Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Training data
biblio
Comprehensive Privacy Analysis of Deep Learning: Passive and Active White-Box Inference Attacks against Centralized and Federated Learning
Submitted by grigby1 on Tue, 02/18/2020 - 10:52am
Resiliency
Inference-Attacks
learning (artificial intelligence)
Membership-Inference
Metrics
neural nets
privacy
privacy leakage
pubcrawl
resilience
inference mechanisms
stochastic gradient descent algorithm
Stochastic processes
Stochastic-Gradient-Descent
Training
Training data
white box cryptography
White Box Security
white-box membership inference attacks
data privacy
active white-box inference attacks
black-box attacks
centralized learning
CIFAR dataset
composability
comprehensive privacy analysis
Computational modeling
Data models
active membership inference attacks
deep learning
deep learning models
deep neural networks
Deep-learning
federated learning setting
Federated-Learning
gradient methods
Inference algorithms
biblio
Learning Transferable Features For Open-Domain Question Answering
Submitted by aekwall on Mon, 11/25/2019 - 1:01pm
single open-domain QA model
open-domain QA models
open-domain question answering
open-domain Question-Answering models
pattern clustering
pubcrawl
question answering (information retrieval)
Question-Answering
sentence-level QA models
natural language processing
span-level QA benefits
Task Analysis
Training
training corpora
Training data
transfer learning
transferable feature learning
transferable features
domain-specific QA models
Analogies and Transference
clustering algorithm
complementary data
Data models
Deep Networks
domain adaptation approaches
domain-adaptation
domain-specific features
Adaptation models
Human behavior
Human Factors
information retrieval
Knowledge Discovery
learning (artificial intelligence)
Linear programming
natural language
biblio
Chronic Poisoning against Machine Learning Based IDSs Using Edge Pattern Detection
Submitted by grigby1 on Wed, 05/01/2019 - 10:33am
learning (artificial intelligence)
Training data
security threats
security of data
security
Scalability
Resiliency
resilience
pubcrawl
Metrics
machine learning algorithms
machine learning
Batch-EPD Boundary Pattern detection algorithm
Intrusion Detection Systems
Intrusion Detection
Image edge detection
edge pattern points
Edge Pattern Detection algorithm
edge detection
detection algorithms
Data models
composability
chronic poisoning attack
big data era
biblio
Automated Generation and Selection of Interpretable Features for Enterprise Security
Submitted by grigby1 on Fri, 03/22/2019 - 12:00pm
machine learning method
Training data
security of data
security
Scalability
Resiliency
resilience
pubcrawl
pattern clustering
Metrics
malware
malicious activity detection
big data security
learning (artificial intelligence)
Fourier transforms
fourier analysis
feature extraction
enterprise security logs
DNF formulas
cyber security
Clustering algorithms
classifiers
Boolean functions
biblio
Towards Making Systems Forget with Machine Unlearning
Submitted by Katie Dey on Mon, 08/06/2018 - 12:24pm
learning (artificial intelligence)
usability perspective
Training data
summation form
statistical query learning
security perspective
security of data
recommender systems
recommendation engine
privacy risks
machine unlearning
machine learning algorithms
Learning systems
Adversarial Machine Learning
forgetting systems
Forgetting System
Feature Selection
feature modeling
feature extraction
Extraction
data privacy
Data models
data lineage
Computational modeling
complex data propagation network
Cognitive Security
Articles of Interest
Extraction
C3E 2019
biblio
Quantifying the impact of adversarial evasion attacks on machine learning based android malware classifiers
Submitted by Katie Dey on Mon, 08/06/2018 - 12:24pm
malicious apps
user devices
Training data
Training
Support vector machines
statistical analysis
smart phones
regression analysis
Random Forest
nonlinear classifiers
neural network
neural nets
malware
adversarial evasion attacks
machine learning
logistic regression
linear classifiers
learning (artificial intelligence)
invasive software
Humanoid robots
feature extraction
Androids
Android-based devices
Android Malware Detection
android malware classifiers
Extraction
biblio
Collaborative SQL-injections Detection System with Machine Learning
Submitted by grigby1 on Thu, 06/07/2018 - 2:12pm
security
privacy
pubcrawl
Human behavior
attack
Resiliency
Policy
collaboration
SQL injection
Policy-Governed Secure Collaboration
policy-based governance
internet
machine learning classification
SQLIA
Training data
biblio
FailureSense: Detecting Sensor Failure Using Electrical Appliances in the Home
Submitted by el_wehby on Fri, 05/25/2018 - 2:50pm
Monitoring
Training data
Training
telecommunication network reliability
Smart homes
sensor reliability
sensor placement
sensor firing
sensor failure detection
sensor deployment
Redundancy
Data collection
inexpensive sensors
home networks
home electrical appliances
Home appliances
fault diagnosis
failuresense
fail-stop failure
Electrical products
distributed sensors
1536086
biblio
Sample-Based Regularization for Support Vector Machine Classification
Submitted by grigby1 on Tue, 05/01/2018 - 10:38am
regularization scheme
training sample selection
training sample level
Training data
Training
SVM
Support vector machines
support vector machine classification
support vector machine
selected training data
sample-based regularization
Resiliency
resilience
composability
Regularization
pubcrawl
optimization
Metrics
maximum margin-based classification
linear combination
kernel methods
Kernel
image classification
human action recognition tasks
Fasteners
Dropout
biblio
Identification of Abnormal Network Traffic Using Support Vector Machine
Submitted by grigby1 on Tue, 05/01/2018 - 10:38am
composability
feature extraction
Kernel
machine learning
machine learning algorithms
Metrics
pubcrawl
resilience
Resiliency
Support vector machines
SVM
Traffic identification
Training
Training data
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
next ›
last »