Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Neural networks
biblio
Fidelity: Towards Measuring the Trustworthiness of Neural Network Classification
Submitted by aekwall on Mon, 12/07/2020 - 12:32pm
pattern classification
security-critical tasks
neural network system
neural network classification
adversarial settings
adversarial attack detection
adversarial examples
Perturbation methods
trustworthiness
machine learning model
machine learning
security of data
Neural networks
neural nets
Statistics
Sociology
Computational modeling
composability
pubcrawl
learning (artificial intelligence)
Trusted Computing
Task Analysis
biblio
Image Style Transfer in Deep Learning Networks
Submitted by aekwall on Mon, 12/07/2020 - 12:11pm
convolution neural network
Semantics
Painting
Neural networks
learning (artificial intelligence)
images contents
image style transfer
image recognition
Image color analysis
deep learning network development process
deep learning
convolutional neural nets
neural style transfer
computer vision researchers
computer vision
CNN
classical style migration model
artistic styles
ART
pubcrawl
Predictive Metrics
Resiliency
Scalability
biblio
Analysis of Hyperparameter Tuning in Neural Style Transfer
Submitted by aekwall on Mon, 12/07/2020 - 12:10pm
hyperparameter tuning
VGG
style cost
sophisticated synthesised artworks
notable artworks
neural style transfer algorithm
Neural networks
neural nets
Image Processing
hyperparameter tuning analysis
neural style transfer
huge computation power
convolutional neural network
content cost
computer graphics engineers
ART
pubcrawl
Predictive Metrics
Resiliency
Scalability
biblio
MaeSTrO: A Mobile App for Style Transfer Orchestration Using Neural Networks
Submitted by aekwall on Mon, 12/07/2020 - 12:09pm
non photorealistic rendering
manifold artistic styles
Mobile app
mobile artists
mobile computing
mobile expressive rendering
Mobile handsets
neural nets
Neural networks
neural style transfer techniques
MaeSTrO
Painting
particular style transfer
rendering (computer graphics)
style transfer
style transfer orchestration
tools
User control
user interfaces
user tests
creative expression
Scalability
Resiliency
Predictive Metrics
pubcrawl
adaptive neural networks
adaptive systems
casual creativity
core technology
creative editing process
neural style transfer
Creativity
generalized user interface
Image Processing
inherent limitations
Iterative methods
localized editing process
localized image stylization
low-level controls
biblio
Flexible Selecting of Style to Content Ratio in Neural Style Transfer
Submitted by aekwall on Mon, 12/07/2020 - 12:09pm
learning (artificial intelligence)
weight ratio selection
user defined style weight ratio
texture synthesis
style transfer
style image selection
Scalability
Resiliency
Predictive Metrics
optimization
neural style transfer
Neural networks
pubcrawl
image texture
Image color analysis
Feature Selection
feature extraction
convolutional neural networks
convolutional neural nets
convolution neural networks
convolution
content ratio
Artificial Intelligence
ART
biblio
ScriptNet: Neural Static Analysis for Malicious JavaScript Detection
Submitted by aekwall on Mon, 11/30/2020 - 12:03pm
LSTM
Internet-scale Computing Security
sequential processing layers
ScriptNet system
Privacy-invasive software
preinformant learning
PIL model
neural static analysis
Neural models
neural malicious JavaScript detection
JavaScript files
Internet-scale processing
discriminative training
computer infection threat vector
policy governance
deep learning model
malware
deep learning
program diagnostics
Java
Vectors
machine learning
Neural networks
neural nets
Metrics
malware detection
composability
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
invasive software
biblio
Design of Intelligent Home Security Monitoring System Based on Android
Submitted by aekwall on Mon, 11/23/2020 - 11:22am
MVP mode
Temperature distribution
intelligent devices
Android remote operation
domestic appliances
health status monitoring
intelligent electrical appliances
Intelligent home
intelligent home condition monitoring
intelligent home drivers development
intelligent home safety assessment
intelligent home security monitoring system
intelligent home-based remote monitoring system
Internet-based Internet-of-Things technology
remote monitoring
MVP model
network congestion
network data model
Operational Data
Power Line Communication
power line communication network
routing nodes
S3C2440A microcontrollers
safety monitoring
system data
Intelligent Data Security
Intelligent Data and Security
computerised monitoring
Scalability
Internet of Things
embedded systems
Linux
Resiliency
pubcrawl
neural nets
Neurons
internet
telecommunication network routing
condition monitoring
microcontrollers
network nodes
security
Logic gates
control engineering computing
home computing
internetworking
Neural networks
Android (operating system)
Compositionality
Androids
Humanoid robots
carrier transmission on power lines
Water heating
embedded Linux
biblio
TensorClog: An Imperceptible Poisoning Attack on Deep Neural Network Applications
Submitted by grigby1 on Wed, 11/04/2020 - 2:12pm
resilience
neural nets
Neural networks
Perturbation methods
poisoning attack
privacy
privacy protection purpose
pubcrawl
real-world application
lower inference accuracy
Resiliency
Scalability
security of data
TensorClog poisoning technique
test error
Training
user data
user privacy violations
deep neural network applications
adversarial attack
AI Poisoning
CIFAR-10 dataset results
converged training loss
data converges
data privacy
data results
deep learning
abusive data collection
deep neural networks
different limited information attack scenarios
feature extraction
Human behavior
imperceptible poisoning attack
internet
Internet application providers
learning (artificial intelligence)
biblio
A Test Cases Generation Technique Based on an Adversarial Samples Generation Algorithm for Image Classification Deep Neural Networks
Submitted by aekwall on Mon, 11/02/2020 - 2:47pm
Measurement
test cases generation technique
test cases generation
Software algorithms
Software
pubcrawl
program testing
Neural networks
neural nets
Metrics
metrics testing
adversarial samples
learning (artificial intelligence)
image classification deep neural networks
image classification
Filtering
DNN
deep learning
coverage metric
Classification algorithms
artificial intelligence tasks
adversarial samples generation algorithm
biblio
Identity theft on e-government/e-governance digital forensics
Submitted by grigby1 on Fri, 10/16/2020 - 11:22am
Neural networks
fraudulent transactions
genetic algorithms
Government
government data processing
governments
identity theft
internet
Law
malicious online activity
fraud
policy-based governance
product reviews
pubcrawl
resilience
Resiliency
system intrusions
time 13.0 month
user anonymity
Cybercrime
collaboration
Computer crime
corporate users
credit card fraud
credit card transactions
Credit cards
credit transactions
cyber-threats
blockchain technology
Cybersecurity
cyberspace-low entry barriers
Digital Forensics
E-Governance
E-Government
electronic commerce
Electronic government
financial fraud
« first
‹ previous
…
26
27
28
29
30
31
32
33
34
…
next ›
last »