Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Adaptation models
biblio
Provenance-based Classification Policy based on Encrypted Search
Submitted by aekwall on Mon, 03/22/2021 - 12:08pm
Predictive Metrics
Encrypted Search
encryption
encryption audits
Games
information retrieval
integrity data
keyword searching
Offline Guessing Attack
pattern classification
encrypted provenance
Privacy Third Party Auditing
provenance-based classification policy
pubcrawl
Public key
security
security protection
semantic security
sensitive information
storage management
cloud document classification
Human behavior
Metrics
Resiliency
composability
Access Control
Adaptation models
authorisation
Cloud Computing
cloud data
Provenance
cloud storage
Compositionality
Cryptography
data integrity
data quality
digital provenance
digital signatures
document category
document handling
biblio
IMPACT: A Trust Model for Human-Agent Teaming
Submitted by aekwall on Mon, 02/01/2021 - 10:39am
IMPACT model
Weapons
unmanned vehicle
trust
Task Analysis
target engagement
remotely operated vehicles
pubcrawl
Predictive models
multi-agent systems
large scale joint exercise controlling multiple unmanned vehicles
intelligent adaptive decision aid
Adaptation models
human-autonomy interaction
human-agent teaming
human trust
human partners
Human behavior
Decision Making
collaborative team
collaboration
autonomous agents
authorization
biblio
A service-oriented adaptive anonymity algorithm
Submitted by grigby1 on Thu, 01/28/2021 - 12:59pm
quasiidentifier attributes
Metrics
Partitioning algorithms
privacy
privacy preservation
privacy-preserving data publishing
pubcrawl
Publishing
Quasi-identifier Attributes
K-anonymity algorithms
released data
resilience
Resiliency
sensitive attributes
service-oriented adaptive anonymity algorithm
service-oriented architecture
splitting value
Adaptation models
k-anonymity
Internet of Things
Human behavior
distribution characteristics
dispersion
data privacy
data handling
contribution value differences
composability
attribute values distribution
attribute value distribution
anonymous results
anonymized data
anonymity group partition process
anonymity
biblio
Defending Against Model Stealing Attacks With Adaptive Misinformation
Submitted by grigby1 on Thu, 01/28/2021 - 12:12pm
Metrics
training dataset
security of data
security
Scalability
Resiliency
resilience
query processing
pubcrawl
Predictive models
Perturbation methods
out-of-distribution inputs
OOD queries
neural nets
model stealing attacks
Adaptation models
learning (artificial intelligence)
labeled dataset
Human behavior
deep neural networks
Data models
Computational modeling
Cloning
clone model
black-box query access
attacker clone model
attacker
Adversary Models
Adaptive Misinformation
biblio
BlurNet: Defense by Filtering the Feature Maps
Submitted by grigby1 on Mon, 12/28/2020 - 11:48am
Scalability
malicious examples
Metrics
neural nets
Neural networks
Perturbation methods
pubcrawl
resilience
Resiliency
robust physical perturbations
Robustness
RP
malicious adversary
security of data
standard blur kernels
standard-architecture traffic sign classifiers
standards
stop signs
substitute model
targeted misclassification rates
traffic engineering computing
victim model
white stickers
white-box attacks
frequency analysis
adaptive attack evaluation
adaptive filtering
adversarial defense
adversarial images
Adversarial Machine Learning
Adversarial robustness
attack algorithms
black stickers
blackbox transfer attack
BlurNet
depthwise convolution layer
Adaptation models
gradient information
high frequency noise
image recognition
image restoration
input image
Kernel
layer feature maps
learning (artificial intelligence)
low-pass filters
lowpass filtering behavior
biblio
Policy-Based Access Control for Robotic Applications
Submitted by grigby1 on Thu, 12/17/2020 - 12:38pm
privacy leakage
Service robots
security aspects
security
ROS
robots
robotic systems
robotic applications
Robot sensing systems
robot programming
robot operating systems
Robot Operating System
Resiliency
resilience
pubcrawl
Access Control
policy-based governance
Policy-based access control
permissions
operating systems
modern robots
Human Factors
Human behavior
extended policy-based access control model
data privacy
basic permission control mechanism
authorisation
Adaptation models
access control mechanism
biblio
Asynchronous Parallel Surrogate Optimization Algorithm Based on Ensemble Surrogating Model and Stochastic Response Surface Method
Submitted by grigby1 on Fri, 11/20/2020 - 12:53pm
parallel optimization algorithm
asynchronous parameter optimization
black-box function optimization
ensemble surrogating model
model integration mode
parallel computing
parallel computing framework
parallel computing resources
parallel computing technology
asynchronous parallel surrogate optimization algorithm
parallel parameter space sampling mechanism
parallel sampling mechanism
Quantitative Trading
response surface methodology
stochastic response surface method
surrogate model-based optimization algorithm
Stochastic Computing Security
Adaptation models
uncertainty handling
parallel algorithms
approximation theory
inference mechanisms
ensemble model
optimisation
Load modeling
Stochastic processes
Computational modeling
Scalability
optimization
Resiliency
resilience
pubcrawl
Predictive models
biblio
A Compositionality Assembled Model for Learning and Recognizing Emotion from Bodily Expression
Submitted by aekwall on Mon, 11/02/2020 - 1:29pm
adaptive learning techniques
single components
RNN learning
real-time emotion recognition
nonlinear dynamic bifurcation
internal emotional state
human body expression
hierarchical recurrent neural learning framework
hierarchical model
express our internal status
compositionality principle
compositionality hypothesis
bodily presentation
bodily expression
bifurcation
Adaptation models
adaptive learning
emotion recognition
Computing Theory and Compositionality
Compositionality
Human Factors
Recurrent neural networks
recurrent neural nets
robots
Training
Neurons
pubcrawl
Human behavior
machine learning
learning (artificial intelligence)
biblio
Towards Efficient Malware Detection and Classification using Multilayered Random Forest Ensemble Technique
Submitted by grigby1 on Thu, 10/29/2020 - 10:12am
malware authors
Vision-based malware analysis
traditional malware
Resiliency
resilience
pubcrawl
privacy
pattern classification
multilayered random forest ensemble technique
microsoft windows
Metrics
malware patterns
malware images
malware detection
malware classification
Adaptation models
malware
learning (artificial intelligence)
invasive software
hybrid model
Human behavior
Gray-scale
Forestry
feature extraction
Ensemble forest
deep neural networks
deep learning models
cyber security
Computational modeling
biblio
An Accurate False Data Detection in Smart Grid Based on Residual Recurrent Neural Network and Adaptive threshold
Submitted by grigby1 on Wed, 10/14/2020 - 11:39am
false data injection attack
cyber physical systems
Transmission line measurements
False Data Detection
power system state estimation
accurate false data detection
Adaptive detection threshold
adaptive judgment threshold
adaptive threshold
Recurrent neural networks
FDIA detection method
linear prediction model
malicious attack
R2N2 model
Residual recurrent neural network
residual recurrent neural network prediction model
Weibull distribution
state estimation
security of data
Predictive models
pubcrawl
Human behavior
resilience
Resiliency
Mathematical model
Data models
Adaptation models
recurrent neural nets
power engineering computing
power system security
Smart Grid
smart power grids
composability
cyber-attacks
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »