Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Prediction algorithms
biblio
Interpreting a Black-Box Model used for SCADA Attack detection in Gas Pipelines Control System
Submitted by grigby1 on Wed, 05/05/2021 - 12:32pm
Prediction algorithms
SCADA Systems Security
LRP
LIME
Interpretable Machine Learning
autoencoder
SCADA System Security
explainable AI
Pipelines
SCADA
Compositionality
Predictive models
SCADA systems
Industries
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
machine learning algorithms
machine learning
biblio
A Security Situation Prediction Method Based on Improved Deep Belief Network
Submitted by aekwall on Tue, 04/27/2021 - 1:09pm
security
cyber-physical systems
Resiliency
pubcrawl
Sociology
Statistics
Prediction algorithms
Clustering algorithms
Communication networks
Predictive models
Deep Belief Network
belief networks
Active Defense
electricity information network
security situation prediction
biblio
Clustering Based Incident Handling For Anomaly Detection in Cloud Infrastructures
Submitted by aekwall on Mon, 03/01/2021 - 4:48pm
NSL-KDD
work factor metrics
run time metrics
nonclustering based algorithm
local outlier factor(LOF)
Kmeans
Isolation Forest algorithm
isolation forest
incident handling model
f-score
decision based approach
DBSCAN
clustering based algorithm
cloud infrastructures
anomaly detection mechanisms
Anomaly
security of data
cloud
Cloud Security
pattern clustering
Data mining
Anomaly Detection
Clustering algorithms
Prediction algorithms
pubcrawl
Resiliency
Protocols
Servers
Scalability
Cloud Computing
Monitoring
biblio
Sagacious Intrusion Detection Strategy in Sensor Network
Submitted by grigby1 on Tue, 02/23/2021 - 2:47pm
smart appliances
Prediction algorithms
logistic regression
regression analysis
network intrusion detection
KNN
WSN
malicious attackers
support vector machine
neural nets
ANN
data corpus
external attacks
IDS methodology
Naive Bayes
sagacious intrusion detection strategy
time division multiple access
Support vector machines
Classification algorithms
service attacks
Floods
Denial of Service attacks
sensors
telecommunication computing
composability
wireless sensor networks
telecommunication security
computer network security
Resiliency
resilience
Metrics
pubcrawl
Intrusion Detection
biblio
Dependable Adaptive Mobility in Vehicular Networks for Resilient Mobile Cyber Physical Systems
Submitted by grigby1 on Tue, 02/23/2021 - 2:24pm
Resiliency
lane departure warning
legal speed limit
Mathematical model
Metrics
network accountability
optimal information exchange
predicted exchanged information
Prediction algorithms
pubcrawl
resilience
Kalman filters
resilient mobile cyber physical systems
Resilient Vehicular Networking
road safety
road traffic
Safety
secure movement-prediction
traffic engineering computing
vehicles
vehicular ad hoc networks
vehicular networks
dependable adaptive mobility
adaptive manner
Adaptive Mobility
advanced driver-assistance systems
autonomous vehicles
collision avoidance
communication technologies
composability
connected moving vehicles
connected vehicles
corresponding developments
adaptive cruise control
Dependable Mobility
driver information systems
efficient functionality
environmental concerns
future locations
Global Positioning System
high mobility
improved safety
Intelligent Transportation Systems
Kalman filter
biblio
Application of Homomorphic Encryption in Machine Learning
Submitted by aekwall on Mon, 02/01/2021 - 11:35am
Scalability
encryption
machine learning algorithms
Resiliency
pubcrawl
Cryptography
Metrics
Prediction algorithms
machine learning
Human Factors
Ciphers
Homomorphic encryption
linear regression
biblio
Link Prediction Adversarial Attack Via Iterative Gradient Attack
Submitted by aekwall on Mon, 01/25/2021 - 1:01pm
gradient information
attack graphs
adversarial attack
adversarial graph
deep models
defense
GAE
gradient attack (GA)
gradient attack strategy
gradient methods
graph autoencode
graph evolved tasks
iterative gradient attack
Link prediction
link prediction adversarial attack problem
node classification
real-world graphs
trained graph autoencoder model
Robustness
data privacy
Task Analysis
learning (artificial intelligence)
Resiliency
pubcrawl
composability
graph theory
privacy
security of data
neural nets
Prediction algorithms
security problem
Predictive models
Predictive Metrics
deep neural networks
Perturbation methods
biblio
Differential Privacy Online Learning Based on the Composition Theorem
Submitted by aekwall on Mon, 01/11/2021 - 1:42pm
Scalability
programming
online learning
Resiliency
Human behavior
pubcrawl
composability
privacy
Prediction algorithms
differential privacy
Learning systems
Gaussian noise
composition theorem
sublinear regret
biblio
Secure Federated Averaging Algorithm with Differential Privacy
Submitted by aekwall on Mon, 01/11/2021 - 1:42pm
convergence analysis
gradient methods
distributed machine learning
Gaussian noise
federated learning
message exchange
stochastic gradient descent
algorithm communication efficiency
client sensitive information
Stochastic processes
differential attacks
federating averaging algorithm
local model parameters
message obfuscation
Model averaging
secure FedAvg algorithm
secure federated averaging algorithm
composability
Scalability
Servers
data privacy
Data models
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
security of data
privacy
convergence
convergence rate
Prediction algorithms
Analytical models
client-server systems
differential privacy
biblio
The Value of Collaboration in Convex Machine Learning with Differential Privacy
Submitted by aekwall on Mon, 01/11/2021 - 1:41pm
financial datasets
financial data processing
privacy budget
multiple data owners
convex machine learning
credit card fraud detection
differentially-private gradient queries
differentially-private gradients
distributed datasets
distributed private data
fraud
fitness cost
loan interest rates
nonoverlapping training datasets
privacy-aware data owners
privacy-aware learning algorithms
Regression
Stochastic gradient algorithm.
stochastic gradient descent
privacy
data privacy
Data models
Support vector machines
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
composability
Scalability
Computational modeling
Prediction algorithms
Training
machine learning
regression analysis
collaboration
differential privacy
gradient methods
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
next ›
last »