Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
neural nets
biblio
Computational Intelligence in Maritime Security and Defense: Challenges and Opportunities
Submitted by grigby1 on Mon, 12/09/2019 - 2:01pm
military computing
Training
simulated annealing
Security & Defense applications
security
review CI applications
pubcrawl
Oceans
neural nets
NATO Nations
Artificial Intelligence
maritime domain
knowledge based systems
groupware
evolutionary computation
Cryptography
computational intelligence
Compositionality
composability
CI techniques
biblio
Deep-Reinforcement Learning Multiple Access for Heterogeneous Wireless Networks
Submitted by grigby1 on Thu, 12/05/2019 - 10:52am
resilience
neural nets
Neural networks
optimal MAC strategy
Policy
Policy Based Governance
policy governance
prior knowledge
pubcrawl
radio networks
network layers
Resiliency
Robustness
share spectrum
telecommunication computing
time division multiple access
time-slotted networks
traditional reinforcement learning
universal MAC protocol
wireless networks
DRL algorithmic framework
clean-slate design
collaboration
convergence
DARPA SC2
deep reinforcement learning
deep-reinforcement learning multiple access
design framework
DLMA
DRL agent
clean slate
heterogeneous wireless networks
Human behavior
Human Factors
learning (artificial intelligence)
MAC design
machine learning
machine-learning technique
Media Access Protocol
Metrics
biblio
Focal Visual-Text Attention for Visual Question Answering
Submitted by aekwall on Wed, 09/04/2019 - 11:15am
neural nets
Metadata Discovery Problem
visual text sequence information
text metadata
single-image visual question answering
question answering (information retrieval)
Neural networks
Scalability
Resiliency
pubcrawl
composability
Computational modeling
Knowledge Discovery
text analysis
Correlation
meta data
cognition
visualization
computer vision
Videos
collective reasoning
Focal Visual-Text Attention network
FVTA
inference mechanisms
biblio
Research on Trust Degree Model of Fault Alarms Based on Neural Network
Submitted by grigby1 on Mon, 08/05/2019 - 11:35am
reliance
human trust
neural nets
neural network
Neurons
operator factors
policy-based governance
pubcrawl
Reliability
human machine system
resilience
Resiliency
Scalability
security of data
situational factors
Training
trust degree model
Databases
alarm system
Alarm systems
available experimental studies
Biological neural networks
collaboration
Compliance
computerised instrumentation
data base
alarm errors
Decision Making
false alarm rate
false trust
fault alarms
fault diagnosis
Human behavior
Human Factors
biblio
One-Shot Learning Approach for Unknown Malware Classification
Submitted by grigby1 on Mon, 06/10/2019 - 2:02pm
neural nets
Word2Vec
unknown malware classification
Training
Task Analysis
static analysis
Resiliency
resilience
pubcrawl
privacy
pattern classification
one-shot learning network
one-shot learning approach
One-shot learning
Neural Turing Machine
Neural networks
Adaptation models
network systems
natural language processing
Metrics
memory augmented neural network
malware classification
malware behavior
malware API calls sequence
malware
Least Recently Used Access
learning (artificial intelligence)
invasive software
intelligent protection systems
Human behavior
fewshot learning
API Sequence
biblio
Defending IT Systems against Intelligent Malware
Submitted by grigby1 on Mon, 06/10/2019 - 2:02pm
privacy
malware binaries
malware classification
malware detection
malware families
malware images
malware variants
Metrics
neural nets
Malware Analysis
pubcrawl
resilience
Resiliency
Signatures
static analysis
Training
unsupervised deep neural networks
adversarial examples
malware
machine learning algorithms
machine learning
learning (artificial intelligence)
IT systems
invasive software
intelligent malware
Human behavior
generative adversarial networks
generative adversarial network
Gallium nitride
dynamic analysis
Classification algorithms
ART
Antivirus Software vendors
biblio
DLGraph: Malware Detection Using Deep Learning and Graph Embedding
Submitted by grigby1 on Mon, 06/10/2019 - 1:59pm
Metrics
Windows application programming interface calls
Windows API calls
Trojan horses
static analysis
stacked denoising autoencoders
softmax regression
SDA
Resiliency
representation learning
pubcrawl
privacy
pattern classification
noise reduction
neural nets
microsoft windows
application program interfaces
malware detection
Malware Analysis
learning (artificial intelligence)
invasive software
Human behavior
graph theory
graph embedding
function-call graphs
function-call graph
feature extraction
embedded vector
embedded systems
DLGraph
deep learning
combined feature vector classification
biblio
Research of Classical Machine Learning Methods and Deep Learning Models Effectiveness in Detecting Anomalies of Industrial Control System
Submitted by grigby1 on Mon, 06/10/2019 - 1:56pm
resilience
machine learning algorithms
machine learning methods
modern industrial control systems
neural nets
Neural networks
privacy
production engineering computing
pubcrawl
machine learning
Resiliency
security
security of data
signal correlations
Support vector machines
Tennessee Eastman process simulation data
Training
Anomaly Detection
linear algorithms
learning (artificial intelligence)
industrial process anomaly detection task
industrial control
ICS security
ICs
Feeds
deep learning models
deep learning
Decision trees
Data processing
Cyber Attacks
control engineering computing
composability
anomaly detection evaluation dataset
biblio
A Neural Network Trojan Detection Method Based on Particle Swarm Optimization
Submitted by grigby1 on Fri, 03/15/2019 - 11:59am
particle swarm optimization
Trojan horses
trojan horse detection
Side Channel Analysis technology
RTL circuits
pubcrawl
PSO NN method
Principal Component Analysis algorithm
principal component analysis
Power demand
power consumption data
power consumption
power aware computing
Artificial Neural Networks
particle swarm optimisation
neural network Trojan detection
neural nets
malicious modifications
invasive software
intelligent neural networks algorithm
Integrated circuit modeling
HSPICE power consumption simulation
hardware Trojan detection
Hardware
Cryptography
biblio
Designing Subspecies of Hardware Trojans and Their Detection Using Neural Network Approach
Submitted by grigby1 on Fri, 03/15/2019 - 11:58am
learning (artificial intelligence)
true positive rate
Trojan horses
trojan horse detection
trigger circuits
TPR
third-party vendors
pubcrawl
outsourcing
neural-network based hardware-Trojan detection method
neural network approach
neural network
neural nets
machine-learning-based hardware-Trojan detection method
machine learning
Logic gates
Artificial Neural Networks
invasive software
integrated circuit design
high-performance hardware device
hardware trojan subspecies designing
hardware trojan
hardware devices mass-production
Hardware
gradient methods
gate-level netlist
feature extraction
electronic engineering computing
electric devices
Design Time
Benchmark testing
« first
‹ previous
…
16
17
18
19
20
21
22
23
24
next ›
last »