Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Twitter
biblio
Sentiment Analysis for Smartphone Operating System: Privacy and Security on Twitter Data
Submitted by grigby1 on Wed, 08/11/2021 - 10:57am
security
pubcrawl
Human Factors
Metrics
resilience
Resiliency
privacy
composability
smart phones
operating systems
Twitter
sentiment analysis
iOS Security
biblio
Evading Deepfake-Image Detectors with White- and Black-Box Attacks
Submitted by grigby1 on Thu, 03/04/2021 - 1:35pm
security of data
neural nets
neural network
optimization
Perturbation methods
popular forensic approach
pubcrawl
resilience
Resiliency
Robustness
Metrics
significant vulnerabilities
social networking (online)
state- of-the-art classifier
synthesizer
synthetic content
synthetically-generated content
target classifier
Training
Twitter
fraudulent social media profiles
white box
security
attack case studies
AUC
black-box attack
composability
deepfake-image detectors
disinformation campaigns
Forensics
White Box Security
Generators
image area
image classification
Image forensics
image generators
image representation
image sensors
image-forensic classifiers
learning (artificial intelligence)
biblio
Decentralized Identifier Distribution for Moving Target Defense and Beyond
Submitted by grigby1 on Tue, 02/23/2021 - 1:56pm
network security
unique universal identifiers
Twitter
timestamp-based concurrency control algorithms
Synchronization
synchronisation
Scalability
Resiliency
resilience
Reconnaissance
pubcrawl
Protocols
protocol
proactive defense
network security objectives
Concurrency
Network reconnaissance
Network Identification
network entity identifiers
moving target defense
IP networks
decentralized identifier distribution
Databases
Cryptography
cryptographically secure random values
Cryptographic Protocols
concurrency control
collision probability
security
biblio
Unsupervised Discovery Of Semantically Aware Communities With Tensor Kruskal Decomposition: A Case Study In Twitter
Submitted by aekwall on Mon, 02/15/2021 - 3:47pm
recursive community structure
functional Twitter elements
hashtag semantics
heavy degree distribution tail
high clustering coefficient values
higher order analytics
higher order counterpart
Julia
Kruskal decomposition
low diameter
news aggregators
Political Campaigns
politics
rank one tensors
functional coherency
semantic weight
semantically aware communities
Structural coherency
structural Twitter elements
substantial empirical evidence
synthetic graph generation models
tensor algebra
tensor kruskal decomposition
tensor representation
Tucker tensor decomposition
Twitter subgraph
unofficial form
unsupervised discovery
tensors
graph theory
social networking (online)
Twitter
Metrics
social network
network theory (graphs)
cyber physical systems
Unsupervised Learning
Semantics
Compositionality
Periodic structures
singular value decomposition
SVD
pubcrawl
Tucker decomposition
decomposition
analytical methodologies
Blogs
clustered graph spectrum
Community discovery
community structure discovery
compact community size distribution
digital marketing
Facebook groups
fact checking
followfollower relationships
biblio
Preventing Poisoning Attacks On AI Based Threat Intelligence Systems
Submitted by grigby1 on Wed, 11/04/2020 - 1:13pm
poisoning attacks prevention
Web sites
Twitter
threat intelligence systems
Support vector machines
social networking (online)
security of data
security analysts
Scalability
Resiliency
resilience
pubcrawl
AI Poisoning
online social media
malicious information
learning (artificial intelligence)
Human behavior
ensembled semi-supervised approach
Engines
cybersecurity domain
computer security
Artificial Intelligence
AI systems
biblio
HashTag Erasure Codes: From Theory to Practice
Submitted by grigby1 on Mon, 11/02/2020 - 10:40am
Scalability
maintenance engineering
MDS erasure codes
minimum-storage regenerating codes
MSR constructions
pubcrawl
Reed-Solomon codes
regenerating codes
repair-bandwidth
lowest data-read
single and multiple failures
small sub-packetization level
storage management
storage overhead
sub-packetization level
Systematics
Twitter
access-optimal
input-output programs
i/o systems security
I/O operations
i-o systems security
HTECs
high-rate MDS codes
hashtag sign
HashTag erasure codes
Hadoop
encoding
distributed storage
Distributed databases
data analysis
code construction
Bandwidth
biblio
PAVSS: Privacy Assessment Vulnerability Scoring System
Submitted by aekwall on Mon, 10/12/2020 - 10:31am
social engineering
Expert Systems and Privacy
Twitter data
privacy-breach vulnerability
Privacy Assessment Vulnerability Scoring System
Privacy assessment
PAVSS
online sources
online so cial networks
online platform
Federal Trade Commission
fair information practice principles
consumer information
cybersecurity experts
security of data
stored data
private data
Human Factors
Data Breach
Data Security
privacy
Twitter
social networking (online)
privacy attacks
pubcrawl
Human behavior
data privacy
Scalability
biblio
Machine Learning and Social Media to Mine and Disseminate Big Scientific Data
Submitted by grigby1 on Fri, 05/22/2020 - 1:43pm
social media
ORNL
pubcrawl
query processing
relational databases
resilience
Resiliency
Scalability
scientific data mining
scientific databases
Oak Ridge National Laboratory
social media interaction
social networking (online)
SQL
SQL language
SQL queries
stream pipelining
structured databases
Structured Query Language
Twitter
Databases
big scientific data
Data discovery
data dissemination
Data mining
data retrieval
data streams
data-intensive projects
Database languages
database queries
atmospheric radiation measurement data center
easy search
environmental data centers
Human behavior
information dissemination
Laboratories
learning (artificial intelligence)
machine learning
machine learning framework
natural language processing
biblio
Detection of Spammers in the Reconnaissance Phase by machine learning techniques
Submitted by grigby1 on Fri, 05/15/2020 - 10:56am
pubcrawl
Xgboost
Twitter
testing
supervised learning
social networking (online)
Social Network Fake Profiles
security of data
Scalability
Resiliency
resilience
reconnaissance phase
artificial honeypot profiles
professional social networks
organizational social network
Network reconnaissance
machine learning techniques
machine learning algorithms
machine learning
learning (artificial intelligence)
Feature Based Strategy
DspamRPfast model
Conferences
Classification algorithms
biblio
A Temporal Recurrent Neural Network Approach to Detecting Market Anomaly Attacks
Submitted by grigby1 on Fri, 05/08/2020 - 2:02pm
recurrent neural nets
U.S. technology companies
Twitter
TRNN
text sequence dependency
temporal recurrent neural network approach
stock markets
social networking (online)
Social network services
social media
Sequence Prediction
security of data
Resiliency
resilience
Recurrent neural networks
recurrent neural network
Anomaly Detection
pubcrawl
policy-based governance
Neural Network Security
Metrics
market anomaly attacks detection
learning (artificial intelligence)
financial stocks markets
financial social media messages
financial market security
feature extraction
deep learning approaches
commodities markets
collaboration
Cognitive Hacking
Artificial Neural Networks
1
2
3
4
next ›
last »