Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
text analysis
biblio
Enhanced Privacy and Data Protection using Natural Language Processing and Artificial Intelligence
Submitted by aekwall on Mon, 02/22/2021 - 1:39pm
natural language processing
unsupervised machine learning
unlabeled domain-specific documents corpora
text analysis
Task Analysis
specific-domain knowledge data sets
sensitive information
Sensitive Data Extraction
Scalability
Resiliency
pubcrawl
privacy preservation
physical documents
expert systems
Medical services
machine learning
knowledge transfer
Human behavior
digital documents
Data protection
data privacy
data obfuscation procedures
artificial intelligence training
artificial intelligence systems
Artificial Intelligence
privacy
biblio
New Direction of Cryptography: A Review on Text-to-Image Encryption Algorithms Based on RGB Color Value
Submitted by aekwall on Mon, 01/25/2021 - 12:57pm
image colour analysis
text-to-image encryption algorithms
Text-to-Image Encryption
survey
RSA and AES
RGB Value
RGB color value
keeping data
global network
data encryption techniques
Comparison
Asymmetric Encryption
symmetric encryption algorithms
asymmetric encryption algorithms
sensitive data
Cryptography
Software algorithms
public key cryptography
Public key
Image color analysis
text analysis
Databases
Metrics
composability
pubcrawl
Human behavior
Resiliency
Receivers
encryption
biblio
Detecting Malicious Web Requests Using an Enhanced TextCNN
Submitted by aekwall on Mon, 12/14/2020 - 12:31pm
Convolutional Neural Network for Text Classification (TextCNN)
Web servers
deep learning
Semantics
Uniform resource locators
Predictive Metrics
web security
deep learning models
convolutional neural network for text classification
file servers
HTTP Dataset CSIC 2010
malicious Web request detection
Malicious Web requests detection
support vector machine (SVM)
TextCNN
Transferable statistical features
Web attack detection
composability
Data models
Support vector machines
support vector machine
feature extraction
learning (artificial intelligence)
machine learning
Resiliency
pubcrawl
security of data
pattern classification
internet
text analysis
convolutional neural nets
convolutional neural networks
text classification
statistical analysis
biblio
Sentimental Style Transfer in Text with Multigenerative Variational Auto-Encoder
Submitted by grigby1 on Fri, 12/11/2020 - 2:54pm
resilience
vae
transfer sentiment values
textual data
text analysis
Text
style-transfer
style
sentimental style transfer
sentiment-transfer
Scalability
Resiliency
audio data
Recurrent neural networks
recurrent neural nets
pubcrawl
neural style transfer
multigenerative variational auto-encoder
Metrics
long short-term memories
learning (artificial intelligence)
Image Processing
generative adversarial network
deep learning
biblio
Fair Transfer of Multiple Style Attributes in Text
Submitted by grigby1 on Fri, 12/11/2020 - 2:52pm
one-style transfer
Yelp dataset
written text
Writing
Training
text style transfer
text generation
text analysis
target text
style attributes
single-style transfers
Scalability
Resiliency
resilience
pubcrawl
communication style
neural style transfer
Neural networks
neural network architecture
neural net architecture
natural language processing
multi-style transfer
Metrics
machine learning
Indexes
Focusing
fair transfer
deep learning
Decoding
biblio
C500-CFG: A Novel Algorithm to Extract Control Flow-based Features for IoT Malware Detection
Submitted by grigby1 on Fri, 12/11/2020 - 2:34pm
Internet of Things
text-based methods
text analysis
static characteristic extraction method
Resiliency
resilience
pubcrawl
privacy
Metrics
malware detection
Malware Analysis
malicious code
IoT malware detection
IoT
invasive software
C500-CFG
Human behavior
high-complexity programs
graph theory
feature information
feature extraction
dynamic programming
Ding's NP-hard problem
decom-piled executable codes
control flow-based features
control flow graph
computer network security
computational complexity
C500-CFG algorithm
biblio
Applications of Graph Integration to Function Comparison and Malware Classification
Submitted by grigby1 on Fri, 12/11/2020 - 2:34pm
pubcrawl
NET
pagerank
PageRank measure integration vectorization
PageRank vector
pattern classification
Perron vector
PMIV
privacy
probability
probability measure
Metrics
random forests
resilience
Resiliency
set theory
standalone classifier
text analysis
text-only feature space
vanilla random forest
vertex set
hand-engineered functions
abstract syntax tree
classification
code block
decompilation
directed graphs
easy-to-compute glass-box vectorization scheme
feature extraction
function comparison
graph integration
graph theory
.NET files
Human behavior
invasive software
Lebesgue antiderivatives
machine learning
malware
Malware Analysis
malware classification
markov chain
Markov processes
biblio
Policy Text Analysis Based on Text Mining and Fuzzy Cognitive Map
Submitted by grigby1 on Fri, 11/20/2020 - 2:27pm
policy documents
time division multiplexing
Text Mining
text analysis
state owned capital layout adjustment
soft computing method
Semantics
Security Policies Analysis
pubcrawl
policy-based governance
policy text analysis
policy elements
causal relationships
partial association test
natural language processing
Layout
latent semantic analysis
fuzzy set theory
Fuzzy cognitive maps
fuzzy cognitive map
fuzzy association rule mining
FARM
Data models
Data mining
biblio
Digital Simulation in the Virtual World: Its Effect in the Knowledge and Attitude of Students Towards Cybersecurity
Submitted by grigby1 on Wed, 11/04/2020 - 1:45pm
text-based environment
password usage
Phishing
privacy
pubcrawl
social engineering
student experience
teaching
text analysis
password
user experience
Virtual Learning Environment
Virtual Learning Environments
virtual reality
virtual world
virtual world lessons
VLE
Digital Simulations
Computer crime
computer science education
cyber physical systems
Cybersecurity
cybersecurity attitude
cybersecurity education
cybersecurity knowledge
digital simulation
computer aided instruction
E-Learning
education
Educational institutions
Instruments
invasive software
malware
online scam
biblio
Few-Shot Transfer Learning for Text Classification With Lightweight Word Embedding Based Models
Submitted by aekwall on Mon, 11/02/2020 - 2:30pm
pooling strategy
Few-shot learning
few-shot transfer learning tasks
lightweight word embedding-based models
modified hierarchical pooling strategy
parameter-free pooling operations
parameter-free property
parameters training
plug-and-play way
deep learning architectures
semantic compositionality
Semantic Networks
semantic text
simple word embedding-based models
supervised data
unseen text sequences
word embedding based models
word processing
text categorization
Data models
feature extraction
Human behavior
pubcrawl
Computational modeling
pattern classification
Training
text analysis
Task Analysis
text classification
transfer learning
deep learning
Human Factors
Compositionality
Computing Theory and Compositionality
supervised learning
data-hungry deep models
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »