Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Probability distribution
biblio
A Dynamic Mechanism for Security Management in Multi-Agent Networked Systems
Submitted by grigby1 on Tue, 02/16/2021 - 12:44pm
Metrics
Strategic Agents
social surplus maximizing mechanism
social surplus maximization
Silicon
security management
Resiliency
resilience
pubcrawl
Probability distribution
private information
network theory (graphs)
network security
network coordinator
multi-agent systems
Social Agents
interdependent valuations
interconnected multiagent networked systems
inter-temporal correlations
incentive compatibility
dynamic networks
dynamic mechanism design problem
dynamic mechanism design
Cost accounting
computer security
computer networks
computer network security
composability
Communication networks
agents security state
biblio
A Generalizable Deepfake Detector based on Neural Conditional Distribution Modelling
Submitted by grigby1 on Fri, 01/15/2021 - 12:01pm
generative adversarial networks
video-realistic generation techniques
Video Forensics
Universal Background Model
two-step synthetic face image detection method
synthetic images
synthetic face generation methods
PixelCNN
photo-realistic generation techniques
neural conditional distribution modelling
generalizable Deepfake detector
Face detection
conditional probabilities
anomaly detector
faces
DeepFake
Training
Probability distribution
probability
deep neural networks
face recognition
resilience
Task Analysis
neural nets
Scalability
Resiliency
Metrics
Human Factors
Human behavior
pubcrawl
feature extraction
biblio
Comparison of Location Privacy Protection Schemes in VANETs
Submitted by aekwall on Mon, 11/02/2020 - 2:39pm
VANET
manet privacy
special mobile ad hoc network
road traffic.
malicious node attacks
location privacy protection schemes
trajectory privacy
Probability distribution
road traffic
Trajectory
vehicular ad-hoc networks
privacy protection
Compositionality
data privacy
Correlation
Metrics
Wireless communication
vehicular ad hoc networks
VANETs
Roads
privacy
location privacy
pubcrawl
Resiliency
Protocols
telecommunication security
biblio
Research on Cloud Computing Security Evaluation Model Based on Trust Management
Submitted by grigby1 on Mon, 10/05/2020 - 2:10pm
Probability distribution
uncertainty
Trusted Computing
trust management mechanism
Trust management
subsequent cloud computing service
sharing applications
security of data
security assessment model
security
Scalability
Resiliency
resilience
quantifiable analysis
pubcrawl
Big Data trust management
information security
Human Factors
DS evidence theory method
DS evidence theory
data unification
Data Security
data credible quantification mechanism
computer theory
Computational modeling
cloud services
Cloud Security
cloud computing security evaluation model
cloud computing security
Cloud Computing
biblio
DDoS Attack Detection Using Greedy Algorithm and Frequency Modulation
Submitted by aekwall on Mon, 06/29/2020 - 12:46pm
network services
DDoS attack detection
source IP addresses
source IP
probability distributions
Probability distribution
greedy
Frequency modulation
divergence
detection phase
destination IP addresses
destination IP
DDoS attack detection algorithm
greedy algorithms
greedy algorithm
Computer crime
Dogs
probability
Anomaly Detection
Entropy
Metrics
composability
pubcrawl
Human behavior
Resiliency
distributed denial of service attack
IP networks
DDoS
computer network security
biblio
Embedding Covert Information on a Given Broadcast Code
Submitted by grigby1 on Tue, 06/02/2020 - 11:54am
random codes
information theoretic security
information-theoretic security
Low Probability of Detection
Metrics
necessary conditions
original broadcast communication
policy-based governance
Probability distribution
pubcrawl
Indexes
random coding argument
Random variables
Receivers
resilience
Resiliency
Scalability
stronger receiver
Transmitters
weaker receiver
decoding error probability
Broadcast Channel
broadcast channels
broadcast code
channel capacity
channel coding
covert communication
covert communications
covert message
Decoding
asymptotic fundamental limits
degraded discrete memoryless broadcast channel
DM-BC
embedding covert information
error probability
error statistics
general DM-BCs
Human behavior
Human Factors
biblio
Modeling of Information Processes for Modern Information System Security Assessment
Submitted by grigby1 on Mon, 05/20/2019 - 4:30pm
Information systems
security of information systems
security of data
Scalability
Resiliency
resilience
pubcrawl
Probability distribution
Probability density function
probability
policy-based governance
modeling conflict
Metrics
information theoretic security
automata
information system security assessment
information security
information influence modeling
hybrid automatons
Human Factors
Human behavior
estimation
conflict processes analysis
composability
collaboration
cellular automatons
automata theory
biblio
Audio Adversarial Examples: Targeted Attacks on Speech-to-Text
Submitted by aekwall on Wed, 01/16/2019 - 2:10pm
automatic speech recognition
White Box Security
white-box iterative optimization-based attack
targeted audio adversarial examples
targeted attacks
speech-to-text
Probability distribution
neural network
Mozilla implementation DeepSpeech end
Iterative methods
Distortion measurement
distortion
security of data
audio waveform
adversarial example
Perturbation methods
Neural networks
Speech recognition
composability
Metrics
pubcrawl
resilience
optimisation
biblio
A noise parameter configuration technique to mitigate detour inference attack on differential privacy
Submitted by grigby1 on Fri, 09/28/2018 - 11:58am
inference attack
Scalability
Resiliency
pubcrawl
Probability distribution
privacy protection
privacy preserving technique
privacy
noise parameter configuration method
Mathematical model
linear regression
attribute correlation
Human behavior
differential privacy method
differential privacy
detour inference attack mitigation
Databases
data utility
Data protection
data privacy
Correlation
composability
biblio
Using k-nearest neighbor method to identify poison message failure
Submitted by grigby1 on Fri, 07/06/2018 - 2:06pm
pubcrawl
unstable network
Toxicology
Telephony
telecommunications networks
telecommunication security
telecommunication network reliability
telecommunication network management
telecommunication computing
System testing
statistical distributions
Scalability
Routing
Resiliency
resilience
AI Poisoning
Protocols
Probability distribution
probabilistic k-nearest neighbor method
poison message failure identification
network fault management
machine learning
learning (artificial intelligence)
Large-scale systems
IP networks
Human behavior
Data mining
control systems
computer science
Computer bugs
« first
‹ previous
1
2
3
next ›
last »