Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Neural networks
biblio
Query-Efficient Black-Box Attack by Active Learning
Submitted by aekwall on Mon, 07/20/2020 - 10:55am
Jacobian matrices
white box cryptography
white-box attack methods
white-box attack approaches
query-efficient black-box attack
query efficiency
generated adversarial examples
CIFAR-10 dataset
adversarial attack
active learning strategy
active learning
MNIST dataset
Learning systems
Perturbation methods
Cryptography
Deep Neural Network
Entropy
machine learning model
convolutional neural nets
Training
Labeling
query processing
Neural networks
Metrics
composability
pubcrawl
Resiliency
learning (artificial intelligence)
biblio
Voltage Based Authentication for Controller Area Networks with Reinforcement Learning
Submitted by aekwall on Mon, 07/20/2020 - 10:44am
testing
spoofing model
spoofing attacks
physical authentication scheme
linear regression
ECU signals
CAN bus
authentication mode
electronic control units
controller area networks
controller area network security
Computers
computer network security
machine learning
Reinforcement learning
Neural networks
pubcrawl
Resiliency
learning (artificial intelligence)
cyber-physical systems
Support vector machines
computer architecture
Internet of Things
authorisation
biblio
An Anomaly Detector for CAN Bus Networks in Autonomous Cars based on Neural Networks
Submitted by aekwall on Mon, 07/20/2020 - 10:44am
critical phase
in-vehicle networks
academic researchers
anomaly detector
anomaly-detection techniques
autonomous cars
CAN bus networks
CAN packets
Controller Area Networks bus
controller area networks
ID field
industrial researchers
MLP Neural Network
MultiLayer Perceptron neural network
real-time detection
robust secure system
securing communication
wireless interfaces
pubcrawl
security of data
Detectors
intrusion detection system
Internet of Things
Protocols
cyber-physical systems
feature extraction
Resiliency
Automotive engineering
Neural networks
Computer hacking
Anomaly Detection
Intrusion Detection
pattern clustering
controller area network security
intrusion detection method
multilayer perceptrons
biblio
Privacy Preserving Big Data Publication On Cloud Using Mondrian Anonymization Techniques and Deep Neural Networks
Submitted by aekwall on Mon, 07/13/2020 - 11:07am
privacy
k-anonymity
machine learning
Mondrian anonymization techniques
Mondrian based k-anonymity approach
neural nets
Neural networks
personal data
personally identifiable information
predominant factor
high-dimensional data deep neural network based framework
privacy breach
privacy preservation
privacy preserving big data publication
privacy-preservation
protection
Resiliency
security
user privacy in the cloud
data analysis
pubcrawl
Human Factors
resilience
Scalability
Metrics
Big Data
Big Data Analytics
Cloud Computing
compromising privacy
big data privacy
data management
Data models
data privacy
data utility
Databases
deep neural networks
differential privacy
DNN
biblio
Markov Augmented Neural Networks for Streaming Video Classification
Submitted by grigby1 on Fri, 07/03/2020 - 1:27pm
Markov processes
video streaming services
video streaming
video signal processing
telecommunication traffic
streaming video classification
Scalability
Resiliency
resilience
pubcrawl
port scanning
Neural networks
neural nets
content providers
Markov Decision Process
Markov augmented neural networks
machine learning
IP networks
IP addresses
internet providers
internet
Inspection
image classification
deep packet inspection techniques
deep packet inspection
decision theory
biblio
A deep learning approach to trespassing detection using video surveillance data
Submitted by grigby1 on Fri, 07/03/2020 - 1:15pm
Railroad security
Deep Neural Network
dual-stage ARTS architecture
dual-stage deep learning architecture
early warning prediction techniques
high fidelity trespass classification stage
inexpensive pre-filtering stage
potential trespassing sites
public domain surveillance data
deep convolutional neural networks
railroad trespassing activity
safety risks
Subspace constraints
surveillance
Trespassing detection
video processing
video surveillance data
deep video
convolutional neural nets
computer architecture
machine learning
pubcrawl
Metrics
Resiliency
resilience
learning (artificial intelligence)
deep learning
Scalability
Neural networks
video surveillance
Detectors
activity detection
automated railroad trespassing detection system
background subtraction
CNN-based deep learning architecture
computer vision
biblio
Chaotic based Image Encryption - A Neutral Perspective
Submitted by grigby1 on Fri, 06/26/2020 - 12:44pm
encryption
Resiliency
resilience
Random sequences
pubcrawl
Neural networks
neural network
neural nets
information entropy analysis
Informatics
image encryption.
image encryption
Image coding
Entropy
encryption algorithm
chaos
encoding
efficient encryption
efficient algorithms
DNA
cyber-physical systems
Cryptography
correlation coefficient analysis
correlation attacks
Correlation
composability
Chaotic generators
chaotic generator
chaotic communication
chaotic based image encryption
biblio
Facial Expression Recognition Using Merged Convolution Neural Network
Submitted by grigby1 on Fri, 06/19/2020 - 12:02pm
image capture
Training
statistical method
statistical analysis
Resiliency
resilience
real-time systems
pubcrawl
Neural networks
Metrics
merged convolution neural network
MCNN
image recognition
image preprocessing
facial recognition
Human Factors
Human behavior
FER
feature extraction
facial expression recognition
face recognition
emotion recognition
convolutional neural nets
convolution neural network
convolution
CNN
camera
biblio
Detecting Adversarial Examples for Deep Neural Networks via Layer Directed Discriminative Noise Injection
Submitted by grigby1 on Fri, 06/19/2020 - 11:49am
machine learning
Training
Sensitivity
Scalability
Resiliency
resilience
pubcrawl
Policy-Governed Secure Collaboration
policy-based governance
Perturbation methods
noninvasive universal perturbation attack
Neural networks
natural scenes
natural images
MobileNet
adversarial examples
learning (artificial intelligence)
layer directed discriminative noise
false trust
false positive rate
dominant layers
distortion
discriminative noise injection strategy
deep neural networks
deep learning
convolutional neural nets
computer vision tasks
computer vision
computer architecture
adversarial images
biblio
Colorless Video Rendering System via Generative Adversarial Networks
Submitted by grigby1 on Fri, 06/12/2020 - 12:21pm
patience
image re-coloring
image style
learning (artificial intelligence)
machine learning
manual stage
Metrics
Motion pictures
neural nets
Neural networks
old documentary movies
image colour analysis
post-processing software
pubcrawl
rendering (computer graphics)
resilience
Resiliency
Scalability
self-attention GAN
traditional hand-painting techniques
Training
white film era
digital photography
ART
automatic rendering
black- film era
coloring movie frames
coloring old movies
colorless video rendering system
computer images
convolutional neural networks
current digital age
deep learning
aesthetics
Gallium nitride
Generative Adversarial Learning
generative adversarial networks
generative adversarial networks models
generative adversarial networks principle
Generators
human culture
Image color analysis
image coloring
« first
‹ previous
…
29
30
31
32
33
34
35
36
37
…
next ›
last »