Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Neural networks
biblio
Autoencoder Classification Algorithm Based on Swam Intelligence Optimization
Submitted by aekwall on Thu, 02/21/2019 - 1:02pm
Neural networks
Swarm Intelligence
Swam Intelligence Optimization
softmax
Quantum Particle Swarm Optimization(QPSO)
Quantum Particle Swarm Optimization
QPSO
pubcrawl
pattern classification
particle swarm optimization
particle swarm optimisation
Neurons
autoencoder classification algorithm
neural nets
Iris
Glass
Decoding
composability
Classification algorithms
classification
BP algorithm
Backpropagation
Autoencoder Neural Network
biblio
Artificial Intelligence in Cyber Threats Intelligence
Submitted by grigby1 on Fri, 02/08/2019 - 4:14pm
Human behavior
Sequential Feature Selection
Resiliency
Reservoirs
Remote Network Monitoring
pubcrawl
Neural networks
Metrics
information security
Artificial Intelligence
feature extraction
Cyber Threats Intelligence
computer security
composability
Classification algorithms
Behaviour Assessment
artificial intelligence security
biblio
Preventing Neural Network Model Exfiltration in Machine Learning Hardware Accelerators
Submitted by grigby1 on Mon, 01/21/2019 - 12:39pm
Metrics
Training
Side-Channels
Scalability
Resiliency
pubcrawl
Neural networks
neural network
model theft
model exfiltration
Adversary Models
memory probing
machine learning
inference
Human behavior
Hardware Security
Hardware
Data models
Context modeling
Computational modeling
biblio
Applying Deep Learning and Vector Representation for Software Vulnerabilities Detection
Submitted by grigby1 on Mon, 01/21/2019 - 12:15pm
Compositionality
deep learning
Human behavior
integer overflow
Metrics
Neural networks
pubcrawl
Resiliency
vector representations
vulnerability assessment
vulnerability detection
biblio
Defense Against Adversarial Attacks Using High-Level Representation Guided Denoiser
Submitted by aekwall on Wed, 01/16/2019 - 2:10pm
Predictive models
resilience
pubcrawl
Metrics
composability
Training
Adaptation models
Neural networks
Perturbation methods
Image reconstruction
noise reduction
White Box Security
biblio
Fooling End-To-End Speaker Verification With Adversarial Examples
Submitted by aekwall on Wed, 01/16/2019 - 2:10pm
adversarial examples
White Box Security
YOHO
original speaker examples
NTIMIT
MFCC
Mel frequency cepstral coefficient
fooling end-to-end speaker verification
end-to-end deep neural models
deep end-to-end network
black-box attacks
automatic speaker verification systems
Automatic speaker verification
security of data
Perturbation methods
Neural networks
neural nets
Task Analysis
Training
speaker recognition
composability
Metrics
pubcrawl
resilience
standards
biblio
Audio Adversarial Examples: Targeted Attacks on Speech-to-Text
Submitted by aekwall on Wed, 01/16/2019 - 2:10pm
automatic speech recognition
White Box Security
white-box iterative optimization-based attack
targeted audio adversarial examples
targeted attacks
speech-to-text
Probability distribution
neural network
Mozilla implementation DeepSpeech end
Iterative methods
Distortion measurement
distortion
security of data
audio waveform
adversarial example
Perturbation methods
Neural networks
Speech recognition
composability
Metrics
pubcrawl
resilience
optimisation
biblio
Detecting Malicious PowerShell Commands Using Deep Neural Networks
Submitted by aekwall on Wed, 01/16/2019 - 2:08pm
Security by Default
composability
deep learning
malware detection
Metrics
natural language processing
Neural networks
powershell
pubcrawl
Resiliency
Windows Operating System Security
biblio
A Machine Learning Approach to Malicious JavaScript Detection using Fixed Length Vector Representation
Submitted by grigby1 on Mon, 12/10/2018 - 11:38am
pubcrawl
malicious JavaScript detection
malicious JS code detection
malicious JS codes
Metrics
neural nets
neural network model
Neural networks
pattern classification
plugin software
Predictive models
machine learning
resilience
Resiliency
Support vector machines
Vectors
web applications
Web site
Web sites
Zero day attacks
Zero-day attacks
drive-by-download attacks
Browsers
classifier model
composability
Context modeling
cyberattacks
Cybersecurity
D3M Dataset
defense
Doc2Vec
Doc2Vec features
authoring languages
Drive-by-Download Data
feature extraction
feature learning
features extraction
fixed length vector representation
invasive software
Java
JavaScript
learning (artificial intelligence)
biblio
Arbitrary Style Transfer in Real-Time with Adaptive Instance Normalization
Submitted by grigby1 on Mon, 11/19/2018 - 12:30pm
Metrics
Training
style features
Scalability
Resiliency
resilience
rendering (computer graphics)
real-time systems
pubcrawl
optimization
optimisation
neural style transfer
Neural networks
neural algorithm
AdaIN layer
iterative optimization process
Iterative methods
interpolation
Histograms
Gallium nitride
feedforward neural nets
feed-forward neural networks
feature extraction
content image rendering
arbitrary style transfer
approximation theory
adaptive instance normalization layer
« first
‹ previous
…
35
36
37
38
39
40
41
42
43
next ›
last »