Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
image recognition
biblio
Facial Expression Recognition Based on Graph Neural Network
Submitted by grigby1 on Mon, 03/29/2021 - 1:01pm
feature extraction
Support vector machines
Resiliency
resilience
pubcrawl
object detection
Metrics
image recognition
image classification
Human behavior
graph theory
Graph Neural Network
graph convolutional neural network
fully automatic facial expression recognition
facial recognition
facial landmark detection
facial expression recognition classification
facial expression recognition
facial expression databases
face recognition
face landmarks detection
Face
emotions
emotion recognition
Databases
convolutional neural networks
convolutional neural nets
biblio
A THz Image Edge Detection Method Based on Wavelet and Neural Network
Submitted by grigby1 on Mon, 02/08/2021 - 2:00pm
neural network method
wavelet transforms
wavelet transform method
wavelet decomposition
wavelet analysis
wavelet
THz image edge detection method
terahertz waves
terahertz wave imaging
security
Scalability
Resiliency
resilience
pubcrawl
Pattern recognition
Neural networks
Canny operator method
neural network
neural nets
Metrics
low-frequency subimage detection
information security
image recognition
Image Processing
image fusion
Image edge detection
Image analysis
frequency
Electromagnetic radiation
edge image fusion
edge detection
composability
biblio
BlurNet: Defense by Filtering the Feature Maps
Submitted by grigby1 on Mon, 12/28/2020 - 12:48pm
Scalability
malicious examples
Metrics
neural nets
Neural networks
Perturbation methods
pubcrawl
resilience
Resiliency
robust physical perturbations
Robustness
RP
malicious adversary
security of data
standard blur kernels
standard-architecture traffic sign classifiers
standards
stop signs
substitute model
targeted misclassification rates
traffic engineering computing
victim model
white stickers
white-box attacks
frequency analysis
adaptive attack evaluation
adaptive filtering
adversarial defense
adversarial images
Adversarial Machine Learning
Adversarial robustness
attack algorithms
black stickers
blackbox transfer attack
BlurNet
depthwise convolution layer
Adaptation models
gradient information
high frequency noise
image recognition
image restoration
input image
Kernel
layer feature maps
learning (artificial intelligence)
low-pass filters
lowpass filtering behavior
biblio
Image Style Transfer in Deep Learning Networks
Submitted by aekwall on Mon, 12/07/2020 - 12:11pm
convolution neural network
Semantics
Painting
Neural networks
learning (artificial intelligence)
images contents
image style transfer
image recognition
Image color analysis
deep learning network development process
deep learning
convolutional neural nets
neural style transfer
computer vision researchers
computer vision
CNN
classical style migration model
artistic styles
ART
pubcrawl
Predictive Metrics
Resiliency
Scalability
biblio
TrISec: Training Data-Unaware Imperceptible Security Attacks on Deep Neural Networks
Submitted by grigby1 on Wed, 11/04/2020 - 2:15pm
pubcrawl
learning (artificial intelligence)
machine learning
ML Security
multilevel security system
object detection
Object recognition
optimization
Optimization algorithms
perceptible noise
pre-trained DNNs
Inference algorithms
resilience
Resiliency
Scalability
security
security of data
structural similarity analysis
traffic sign detection
Training
training data-unaware imperceptible security attacks
training dataset
feature extraction
AI Poisoning
automation
autonomous vehicles
convolutional neural nets
Correlation
data manipulation attacks
data poisoning attacks
Deep Neural Network
deep neural networks
DNNs
Adversarial Machine Learning
generated attack images
German Traffic Sign Recognition Benchmarks dataset
Human behavior
image classification
Image coding
image recognition
imperceptibility factor
imperceptible attack images
Imperceptible Attack Noise
biblio
IoT Malware Analysis
Submitted by aekwall on Mon, 10/26/2020 - 12:12pm
machine learning
Ollydebug
IoT malware analysis
information system integrity
information system confidentiality
information system availability
CIA triad
malicious users
malicious software
Predictive Metrics
malware attacks
Malware Analysis
image recognition
privacy
IoT
blockchain
Metrics
pubcrawl
Human behavior
Resiliency
invasive software
security
malware
data integrity
IoT devices
Internet of Things
Conferences
biblio
Neural Algebra of Classifiers
Submitted by grigby1 on Mon, 10/05/2020 - 2:02pm
image recognition
visualization
visual recognition benchmarks
Training
simple visual classifiers
pubcrawl
Neural networks
neural network modules
neural nets
neural algebra
algebra
image classification
Compositionality
complex visual concept
classifier
boolean algebra operations
Boolean algebra
Birds
Beak
biblio
Creation of Adversarial Examples with Keeping High Visual Performance
Submitted by grigby1 on Fri, 09/11/2020 - 11:46am
visualization
intelligence
image recognition technology
human readability
high visual performance
FGSM
convolutional neural network (CNN)
character string CAPTCHA
character recognition
character images
artificial
CAPTCHA
captchas
image recognition
convolutional neural network
learning (artificial intelligence)
adversarial examples
image classification
Resistance
Perturbation methods
composability
Mathematical model
security
Human behavior
pubcrawl
Neural networks
convolutional neural nets
CNN
machine learning
biblio
End-to-End Captcha Recognition Using Deep CNN-RNN Network
Submitted by grigby1 on Fri, 09/11/2020 - 11:43am
4-character text captcha
CAPTCHA
two-layer GRU network
Residual
input captcha picture features
Gated Recurrent Unit
end-to-end captcha recognition
deep residual convolutional neural network
completely automated public turing test
CNN-RNN network model
CNN-RNN
CAPTCHA recognition
security of data
captchas
image recognition
Backpropagation
human computer interaction
composability
recurrent neural nets
internet
Human behavior
pubcrawl
convolutional neural nets
biblio
Selective Poisoning Attack on Deep Neural Network to Induce Fine-Grained Recognition Error
Submitted by aekwall on Mon, 08/10/2020 - 10:36am
MNIST
Training data
Training
Support vector machines
Speech recognition
selective poisoning attack
security of data
Resiliency
pubcrawl
policy-based governance
poisoning attack
Pattern recognition
nuclear facilities
Neurons
Neural networks
neural nets
AI Poisoning
malicious training data
machine learning library
machine learning
learning (artificial intelligence)
image recognition
fine-grained recognition error
DNN training process
DNN security
distortion
Deep Neural Network
Data models
cyber physical systems
CIFAR10
chosen class
Artificial Neural Networks
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »