Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
pattern classification
biblio
Provenance-based Classification Policy based on Encrypted Search
Submitted by aekwall on Mon, 03/22/2021 - 1:08pm
Predictive Metrics
Encrypted Search
encryption
encryption audits
Games
information retrieval
integrity data
keyword searching
Offline Guessing Attack
pattern classification
encrypted provenance
Privacy Third Party Auditing
provenance-based classification policy
pubcrawl
Public key
security
security protection
semantic security
sensitive information
storage management
cloud document classification
Human behavior
Metrics
Resiliency
composability
Access Control
Adaptation models
authorisation
Cloud Computing
cloud data
Provenance
cloud storage
Compositionality
Cryptography
data integrity
data quality
digital provenance
digital signatures
document category
document handling
biblio
SSH and FTP brute-force Attacks Detection in Computer Networks: LSTM and Machine Learning Approaches
Submitted by grigby1 on Tue, 03/09/2021 - 2:36pm
learning (artificial intelligence)
telecommunication traffic
SSH
pubcrawl
policy-based governance
pattern classification
password
network traffic anomaly detection
network security
MLP
machine learning classifiers
machine learning approaches
machine learning algorithms
machine learning
LSTM
long short-term memory deep learning approach
Anomaly Detection
Intrusion Detection
internet
Human Factors
Human behavior
high-level attacks
FTP
dictionary-based brute-force attacks
Dictionaries
deep learning.
deep learning
computer network security
Computer Network Attacks
brute-force
brute force attacks
biblio
Mobile Botnet Detection: A Deep Learning Approach Using Convolutional Neural Networks
Submitted by grigby1 on Tue, 03/09/2021 - 2:22pm
mobile devices
ISCX botnet dataset
learning (artificial intelligence)
machine learning
machine learning classifiers
malicious apps
Metrics
mobile botnet detection
mobile computing
invasive software
mobile operating systems
pattern classification
program diagnostics
pubcrawl
resilience
Resiliency
smart phones
static app features
CNN-based approach
Android botnet detection
Android Botnets
Android platform
Androids
botnet
botnet apps
Botnet detection
botnets
Android (operating system)
CNN-based model
composability
convolutional neural nets
convolutional neural networks
deep learning
feature extraction
Forestry
Humanoid robots
biblio
GeoDA: A Geometric Framework for Black-Box Adversarial Attacks
Submitted by aekwall on Tue, 03/09/2021 - 12:05pm
image classification
Robustness
Resiliency
query processing
queries
pubcrawl
Perturbation methods
pattern classification
optimisation
Neural networks
natural image classifiers
minimal perturbation
Metrics
Measurement
mean curvature
Iterative methods
adversarial examples
geometric framework
gaussian distribution
estimation
effective iterative algorithm
Deep Networks
decision boundary
data samples
Covariance matrices
composability
carefully perturbed images
black-box settings
black-box perturbations
black-box attack algorithm
black-box adversarial attacks
black box encryption
biblio
Improving Black Box Classification Model Veracity for Electronics Anomaly Detection
Submitted by aekwall on Tue, 03/09/2021 - 12:05pm
electronics anomaly detection
fault detection
KNN
BB-stepwise algorithm
black box
black box classification model veracity
black box model
classification model transparency
data driven classification models
decision tree models
fault diagnosis
electronics devices
electronics industry
higher transparency
Industrial electronics
KNN models
KNN-stepwise
manufactured electronics
Stepwise
Metrics
performance evaluation
Classification algorithms
Data models
nearest neighbour methods
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
composability
Conferences
pattern classification
manufacturing systems
production engineering computing
black box encryption
Decision trees
classification
Veracity
Feature Selection
biblio
Hybrid Deep Neural Networks to Infer State Models of Black-Box Systems
Submitted by aekwall on Tue, 03/09/2021 - 12:04pm
inferred states
automated software engineering tasks
Black-box Model Inference
black-box systems
black-box techniques
black-box third-party libraries
C code
detection techniques
entire source code
existing dynamic model inference techniques
hybrid deep neural network
infer state models
888 random recent system-level test cases
inferring behavior model
program comprehension
recurrent layers
run-time traces
running software system
Specification Mining
state change points
state classification algorithm
traditional time series change
UAV auto-pilot solution
white-box
Anomaly Detection
Time measurement
Classification algorithms
learning (artificial intelligence)
Resiliency
pubcrawl
composability
Metrics
neural nets
pattern classification
program testing
testing
Task Analysis
software engineering
black box encryption
aerospace computing
deep learning
Instruments
inference mechanisms
time series
convolutional neural network
Time series analysis
recurrent neural network
convolutional layers
biblio
Constrained Interval Type-2 Fuzzy Classification Systems for Explainable AI (XAI)
Submitted by aekwall on Mon, 03/01/2021 - 5:01pm
xai
type-reduction step
output interval centroid
IT2
interval type-2 fuzzy logic
inherently interpretable structure
fuzzy logic systems
explainable type-2 fuzzy systems
explainable CIT2 classifiers
constrained interval type-2 fuzzy sets
constrained interval type-2 fuzzy classification systems
Constrained interval type-2
classification reliability
explainable artificial intelligence
Intelligent systems
Scalability
explainable AI
Artificial Intelligence
Switches
Linguistics
Fuzzy sets
Indexes
Generators
fuzzy set theory
Fuzzy logic
natural language
pattern classification
Shape
pubcrawl
Resiliency
biblio
Lightweight Testbed for Cybersecurity Experiments in SCADA-based Systems
Submitted by grigby1 on Tue, 02/23/2021 - 2:58pm
reconnaissance attack
Network reconnaissance
network scanning
network traffic
Open area test sites
pattern classification
physical damages
Protocols
pubcrawl
network classification model
resilience
Resiliency
SCADA
SCADA systems
SCADA-based Systems
Scalability
telecommunication traffic
testbed
cybersecurity experiments
computer network security
computer security
container-based SCADA testbed
Containers
critical infrastructure
critical infrastructures
cyber physical systems
cyber-attacks
ARP Spoofing
Docker
experimental testbeds
financial damages
interoperable platform
learning (artificial intelligence)
machine learning
man in the middle attack
MITM Attack
biblio
A Hybrid Feature Extraction Network for Intrusion Detection Based on Global Attention Mechanism
Submitted by grigby1 on Tue, 02/23/2021 - 2:46pm
intrusion detection task
AI methods
false alarm rates
feature extraction layer
fully connected layer
Global Attention Mechanism
global attention mechanism layer
hybrid feature extraction network
hybrid network
temporal features
intrusion detection tasks
large-scale network traffic
low recognition performance
network monitoring system
network traffic attributes
Residual U Net
RULA-IDS
SVM classification layer
computer network security
feature extraction
machine learning
Support vector machines
Intrusion Detection
pubcrawl
Metrics
resilience
Resiliency
Training
telecommunication traffic
composability
pattern classification
neural nets
deep learning
testing
network intrusion detection
spatial features
biblio
Network Intrusion Detection Method Based on GAN Model
Submitted by grigby1 on Tue, 02/23/2021 - 2:45pm
performance indicators
Metrics
multi-classification model
network intrusion detection
network intrusion detection method
neural nets
original classification model
parameter setting
pattern classification
loss function
pubcrawl
resilience
security of data
supervised learning
supervised learning multiclassification model
Training
training method
Transforms
Gallium nitride
Resiliency
Predictive Metrics
Scalability
adversarial idea
binary classification model
composability
Computational modeling
detection accuracy
Generative Adversarial Learning
gan
GAN model
generated adversarial network
generative adversarial networks
label sample set
label samples
learning (artificial intelligence)
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »