Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
distortion
biblio
Effective and Fast DeepFake Detection Method Based on Haar Wavelet Transform
Submitted by grigby1 on Fri, 01/15/2021 - 12:02pm
generated face
Blur inconsistency
blur inconsistency detection scheme
DeepFake detection method
DeepFake generation algorithms
DeepFake videos
distortion
exclusive blur inconsistency
face images
face region
fake face
DeepFake
Generative Adversarial Networks GANs
Haar transforms
Haar wavelet
Haar wavelet transform
high-quality fake videos
realistic manner
source video
surrounding context
Wavelet domain
Gallium nitride
Human behavior
Human Factors
Metrics
Resiliency
Scalability
neural nets
resilience
face recognition
feature extraction
pubcrawl
Image edge detection
gan
object detection
generative adversarial networks
Face
Videos
wavelet transforms
video signal processing
detection rate
biblio
Deep Learning with Feature Reuse for JPEG Image Steganalysis
Submitted by aekwall on Mon, 11/09/2020 - 1:12pm
J-UNIWARD
32-layer convolutional neural networks
bit per nonzero AC DCT coefficient
bottleneck layers
bpnzAC
conventional SCA-GFR method
detection error rate reduction
feature reuse
Gabor filters
Steganography
JPEG compressed image
JPEG image steganalysis
JPEG steganalysis methods
shared features
weak hidden information
XuNet method
Information Reuse and Security
computer architecture
CNN model
Compositionality
Transform coding
distortion
convolution
discrete cosine transforms
Image coding
data compression
convolutional neural nets
Training
deep learning
pubcrawl
Resiliency
learning (artificial intelligence)
feature extraction
biblio
Efficiency Assessment of the Steganographic Coding Method with Indirect Integration of Critical Information
Submitted by grigby1 on Fri, 09/18/2020 - 1:47pm
image media image
digital video data platform
Discrete Cosine Transformation (DCT)
discrete cosine transformation matrix
discrete cosine transforms
efficiency assessment
embedded critical data
embedded data resistance
embedded digital data
encoding embedding
image container
image fragment
digital representation
Koch methods
Lakes
quantization coefficient
steganographic coding
steganographic coding method
steganographic embedding
structural elements
transformed image
weight coefficients
Zhao methods
Image reconstruction
security
pubcrawl
resilience
Resiliency
matrix algebra
Cryptography
Containers
Metrics
Compositionality
visualization
Image coding
Comparative Analysis
Steganography
distortion
coding theory
built-in containers
code structures
container.
critical information
data extraction
digital data container
digital platform
biblio
Exploring Adversaries to Defend Audio CAPTCHA
Submitted by grigby1 on Fri, 09/11/2020 - 11:44am
bots
captchas
CAPTCHA
adversarial audio captcha
adversarial audio datasets
adversarial examples attack
attack accuracy
basic iterative method
BIM
Noise measurement
deepFool
distortion
medium background noise
near-sighted users
single audio captcha
spoken digits
Web-based authentication method
websites
composability
authorisation
machine learning
machine learning algorithms
security
pubcrawl
Human behavior
internet
deep learning
learning (artificial intelligence)
Classification algorithms
neural nets
Speech recognition
deep learning models
Web sites
attack models
handicapped aids
biblio
On the Design of Black-Box Adversarial Examples by Leveraging Gradient-Free Optimization and Operator Splitting Method
Submitted by grigby1 on Fri, 09/04/2020 - 4:10pm
distortion metrics
advanced AI platforms
alternating direction method of multipliers
Bayesian optimization
black-box adversarial attack generation methods
black-box adversarial examples
black-box attacks
BO-ADMM
competitive attack success rates
Convex functions
ADMM solution framework
gradient-free optimization
gradient-free regime
operator splitting method
query complexities
Robust machine learning
zeroth-order optimization
ZO-ADMM
Black Box Security
Complexity theory
optimisation
pubcrawl
composability
Metrics
Resiliency
resilience
learning (artificial intelligence)
optimization
security of data
distortion
Perturbation methods
image classification
Bayes methods
image retrieval
black-box adversarial attacks
Measurement
estimation
biblio
Selective Poisoning Attack on Deep Neural Network to Induce Fine-Grained Recognition Error
Submitted by aekwall on Mon, 08/10/2020 - 10:36am
MNIST
Training data
Training
Support vector machines
Speech recognition
selective poisoning attack
security of data
Resiliency
pubcrawl
policy-based governance
poisoning attack
Pattern recognition
nuclear facilities
Neurons
Neural networks
neural nets
AI Poisoning
malicious training data
machine learning library
machine learning
learning (artificial intelligence)
image recognition
fine-grained recognition error
DNN training process
DNN security
distortion
Deep Neural Network
Data models
cyber physical systems
CIFAR10
chosen class
Artificial Neural Networks
biblio
Detecting Adversarial Examples for Deep Neural Networks via Layer Directed Discriminative Noise Injection
Submitted by grigby1 on Fri, 06/19/2020 - 11:49am
machine learning
Training
Sensitivity
Scalability
Resiliency
resilience
pubcrawl
Policy-Governed Secure Collaboration
policy-based governance
Perturbation methods
noninvasive universal perturbation attack
Neural networks
natural scenes
natural images
MobileNet
adversarial examples
learning (artificial intelligence)
layer directed discriminative noise
false trust
false positive rate
dominant layers
distortion
discriminative noise injection strategy
deep neural networks
deep learning
convolutional neural nets
computer vision tasks
computer vision
computer architecture
adversarial images
biblio
Adaptive Steganography in the Noisy Channel with Dual-Syndrome Trellis Codes
Submitted by aekwall on Mon, 06/15/2020 - 11:01am
error correction codes
unacceptably-high payload error rates
trellis codes
syndrome codes
STC
nonadversarial noise
embedding process
Dual-syndrome Trellis Codes
channel error rate
Adaptive steganography
forward error correction
noisy channel
Steganography
Convolutional codes
Resiliency
error correction
Payloads
Transform coding
distortion
Noise measurement
channel coding
Bit error rate
Image coding
data encapsulation
Metrics
composability
pubcrawl
biblio
Maximal Information Leakage based Privacy Preserving Data Disclosure Mechanisms
Submitted by aekwall on Mon, 04/20/2020 - 10:31am
confidential label
privacy models and measurement
Sibson mutual information
privacy-utility trade-off
privacy preserving data disclosure mechanisms
privacy metric
output data vector
MNIST dataset
maximal information leakage
Information Theoretic Privacy
information theoretic measures
FERG dataset
data vectors
data driven setting
data privacy
Bernoulli-Gaussian model
auto-encoders
privacy preservation
distortion
generative adversarial networks
gaussian distribution
Measurement
Mutual information
optimization
Metrics
privacy
pubcrawl
Data models
biblio
Multi-domain Embedding Strategies for Video Steganography by Combining Partition Modes and Motion Vectors
Submitted by aekwall on Mon, 03/09/2020 - 11:17am
MV domain
distortion-minimization framework
embedding capacity
embedding domains
image motion analysis
MDE strategies
motion estimation
motion vectors
multidomain embedding strategies
discrete cosine transforms
partition modes
potential security risks
sequential embedding
Steganography
video steganography
Video-steganography
Security Risk Estimation
minimisation
security
Resiliency
pubcrawl
Metrics
data encapsulation
video signal processing
distortion
Human Factors
Scalability
encoding
Quantization (signal)
Binary codes
-motion-vector
-multi-domain-embedding
-partition-mode
digital video
« first
‹ previous
1
2
3
4
5
6
next ›
last »