Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
neural nets
biblio
Multitask Adversarial Learning for Chinese Font Style Transfer
Submitted by aekwall on Mon, 02/01/2021 - 10:44am
fine-grained parts
style transfer
character images
character recognition
character sets
Chinese character complexity
Chinese font datasets
Chinese font style transfer
cross-task interactions
neural style transfer
font generation
general style transfer
MTfontGAN
multiple target ones
multitask
multitask adversarial learning
reference font
Scalability
gan
Gallium nitride
overfitting problem
Predictive Metrics
Generators
natural language processing
machine learning
Libraries
Training
neural nets
Decoding
pubcrawl
Resiliency
learning (artificial intelligence)
Task Analysis
biblio
Method of Image Style Transfer Based on Edge Detection
Submitted by aekwall on Mon, 02/01/2021 - 10:43am
neural style transfer
neural network style transfer
neural network processing
markov random field neural network algorithm
Markov random field
edge information loss
edge information image
content image edge structure
image style transfer
Scalability
Predictive Metrics
edge detection
Markov processes
neural network
random processes
neural nets
pubcrawl
Resiliency
biblio
Jekyll: Attacking Medical Image Diagnostics using Deep Generative Models
Submitted by aekwall on Mon, 02/01/2021 - 10:43am
DNN-based image translation attack
attacker-chosen disease condition
attacking medical image diagnostics
biomedical image
biomedical imagery
biomedical optical imaging
deep generative models
deep learning tools
defenses
neural style transfer
eye
healthcare domain
Jekyll
medical domain
medical image diagnostics
neural style transfer framework
patient healthcare
retinal fundus image modalities
image segmentation
learning (artificial intelligence)
machine learning
Resiliency
pubcrawl
deep learning
neural nets
image watermarking
attacks
Scalability
Generative Models
Predictive Metrics
deep neural networks
sensitive data
medical image processing
medical images
diseases
medical professionals
biblio
Defending Against Model Stealing Attacks With Adaptive Misinformation
Submitted by grigby1 on Thu, 01/28/2021 - 12:12pm
Metrics
training dataset
security of data
security
Scalability
Resiliency
resilience
query processing
pubcrawl
Predictive models
Perturbation methods
out-of-distribution inputs
OOD queries
neural nets
model stealing attacks
Adaptation models
learning (artificial intelligence)
labeled dataset
Human behavior
deep neural networks
Data models
Computational modeling
Cloning
clone model
black-box query access
attacker clone model
attacker
Adversary Models
Adaptive Misinformation
biblio
Enhancing Resilience of Deep Learning Networks By Means of Transferable Adversaries
Submitted by grigby1 on Thu, 01/28/2021 - 12:10pm
neural nets
transferable adversaries
Training
Task Analysis
single-step adversaries
security of data
Scalability
Resiliency
resilience enhancement
resilience
pubcrawl
Perturbation methods
pattern classification
Neural networks
Adversarial training
Multi-step Adversaries
Metrics
machine learning
learning (artificial intelligence)
Information systems
Human behavior
defense methods
deep learning networks
deep learning
classification decision model
Artificial Neural Networks
Adversary Models
biblio
Link Prediction Adversarial Attack Via Iterative Gradient Attack
Submitted by aekwall on Mon, 01/25/2021 - 12:01pm
gradient information
attack graphs
adversarial attack
adversarial graph
deep models
defense
GAE
gradient attack (GA)
gradient attack strategy
gradient methods
graph autoencode
graph evolved tasks
iterative gradient attack
Link prediction
link prediction adversarial attack problem
node classification
real-world graphs
trained graph autoencoder model
Robustness
data privacy
Task Analysis
learning (artificial intelligence)
Resiliency
pubcrawl
composability
graph theory
privacy
security of data
neural nets
Prediction algorithms
security problem
Predictive models
Predictive Metrics
deep neural networks
Perturbation methods
biblio
Comparison of Cryptography by Chaotic Neural Network and by AES
Submitted by grigby1 on Fri, 01/22/2021 - 12:51pm
AES cipher
AES ciphering
chaos
chaotic cryptography
Chaotic maps
chaotic neural network approach
chaotic neural networks
Cryptography
neural nets
pubcrawl
short plaintexts
text encryption
biblio
Machine and Deep Learning Based Comparative Analysis Using Hybrid Approaches for Intrusion Detection System
Submitted by grigby1 on Wed, 01/20/2021 - 3:22pm
performance indicator metrics
learning (artificial intelligence)
machine learning
Naive Bayes Classifiers
nearest neighbour methods
network security threats
neural nets
NSL-KDD dataset
pattern classification
K-NN
pubcrawl
resilience
Resiliency
security of data
self-learning-based classification algorithms
Support vector machines
vulnerable source code
hybrid feature selection
APIs
application programming interface
Bayes methods
CIDDS-001 dataset
Compositionality
cyber security
cybersecurity organizations
deep learning
API
IDS
internet
intranet
intranets
Intrusion Detection
intrusion detection system
Intrusion Detection System (IDS)
biblio
On the Effective Capacity of an Underwater Acoustic Channel under Impersonation Attack
Submitted by grigby1 on Wed, 01/20/2021 - 3:08pm
telecommunication computing
Markov processes
neural nets
probability
pubcrawl
Quality-of-Service
resilience
Resiliency
state-transition probabilities
markov chain
telecommunication security
threshold-based decoding error model
underwater acoustic
underwater acoustic channel
underwater acoustic communication
UWA channel
wireless channels
gradient methods
artificial neural network
Artificial Neural Networks
authentication
authentication constraints
channel coding
composability
effective capacity
feature-based authentication
Acoustic Fingerprints
gradient-descent technique
GTJ method
Human behavior
impersonation attack
Kuiper belt
malicious data
malicious node
biblio
Improving Data Privacy Using Fuzzy Logic and Autoencoder Neural Network
Submitted by aekwall on Mon, 01/18/2021 - 10:33am
neural nets
Fuzzy Cryptography
privacy preserving techniques
health sectors
fuzzy logic membership functions
autoencoder
privacy breach
stored data
hospitals
health care
Biological neural networks
Fuzzy logic
security
Autoencoder Neural Network
Metrics
privacy
pubcrawl
Resiliency
Organizations
electronic health records
data privacy
Cryptography
Scalability
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »