Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
neural nets
biblio
Reinforcement Learning inspired Deep Learned Compositional Model for Decision Making in Tracking
Submitted by grigby1 on Mon, 10/05/2020 - 2:01pm
previous location
neural nets
object tracking
occlusion handling
partial occlusions
partially observable Markov decision making
penalty based training
pose estimation
pose estimation capabilities
multiple large video datasets
pubcrawl
Reinforcement learning
skeleton based part representation
Streaming media
target tracking
tracker
tracking
video signal processing
heuristic methods
Compositional Models
Compositionality
Computational modeling
computer science
Decision Making
deep learned compositional model
Deep Neural Network
deep reinforcement
cluttered background
human bodies
human inputs
image representation
incessant decision making
learning (artificial intelligence)
Markov processes
Mathematical model
biblio
A Hierarchy-to-Sequence Attentional Neural Machine Translation Model
Submitted by grigby1 on Mon, 10/05/2020 - 2:01pm
semantic compositionality modeling
neural nets
optimal model parameters
parameter learning
pubcrawl
recurrent neural nets
Recurrent neural networks
segmented clause sequence
segmented clauses
neural machine translation
Semantics
sequence-to-sequence attentional neural machine translation
short clauses
Speech
speech processing
text analysis
Training
translation prediction
hierarchical neural network structure
Chinese-English translation
clause level
Compositionality
Context modeling
conventional NMT model
Decoding
English-German translation
grammars
attention models
Hierarchy-to-sequence
hierarchy-to-sequence attentional neural machine translation model
hierarchy-to-sequence attentional NMT model
language translation
learning (artificial intelligence)
long parallel sentences
natural language processing
biblio
AOGNets: Compositional Grammatical Architectures for Deep Learning
Submitted by grigby1 on Mon, 10/05/2020 - 1:49pm
object detection
image segmentation
ImageNet-1K classification benchmark
input feature map
learning (artificial intelligence)
model interpretability score
MS-COCO object detection
network dissection
network generator
neural architectures
neural nets
image classification
phrase structure grammar
pubcrawl
Recognition: Detection
Reconfigurability
representation learning
ResNeXt
retrieval
segmentation benchmark
SENet
deep learning
Human behavior
Human Factors
Computing Theory and Compositionality
AND-OR Grammar
AOG building block
AOGNet
AOGNets
attention based variants
categorization
deep compositional grammatical architectures
Compositionality
deep neural networks
DenseNet
dependency grammar
DNNs
DualPathNet
feature channels
feature exploration
grammar models
grammars
biblio
Denoising and Verification Cross-Layer Ensemble Against Black-box Adversarial Attacks
Submitted by aekwall on Mon, 09/21/2020 - 3:36pm
adversarial inputs
Cross Layer Security
verification cross-layer ensemble
unsupervised model
supervised model verification ensemble
representative attacks
noise reduction
MODEF
Manifolds
ensemble diversity
ensemble defense
defense-attack arms race
defense success rates
cross-layer model diversity ensemble framework
black-box adversarial attacks
benign inputs
security of data
adversarial deep learning
composability
DNNs
adversarial examples
machine learning tasks
deep neural networks
Predictive models
testing
Training
Neural networks
neural nets
Robustness
pubcrawl
Resiliency
learning (artificial intelligence)
biblio
Exploring Adversaries to Defend Audio CAPTCHA
Submitted by grigby1 on Fri, 09/11/2020 - 11:44am
bots
captchas
CAPTCHA
adversarial audio captcha
adversarial audio datasets
adversarial examples attack
attack accuracy
basic iterative method
BIM
Noise measurement
deepFool
distortion
medium background noise
near-sighted users
single audio captcha
spoken digits
Web-based authentication method
websites
composability
authorisation
machine learning
machine learning algorithms
security
pubcrawl
Human behavior
internet
deep learning
learning (artificial intelligence)
Classification algorithms
neural nets
Speech recognition
deep learning models
Web sites
attack models
handicapped aids
biblio
Comparison of Cryptography by Chaotic Neural Network and by AES
Submitted by aekwall on Tue, 09/08/2020 - 10:12am
Cryptography
Resiliency
pubcrawl
composability
neural nets
Predictive Metrics
chaos
chaotic cryptography
Chaotic maps
AES cipher
AES ciphering
chaotic neural network approach
chaotic neural networks
short plaintexts
text encryption
biblio
Distributed Black-Box optimization via Error Correcting Codes
Submitted by grigby1 on Fri, 09/04/2020 - 4:11pm
convergence
Black Box Security
structured search directions
structured exploration methods
stragglers
Optimization methods
objective function
Linear programming
evolution strategies
error correcting codes
distributed black-box optimization
derivative-free optimization framework
deep convolutional neural networks
decoding step
telecommunication security
black-box adversarial attacks
Perturbation methods
Iterative methods
error correction codes
neural nets
encoding
Decoding
resilience
Resiliency
Metrics
composability
pubcrawl
optimisation
biblio
A Black-Box Approach to Generate Adversarial Examples Against Deep Neural Networks for High Dimensional Input
Submitted by grigby1 on Fri, 09/04/2020 - 4:11pm
linear regression model
black-box setting
CNNs
data science
extensive recent works
generate adversarial examples
generating adversarial samples
high dimensional
image classification
learning models
linear fine-grained search
black-box approach
minimizing noncontinuous function
model parameters
noncontinuous step function problem
numerous advanced image classifiers
queries
white-box setting
Zeroth order
zeroth order optimization algorithm
zeroth-order optimization method
Black Box Security
Cyberspace
query processing
Conferences
optimisation
pubcrawl
composability
Metrics
Resiliency
resilience
learning (artificial intelligence)
neural nets
security of data
machine-to-machine communications
regression analysis
Iterative methods
deep neural networks
face recognition
adversarial perturbations
gradient methods
adversarial examples
approximation theory
biblio
Semi-black-box Attacks Against Speech Recognition Systems Using Adversarial Samples
Submitted by grigby1 on Fri, 09/04/2020 - 4:10pm
automatic speech recognition systems
Black Box Security
targeted ASR systems
semiblack-box attack
semi-black-box attacks
security vulnerabilities
Kaldi
high attack success rate
gradient-independent genetic algorithm
gradient descent algorithm
adversary-expected transcript texts
adversarial samples
adversarial attacks
white-box attacks
Speech recognition
gradient methods
security of data
Deep Neural Network
Perturbation methods
deep neural networks
Statistics
Sociology
genetic algorithms
neural nets
resilience
Resiliency
Metrics
composability
pubcrawl
Hidden Markov models
Computational modeling
biblio
Black Box Explanation Guided Decision-Based Adversarial Attacks
Submitted by grigby1 on Fri, 09/04/2020 - 4:10pm
Training data
Black Box Security
targeted deep neural networks
performing decision-based black-box attacks
imperceptive adversarial perturbation
imperceptible adversarial example
derivative-free and constraint optimization problem
decision-based black-box adversarial attack
decision-based adversarial attacks
Constraint optimization
boundary attack
black box explanation guided decision-based adversarial attacks
black box explanation
attack efficiency
artificial intelligence security
Logistics
Cryptography
Perturbation methods
neural nets
Neural networks
learning (artificial intelligence)
resilience
Resiliency
Metrics
composability
pubcrawl
search problems
Artificial Intelligence
optimisation
telecommunication security
Cats
Computational modeling
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
…
next ›
last »