Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Prediction algorithms
biblio
An Improved Collaborative Filtering Recommendation Algorithm Based on Differential Privacy
Submitted by aekwall on Mon, 01/11/2021 - 12:40pm
gradient methods
ε-differential privacy
stochastic gradient descent algorithm
recommendation systems
recommendation accuracy loss
potential characteristic matrix
noise matrix factorization model
Netflix
MovieLens
differential privacy matrix factorization model
differential privacy constraint
collaborative filtering recommendation model
centralized recommendation
matrix factorization
Matrix decomposition
differential privacy protection
Scalability
Perturbation methods
recommender systems
privacy protection
differential privacy
Predictive models
software engineering
Stochastic processes
Prediction algorithms
privacy
collaborative filtering
composability
pubcrawl
Human behavior
Resiliency
data privacy
biblio
Comparing Explanations between Random Forests and Artificial Neural Networks
Submitted by grigby1 on Tue, 12/01/2020 - 1:02pm
learning algorithm
Vegetation
transparent structure
random forests
Radio frequency
pubcrawl
predictive performance
predictive accuracy
Prediction algorithms
neural nets
Artificial Intelligence
human trust
Human behavior
heuristic explanation method
Forestry
decision making processes
Decision Making
black boxes
Artificial Neural Networks
biblio
Research of Personalized Recommendation Algorithm Based on Trust and User's Interest
Submitted by grigby1 on Tue, 12/01/2020 - 12:36pm
pubcrawl
Videos
user interest
trustworthyness model
Trusted Computing
trust similarity
trust
sparse subspace clust algorithm
social networking (online)
robust trust
Robot Trust
Resiliency
resilience
recommender systems
Accuracy
Prediction algorithms
personalized recommendation algorithm
pattern clustering
online video site
Motion pictures
joint interest-content recommendation
Human Factors
Human behavior
History
filtering algorithms
collaboration
Clustering algorithms
biblio
Improving Cache Performance for Large-Scale Photo Stores via Heuristic Prefetching Scheme
Submitted by aekwall on Mon, 11/30/2020 - 11:03am
multitenant environment
cache stack
Caching Algorithm
caching policies
distributed photo caching architecture
distributed storage
heuristic prefetching scheme
high performance expectations
Internet-scale photo caching algorithms
large-scale photo stores
largest social network service company
cache performance
performance gap
photo service providers
photo storage
prefetcher
Prefetching
QQPhoto cache efficiency
QQPhoto workload
simple baseline algorithms
Internet-scale Computing Security
user experiences
Servers
Resiliency
Human behavior
pubcrawl
composability
social networking (online)
Metrics
internet
Prediction algorithms
image retrieval
Cloud Computing
China
cache storage
data centers
Sun
policy governance
access latency
advanced cache algorithms
backend network traffic
cache hit ratio
biblio
A Novel Personalized Recommendation Algorithm Based on Trust Relevancy Degree
Submitted by aekwall on Mon, 11/23/2020 - 10:39am
recommender systems
trust relevancy degree
Social trust
social network information
personalized recommendation technology
personalized recommendation
personal characteristics
novel personalized recommendation algorithm
matrix factorization
ecommerce
Dianping datasets
human trust
Human behavior
Matrix decomposition
electronic commerce
Trusted Computing
data sparsity
data science
collaboration
trust
Data mining
Filtering
Training
Prediction algorithms
internet
social networking (online)
Social network services
collaborative filtering
pubcrawl
biblio
Variational Encoder-Decoder Recurrent Neural Network (VED-RNN) for Anomaly Prediction in a Host Environment
Submitted by aekwall on Mon, 11/09/2020 - 12:20pm
Hidden Markov models
Information Reuse and Security
VED-RNN
variational encoder-decoder recurrent neural network
System-calls
system-call traces
sequence to sequence model
sequence to sequence
security tools
prediction model input data representation
HIDS
anomaly prediction
one-class classification
NIDS
security of data
Compositionality
Intrusion Detection Systems
Recurrent neural networks
recurrent neural nets
Predictive models
Anomaly Detection
Prediction algorithms
pattern classification
Decoding
pubcrawl
Resiliency
Classification algorithms
biblio
Behavioral malware analysis algorithm comparison
Submitted by aekwall on Mon, 10/26/2020 - 11:12am
tools
behavioral malware analysis
Sensitivity
Predictive Metrics
behavioral analysis
computer viruses
Malware Analysis
privacy
testing
computer security
Prediction algorithms
malware
Metrics
Algorithms
pubcrawl
Human behavior
Resiliency
machine learning
learning (artificial intelligence)
machine learning algorithms
malware detection
biblio
Collaborative Filtering Algorithm Based on Trust and Information Entropy
Submitted by grigby1 on Mon, 10/05/2020 - 1:10pm
Prediction algorithms
weighted information entropy
trust similarity
trust relationship
trust
time decay function
time decay
security
Scalability
robots
Resiliency
resilience
recommender systems
recommendation system
pubcrawl
collaboration
Pearson similarity
information entropy theory
information entropy
human trust
Human Factors
human computer interaction
Human behavior
filtering algorithms
Filtering
Entropy
computer theory
collaborative filtering algorithm
collaborative filtering
biblio
Security Analysis of Improved One-Time Pad Cryptography Using TRNG Key Generator
Submitted by grigby1 on Fri, 09/04/2020 - 2:38pm
frequency monobit
brute force attacks
TRNG key generator
trng
ryptography
Refining
random keys
PRNG
Prediction algorithms
OTP
one-time pad cryptography
one-time pad
information security analysis
Ciphers
Fisher-Yates shuffling algorithm
cipher text mapping
avalanche effect
random number generation
Brute Force Attack
policy-based governance
Human Factors
cryptographic algorithms
pubcrawl
Generators
encryption
Cryptography
biblio
Node Copying for Protection Against Graph Neural Network Topology Attacks
Submitted by aekwall on Mon, 08/17/2020 - 10:18am
Topology
similarity structure
semi-supervised learning
prediction capability
node copying
graph topology
graph neural network topology attacks
graph convolutional networks
graph based machine
downstream learning task
detection problem
deep learning models
corruption
attack graphs
graph connectivity
Predictive Metrics
security of data
adversarial attacks
network topology
network theory (graphs)
Training
Prediction algorithms
Neural networks
neural nets
Computational modeling
graph theory
composability
pubcrawl
Resiliency
learning (artificial intelligence)
Task Analysis
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
next ›
last »