Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
AUC
biblio
A Dual Approach for Preventing Blackhole Attacks in Vehicular Ad Hoc Networks Using Statistical Techniques and Supervised Machine Learning
Submitted by aekwall on Mon, 01/10/2022 - 11:54am
Receivers
Attack vectors
VANETs
ROC
f1-score AODV
Blackhole
AUC
Accuracy
denial-of-service attack
vehicular ad hoc networks
Measurement
Human behavior
Resiliency
Scalability
pubcrawl
Public key
machine learning
Support vector machines
Robustness
biblio
Evading Deepfake-Image Detectors with White- and Black-Box Attacks
Submitted by grigby1 on Thu, 03/04/2021 - 1:35pm
security of data
neural nets
neural network
optimization
Perturbation methods
popular forensic approach
pubcrawl
resilience
Resiliency
Robustness
Metrics
significant vulnerabilities
social networking (online)
state- of-the-art classifier
synthesizer
synthetic content
synthetically-generated content
target classifier
Training
Twitter
fraudulent social media profiles
white box
security
attack case studies
AUC
black-box attack
composability
deepfake-image detectors
disinformation campaigns
Forensics
White Box Security
Generators
image area
image classification
Image forensics
image generators
image representation
image sensors
image-forensic classifiers
learning (artificial intelligence)
biblio
Threshold Based Optimization of Performance Metrics with Severely Imbalanced Big Security Data
Submitted by grigby1 on Fri, 04/03/2020 - 11:18am
learning (artificial intelligence)
threshold based optimization
Slow HTTP POST
severely imbalanced slow HTTP DoS attack data
severely imbalanced big security data
security of data
pubcrawl
predictive security metrics
Performance Metrics
pattern classification
optimisation
Metrics
machine learning techniques
big data security metrics
imbalanced big dataset
Decision trees
cyber security domain
classifier predictive models
classifier performance
classification threshold
class imbalance
C4.5N decision tree
Big Data
AUC
area under the receiver operating characteristic curve
biblio
Cross-Release Code Churn Impact on Effort-Aware Software Defect Prediction
Submitted by grigby1 on Thu, 09/26/2019 - 9:25am
open-source projects
standards
software quality
software metrics
software defect prediction
Safe Coding
Resiliency
resilience
regression analysis
public domain software
pubcrawl
Predictive models
Pop effort aware measure
policy-based governance
AUC
Open Source Software
Metrics
Measurement
Human Factors
Human behavior
GM
effort-aware software defect prediction
design metrics
cross-release code churn impact
Cross-release code churn
Correlation
complex systems
collaboration
biblio
Classifying Text-Based Computer Interactions for Health Monitoring
Submitted by grigby1 on Wed, 03/08/2017 - 1:44pm
pervasive computing
healthcare provider
human computer interaction
Human-computer interaction
keystroke analysis
Monitoring
patient monitoring
pattern classification
personal health informatics
Healthcare
Pragmatics
Predictive models
PreMCI
premild cognitive impairment
pubcrawl170115
text analysis
unobtrusive method
aging
health monitoring
health care
Dementia
Data models
current assessment
continuous monitoring
constructed statistical model
computer interaction pattern
Computational modeling
cognitive impairment
cognitive function
classifying text-based computer interaction
classification rate
AUC
area under curve
biblio
Who Wrote This? Textual Modeling with Authorship Attribution in Big Data
Submitted by BrandonB on Mon, 05/04/2015 - 1:22pm
textual modeling
multiple-author documents
Predictive models
Probabilistic topic models
receiver operating characteristic curve
ROC curve
SAT model
supervised author-topic model
text analysis
meta-data
topic representations
topic-based generative models
Training
unsupervised AT model
Unsupervised Learning
unsupervised learning technique
Vectors
Computational modeling
area under curve
AUC
author-topic model
authorship attribution
authorship learning
authorship prediction
Bayesian inference
Big Data
Analytical models
Data models
dimension reduction
Dirichlet distribution
High dimensional texual data
information discovery
Mathematical model
meta data
biblio
Identifying users with application-specific command streams
Submitted by BrandonB on Thu, 04/30/2015 - 12:52pm
receiver operating characteristic
machine learning
machine learning algorithms
message authentication
Mice
Microsoft
MS Word commands
Radio frequency
random forests
learning (artificial intelligence)
RF
ROC curve
sensitivity analysis
user command streams
user identification
user profiles
user-issued commands
Active Authentication
Keyboards
Intrusion Detection
Human-computer interaction
human computer interaction
Hidden Markov models
GUI-based application
Classification algorithms
biometrics (access control)
Behavioral biometrics
authentication
AUC
area under the curve
application-specific command streams
AdaBoost
active authentication model