Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
black-box
biblio
SPA: An Efficient Adversarial Attack on Spiking Neural Networks using Spike Probabilistic
Submitted by aekwall on Tue, 12/20/2022 - 5:21pm
Perturbation methods
white-box
White Box Security
transferability
Spiking Neural Networks
SNNs
security
Resiliency
pubcrawl
Probabilistic logic
adversarial attacks
perturbation
Neural networks
Metrics
Medical diagnosis
Linear programming
Degradation
composability
black-box
biblio
Adversarial Attack on Fake-Faces Detectors Under White and Black Box Scenarios
Submitted by aekwall on Mon, 01/31/2022 - 4:11pm
Detectors
White Box Security
white-box
forensic models
Faked faces
black-box
adversarial attack
Forensics
Generators
security
generative adversarial networks
composability
Resiliency
Metrics
pubcrawl
Conferences
feature extraction
biblio
Black-box System Identification of CPS Protected by a Watermark-based Detector
Submitted by aekwall on Tue, 03/09/2021 - 12:05pm
Networked Control System
Watermarking
System Identification
support vector regression
Support vector machines
sensors
security
pubcrawl
process control
Particle separators
CPS Modeling and Simulation
Metrics
Detectors
cyber-physical security
black-box
black box encryption
Predictive Metrics
composability
Resiliency
biblio
Transparent IFC Enforcement: Possibility and (In)Efficiency Results
Submitted by grigby1 on Thu, 03/04/2021 - 2:34pm
security lattice
programming languages
pubcrawl
real-world programs
resilience
Resiliency
Runtime
secure information flow control
Secure Multi-Execution
secure programs
security condition
polynomial time
security of data
Semantics
SME family
termination insensitive noninterference
third-party systems
transparency
transparent enforcement
transparent IFC enforcement
white-box
FlowFox browser
white box
security
black-box
black-box enforcement
Browsers
composability
computational complexity
Computer languages
efficiency
faceted secure multiexecution
White Box Security
FSME
IFC community
Information Flow Control
Lattices
memory overhead
Metrics
Multiple Facets
no-write-down no-read-up style security policy
noninterference
biblio
Targeted Adversarial Examples for Black Box Audio Systems
Submitted by grigby1 on Fri, 09/04/2020 - 4:10pm
adversarial perturbations
Black Box Security
white-box attacks
speech-to-text
Speech recognition
gradient methods
gradient estimation
fooling ASR systems
estimation
deep recurrent networks
black-box
black box audio systems
automatic speech recognition systems
audio transcription
audio systems
adversarial generation
security of data
Approximation algorithms
recurrent neural nets
adversarial attack
deep neural networks
Statistics
Sociology
genetic algorithms
Decoding
resilience
Resiliency
Metrics
composability
pubcrawl
Task Analysis
biblio
Explanation Mining: Post Hoc Interpretability of Latent Factor Models for Recommendation Systems
Submitted by aekwall on Wed, 01/16/2019 - 2:09pm
association rules
black-box
composability
Explanations
interpretability
latent factor models
Metrics
pubcrawl
recommendation systems
resilience
White Box Security
white-box
biblio
A Grey-Box Approach for Detecting Malicious User Interactions in Web Applications
Submitted by K_Hooper on Wed, 11/01/2017 - 11:07am
Scalability
resilience
pubcrawl
Chained Attacks
black-box
web security
white-box
biblio
Model-based control of device replication for trusted data collection
Submitted by BrandonB on Wed, 05/06/2015 - 9:58am
Hierarchical Control
voting protocol mechanisms
trusted data collection
Trusted Computing
Situational Assessment
Sensor Replication
security of data
security attack
quality of service
QoS
Protocols
malicious devices
Adaptive Fault-tolerance
Frequency modulation
device replication autonomic management
delays
data corruptions
Data collection
black-box
batteries
bandwidth attack
Bandwidth
Attacker Modeling
algorithm correctness
biblio
Model-based control of device replication for trusted data collection
Submitted by BrandonB on Thu, 04/30/2015 - 2:06pm
Hierarchical Control
voting protocol mechanisms
trusted data collection
Trusted Computing
Situational Assessment
Sensor Replication
security of data
security attack
quality of service
QoS
Protocols
malicious devices
Adaptive Fault-tolerance
Frequency modulation
device replication autonomic management
delays
data corruptions
Data collection
black-box
batteries
bandwidth attack
Bandwidth
Attacker Modeling
algorithm correctness