Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
inference mechanisms
biblio
CrypTFlow: Secure TensorFlow Inference
Submitted by aekwall on Mon, 03/15/2021 - 12:11pm
compiler security
TensorFlow inference code
semihonest security
semihonest MPC protocol
Secure TensorFlow inference
secure multiparty computation protocols
Porthos
plaintext TensorFlow
malicious security
malicious secure MPC protocols
inference accuracy
improved semihonest 3-party protocol
ImageNet dataset
end-to-end compiler
CrypTFlow
Aramis
Scalability
program compilers
Compositionality
inference mechanisms
Benchmark testing
public key cryptography
Logistics
Metrics
Cryptography
pubcrawl
Resiliency
Task Analysis
Protocols
Cryptographic Protocols
Hardware
data privacy
biblio
Hybrid Deep Neural Networks to Infer State Models of Black-Box Systems
Submitted by aekwall on Tue, 03/09/2021 - 12:04pm
inferred states
automated software engineering tasks
Black-box Model Inference
black-box systems
black-box techniques
black-box third-party libraries
C code
detection techniques
entire source code
existing dynamic model inference techniques
hybrid deep neural network
infer state models
888 random recent system-level test cases
inferring behavior model
program comprehension
recurrent layers
run-time traces
running software system
Specification Mining
state change points
state classification algorithm
traditional time series change
UAV auto-pilot solution
white-box
Anomaly Detection
Time measurement
Classification algorithms
learning (artificial intelligence)
Resiliency
pubcrawl
composability
Metrics
neural nets
pattern classification
program testing
testing
Task Analysis
software engineering
black box encryption
aerospace computing
deep learning
Instruments
inference mechanisms
time series
convolutional neural network
Time series analysis
recurrent neural network
convolutional layers
biblio
Explainability in threat assessment with evidential networks and sensitivity spaces
Submitted by grigby1 on Tue, 02/16/2021 - 1:42pm
information fusion
belief functions
cables (electric)
Communication cables
evidence theory
evidential networks
Explainability
explanation abilities
graphical models
Damage Assessment
marine engineering
opportunity-capability-intent threat model
sensitivity spaces
source quality model
Underwater cables
underwater communication cables
vessel
pubcrawl
uncertainty handling
underwater acoustic communication
Sensitivity
marine communication
threat assessment
uncertainty
probability
inference mechanisms
Cost accounting
cognition
Artificial Intelligence
sensor fusion
telecommunication security
Resiliency
resilience
biblio
I Can Get Some Satisfaction: Fuzzy Ontologies for Partial Agreements in Blockchain Smart Contracts
Submitted by aekwall on Mon, 01/18/2021 - 11:26am
Semantics
Fuzzy Cryptography
partial agreement
Pareto-optimal solutions
Fuzzy sets
fuzzy ontology reasoning task
fuzzy ontologies
blockchain smart contracts
best satisfiability degree
Pareto optimisation
blockchain systems
fuzzy reasoning
Ethereum blockchain
inference mechanisms
Scalability
cognition
contracts
smart contracts
fuzzy set theory
cryptocurrencies
ontologies (artificial intelligence)
blockchain
Metrics
Cryptography
pubcrawl
Resiliency
Task Analysis
Ontologies
biblio
Measuring Trustworthiness of IoT Image Sensor Data Using Other Sensors’ Complementary Multimodal Data
Submitted by aekwall on Mon, 12/07/2020 - 12:31pm
uncertainty handling
trustworthy measure
temperature sensor data
numerical data
multimodal
IoT sensor data
IoT image sensor data
image sensors
image sensor data
DST framework
Dempster-Shafer Theory
complementary multimodal data
authentic forged image data
Temperature distribution
Temperature sensors
security of data
Numerical models
inference mechanisms
Internet of Things applications
sensor fusion
trustworthiness
trust
composability
pubcrawl
learning (artificial intelligence)
Data models
Trusted Computing
IoT applications
Internet of Things
biblio
Asynchronous Parallel Surrogate Optimization Algorithm Based on Ensemble Surrogating Model and Stochastic Response Surface Method
Submitted by grigby1 on Fri, 11/20/2020 - 1:53pm
parallel optimization algorithm
asynchronous parameter optimization
black-box function optimization
ensemble surrogating model
model integration mode
parallel computing
parallel computing framework
parallel computing resources
parallel computing technology
asynchronous parallel surrogate optimization algorithm
parallel parameter space sampling mechanism
parallel sampling mechanism
Quantitative Trading
response surface methodology
stochastic response surface method
surrogate model-based optimization algorithm
Stochastic Computing Security
Adaptation models
uncertainty handling
parallel algorithms
approximation theory
inference mechanisms
ensemble model
optimisation
Load modeling
Stochastic processes
Computational modeling
Scalability
optimization
Resiliency
resilience
pubcrawl
Predictive models
biblio
Research on Vulnerability Ontology Model
Submitted by aekwall on Mon, 11/09/2020 - 1:19pm
inference mechanisms
Information Reuse and Security
weakness class
vulnerability class
security vulnerability ontology model
public information systems
knowledge inference
information security public databases
Inference Rules
industry public standards
CWE
capec
CVE
Compositionality
security of data
Communication networks
Ontology
ontologies (artificial intelligence)
finance
Economics
Vulnerability
Databases
standards
pubcrawl
Resiliency
security
Ontologies
biblio
Inferring Trust Using Personality Aspects Extracted from Texts
Submitted by aekwall on Mon, 10/12/2020 - 11:33am
inference mechanisms
Expert Systems and Privacy
trust mechanisms
trust inference
trust computation
personality models
online human-fed evaluation systems
nonpersonality-wise approaches
malicious people
logical protection
evaluation system
affective aspects
psychology
trust model
Numerical models
security of data
Software systems
Human Factors
Data mining
Correlation
text analysis
Decision Making
tools
Computational modeling
pubcrawl
Human behavior
Data models
Trusted Computing
data privacy
Scalability
biblio
Security Assessment of Dynamic Networks with an Approach of Integrating Semantic Reasoning and Attack Graphs
Submitted by aekwall on Mon, 10/05/2020 - 11:53am
security assessment
Dynamic Networks and Security
test networks
semantic reasoning
Security Ontology
scalable security analysis
risk assessment experience
ontology- and graph-based approach
integrating semantic reasoning
Inference algorithms
security knowledge
attack graph
inference mechanisms
Semantics
cognition
security problems
security of data
ontologies (artificial intelligence)
cyber-attacks
risk management
Decision Making
tools
Metrics
Mobile handsets
graph theory
composability
pubcrawl
Resiliency
network security
security
Ontologies
enterprise networks
biblio
Detecting Cyber Supply Chain Attacks on Cyber Physical Systems Using Bayesian Belief Network
Submitted by aekwall on Mon, 08/24/2020 - 1:36pm
power engineering computing
cyberattack
cyberattack vectors
Cybercrime
cybercrime phenomenon
DAG method
inference mechanisms
invasive software
Knowledge representation
cyber-physical systems
probabilistic inference
pubcrawl
Resiliency
smart power grids
supply chains
threat probability
uncertainty
CPS domain
Scalability
Artificial Intelligence
Bayes methods
Bayesian belief network
Bayesian belief networks
belief networks
composability
Computer crime
Chained Attacks
CSC domain
Cyber Attacks
Cyber Physical System
cyber physical systems
cyber security domain
cyber supply chain attacks detection
Cyber Supply Chain Threats
1
2
3
4
5
next ›
last »