Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Syntactics
biblio
Design and Implementation of English Grammar Error Correction System Based on Deep Learning
Submitted by grigby1 on Mon, 07/31/2023 - 3:49pm
deep learning
pubcrawl
Metrics
resilience
composability
Syntactics
forward error correction
information science
Grammar
education
Resiliency
Grammatical Error Correction
N-um syntax
biblio
Research on Relation Extraction of Fusion Entity Enhancement and Shortest Dependency Path based on BERT
Submitted by grigby1 on Fri, 06/09/2023 - 1:18pm
Semantics
shortest dependency path
Cyber Dependencies
relation extraction
BERT
Transformers
Resiliency
Bit error rate
natural language processing
Syntactics
deep learning
Compositionality
composability
Scalability
resilience
Metrics
Human Factors
Human behavior
pubcrawl
feature extraction
biblio
Learning Common Dependency Structure for Unsupervised Cross-Domain Ner
Submitted by grigby1 on Fri, 06/09/2023 - 1:17pm
composability
unsupervised cross-domain
dependency structure
Cyber Dependencies
named entity recognition
Resiliency
Speech recognition
Acoustics
graph neural networks
Syntactics
Compositionality
signal processing
Scalability
Conferences
resilience
Metrics
Human Factors
Human behavior
pubcrawl
Training
Adaptation models
biblio
Security Foundations for Application-Based Covert Communication Channels
Submitted by grigby1 on Fri, 05/19/2023 - 1:26pm
resilience
privacy-enhancing technologies
censorship
and censorship
Resiliency
Security Foundations
Communication channels
anonymity
covert channels
security
Syntactics
Compositionality
cognition
Protocols
privacy
Scalability
pubcrawl
biblio
VDBWGDL: Vulnerability Detection Based On Weight Graph And Deep Learning
Submitted by grigby1 on Fri, 04/28/2023 - 10:53am
composability
Weight Graph
Code Variant
vulnerability detection
codes
coding theory
Sensitivity
Syntactics
Semantics
Compositionality
Cryptography
Conferences
Resiliency
resilience
Metrics
pubcrawl
security
information security
deep learning
biblio
Unleashing the Power of Compiler Intermediate Representation to Enhance Neural Program Embeddings
Submitted by aekwall on Fri, 04/28/2023 - 8:43am
Task Analysis
Training
Scalability
pubcrawl
Metrics
Resiliency
Training data
Compositionality
Program processors
Syntactics
Cloning
codes
compiler technique
deep learing
program embedding
compiler security
biblio
Pausing While Programming: Insights From Keystroke Analysis
Submitted by grigby1 on Fri, 03/03/2023 - 4:19pm
Training
pubcrawl
Human behavior
Metrics
Correlation
Java
Syntactics
Python
software engineering
Technological innovation
Writing
Programming profession
keystroke analysis
codes
• Social and professional topics → Computing education.
biblio
SecurePtrs: Proving Secure Compilation with Data-Flow Back-Translation and Turn-Taking Simulation
Submitted by aekwall on Fri, 02/17/2023 - 9:50am
compiler security
Resiliency
Compositionality
Scalability
Metrics
pubcrawl
codes
Computational modeling
computer security
Human Factors
n/a
policy-based governance
Safe Coding
Syntactics
Technological innovation
biblio
Authorship Verification via Linear Correlation Methods of n-gram and Syntax Metrics
Submitted by grigby1 on Fri, 02/03/2023 - 4:07pm
Training
machine learning
pubcrawl
Human behavior
Metrics
Correlation
Measurement
Training data
Syntactics
Software algorithms
Technological innovation
stylometry
authorship
N-grams
Part of Speech (PoS)
syntactical data
biblio
Research on Computer Network Security Framework Based on Concurrent Data Detection and Security Modelling
Submitted by aekwall on Fri, 01/13/2023 - 3:03pm
Drives
Computational modeling
Data models
Scalability
pubcrawl
Semantics
Compositionality
network security
Syntactics
computer network
Concurrent Data Detection
security framework
Security Modelling
security scalability
1
2
3
4
5
6
7
next ›
last »