Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
neural nets
biblio
Quantum Electronic Generator of Random Numbers for Information Security in Automatic Control Systems
Submitted by aekwall on Mon, 03/16/2020 - 10:41am
Random walks
quantum computing
quantum computing security
quantum cryptography
quantum electronic generator
quantum random numbers generator
random number generation
random numbers
random numbers application
Random sequences
pubcrawl
Reliability
resilience
Resiliency
Scalability
Scientific Computing Security
semiconductor electronic components
statistical testing
tunneling
tunnelling
Cryptography
automatic control systems
communication lines
composability
Compositionality
computer systems
computer units
computing nodes
control system security
cryptographic keys
automated driving systems
electron-quantum generator
electrons tunneling
Generators
information security
neural nets
NIST
NIST statistical tests
Predictive Metrics
biblio
New security architecture using hybrid IDS for virtual private clouds
Submitted by grigby1 on Mon, 03/09/2020 - 1:26pm
learning (artificial intelligence)
virtual private clouds
virtual private cloud
virtual machines
virtual machine security
virtual machine
telecommunication traffic
security architecture
private cloud environments
privacy vulnerability
neural nets
network-based intrusion detection system
network-based IDS
network security
Malicious Traffic
machine learning
IDS
intrusion detection system
IDS based ANN
hybrid Intrusion Detection System
hybrid IDS
host-based intrusion detection system
digital transformation
digital revolution
detection engine
data privacy
cyber-attacks
computer network security
Cloud Computing
artificial neural network
anomalies detection
pubcrawl
biblio
Self-Secured Control with Anomaly Detection and Recovery in Automotive Cyber-Physical Systems
Submitted by grigby1 on Mon, 03/02/2020 - 1:35pm
learning (artificial intelligence)
System recovery
sensors
self-secured control
security of data
security
Resiliency
resilience
recovery estimation error
pubcrawl
neural nets
Mathematical model
machine learning models
machine learning
Anomaly Detection
generative adversarial networks
electric vehicle
cyber-physical systems
CPS
control loop behavior
control engineering computing
computer architecture
battery management system
battery
batteries
Automotive engineering
Automotive cyber-physical systems
automotive controllers
biblio
Evaluating Fault Resiliency of Compressed Deep Neural Networks
Submitted by grigby1 on Wed, 02/26/2020 - 4:48pm
Hardware
VGG16
storage faults
software mitigation techniques
Resiliency
resilience
Quantization (signal)
pubcrawl
Predictive models
neural nets
LeNet-5
learning (artificial intelligence)
inference mechanisms
hardware mitigation techniques
Analytical models
fault tolerant computing
fault tolerance
Fault resiliency
Fault Resilience
Fault Attacks
Efficient and secure inference engines
Deep neural network model compression
deep learning
Data models
data compression
Computational modeling
compressed DNN models
compressed deep neural networks
biblio
Analysis of Cybersecurity Threats in Cloud Applications Using Deep Learning Techniques
Submitted by grigby1 on Wed, 02/26/2020 - 4:41pm
IDS
threat vectors
telecommunications equipment
Support vector machines
security of data
pubcrawl
privacy
neural nets
Metrics
Measurement
learning (artificial intelligence)
cloud applications
enterprise grade security applications
enterprise applications
deep neural networks
deep learning techniques
deep learning
cybersecurity threats
Cybersecurity
cloud environments
Cloud Computing
biblio
Cognitive Routing for Improvement of IoT Security
Submitted by grigby1 on Wed, 02/26/2020 - 4:36pm
secure SDN paths
packet flows
pubcrawl
quality of service
Random Neural Networks
Routing
routing decisions
Scalability
SDN infrastructure
secure networks
Neural networks
security-aware routing
security-by-design concept
SerIoT
software defined networking
telecommunication network routing
telecommunication security
telecommunication traffic
trust relationships
Trust Routing
Europe
cognitive radio
Cognitive routing
Cognitive-Packet-Network
composability
Computer crime
computer network reliability
computer network security
dedicated networks
energy criteria
Cognitive Packet Networks mechanisms
information security
Internet of Things
Internet-of-Things
IoT
IoT security
network architecture
network nodes
Network-Security
neural nets
biblio
Representation of White- and Black-Box Adversarial Examples in Deep Neural Networks and Humans: A Functional Magnetic Resonance Imaging Study
Submitted by grigby1 on Tue, 02/18/2020 - 11:53am
resilience
Metrics
neural nets
neural network
neurophysiology
Noise
pubcrawl
representation patterns
representational similarity
medical image processing
Resiliency
Task Analysis
vision
visual perception
visual representation
Visual systems
visualization
white box cryptography
DNNs
Biological neural networks
biomedical MRI
black-box adversarial examples
brain
brain-inspired deep neural networks
complex level visual tasks
composability
computer vision
adversarial example
Facial animation
fMRI
Functional magnetic resonance imaging
functional magnetic resonance imaging study
high-level visual tasks
human performance
human vision
human visual system
biblio
Test4Deep: An Effective White-Box Testing for Deep Neural Networks
Submitted by grigby1 on Tue, 02/18/2020 - 11:52am
Neurons
white-box testing framework
white box testing
white box cryptography
testing
Test4Deep
test cases
Software
Resiliency
resilience
pubcrawl
program testing
Prediction algorithms
optimization
Biological neural networks
neuron coverage
neural nets
multiple DNNs
Metrics
machine learning
learning (artificial intelligence)
generated test inputs
DNNs
diversity
DeepXplore
deep neural networks
Deep Learning testing
composability
biblio
Comprehensive Privacy Analysis of Deep Learning: Passive and Active White-Box Inference Attacks against Centralized and Federated Learning
Submitted by grigby1 on Tue, 02/18/2020 - 11:52am
Resiliency
Inference-Attacks
learning (artificial intelligence)
Membership-Inference
Metrics
neural nets
privacy
privacy leakage
pubcrawl
resilience
inference mechanisms
stochastic gradient descent algorithm
Stochastic processes
Stochastic-Gradient-Descent
Training
Training data
white box cryptography
White Box Security
white-box membership inference attacks
data privacy
active white-box inference attacks
black-box attacks
centralized learning
CIFAR dataset
composability
comprehensive privacy analysis
Computational modeling
Data models
active membership inference attacks
deep learning
deep learning models
deep neural networks
Deep-learning
federated learning setting
Federated-Learning
gradient methods
Inference algorithms
biblio
Towards Understanding Limitations of Pixel Discretization Against Adversarial Attacks
Submitted by grigby1 on Tue, 02/18/2020 - 11:52am
neural nets
white-box attacks
white box cryptography
Training
Robustness
Resiliency
resilience
pubcrawl
preprocessing defense methods
preprocessing defense
pixel discretization defense method
pixel discretization
Perturbation methods
Neural networks
adversarial attacks
MNIST
Metrics
Measurement
machine learning
low computational overhead
ImageNet
Image Processing
deep learning
Data models
Cryptography
composability
Artificial Neural Networks
« first
‹ previous
…
14
15
16
17
18
19
20
21
22
…
next ›
last »