Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
inference mechanisms
biblio
Beyond Pixels: Image Provenance Analysis Leveraging Metadata
Submitted by aekwall on Mon, 03/30/2020 - 10:34am
meta data
provenance graph construction
Phylogeny
Painting
online multimedia
noncontent-based information
metadata-based inferences
image provenance analysis
cultural analytics
automated provenance analysis
Provenance
inference mechanisms
Semantics
visualization
Task Analysis
digital image forensics
Image forensics
multimedia computing
video signal processing
metadata
internet
Metrics
Image edge detection
graph theory
composability
pubcrawl
Human behavior
Resiliency
biblio
Evaluating Fault Resiliency of Compressed Deep Neural Networks
Submitted by grigby1 on Wed, 02/26/2020 - 3:48pm
Hardware
VGG16
storage faults
software mitigation techniques
Resiliency
resilience
Quantization (signal)
pubcrawl
Predictive models
neural nets
LeNet-5
learning (artificial intelligence)
inference mechanisms
hardware mitigation techniques
Analytical models
fault tolerant computing
fault tolerance
Fault resiliency
Fault Resilience
Fault Attacks
Efficient and secure inference engines
Deep neural network model compression
deep learning
Data models
data compression
Computational modeling
compressed DNN models
compressed deep neural networks
biblio
Comprehensive Privacy Analysis of Deep Learning: Passive and Active White-Box Inference Attacks against Centralized and Federated Learning
Submitted by grigby1 on Tue, 02/18/2020 - 10:52am
Resiliency
Inference-Attacks
learning (artificial intelligence)
Membership-Inference
Metrics
neural nets
privacy
privacy leakage
pubcrawl
resilience
inference mechanisms
stochastic gradient descent algorithm
Stochastic processes
Stochastic-Gradient-Descent
Training
Training data
white box cryptography
White Box Security
white-box membership inference attacks
data privacy
active white-box inference attacks
black-box attacks
centralized learning
CIFAR dataset
composability
comprehensive privacy analysis
Computational modeling
Data models
active membership inference attacks
deep learning
deep learning models
deep neural networks
Deep-learning
federated learning setting
Federated-Learning
gradient methods
Inference algorithms
biblio
Deliberative and Affective Reasoning: a Bayesian Dual-Process Model
Submitted by aekwall on Mon, 02/10/2020 - 11:09am
Intelligent Agents
affective reasoning
Artificial agents
BayesAct agents
Bayesian dual-process model
computationally tractable model
decision theoretic reasoning
emotional level
free energy
human experience
human social networks
affective alignment
intelligent computational agents
plausible model
social experiences
social order
social sciences computing
social-psychological Bayesian affect control theory
social-psychological theory
socio-technical system
sociological theory
technological agents
inference mechanisms
Bayes methods
pubcrawl
Computational modeling
multi-agent systems
collaboration
chatbots
Complexity theory
cognition
Human Factors
Markov Decision Process
Scalability
Artificial Intelligence
Biological system modeling
affective computing
human interaction
social interactions
psychology
Social Agents
active inference
affect control theory
biblio
Decision Support System for Risk Assessment Using Fuzzy Inference in Supply Chain Big Data
Submitted by grigby1 on Mon, 01/27/2020 - 11:34am
risk assessment
Metrics
organisation Big Data collection
organisational aspects
policy-based governance
production engineering computing
pubcrawl
resilience
Resiliency
mamdani fuzzy inference
risk Identification
risk management
Scalability
supply chain Big Data
supply chain management
supply chain risk assessment
supply chains
Fuzzy Inference DSS mechanism
Big Data
collaboration
composability
Decision Making
decision support system
Decision support systems
emerging association patterns
FIDSS mechanism
Analytical models
Fuzzy logic
fuzzy reasoning
fuzzy set theory
Fuzzy sets
Human behavior
Human Factors
inference mechanisms
biblio
SCTD: Smart Reasoning Based Content Threat Defense in Semantics Knowledge Enhanced ICN
Submitted by grigby1 on Tue, 01/21/2020 - 10:27am
security of data
internet
knowledge graph
pubcrawl
resilience
Resiliency
Scalability
SCTD
security knowledge-based defense mechanism
information-centric networking
semantic obfuscation
semantic reasoning
semantic relations
Semantics
smart based defense mechanism
smart reasoning algorithms
smart reasoning based content threat defense
subscription-based naming mechanism
Extranets
cognition
computer architecture
content semantic awareness
content threats
content-based defense mechanism
context communication content
distributed processing
edge computing
blacklisting
fog computing based defense mechanism
ICN edge defense system
ICN protocols
ICN semantic features
inference mechanisms
Information Centric Network
Information Centric Networks
biblio
An Expert System Based on Belief Rule to Assess Bank Surveillance Security
Submitted by grigby1 on Thu, 01/02/2020 - 1:46pm
pubcrawl
virtual life
surveillance security
security of data
security assessment
security
Scalability
RIMER approach
RIMER
Resiliency
resilience
real-time security data
real-life security system
bank data processing
knowledge base
inference mechanisms
Human behavior
generic belief rule based inference methodology
expert systems
evidential reasoning algorithm
BRB inference methodology
belief rule based expert system
belief rule base
bank surveillance security assessment
bank security assessment
banking security
biblio
Expert System for Managing Policy of Technological Security in Uncertainty Conditions: Architectural, Algorithmic, and Computing Aspects
Submitted by grigby1 on Thu, 01/02/2020 - 1:46pm
security
probability measure
process control
Production
pubcrawl
resilience
Resiliency
Safety
Scalability
Scientific Computing Security
probability
security of data
technological process
technological safety
technological safety management
technological security
theory of evidence
uncertainty
uncertainty conditions
uncertainty handling
expert system
algorithmic aspects
architectural aspects
business data processing
Circuit faults
Compositionality
computing aspects
Dempster-Schafer trust function
diagnostic variables
enterprise
False Data Detection
expert systems
Expert Systems and Security
faulty process chains
faulty technological chain
Human behavior
inference mechanisms
knowledge base production
Predictive Metrics
biblio
Research and Design of Subway BAS Intrusion Detection Expert System
Submitted by grigby1 on Thu, 01/02/2020 - 1:45pm
Public transportation
urban rail transit system
the inference engine
targeted intrusion detection expert system
subway equipment
subway BAS intrusion detection expert System
security of data
security
Scalability
Resiliency
resilience
railways
rail transit system
rail traffic
Rails
Building automation system
pubcrawl
knowledge base
intrusion detection system
Intrusion Detection
information security
inference mechanisms
inference engine
Human behavior
expert systems
expert system
Engines
cognition
building management systems
biblio
From Big Data to Knowledge: Issues of Provenance, Trust, and Scientific Computing Integrity
Submitted by aekwall on Mon, 10/28/2019 - 9:39am
provenance-based trust reasoning
data science
Data validity
data-intensive science and engineering
Knowledge engineering
knowledge provenance
malicious attacks
natural environmental changes
operations mistakes
cognitive systems
SCI failures
scientific computing integrity
scientific workflows
Variety
Veracity
Viewpoints
views
Scientific Computing Security
trust
Big Data
Conferences
data integrity
Trusted Computing
Resiliency
pubcrawl
graph theory
Computational modeling
security of data
provenance graphs
cognition
Semantics
inference mechanisms
Predictive Metrics
data provenance
scientific information systems
Compositionality
« first
‹ previous
1
2
3
4
5
next ›
last »