial neural network
security of data
cyber physical systems
neural nets
social networking (online)
policy-based governance
pubcrawl
Resiliency
machine learning
learning (artificial intelligence)
biblio
Privacy-Preserving Deep Learning via Additively Homomorphic Encryption
Submitted by grigby1 on Fri, 08/07/2020 - 3:47pm
resilience
neural nets
privacy
privacy issues
privacy-preserving deep learning
privacy-preserving financial data analytics systems
privacy-preserving logistic regression
pubcrawl
regression analysis
JST CREST AI
Resiliency
Scalability
social challenges
social life
social sciences computing
Society 5.0
super-smart society
additively homomorphic encryption
IoT
information and communication technology
Human Factors
Human behavior
fraud
fourth industrial revolution
financial institutions
financial data processing
encryption
digital arithmetic
deep learning
data privacy
data analysis
Big Data
AI
biblio
PRADA: Protecting Against DNN Model Stealing Attacks
Submitted by aekwall on Mon, 08/03/2020 - 10:38am
nontargeted adversarial examples
Adversarial Machine Learning
API queries
confidentiality protection
DNN model extraction attacks
DNN model stealing attacks
machine learning applications
ML models
model extraction attacks
model stealing
model extraction
PRADA
prediction accuracy
prediction API
prior model extraction attacks
stolen model
transferable adversarial examples
well-defined prediction APIs
Adversary Models
Neural networks
Scalability
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
Computational modeling
Metrics
neural nets
security of data
query processing
Business
Training
Mathematical model
Data mining
Predictive models
Deep Neural Network
application program interfaces
biblio
A Secure Service Discovery Scheme for Mobile ad hoc Network using Artificial Deep Neural Network
Submitted by aekwall on Mon, 08/03/2020 - 10:17am
numerous security challenges
telecommunication security
telecommunication computing
software agents
service providers
service discovery process
service discovery operation
service discovery
security information
security
Routing protocols
quality of service
QoS
pubcrawl
manet privacy
neural nets
mobile ad hoc networks
mobile ad hoc network
MANET
improved security
cross-layer discovery
artificial deep neural network
agent-based cross-layer
agent based secure service discovery scheme
Ad Hoc Network Security
Compositionality
Metrics
Resiliency
biblio
Research on a General Fast Analysis Algorithm Model for Pd Acoustic Detection System: The Algorithm Model Design and Its Application
Submitted by aekwall on Mon, 08/03/2020 - 10:16am
maintenance engineering
intelligent analysis
pattern identification
acoustical emission signals
algorithm model design
BP artificial neural network
genetic algorithm model design
identification with phase compensation
IPC
GIS
maintenance personnel
PD acoustic detection system
PRPD 2D histogram
standard GIGRE D1.33 444
standard IEC TS 62478-2016
statistic operators
Acoustic Fingerprints
Resiliency
gas insulated substations
acoustic emission
acoustic detection
fault diagnosis
3G mobile communication
Smart Grids
power engineering computing
genetic algorithms
IEC standards
automation
neural nets
Backpropagation
composability
pubcrawl
Human behavior
biblio
Attacks on Digital Watermarks for Deep Neural Networks
Submitted by grigby1 on Thu, 07/30/2020 - 1:54pm
deep learning models
watermark
statistical distribution
model prediction
Mobile app
intellectual property theft
fast response times.
Digital Watermarks
deep neural networks training
Deep Neural Network
At-tack
ip protection
copy protection
Watermarking
learning (artificial intelligence)
detection algorithms
neural nets
composability
standards
Computational modeling
industrial property
Mathematical model
Resiliency
resilience
policy-based governance
pubcrawl
Neural networks
Training
biblio
Protecting the Intellectual Properties of Digital Watermark Using Deep Neural Network
Submitted by grigby1 on Thu, 07/30/2020 - 1:53pm
ip protection
Watermarking
watermark
Speech recognition
security
Resiliency
resilience
pubcrawl
policy-based governance
ownership verification
neural nets
natural language processing
machine learning
learning (artificial intelligence)
Artificial Intelligence
intellectual property security
intellectual property
industrial property
Image Processing
embedding watermarks
embedded
DNN algorithms
Digital Watermark
Deep Neural Network
deep learning models
counter-watermark attacks
composability
biblio
Privacy Preserving Big Data Publication On Cloud Using Mondrian Anonymization Techniques and Deep Neural Networks
Submitted by aekwall on Mon, 07/13/2020 - 11:07am
privacy
k-anonymity
machine learning
Mondrian anonymization techniques
Mondrian based k-anonymity approach
neural nets
Neural networks
personal data
personally identifiable information
predominant factor
high-dimensional data deep neural network based framework
privacy breach
privacy preservation
privacy preserving big data publication
privacy-preservation
protection
Resiliency
security
user privacy in the cloud
data analysis
pubcrawl
Human Factors
resilience
Scalability
Metrics
Big Data
Big Data Analytics
Cloud Computing
compromising privacy
big data privacy
data management
Data models
data privacy
data utility
Databases
deep neural networks
differential privacy
DNN
« first
‹ previous
…
8
9
10
11
12
13
14
15
16
…
next ›
last »