Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Training data
biblio
The Hammer and the Nut: Is Bilevel Optimization Really Needed to Poison Linear Classifiers?
Submitted by grigby1 on Wed, 02/09/2022 - 1:46pm
denial-of-service attack
data poisoning
Computational modeling
AI Poisoning
Adversarial Machine Learning
Training data
Training
Toxicology
System performance
secure AI
Scalability
Resiliency
resilience
pubcrawl
Neural networks
Human behavior
biblio
Deep Poisoning: Towards Robust Image Data Sharing against Visual Disclosure
Submitted by grigby1 on Wed, 02/09/2022 - 1:46pm
visualization
Training data
Training
Toxicology
Scalability
Resiliency
resilience
pubcrawl
image representation
Human behavior
Conferences
computer vision
AI Poisoning
biblio
Intrusion Detection in VANETs
Submitted by aekwall on Mon, 02/07/2022 - 4:10pm
Attacks on VANET
Compositionality
computer architecture
IDS
Intrusion Detection
intrusion detection system
MANET Attack Detection
Metrics
pubcrawl
Reliability
Resiliency
security
Training data
VANET Security
vehicular ad hoc networks
wireless networks
biblio
Analysis of Data Transforming Technology for Malware Detection
Submitted by grigby1 on Mon, 02/07/2022 - 3:45pm
malware
malicious script
GBM
detection rate
data conversion
Malware Analysis
learning (artificial intelligence)
software engineering
Training data
privacy
Resiliency
resilience
Metrics
Human behavior
pubcrawl
machine learning
deep learning
biblio
Learning by Environment Clusters for Face Presentation Attack Detection
Submitted by aekwall on Mon, 01/10/2022 - 11:52am
Support vector machines
lighting
face recognition
pubcrawl
Scalability
Resiliency
Human behavior
Training data
Instruments
Three-dimensional displays
Focusing
Face anti-spoofing
face image clustering
presentation attack detection
Attack vectors
biblio
Security Threat Sounds Classification Using Neural Network
Submitted by grigby1 on Mon, 01/10/2022 - 11:30am
Metrics
Neural Network Security
artificial neural network
Artificial Neural Networks
collaboration
convolutional neural network
convolutional neural networks
cyber physical systems
event detection
Mel frequency cepstral coefficient
Training data
Neural networks
policy-based governance
pubcrawl
resilience
Resiliency
security
Sound recognition and classification
surveillance
Training
biblio
Model Fragmentation, Shuffle and Aggregation to Mitigate Model Inversion in Federated Learning
Submitted by aekwall on Mon, 12/20/2021 - 11:31am
Adversary Models
Aggregates
Collaborative Work
differential privacy
federated learning
Human behavior
Learning systems
Metrics
Metropolitan area networks
Model inversion
privacy
pubcrawl
Resiliency
Resistance
Scalability
Training data
biblio
A Study on the Transferability of Adversarial Attacks in Sound Event Classification
Submitted by grigby1 on Tue, 11/30/2021 - 1:30pm
Resiliency
Transforms
transferability
Training data
speech processing
sound event classification
signal processing security
signal processing
security
adversarial attacks
resilience
pubcrawl
privacy
Metrics
computer vision
Computational modeling
composability
audio tagging
biblio
Classification Between Machine Translated Text and Original Text By Part Of Speech Tagging Representation
Submitted by grigby1 on Mon, 11/29/2021 - 2:32pm
pubcrawl
Zipf’s Law
word embedding
Vocabulary
trigram representation
Training data
text analytics
tagging
Scalability
Artificial Neural Networks
part of speech tagging
Numerical models
Metrics
Indexes
Human Factors
Human behavior
Dictionaries
composability
biblio
A Malware Detection Approach Using Malware Images and Autoencoders
Submitted by aekwall on Tue, 09/21/2021 - 10:08am
Task Analysis
pubcrawl
Resiliency
Human behavior
privacy
Training data
malware
malware detection
Sensor Systems
Malware Analysis
autoencoders
Labeling
malware images
supervised learning
Unsupervised Learning
Predictive Metrics
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »