Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Neural networks
biblio
Towards Understanding Limitations of Pixel Discretization Against Adversarial Attacks
Submitted by grigby1 on Tue, 02/18/2020 - 11:52am
neural nets
white-box attacks
white box cryptography
Training
Robustness
Resiliency
resilience
pubcrawl
preprocessing defense methods
preprocessing defense
pixel discretization defense method
pixel discretization
Perturbation methods
Neural networks
adversarial attacks
MNIST
Metrics
Measurement
machine learning
low computational overhead
ImageNet
Image Processing
deep learning
Data models
Cryptography
composability
Artificial Neural Networks
biblio
Mathematical Modeling of the Security Management Process of an Information System in Conditions of Unauthorized External Influences
Submitted by aekwall on Mon, 02/17/2020 - 2:22pm
neural network
wavelet transforms
wavelet transform
unauthorized external influences
signal processing security
security of data
security management process
Resiliency
pubcrawl
privacy
Neural networks
Dynamical Systems
neural nets
Metrics
mathematical modeling
information system
impact
dynamic analysis
conflict
composability
adaptive response unit
biblio
Video Steganography by Neural Networks Using Hash Function
Submitted by grigby1 on Mon, 02/10/2020 - 11:44am
neural nets
video steganography
video signal processing
video content
video
telecommunication security
STEM
stego video
steganography detection
Steganography
steganographic techniques
pubcrawl
PSNR
privacy
Neural networks
Artificial Neural Networks
MSE
Metrics
Image Steganography
hybrid neural networks
Hash Function
hash algorithm
hash
discrete wavelet transforms
digital video
Data mining
Cryptography
computer science
composability
biblio
Initial Weights Optimization Using Enhanced Step Size Firefly Algorithm for Feed Forward Neural Network Applied to Spam Detection
Submitted by grigby1 on Mon, 02/10/2020 - 11:17am
Enhanced Step Size Firefly
feed forward neural network
Feeds
Human behavior
Human Factors
Initial Weight Optimization
Metrics
Neural networks
Neurons
optimization
pubcrawl
Scalability
Social network services
spam detection
Training
Uniform resource locators
biblio
Adversarial Machine Learning Beyond the Image Domain
Submitted by grigby1 on Tue, 01/28/2020 - 2:39pm
Adversarial Machine Learning
composability
Intrusion Detection
machine learning
Neural networks
privacy
pubcrawl
resilience
Resiliency
biblio
Latent Backdoor Attacks on Deep Neural Networks
Submitted by grigby1 on Mon, 01/27/2020 - 12:30pm
Artificial Intelligence
Human behavior
Human Factors
machine learning
Metrics
Neural networks
pubcrawl
stylometry
biblio
Intrusion Detection Using Swarm Intelligence
Submitted by aekwall on Mon, 01/27/2020 - 10:26am
random neural network based system
mean squared error
multilayer perceptrons
Neural networks
Neurons
NSL-KDD
NSL-KDD Train
particle swarm optimization
Prediction algorithms
pubcrawl
mean square error methods
recurrent neural nets
Recurrent neural networks
RNN-ABC
sensitive information
SQL
SQL injection
Swarm Intelligence
Training
hybrid multilayer perceptron based intrusion detection system
Artificial Bee Colony
artificial bee colony algorithm
Biological neural networks
communication technologies
composability
Compositionality
computer network security
Cyber Attacks
Denial-of-Service
anomaly-based intrusion detection scheme
insecure channel
Internet of Things
Internet-of-Things devices
Intrusion Detection
IoT device
IoT security
learning (artificial intelligence)
man-in-middle
biblio
Using Machine Learning for Handover Optimization in Vehicular Fog Computing
Submitted by grigby1 on Tue, 01/21/2020 - 11:39am
Fog computing
fog request distribution
handover optimization
Neural networks
pubcrawl
resilience
Resiliency
Scalability
security
vehicular networks
biblio
User Behavior Profiling Using Ensemble Approach for Insider Threat Detection
Submitted by grigby1 on Tue, 01/21/2020 - 11:24am
resilience
Monitoring
MSLSTM
multistate long short term memory
multistate LSTM
network walls
Neural networks
Organizations
policy-based governance
pubcrawl
Metrics
Resiliency
security of data
Servers
spatial-temporal behavior features
time series
Time Series Anomaly Detection
user behavior action sequence
user behavior profiling
ensemble hybrid machine learning
behavioural sciences computing
CNN
collaboration
convolution
convolution neural network
convolution neural networks
convolutional neural nets
cyber security
Anomaly Detection
feature extraction
Human behavior
human behavior impact
insider threat
Insider Threat Detection
learning (artificial intelligence)
machine learning
malicious activities
file
AMapi: An Application Programming Interface for Additive Manufacturing Systems
Submitted by Arman Sabbaghi on Fri, 01/10/2020 - 4:45pm. Contributors:
Arman Sabbaghi
Raquel De Souza
Borges Ferreira
Kevin Amstutz
Qiang Huang
3D printing
Artificial Intelligence
cyber-physical systems
Neural networks
Posters
1544841
CPS PI Meeting 2019
2019
NSF
U.S. Government
Poster
« first
‹ previous
…
32
33
34
35
36
37
38
39
40
…
next ›
last »