Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Iterative methods
biblio
Density Imaging Using a Compressive Sampling DBIM approach
Submitted by aekwall on Mon, 09/14/2020 - 11:29am
Inverse Problems
Ultrasound tomography
Ultrasonic variables measurement
ultrasonic imaging
Transmitters
Tomography
Resiliency
Receivers
pubcrawl
privacy
microwave imaging
medical image processing
measurement systems
measurement system
Iterative methods
inverse scattering
composability
imaging time
image recovery quality
Image reconstruction
Image quality
Image coding
Distorted Born iterative method (DBIM)
distorted Born iterative method
density information
density imaging
DBIM method
cyber-physical systems
compressive sampling technique
compressive sampling DBIM approach
compressive sampling (CS)
compressive sampling
biblio
Distributed Black-Box optimization via Error Correcting Codes
Submitted by grigby1 on Fri, 09/04/2020 - 3:11pm
convergence
Black Box Security
structured search directions
structured exploration methods
stragglers
Optimization methods
objective function
Linear programming
evolution strategies
error correcting codes
distributed black-box optimization
derivative-free optimization framework
deep convolutional neural networks
decoding step
telecommunication security
black-box adversarial attacks
Perturbation methods
Iterative methods
error correction codes
neural nets
encoding
Decoding
resilience
Resiliency
Metrics
composability
pubcrawl
optimisation
biblio
A Black-Box Approach to Generate Adversarial Examples Against Deep Neural Networks for High Dimensional Input
Submitted by grigby1 on Fri, 09/04/2020 - 3:11pm
linear regression model
black-box setting
CNNs
data science
extensive recent works
generate adversarial examples
generating adversarial samples
high dimensional
image classification
learning models
linear fine-grained search
black-box approach
minimizing noncontinuous function
model parameters
noncontinuous step function problem
numerous advanced image classifiers
queries
white-box setting
Zeroth order
zeroth order optimization algorithm
zeroth-order optimization method
Black Box Security
Cyberspace
query processing
Conferences
optimisation
pubcrawl
composability
Metrics
Resiliency
resilience
learning (artificial intelligence)
neural nets
security of data
machine-to-machine communications
regression analysis
Iterative methods
deep neural networks
face recognition
adversarial perturbations
gradient methods
adversarial examples
approximation theory
biblio
Data Conformity Evaluation: A Novel Approach for IoT Security
Submitted by grigby1 on Fri, 06/26/2020 - 12:04pm
L1-norm
wireless sensor networks
tensors
tensor decomposition
telecommunication network topology
star topology network
security
Scalability
Resiliency
pubcrawl
principal-component-analysis
network topology
Metrics
blind attack detection method
Jamming
Iterative methods
IoT security
IoT networks
Internet of Things
Image edge detection
edge detection
data conformity evaluation
data conformity
computer network security
composability
biblio
Trust is the Cure to Distributed Consensus with Adversaries
Submitted by grigby1 on Fri, 06/19/2020 - 10:49am
resilience
Iterative methods
Nonvolatile memory
optimisation
policy-based governance
Policy-Governed Secure Collaboration
Power supplies
Program processors
pubcrawl
Hardware
Resiliency
Scalability
social engineering networked systems
Task Analysis
trust evaluation mechanism
trust graph model
trust propagation scheme
trust-aware consensus algorithm
decision theory
composability
Computer Theory and Trust
access protocols
Byzantine adversary detection
computer science
consensus iteration process
Decision Making
decision making problem
Compositionality
distributed consensus algorithm
distributed consensus problems
distributed optimization
economic engineering networked systems
energy harvesting
false trust
graph theory
biblio
Computer network intrusion detection using sequential LSTM Neural Networks autoencoders
Submitted by aekwall on Mon, 05/11/2020 - 10:12am
Unsupervised Learning
variable length data sequence
sequential LSTM Neural Networks autoencoders
sequential intrusion detection
sequential data
sequential autoencoder
network data sequence
long short term memory neural network
GRU
fixed length data sequence
computer network intrusion detection
computer network data
Bi-LSTM
autoencoders
encoding
LSTM
computer network security
computer networks
Payloads
Intrusion Detection
Training
network intrusion detection
Neural networks
neural nets
Decoding
Metrics
Iterative methods
composability
pubcrawl
Resiliency
feature extraction
biblio
Feature Denoising for Improving Adversarial Robustness
Submitted by grigby1 on Fri, 04/17/2020 - 9:58am
image classification systems
White Box Security
security of data
retrieval
Resiliency
resilience
Recognition: Detection
pubcrawl
pattern classification
nonlocal means
network architectures
Metrics
learning (artificial intelligence)
Iterative methods
image denoising
10-iteration PGD white-box attacks
image classification
feature extraction
feature denoising
deep learning
convolutional networks
Compositionality
composability
categorization
black-box attack settings
Adversarial training
Adversarial robustness
adversarial perturbations
adversarial attacks
2000-iteration PGD white-box attacks
biblio
Evaluation Framework for Future Privacy Protection Systems: A Dynamic Identity Ecosystem Approach
Submitted by grigby1 on Fri, 04/03/2020 - 11:32am
identity protection strategies
Privacy Policies
Stochastic game
protection game
privacy protection system
privacy protection
policy iteration algorithm
policy evaluation
personal identity information
optimal policy
Iterative methods
information dynamic
privacy
evaluation framework
dynamic identity ecosystem approach
Bayesian network mathematical representation
identity theft
Identity Ecosystem
Scalability
data privacy
Human behavior
pubcrawl
security of data
belief networks
biblio
A Hierarchical Approach to Self-Timed Circuit Verification
Submitted by aekwall on Mon, 03/16/2020 - 9:39am
asynchronous circuit modeling
timing circuits
self-timed circuit verification
non deterministic behavior
mechanical theorem proving
link-joint style
link joint model
Latches
iterative self-timed circuits
hierarchical verification
hardware description language
greatest common divisor circuit model
greatest common divisor
flip-flops
combinational circuits
asynchronous circuit verification
Resiliency
arbitrated merge
ACL2 theorem prover
Theorem Proving
scalable verification
hardware description languages
Integrated circuit modeling
Wires
Compositionality
Predictive Metrics
Scalability
timing
Logic gates
Iterative methods
Computational modeling
pubcrawl
biblio
Design of and Resiliency Enhancement in Coarse/Fine Hybrid Granular Routing Optical Networks Based on Iterative Path-Pair-Loop Inflation
Submitted by grigby1 on Wed, 02/26/2020 - 3:49pm
pubcrawl
working path
wireless channels
virtual direct links
Virtual Direct Link
telecommunication network routing
spectral-resource-utilization-efficient optical network architecture
simulated annealing technique
simulated annealing
routing scheme
Routing and Wavelength Assignment
resilient path design
Resiliency
resilience
redundant path
30+0/0 route diversity improvement
optical fibre networks
optical channels
network resiliency
iterative path-pair-loop inflation
Iterative methods
highly resilient coarse granular routing optical network architecture
higher spectral resource utilization
fine hybrid granular routing optical networks
fiber number reduction
Dedicated Path Protection
conventional networks
coarse hybrid granular routing optical networks
Coarse Granular Routing
« first
‹ previous
1
2
3
4
5
6
next ›
last »