Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Predictive models
biblio
A Comparison of Nano-Patterns vs. Software Metrics in Vulnerability Prediction
Submitted by grigby1 on Wed, 11/04/2020 - 1:36pm
program testing
web services
vulnerable methods
vulnerable code
vulnerability prediction models
Vulnerability
vulnerabilities
software security
software quality
software metrics
Software
security of data
security
pubcrawl
Complexity theory
Predictive models
Object oriented modeling
nanopatterns
nano-pattern
metrics testing
Metrics
method-level traceable patterns
method-level software metrics
Measurement
learning (artificial intelligence)
Java
internet
biblio
An Xception Convolutional Neural Network for Malware Classification with Transfer Learning
Submitted by grigby1 on Thu, 10/29/2020 - 11:10am
Microsoft malware dataset
Xception model
Xception convolutional neural network
Xception
VGG16 model
transfer learning
Training
testing
Support vector machines
special CNN architecture
Resiliency
resilience
pubcrawl
privacy
Predictive models
pattern classification
CNN models
Metrics
malware image classification
malware classification problem
malware classification
malware
learning (artificial intelligence)
invasive software
image-based malware classification
image classification
Human behavior
Gray-scale
feature extraction
ensemble model
convolutional neural network (CNN)
convolutional neural nets
biblio
An Accurate False Data Detection in Smart Grid Based on Residual Recurrent Neural Network and Adaptive threshold
Submitted by grigby1 on Wed, 10/14/2020 - 12:39pm
false data injection attack
cyber physical systems
Transmission line measurements
False Data Detection
power system state estimation
accurate false data detection
Adaptive detection threshold
adaptive judgment threshold
adaptive threshold
Recurrent neural networks
FDIA detection method
linear prediction model
malicious attack
R2N2 model
Residual recurrent neural network
residual recurrent neural network prediction model
Weibull distribution
state estimation
security of data
Predictive models
pubcrawl
Human behavior
resilience
Resiliency
Mathematical model
Data models
Adaptation models
recurrent neural nets
power engineering computing
power system security
Smart Grid
smart power grids
composability
cyber-attacks
biblio
Denoising and Verification Cross-Layer Ensemble Against Black-box Adversarial Attacks
Submitted by aekwall on Mon, 09/21/2020 - 3:36pm
adversarial inputs
Cross Layer Security
verification cross-layer ensemble
unsupervised model
supervised model verification ensemble
representative attacks
noise reduction
MODEF
Manifolds
ensemble diversity
ensemble defense
defense-attack arms race
defense success rates
cross-layer model diversity ensemble framework
black-box adversarial attacks
benign inputs
security of data
adversarial deep learning
composability
DNNs
adversarial examples
machine learning tasks
deep neural networks
Predictive models
testing
Training
Neural networks
neural nets
Robustness
pubcrawl
Resiliency
learning (artificial intelligence)
biblio
Vulnerability Discovery Modelling With Vulnerability Severity
Submitted by grigby1 on Fri, 09/11/2020 - 11:58am
risk analysis
Web browser
vulnerability severity
vulnerability discovery rate
vulnerability discovery process
vulnerability discovery models highlight
vulnerability discovery modelling
Vulnerability discovery model
vulnerability data
vulnerabilities
severity
predictive capability
Browser Security
Compositionality
Browsers
security of data
online front-ends
software vulnerabilities
composability
software fault tolerance
Data models
Mathematical model
Analytical models
Software
resilience
Metrics
Human behavior
pubcrawl
security
Predictive models
biblio
Synonym-based Attack to Confuse Machine Learning Classifiers Using Black-box Setting
Submitted by grigby1 on Fri, 09/04/2020 - 4:11pm
machine learning algorithms
ML models
black-box setting
black-box attack
Blogs
bot tweets
bots
convolutional neural network
deep learning classifiers
testing
machine learning classifiers
ML-based bot detection algorithms
ML-based models
popular content sharing platform
supervised learning
synonym-based attack
vulnerability constraints
Black Box Security
Resiliency
computer network security
invasive software
feature extraction
social networking (online)
Artificial Intelligence
pubcrawl
composability
Metrics
Cryptography
resilience
pattern classification
Training
learning (artificial intelligence)
machine learning
deep learning
Predictive models
biblio
A Comparison of Performance Metrics with Severely Imbalanced Network Security Big Data
Submitted by grigby1 on Fri, 08/28/2020 - 3:53pm
sampling
pattern classification
Performance Metrics
Precision-Recall Curve
Predictive models
pubcrawl
Radio frequency
resilience
Resiliency
minority classes
sampling distribution ratio
sampling methods
Scalability
severe class imbalance
severely imbalanced network security big data
Sparks
testing dataset roles
Training
Data mining
Apache Spark framework
area under the receiver operating characteristic curve
Big Data
Big Data Analytics
big data security metrics
Cluster Computing
computer network security
data analysis
apache spark
Geometric Mean
imbalanced data
learning (artificial intelligence)
machine learning
majority class
Measurement
metrics testing
Metrics
biblio
A Probability Prediction Based Mutable Control-Flow Attestation Scheme on Embedded Platforms
Submitted by aekwall on Mon, 08/17/2020 - 11:35am
execution-profiling CFG
operating systems (computers)
coarse-grained check
coarse-grained control-flow attestation schemes
Control Flow Attestation
control-flow security
costly fine-grained level
Embedded Platform Security
embedded software
Predictive models
execution-profiling control-flow graph
fine-grained remote control-flow attestation
MGC-FA
mutable control-flow attestation scheme
mutable granularity control-flow attestation
Mutable Granularity Scheme
remote control-flow attestation scheme
Resiliency
attestation
Remote Attestation
Runtime
security
software integrity
control-flow attacks
embedded systems
Raspberry Pi
security of data
Human behavior
pubcrawl
composability
machine learning
Probabilistic logic
probability
ARM TrustZone
biblio
Test-Driven Anonymization for Artificial Intelligence
Submitted by grigby1 on Thu, 08/13/2020 - 5:07pm
anonymization efforts
artificial intelligence security
test-driven anonymization approach
Software Testing
regulatory requirements
Privacy Protections
nonfunctional quality
k-anonymity
internal requirements
Insurance
functional suitability
functional quality
classification AIs
artificial intelligence tools
anonymized data
anonymization techniques
tools
anonymization
AI context
artificial intelligence technique
testing
Data protection
pattern classification
Production
health care
data privacy
Data models
pubcrawl
Artificial Intelligence
Predictive models
security of data
biblio
PRADA: Protecting Against DNN Model Stealing Attacks
Submitted by aekwall on Mon, 08/03/2020 - 10:38am
nontargeted adversarial examples
Adversarial Machine Learning
API queries
confidentiality protection
DNN model extraction attacks
DNN model stealing attacks
machine learning applications
ML models
model extraction attacks
model stealing
model extraction
PRADA
prediction accuracy
prediction API
prior model extraction attacks
stolen model
transferable adversarial examples
well-defined prediction APIs
Adversary Models
Neural networks
Scalability
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
Computational modeling
Metrics
neural nets
security of data
query processing
Business
Training
Mathematical model
Data mining
Predictive models
Deep Neural Network
application program interfaces
« first
‹ previous
…
16
17
18
19
20
21
22
23
24
…
next ›
last »