Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Training data
biblio
Detection of Near Field Communication (NFC) Relay Attack Anomalies in Electronic Payment Cases using Markov Chain
Submitted by aekwall on Tue, 09/08/2020 - 8:59am
Markov processes
Chained Attacks
target NFC network
near-field communication
markov chain
intrusive detection system
electronic payment cases
attack anomalies
Near Field Communication
Training data
security of data
embedded system security
Relays
relay attack
Google
pubcrawl
Resiliency
Data models
security
Scalability
biblio
Black Box Explanation Guided Decision-Based Adversarial Attacks
Submitted by grigby1 on Fri, 09/04/2020 - 3:10pm
Training data
Black Box Security
targeted deep neural networks
performing decision-based black-box attacks
imperceptive adversarial perturbation
imperceptible adversarial example
derivative-free and constraint optimization problem
decision-based black-box adversarial attack
decision-based adversarial attacks
Constraint optimization
boundary attack
black box explanation guided decision-based adversarial attacks
black box explanation
attack efficiency
artificial intelligence security
Logistics
Cryptography
Perturbation methods
neural nets
Neural networks
learning (artificial intelligence)
resilience
Resiliency
Metrics
composability
pubcrawl
search problems
Artificial Intelligence
optimisation
telecommunication security
Cats
Computational modeling
biblio
Selective Poisoning Attack on Deep Neural Network to Induce Fine-Grained Recognition Error
Submitted by aekwall on Mon, 08/10/2020 - 9:36am
MNIST
Training data
Training
Support vector machines
Speech recognition
selective poisoning attack
security of data
Resiliency
pubcrawl
policy-based governance
poisoning attack
Pattern recognition
nuclear facilities
Neurons
Neural networks
neural nets
AI Poisoning
malicious training data
machine learning library
machine learning
learning (artificial intelligence)
image recognition
fine-grained recognition error
DNN training process
DNN security
distortion
Deep Neural Network
Data models
cyber physical systems
CIFAR10
chosen class
Artificial Neural Networks
biblio
Estimating the Number of Hidden Nodes of the Single-Hidden-Layer Feedforward Neural Networks
Submitted by grigby1 on Fri, 07/03/2020 - 3:54pm
hidden nodes
Training data
Training
singular value decomposition
single-hidden-layer feedforward neural network
sample-based data normalization
pubcrawl
optimal number
normalized data
Metrics
Artificial Neural Networks
Feedforward neural networks
feedforward neural nets
Eigenvalues and eigenfunctions
decomposition
data normalization
cyber physical systems
computer architecture
Compositionality
attribute-based data normalization
biblio
Preserving Privacy in Convolutional Neural Network: An ∊-tuple Differential Privacy Approach
Submitted by aekwall on Mon, 06/22/2020 - 10:20am
Deep Neural Network
ϵ-tuple differential privacy approach
Training data
significant accuracy degradation
salient data features
reusable output model
privacy preserving model
privacy concern
model inversion attack
model buildup data
financial data
deep neural networks
complex data features
medical data
CNN model
differential privacy
Cloud Computing
transfer learning
image recognition
convolutional neural network
convolutional neural nets
CNN
privacy
classification
composability
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
data privacy
Scalability
biblio
Research on Extending Person Re-identification Datasets Based on Generative Adversarial Network
Submitted by grigby1 on Fri, 06/12/2020 - 11:22am
neural nets
Training data
Training
surveillance camera network
Scalability
Resiliency
resilience
pubcrawl
person re-identification datasets
Person re-identification
Person Re-ID
pedestrians image
pedestrians
object detection
Cameras
Metrics
learning (artificial intelligence)
label smoothing regularization for outliers with weight algorithm
Image color analysis
Generators
generative adversarial networks
generative adversarial network
Generative Adversarial Nets
Generative Adversarial Learning
feature extraction
deep training
deep learning
biblio
Membership Inference Attacks Against Adversarially Robust Deep Learning Models
Submitted by grigby1 on Fri, 04/03/2020 - 11:56am
provable security
resilience
Training data
target model
security and privacy
provable defense
privacy challenges
membership inference attack
evasion attacks
empirical membership inference attacks
adversarially robust deep learning models
adversarial training method
adversarial defenses
adversarial defense methods
adversarial defense
deep learning
Compositionality
Metrics
neural nets
security challenges
privacy
Data models
data privacy
Resiliency
pubcrawl
security
Predictive models
Training
security of data
learning (artificial intelligence)
biblio
Countermeasure of Lightweight Physical Unclonable Function Against Side-Channel Attack
Submitted by grigby1 on Mon, 03/02/2020 - 12:32pm
message authentication
Training data
Tamper resistance
side-channel information
Side-channel attack
security of IoT
Scalability
pubcrawl
Power measurement
Power demand
power consumption
power aware computing
Physical Unclonable Function
modeling attack
Metrics
authentication
lightweight PUF
lightweight physical unclonable function
Internet of Things
internet
Integrated circuit modeling
Industrial Internet of Things
Human Factors
Human behavior
Hardware Security
field programmable gate arrays
external Internet
Cryptography
countermeasure method
biblio
Ensemble-Learning-Based Hardware Trojans Detection Method by Detecting the Trigger Nets
Submitted by grigby1 on Wed, 02/26/2020 - 3:38pm
resilience
Trojan types
Trojan horses
trojan horse detection
Trojan circuits
Trigger-net features
Training data
Training
suspicious Trigger nets
supply chain security
security
Resiliency
cyber physical systems
pubcrawl
learning (artificial intelligence)
Integrated circuit modeling
integrated circuit design
IC systems
IC design phase
hardware-Trojan detection method
Hardware
feature extraction
ensemble learning method
biblio
Malware Evasion Attack and Defense
Submitted by grigby1 on Tue, 02/18/2020 - 10:53am
malware detection systems
white-box evasion attacks
White Box Security
white box cryptography
Training data
Training
security
Resiliency
resilience
pubcrawl
Perturbation methods
pattern classification
ML-based malware detector
ML classifier
Metrics
malware evasion attack
adversarial example
malware
machine learning classifiers
learning (artificial intelligence)
invasive software
grey-box evasion attacks
Evasion Attack
Detectors
defense approaches
defense
Data models
composability
black-box attacks
Adversarial Machine Learning
adversarial examples
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
next ›
last »