Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
image classification
biblio
Effectiveness of Random Deep Feature Selection for Securing Image Manipulation Detectors Against Adversarial Examples
Submitted by grigby1 on Mon, 12/28/2020 - 12:49pm
image manipulation detectors
Support vector machines
security of data
secure classification
Scalability
Resiliency
resilience
randomization-based defences
random feature selection approach
random deep feature selection
pubcrawl
Metrics
linear SVM
learning (artificial intelligence)
adaptive filtering
image manipulation detection tasks
image manipulation detection
image classification
fully connected neural network
Feature Selection
feature randomization
feature extraction
deep learning for forensics
deep learning features
CNN image manipulation detector
adversarial multimedia forensics
Adversarial Machine Learning
biblio
Artificial Intelligence and Internet of Things for Robotic Disaster Response
Submitted by aekwall on Mon, 12/14/2020 - 12:38pm
Mobile Robot
deep learning model training
Disaster Response
disaster site
disaster-straining robots
environmental Big Data
field workstation
Fukushima nuclear disaster
ground robots
intelligent Internet of Things
AIoT
model verification
natural man-made disasters
on-site continuing objects classification
robotic disaster response
surface robots
underwater swarm robots
Unmanned underwater vehicles
Wenchuan earthquake
image classification
Internet of Things
learning (artificial intelligence)
pubcrawl
composability
mobile robots
Swarm Intelligence
neural nets
Workstations
Big Data
Artificial Intelligence
control engineering computing
Robot sensing systems
Compositionality
government agencies
emergency management
disasters
Service robots
biblio
Identification of Computer Displays Through Their Electromagnetic Emissions Using Support Vector Machines
Submitted by aekwall on Mon, 12/14/2020 - 12:28pm
information security
Training
TEMPEST information security problem
tempest
Support vector machines
signal processing
security of data
Resiliency
pubcrawl
Predictive Metrics
pattern classification
Monitoring
matrix algebra
Kernel
computer displays
Image reconstruction
image classification
F1-score
Electromagnetics
electromagnetic emissions
display image capture
confusion matrix
Computer graphics
Antenna measurements
Artificial Intelligence
classification
composability
biblio
Style transfer-based image synthesis as an efficient regularization technique in deep learning
Submitted by grigby1 on Fri, 12/11/2020 - 2:54pm
Resiliency
Neural networks
neural style transfer
newly created images
pubcrawl
Regularization
regularization techniques e.g
relatively poor generalization abilities
representative neural architectures
resilience
Metrics
Scalability
Skin
skin lesions
style transfer-based image synthesis
Task Analysis
Training
transfer learning
unlabeled images
Image analysis
challenging skin lesion classification case study
convolutional neural nets
convolutional neural networks
data augmentation
decision support system
deep learning
deep neural networks
Diagnosis
efficient regularization technique
base image
image classification
image classification purposes
image synthesis
labeled images
learning (artificial intelligence)
learning algorithms
Lesions
machine learning
biblio
Standardization of Gram Matrix for Improved 3D Neural Style Transfer
Submitted by grigby1 on Fri, 12/11/2020 - 2:53pm
Solid modeling
Metrics
neural net architecture
neural style transfer
pubcrawl
resilience
Resiliency
Scalability
Shape
Mathematical model
standardization
standardized Gram matrix based loss function
stereo image processing
style similarity
Three-dimensional displays
Two dimensional displays
voxel
2D binary monochromatic images
learning (artificial intelligence)
image representation
image colour analysis
Image color analysis
image classification
convolutional neural network architecture
convolutional neural nets
computational geometry
color information
classifier network training
binary models
binary 3D voxel representation
3D voxelized objects
3D neural style transfer
3D geometries
biblio
MTComm Based Virtualization and Integration of Physical Machine Operations with Digital-Twins in Cyber-Physical Manufacturing Cloud
Submitted by grigby1 on Tue, 12/01/2020 - 4:35pm
pubcrawl
manufacturing
manufacturing processes
Metrics
MTComm
MTComm based virtualization
physical machine need
physical machine operations
Policy Based Governance
production engineering computing
machine tools
resilience
Resiliency
Scalability
Solid modeling
Three-dimensional displays
virtual images
Virtualization
visualization
Digital-Twin
Cloud Computing
collaboration
composability
CPMC
Cyber Manufacturing
cyber-physical manufacturing cloud
cyber-physical systems
data visualisation
application scenarios
digital-twin simulator
Digital-Twins simulate physical world objects
Human behavior
Human Factors
image classification
Internet scale machine tool communication method
Internet-scale Computing Security
machine sensors
biblio
TrISec: Training Data-Unaware Imperceptible Security Attacks on Deep Neural Networks
Submitted by grigby1 on Wed, 11/04/2020 - 2:15pm
pubcrawl
learning (artificial intelligence)
machine learning
ML Security
multilevel security system
object detection
Object recognition
optimization
Optimization algorithms
perceptible noise
pre-trained DNNs
Inference algorithms
resilience
Resiliency
Scalability
security
security of data
structural similarity analysis
traffic sign detection
Training
training data-unaware imperceptible security attacks
training dataset
feature extraction
AI Poisoning
automation
autonomous vehicles
convolutional neural nets
Correlation
data manipulation attacks
data poisoning attacks
Deep Neural Network
deep neural networks
DNNs
Adversarial Machine Learning
generated attack images
German Traffic Sign Recognition Benchmarks dataset
Human behavior
image classification
Image coding
image recognition
imperceptibility factor
imperceptible attack images
Imperceptible Attack Noise
biblio
A Test Cases Generation Technique Based on an Adversarial Samples Generation Algorithm for Image Classification Deep Neural Networks
Submitted by aekwall on Mon, 11/02/2020 - 2:47pm
Measurement
test cases generation technique
test cases generation
Software algorithms
Software
pubcrawl
program testing
Neural networks
neural nets
Metrics
metrics testing
adversarial samples
learning (artificial intelligence)
image classification deep neural networks
image classification
Filtering
DNN
deep learning
coverage metric
Classification algorithms
artificial intelligence tasks
adversarial samples generation algorithm
biblio
Adversarial Examples Against Image-based Malware Classification Systems
Submitted by grigby1 on Thu, 10/29/2020 - 11:13am
learning (artificial intelligence)
visualization
Robustness
Resiliency
resilience
pubcrawl
privacy
Perturbation methods
Metrics
malware files
malware classification
malware
mal-ware classification techniques
machine learning
adversarial attack
invasive software
image-based malware classification systems
image classification
Human behavior
DL-based classification systems
data visualisation
convolutional neural networks
convolutional neural network malware classifiers
convolutional neural nets
convolution neural network
computer vision
adversarial attacks
biblio
Robustness Analysis of CNN-based Malware Family Classification Methods Against Various Adversarial Attacks
Submitted by grigby1 on Thu, 10/29/2020 - 11:12am
image-based classification methods
security
Robustness
Resiliency
resilience
pubcrawl
privacy
Microsoft malware dataset
Metrics
malware family classification
malware classification
malware
invasive software
input image
imperceptible nonrandom perturbations
adversarial attacks
image colour analysis
Image color analysis
image classification
Human behavior
feature extraction
convolutional neural networks
convolutional neural network-based malware family classification methods
convolutional neural nets
Conferences
CNN-based malware family classification method
CNN-based classification methods
Analytical models
adversarial example
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »