Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Iterative methods
biblio
GeoDA: A Geometric Framework for Black-Box Adversarial Attacks
Submitted by aekwall on Tue, 03/09/2021 - 11:05am
image classification
Robustness
Resiliency
query processing
queries
pubcrawl
Perturbation methods
pattern classification
optimisation
Neural networks
natural image classifiers
minimal perturbation
Metrics
Measurement
mean curvature
Iterative methods
adversarial examples
geometric framework
gaussian distribution
estimation
effective iterative algorithm
Deep Networks
decision boundary
data samples
Covariance matrices
composability
carefully perturbed images
black-box settings
black-box perturbations
black-box attack algorithm
black-box adversarial attacks
black box encryption
biblio
Approximate Symbolic Explanation for Neural Network Enabled Water-Filling Power Allocation
Submitted by aekwall on Mon, 03/01/2021 - 4:03pm
fading channels
symbolic mapping
slow iterative search
OFDM sub-channels
NN power allocation solution
neural network enabled water-filling power allocation
Meijer G-function
iterative WF threshold search process
direct high-dimensional mapping
channel gain
approximate symbolic explanation
Search Space
OFDM modulation
Transforms
xai
Scalability
approximation theory
wireless
Artificial Neural Networks
telecommunication computing
neural nets
optimization
Iterative methods
Wireless communication
resource management
deep learning
pubcrawl
Resiliency
machine learning
biblio
Reduced-Complexity Singular Value Decomposition For Tucker Decomposition: Algorithm And Hardware
Submitted by aekwall on Mon, 02/15/2021 - 3:45pm
singular value decomposition
decomposition
Tucker decomposition
tensors
tensor algorithms
size 28.0 nm
resource-constrained hardware platforms
reduced-complexity SVD scheme
power 37.6 mW
iterative self-multiplication
high-dimensional data processing
big data analysis
SVD
Big Data
Data-Intensive Applications
hardware architecture
Compositionality
CMOS technology
CMOS integrated circuits
cyber physical systems
data analysis
Metrics
Iterative methods
pubcrawl
machine learning
biblio
Tackling Actuator Saturation in Fixed Point Iteration-based Adaptive Control
Submitted by aekwall on Mon, 01/25/2021 - 11:54am
nonlinear control systems
van der Pol oscillator
saturated control system
relaxation oscillators
nominal trajectory
Lyapunov function-based approach
FPIAC control
fixed point iteration-based adaptive control
Fixed Point Iteration
control design methods
Banach Space
Anti-windup
adaptive control
actuator saturation
Resiliency
actuator security
controller design
control system synthesis
iterative process
Lyapunov methods
actuators
dynamic system
Metrics
Iterative methods
composability
pubcrawl
Human behavior
biblio
Control Synthesis for Cyber-Physical Systems to Satisfy Metric Interval Temporal Logic Objectives under Timing and Actuator Attacks*
Submitted by aekwall on Mon, 01/25/2021 - 11:53am
stochastic games
time-sensitive
Power capacitors
metric interval temporal logic objectives
finite state controller
durational stochastic game
control synthesis
control input
road traffic control
Clocks
actuator security
actuator attacks
CPS
actuators
timing information
timing
Temporal Logic
Games
probability
Stochastic processes
Metrics
Iterative methods
composability
pubcrawl
Human behavior
Resiliency
cyber-physical systems
biblio
MaeSTrO: A Mobile App for Style Transfer Orchestration Using Neural Networks
Submitted by aekwall on Mon, 12/07/2020 - 11:09am
non photorealistic rendering
manifold artistic styles
Mobile app
mobile artists
mobile computing
mobile expressive rendering
Mobile handsets
neural nets
Neural networks
neural style transfer techniques
MaeSTrO
Painting
particular style transfer
rendering (computer graphics)
style transfer
style transfer orchestration
tools
User control
user interfaces
user tests
creative expression
Scalability
Resiliency
Predictive Metrics
pubcrawl
adaptive neural networks
adaptive systems
casual creativity
core technology
creative editing process
neural style transfer
Creativity
generalized user interface
Image Processing
inherent limitations
Iterative methods
localized editing process
localized image stylization
low-level controls
biblio
Quick and Accurate False Data Detection in Mobile Crowd Sensing
Submitted by grigby1 on Wed, 10/14/2020 - 11:40am
MCS
wireless sensor networks
SVD
Sparse matrices
Smartphones
singular value decomposition
sensors
sensor fusion
Roads
Resiliency
resilience
pubcrawl
Monitoring
mobile crowd sensing
mobile computing
approximation theory
Matrix Separation
Matrix decomposition
Matrix converters
low-rank matrix approximation
LightLRFMS
light weight low rank and false matrix separation algorithm
Iterative methods
iteration process
Human behavior
False Data Detection
DRMF
direct robust matrix factorization
cyber physical systems
composability
biblio
Evaluating Resilience of Grid Load Predictions under Stealthy Adversarial Attacks
Submitted by aekwall on Mon, 10/05/2020 - 10:47am
iterative attack method
adversarial perturbation
DeepForge
distributed sensor fusion
distributed smart meters
domain-specific deep-learning
Dynamic Pricing
grid maintenance
GridLAB-D
inference predictors
power distribution planning
load forecasting
load forecasting systems
model-based design
power distribution network
resilience evaluation
smart grid load prediction systems
synthetic norm-bounded modifications
testbed
CPS resilience
smart power grids
Data Security
cyber-physical systems
learning (artificial intelligence)
machine learning
Resiliency
pubcrawl
Iterative methods
optimization problem
optimisation
security of data
cyber physical systems
adversarial attacks
power engineering computing
power distribution control
sensor fusion
information processing
power systems
smart meters
distributed sensors
biblio
Recycled ADMM: Improve Privacy and Accuracy with Less Computation in Distributed Algorithms
Submitted by aekwall on Mon, 09/28/2020 - 10:55am
iterative process
Scalability
Resiliency
recycled ADMM
R-ADMM
pubcrawl
privacy-utility tradeoff
privacy analysis
privacy
Perturbation methods
optimization
local data
linear approximation
alternating direction method of multiplier
Iterative methods
Human behavior
distributed algorithms
differential privacy
decentralized convex optimization problems
data privacy
convex programming
Convex functions
convergence
Computing Theory and Privacy
approximation theory
biblio
A GUI for Wideband Spectrum Sensing using Compressive Sampling Approaches
Submitted by aekwall on Mon, 09/14/2020 - 11:31am
Nyquist sampling rates
device communications
effective spectral resource utilization
formidable owing
graphical user interface
graphical user interface (GUI)
measurement vectors
modulated wideband converter
Modulated Wideband Converter (MWC)
multiple measurement vector framework
MWC
newer spectral opportunities
compressive sampling approaches
orthogonal matching pursuit
orthogonal matching pursuit (OMP)
prominent solution
rapidly growing device
SBL approach
Sparse Bayesian Learning (SBL)
Sparse Bayesian Learning algorithms
spectral support
support recovery
wideband spectrum sensing
Wideband
cyber-physical systems
Resiliency
pubcrawl
composability
Iterative methods
privacy
Signal to noise ratio
radio networks
sensors
signal detection
graphical user interfaces
Bayes methods
radio spectrum management
compressed sensing
Matching pursuit algorithms
OMP
GUI
cognitive radio
compressive sampling
signal sampling
signal reconstruction
cognitive radio networks
« first
‹ previous
1
2
3
4
5
6
next ›
last »