Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
pattern classification
biblio
Applications of Graph Integration to Function Comparison and Malware Classification
Submitted by grigby1 on Fri, 12/11/2020 - 2:34pm
pubcrawl
NET
pagerank
PageRank measure integration vectorization
PageRank vector
pattern classification
Perron vector
PMIV
privacy
probability
probability measure
Metrics
random forests
resilience
Resiliency
set theory
standalone classifier
text analysis
text-only feature space
vanilla random forest
vertex set
hand-engineered functions
abstract syntax tree
classification
code block
decompilation
directed graphs
easy-to-compute glass-box vectorization scheme
feature extraction
function comparison
graph integration
graph theory
.NET files
Human behavior
invasive software
Lebesgue antiderivatives
machine learning
malware
Malware Analysis
malware classification
markov chain
Markov processes
biblio
Graph Embedding Based Familial Analysis of Android Malware using Unsupervised Learning
Submitted by grigby1 on Fri, 12/11/2020 - 2:32pm
Malware Analysis
Unsupervised Learning
supervised learning
SRA
smart phones
similarity relationships
Semantics
security
Resiliency
resilience
pubcrawl
privacy
pattern clustering
pattern classification
Metrics
malware link network
analytical workload
malware
learning (artificial intelligence)
invasive software
Human behavior
graph theory
graph embedding techniques
graph embedding
GefDroid
feature extraction
familial analysis
Face
detection algorithms
application program interfaces
Android malware
biblio
Fidelity: Towards Measuring the Trustworthiness of Neural Network Classification
Submitted by aekwall on Mon, 12/07/2020 - 12:32pm
pattern classification
security-critical tasks
neural network system
neural network classification
adversarial settings
adversarial attack detection
adversarial examples
Perturbation methods
trustworthiness
machine learning model
machine learning
security of data
Neural networks
neural nets
Statistics
Sociology
Computational modeling
composability
pubcrawl
learning (artificial intelligence)
Trusted Computing
Task Analysis
biblio
IoT Denial-of-Service Attack Detection and Prevention Using Hybrid IDS
Submitted by grigby1 on Tue, 12/01/2020 - 1:45pm
Internet of Things
Signature-based IDS
Signature-based
security issues
Resiliency
resilience
pattern classification
network packet classification
IoT DoS
IoT denial-of-service attack detection
intrusion detection system
intrusion detection and prevention systems
pubcrawl
IDS
IDPS
hybrid IDS
DoS Attack Detection
digital signatures
computer network security
composability
anomaly-based IDS
Anomaly-based
ACL
biblio
Variational Encoder-Decoder Recurrent Neural Network (VED-RNN) for Anomaly Prediction in a Host Environment
Submitted by aekwall on Mon, 11/09/2020 - 1:20pm
Hidden Markov models
Information Reuse and Security
VED-RNN
variational encoder-decoder recurrent neural network
System-calls
system-call traces
sequence to sequence model
sequence to sequence
security tools
prediction model input data representation
HIDS
anomaly prediction
one-class classification
NIDS
security of data
Compositionality
Intrusion Detection Systems
Recurrent neural networks
recurrent neural nets
Predictive models
Anomaly Detection
Prediction algorithms
pattern classification
Decoding
pubcrawl
Resiliency
Classification algorithms
biblio
Face Recognition Based on Densely Connected Convolutional Networks
Submitted by aekwall on Mon, 11/09/2020 - 1:13pm
CASIA-WebFace dataset
Information Reuse and Security
residual network
LFW dataset
face verification accuracy
face recognition model
face recognition methods
densely connected convolutional neural network
densely connected convolutional networks
dense face model
dense block layers
feature extraction
CAS-PEAL-Rl dataset
face recognition
Compositionality
recurrent neural nets
convolution
pattern classification
pubcrawl
Resiliency
learning (artificial intelligence)
biblio
Addressing Adversarial Attacks Against Security Systems Based on Machine Learning
Submitted by grigby1 on Wed, 11/04/2020 - 2:16pm
machine learning
spam
Scalability
Resiliency
resilience
pubcrawl
poisoning attacks
poisoning attack
pattern classification
Organizations
network intrusion detection
malware
machine-learning classifiers
adversarial attacks
learning (artificial intelligence)
invasive software
Intrusion Detection
Human behavior
evasion attacks
Detectors
deep learning
cyber security platforms
cyber detector
Computer crime
AI Poisoning
biblio
Few-Shot Transfer Learning for Text Classification With Lightweight Word Embedding Based Models
Submitted by aekwall on Mon, 11/02/2020 - 2:30pm
pooling strategy
Few-shot learning
few-shot transfer learning tasks
lightweight word embedding-based models
modified hierarchical pooling strategy
parameter-free pooling operations
parameter-free property
parameters training
plug-and-play way
deep learning architectures
semantic compositionality
Semantic Networks
semantic text
simple word embedding-based models
supervised data
unseen text sequences
word embedding based models
word processing
text categorization
Data models
feature extraction
Human behavior
pubcrawl
Computational modeling
pattern classification
Training
text analysis
Task Analysis
text classification
transfer learning
deep learning
Human Factors
Compositionality
Computing Theory and Compositionality
supervised learning
data-hungry deep models
biblio
Towards Efficient Malware Detection and Classification using Multilayered Random Forest Ensemble Technique
Submitted by grigby1 on Thu, 10/29/2020 - 11:12am
malware authors
Vision-based malware analysis
traditional malware
Resiliency
resilience
pubcrawl
privacy
pattern classification
multilayered random forest ensemble technique
microsoft windows
Metrics
malware patterns
malware images
malware detection
malware classification
Adaptation models
malware
learning (artificial intelligence)
invasive software
hybrid model
Human behavior
Gray-scale
Forestry
feature extraction
Ensemble forest
deep neural networks
deep learning models
cyber security
Computational modeling
biblio
Convolutional Neural Networks as Classification Tools and Feature Extractors for Distinguishing Malware Programs
Submitted by grigby1 on Thu, 10/29/2020 - 11:11am
malware detection
visualization
Training
testing
SVM
Support vector machines
support vector machine
Resiliency
resilience
pubcrawl
privacy
pattern classification
nearest neighbour methods
microsoft malware classification challenge
Metrics
malware programs
anti-malware industry
malware classification
malware
learning (artificial intelligence)
KNN
k-nearest neighbors
invasive software
Human behavior
feature extractors
feature extraction
convolutional neural networks
convolutional neural nets
computer architecture
computationally efficient CNN-based architecture
CNN based algorithms
classification tools
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »