Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
neural nets
biblio
Research on Computer Network Security Evaluation Method Based on Levenberg-Marquardt Algorithms
Submitted by grigby1 on Fri, 05/08/2020 - 2:42pm
Metrics
Neural Network Security
training process
local minimum point
LM-BP algorithm
Levenberg-Marquardt algorithms
evaluation
computer network security evaluation method
computer networks
BP Neural Network
Backpropagation
Training
neural nets
Communication networks
Safety
Indexes
computer network security
collaboration
policy-based governance
pubcrawl
Neural networks
security
biblio
Research of Computer Network Security Evaluation Based on Backpropagation Neural Network
Submitted by grigby1 on Fri, 05/08/2020 - 2:42pm
Backpropagation
Neural Network Security
Virus
prediction
loopholes
evaluation
computer viruses
computer networks
computer network security evaluation
BP Neural Network
backpropagation neural network
security
Biological neural networks
Metrics
neural nets
Communication networks
Mathematical model
Indexes
computer network security
collaboration
policy-based governance
pubcrawl
biblio
Certified Robustness to Adversarial Examples with Differential Privacy
Submitted by aekwall on Mon, 04/20/2020 - 10:31am
machine learning models
privacy models and measurement
Sophisticated Attacks
PixelDP
norm-bounded attacks
machine-learning
ImageNet
Google Inception network
defense
Deep-learning
cryptographically-inspired privacy formalism
certified robustness
certified defense
Adversarial-Examples
adversarial examples
Cryptography
deep neural networks
differential privacy
Predictive models
Measurement
Mathematical model
Databases
neural nets
standards
Robustness
Metrics
pubcrawl
learning (artificial intelligence)
security
data privacy
biblio
Adversarial Defense via Learning to Generate Diverse Attacks
Submitted by grigby1 on Fri, 04/17/2020 - 10:58am
neural nets
White Box Security
Training
stochastic generator
security of data
Robustness
Resiliency
resilience
recursive generator
pubcrawl
Perturbation methods
pattern classification
optimization
one-shot perturbation
Neural networks
adversarial defense
Metrics
malicious attacks
machine learning
learning (artificial intelligence)
Generators
deterministic generator
deep neural networks
deep learning
Compositionality
composability
classification performance
black-box attacks
Adversarial training
biblio
Enabling Adaptive Deep Neural Networks for Video Surveillance in Distributed Edge Clouds
Submitted by aekwall on Mon, 04/13/2020 - 10:28am
video surveillance
two-stage delay-aware graph searching approach
task scheduling
remote clouds
network delay
network cameras
intelligent video surveillance task scheduling problem
input video segment
feature similarity
distributed edge clouds
computing delay
adaptive DNN model selection method
adaptive deep neural networks
NP-hard
Computation offloading
deep neural networks
Cloud Computing
scheduling
edge computing
video signal processing
image segmentation
computational complexity
resource allocation
neural nets
Metrics
graph theory
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
feature extraction
biblio
HealthGuard: A Machine Learning-Based Security Framework for Smart Healthcare Systems
Submitted by grigby1 on Fri, 04/10/2020 - 12:53pm
nearest neighbour methods
healthguard
implantable medical devices
Internet-of-Things
k-nearest neighbor
machine learning-based detection techniques
machine learning-based security framework
malicious activities detection
malicious threats
medical emergency
Healthcare
patient monitoring
pervasive computing
Random Forest
SHS
Smart Healthcare System
smart healthcare systems
smart medical devices
Pervasive Computing Security
Human Factors
resilience
security
computer network security
Scalability
internet
health care
medical information systems
pubcrawl
Metrics
Resiliency
Internet of Things
Human behavior
random forests
neural nets
Anomaly Detection
artificial neural network
critical medical conditions
Decision Tree
Decision trees
diseases
biblio
Detection of Phishing websites using Generative Adversarial Network
Submitted by grigby1 on Fri, 04/10/2020 - 12:37pm
internal structure
Web sites
Uniform resource locators
Training
synthetic phishing features
security analytics
pubcrawl
phishing Websites
Phishing Detection
phishing datasets
Phishing
pattern classification
normal Websites
neural nets
meta data
low-risk rightreward nature
attack vector
Human Factors
Human behavior
hacking endeavour
Generators
generator network
generative adversarial networks
generative adversarial network
Gallium nitride
feature extraction
external metadata
discriminator network
Computer crime
Cloud Security
Big Data Analytics
biblio
Membership Inference Attacks Against Adversarially Robust Deep Learning Models
Submitted by grigby1 on Fri, 04/03/2020 - 12:56pm
provable security
resilience
Training data
target model
security and privacy
provable defense
privacy challenges
membership inference attack
evasion attacks
empirical membership inference attacks
adversarially robust deep learning models
adversarial training method
adversarial defenses
adversarial defense methods
adversarial defense
deep learning
Compositionality
Metrics
neural nets
security challenges
privacy
Data models
data privacy
Resiliency
pubcrawl
security
Predictive models
Training
security of data
learning (artificial intelligence)
biblio
Novel Defense Method against Audio Adversarial Example for Speech-to-Text Transcription Neural Networks
Submitted by grigby1 on Fri, 03/27/2020 - 11:38am
computer security
speech-to-text transcription neural networks
speech-to-text
speech synthesis
Speech recognition
Sandbox Method
sandbox approach
Neural networks
defense method
Deep Speech
data representation
learning (artificial intelligence)
audio adversarial example
adversarial example
neural nets
sandboxing
composability
deep learning
policy-based governance
pubcrawl
collaboration
security of data
biblio
A Robust Malware Detection System Using Deep Learning on API Calls
Submitted by grigby1 on Fri, 03/27/2020 - 11:37am
cuckoo sandbox
robust malware detection system
redundant API
Object oriented modeling
neural nets
massive malware
massive datasets
malware detection
computer security
component
BLSTM
API sequences
API calls
API
Logic gates
application program interfaces
sandboxing
invasive software
malware
composability
policy-based governance
pubcrawl
Neural networks
feature extraction
collaboration
learning (artificial intelligence)
deep learning
« first
‹ previous
…
13
14
15
16
17
18
19
20
21
…
next ›
last »