Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Covariance matrices
biblio
Security and Privacy Trade-Offs in CPS by Leveraging Inherent Differential Privacy
Submitted by grigby1 on Wed, 04/20/2022 - 10:45am
control systems
Covariance matrices
CPS Privacy
Databases
data privacy
Human Factors
privacy
pubcrawl
Sensitivity
uncertainty
biblio
A Distributed Approach for Estimation of Information Matrix in Smart Grids and its Application for Anomaly Detection
Submitted by grigby1 on Wed, 05/26/2021 - 11:39am
Anomaly Detection
Covariance matrices
CPS Privacy
cyber physical systems
Human behavior
Human Factors
maximum likelihood estimation
privacy
pubcrawl
Random variables
Smart Grids
Symmetric matrices
Transmission line matrix methods
biblio
A Game-Theoretic Approach to Secure Estimation and Control for Cyber-Physical Systems with a Digital Twin
Submitted by aekwall on Mon, 03/29/2021 - 11:50am
game theoretic security
stealthy estimation attack
Signaling Game with Evidence
physical system
online digital model
intelligent attackers
estimation theory
digital twin
Data-Integrity Attack
clandestine attack strategies
Chi-square detector
CPSS
defense strategies
Covariance matrices
game-theoretic approach
security of data
state estimation
Predictive Metrics
estimation
Human Factors
Games
control systems
pubcrawl
Resiliency
cyber-physical systems
game theory
Scalability
Monitoring
Detectors
biblio
GeoDA: A Geometric Framework for Black-Box Adversarial Attacks
Submitted by aekwall on Tue, 03/09/2021 - 12:05pm
image classification
Robustness
Resiliency
query processing
queries
pubcrawl
Perturbation methods
pattern classification
optimisation
Neural networks
natural image classifiers
minimal perturbation
Metrics
Measurement
mean curvature
Iterative methods
adversarial examples
geometric framework
gaussian distribution
estimation
effective iterative algorithm
Deep Networks
decision boundary
data samples
Covariance matrices
composability
carefully perturbed images
black-box settings
black-box perturbations
black-box attack algorithm
black-box adversarial attacks
black box encryption
biblio
Improving Style Transfer with Calibrated Metrics
Submitted by aekwall on Mon, 02/01/2021 - 11:45am
content image
universal style transfer
transferred image
style weights
quantitative evaluation procedure
Neural Style Transfer methods
histogram loss
Gatys' loss
Effectiveness statistic measures
EC scores
E statistics
Coherence statistic measures
style image
Coherence
Scalability
neural style transfer
rendering (computer graphics)
Covariance matrices
Predictive Metrics
integrated circuits
statistical analysis
optimisation
standards
calibration
optimization
pubcrawl
Resiliency
biblio
Data-driven Stealthy Actuator Attack against Cyber-Physical Systems
Submitted by aekwall on Mon, 01/25/2021 - 12:54pm
actuators
stealthy attack
data-driven stealthy actuator attack
Data-Driven
cyber-physical system security
convex optimization problem
attack signal
arbitrary detectors
Technological innovation
Covariance matrices
convex programming
actuator security
computer network security
Metrics
detection rate
composability
pubcrawl
Human behavior
Resiliency
Electronic mail
cyber-physical systems
security
Detectors
biblio
Privacy-Enabled Secure Control of Fog Computing Aided Cyber-Physical Systems
Submitted by aekwall on Mon, 09/28/2020 - 12:16pm
cyber physical systems
CPS Privacy
secure estimation scheme
Secure control design
privacy-enabled secure control
observer-based secure control problem
Luenberger observer
fog computing aided CPS
Fog computation
FCA-CPS
Data Perturbation
complicated computation
industrial process
Covariance matrices
Linear systems
Cryptography
Observers
Perturbation methods
fog layer
Human Factors
edge computing
security threats
privacy
pubcrawl
Human behavior
cyber-physical systems
distributed processing
data privacy
encryption
biblio
Coordinated Data-Falsification Attacks in Consensus-based Distributed Kalman Filtering
Submitted by aekwall on Mon, 08/03/2020 - 10:29am
false-data detectors
uncoordinated attacks
telecommunication security
state estimation
sensors
Scalability
Resiliency
pubcrawl
network-wide estimation error maximization
neighboring agents
naive attacks
Metrics
linear model
Kalman filters
honest agents
adaptive filtering
estimation error
Distributed databases
data-falsification attack
Covariance matrices
coordinated data-falsification attacks
consensus-based distributed Kalman filtering
Byzantine agents
Boolean relaxation
Boolean algebra
block-coordinate descent method
backward stepwise based subset selection method
attack strategy
attack sequences
biblio
Trust-Based Distributed Kalman Filter Estimation Fusion under Malicious Cyber Attacks
Submitted by grigby1 on Fri, 06/19/2020 - 11:48am
sensor networks
pubcrawl
replay attacks
resilience
Resiliency
Scalability
security
security of data
sensor fusion
Policy-Governed Secure Collaboration
state estimation
trust-based distributed Kalman filter estimation fusion
trust-based distributed processing frame
Trusted Computing
trusted nodes
truth discovery
wireless sensor networks
information exchange
Cyber Attacks
distributed cooperative localization
Distributed databases
Distributed Kalman filter
distributed processing
Dynamic state estimation
False Data Injection
false trust
Covariance matrices
Kalman filters
malicious attacks
malicious cyber attacks
malicious network attack
measurement errors
neighbor nodes
policy-based governance
biblio
On Integrating Knowledge Graph Embedding into SPARQL Query Processing
Submitted by grigby1 on Fri, 05/22/2020 - 2:38pm
Approximation algorithms
Time factors
SPARQL query processing
research problems
query languages
query language
NN search algorithm
Nearest Neighbor Searching
knowledge graph embedding
KGE
Covariance matrices
search problems
nearest neighbor search
query processing
graph theory
nearest neighbour methods
Measurement
optimisation
Metrics
standards
Mathematical model
pubcrawl
1
2
next ›
last »