Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Training data
biblio
Hunting for Naval Mines with Deep Neural Networks
Submitted by grigby1 on Wed, 04/11/2018 - 2:49pm
sonar imaging
modest DNN model
naval engineering computing
neural nets
privacy
pubcrawl
remotely operated vehicles
robot vision
sea faring vessels
side-scan sonar imagery
Sonar
minelike objects
support vector machine
Support vector machines
threat vectors
Throughput
trainable parameter count
Training
Training data
Underwater vehicles
visualization technique
Weapons
DNN depth
autonomous unmanned underwater vehicle
Brain modeling
calculation requirements
computation requirements
Computational modeling
data distribution training
Data models
deep neural network methods
deep neural networks
detection efficacy
autonomous underwater vehicles
DNN models
explosive naval mines
explosives
feature extraction
image recognition
image recognition tasks
learning (artificial intelligence)
memory requirements
Metrics
biblio
Hierarchical Graph Neuron Scheme in Classifying Intrusion Attack
Submitted by grigby1 on Mon, 04/02/2018 - 12:52pm
Metrics
Training data
Training
testing
Resiliency
resilience
pubcrawl
Pattern recognition
Neurons
arrays
Intrusion Detection
information security
Indexes
Hierarchical Graph Neuron
composability
classification
attack graphs
biblio
Physical security assessment with convolutional neural network transfer learning
Submitted by K_Hooper on Wed, 02/14/2018 - 11:59am
security of data
physical security
physical security assessment
physical security system
physical security video data
pubcrawl
Resiliency
Scalability
security
Periodic retraining
Support vector machines
target detection
Training
Training data
transfer learning
video signal processing
visible imager data
artificial intelligence security
object recognition tasks
Object recognition
object detection
Nuisance Alarms
neural nets
Metrics
machine learning
learning (artificial intelligence)
human in the loop ground truth data
Human behavior
feature extraction
deep learning techniques
convolutional neural network transfer learning
convolutional neural network
Artificial Neural Networks
biblio
Identifying Reversible Circuit Synthesis Approaches to Enable IP Piracy Attacks
Submitted by grigby1 on Tue, 01/23/2018 - 3:24pm
Logic gates
Training data
TBS
Support vector machines
security
Reversible logic
reversible circuit synthesis approaches
Resiliency
QMDD
pubcrawl
policy-based governance
Policy
network synthesis
machine learning algorithms
machine learning
BDD
logic design
logic circuits
learning (artificial intelligence)
IP piracy attacks
IP piracy
Interference
integrated circuit piracy
Integrated circuit modeling
industrial property
ESOP
embedded function
composability
collaboration
biblio
Cross-Project Defect Prediction Using a Credibility Theory Based Naive Bayes Classifier
Submitted by grigby1 on Thu, 12/28/2017 - 1:30pm
predictive security metrics
transfer learning
Training data
Training
target projects
target data distribution
standards
source projects
software quality
software engineering
Software
quality assurance
pubcrawl
program debugging
Bayes methods
Predictive models
Predictive Metrics
pattern classification
novel reweighting mechanism
Nai¨ve Bayes classifier
Metrics
Insurance
cross-project defect prediction
credibility theory based naive Bayes classifier
credibility theory
CPDP
computer science
biblio
Phishing website detection framework through web scraping and data mining
Submitted by grigby1 on Wed, 12/20/2017 - 1:07pm
Crawlers
Data mining
feature extraction
heuristic weights
Human behavior
Human Factors
Phishing
Phishing Detection
pubcrawl
Training data
Uniform resource locators
visualization
Web crawler
biblio
Using synthetic data to train neural networks is model-based reasoning
Submitted by grigby1 on Wed, 12/20/2017 - 1:03pm
Captcha-breaking architecture
human beings
wikipedia
Training
task-specific posterior uncertainty
synthetic-data generative model
synthetic training data
proposal distribution generator learning
Neural networks
neural network training
neural network parameter optimization
neural network generalization
model-based reasoning
Facebook
Computational modeling
pubcrawl
Bayesian model-based reasoning
approximate inference
captchas
CAPTCHA
neural nets
Generators
social networking (online)
Web sites
Training data
learning (artificial intelligence)
Data models
composability
Human Factors
Human behavior
biblio
Early Identification of Vulnerable Software Components via Ensemble Learning
Submitted by grigby1 on Mon, 11/27/2017 - 12:30pm
Resiliency
vulnerability detection scheme
vulnerability detection
Vulnerability
Training data
Training
supports vector machine algorithm
Support vector machines
support vector machine
software testing process
Software systems
software reliability
smart phones
security of data
robust software system
Compositionality
pubcrawl
program testing
Predictive models
Prediction algorithms
object-oriented programming
mislabeled data
Metrics
learning (artificial intelligence)
Java Android applications
Java
Human Factors
Human behavior
Ensemble Learning
early vulnerable software component identification
biblio
A Scalable Meta-Model for Big Data Security Analyses
Submitted by grigby1 on Fri, 11/03/2017 - 11:31am
network anomaly detection
Training data
sufficient statistics
statistical data models
security of data
security analyses
security
Scalable Security
scalable meta-model
Scalability
regression analysis
pubcrawl
Predictive models
Big Data
meta-model sufficient statistics
meta-model matrix
Meta-Model
matrix algebra
machine learning algorithms
linear regressions
linear regression models
linear regression
learning (artificial intelligence)
Data models
Conferences
Big Data security analysis
biblio
On Accuracy of Classification-Based Keystroke Dynamics for Continuous User Authentication
Submitted by grigby1 on Wed, 03/08/2017 - 2:45pm
learning (artificial intelligence)
word total time duration
user active authentication
Training data
Training
timing
SVM
Support vector machines
support vector machine
security
pubcrawl170115
Performance
pattern classification
natural language processing
message authentication
machine learning techniques
authentication
keystroke features
keystroke dynamics authentication systems
keystroke dynamics
key duration
Kernel
K-NN
k-nearest neighbor classifier
flight time latency
feature extraction
English words
directed graphs
diagraph time latency
continuous user authentication
classification-based keystroke dynamics
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
next ›
last »