Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Jacobian matrices
biblio
Adversarial Eigen Attack on BlackBox Models
Submitted by aekwall on Fri, 03/31/2023 - 8:35am
Adversarial attack and defense
Black Box Attacks
composability
Computational modeling
computer vision
Data models
deep learning
Jacobian matrices
machine learning
Metrics
Optimization methods
Perturbation methods
pubcrawl
Resiliency
Training data
biblio
Distribution Grid State Assessment for Control Reserve Provision Using Boundary Load Flow
Submitted by grigby1 on Wed, 12/02/2020 - 1:04pm
Probabilistic logic
load uncertainties
Mathematical model
Power cables
power generation
power grids
power system parameter estimation
power system security
power system stability
power system state estimation
load forecasting
pubcrawl
resilience
Resiliency
Scalability
solar power plants
solar power stations
standard load profile
wind power plants
frequency stability
boundary load flow method
control reserve
control reserve provision
control reserve supply
coupled congestion control
distributed power generation
distribution grid state assessment
ex ante evaluation
forecasting loads
boundary load flow
future grid state identification
grid congestions
grid parameter estimation
grid parameters
grid state assessment
grid state identification
Jacobian matrices
Load flow
biblio
Detection of False Data Injection Attacks in Cyber-Physical Systems using Dynamic Invariants
Submitted by aekwall on Mon, 08/03/2020 - 9:29am
Power system dynamics
Kalman filters
learning (artificial intelligence)
Meters
Metrics
National security
power engineering computing
Power measurement
power system
Kalman filter
power system security
pubcrawl
Resiliency
robust estimation
Scalability
security of data
state estimation
traditional anomaly detection approaches
data-driven temporal causal relationships
adaptive filtering
adaptive robust thresholding
Anomaly Detection
bad data detection
Bayesian filtering
complex cyber-physical systems
cyber-physical systems
data-driven functional relationships
False Data Detection
dynamic invariant network
false data injection attack detection
false data injection attacks
G-KART
Granger causality based Kalman filter
graph theory
invariant graph
Jacobian matrices
biblio
Query-Efficient Black-Box Attack by Active Learning
Submitted by aekwall on Mon, 07/20/2020 - 9:55am
Jacobian matrices
white box cryptography
white-box attack methods
white-box attack approaches
query-efficient black-box attack
query efficiency
generated adversarial examples
CIFAR-10 dataset
adversarial attack
active learning strategy
active learning
MNIST dataset
Learning systems
Perturbation methods
Cryptography
Deep Neural Network
Entropy
machine learning model
convolutional neural nets
Training
Labeling
query processing
Neural networks
Metrics
composability
pubcrawl
Resiliency
learning (artificial intelligence)
biblio
Efficient Implementation of Cryptography on Points of an Elliptic Curve in Residue Number System
Submitted by grigby1 on Fri, 06/26/2020 - 11:54am
Metrics
weighted number system
Scalability
RNS
Resiliency
resilience
residue number systems
residue number system
public key cryptography
pubcrawl
Modular Multiplication
adding points
Mathematical model
Jacobian matrices
Galois fields
Elliptic curves
Elliptic curve cryptography
elliptic curve
doubling points
Cryptography
computational complexity
arithmetic operations
biblio
Modification and Optimization of Solovey-Strassen's Fast Exponentiation Probablistic Test Binary Algorithm
Submitted by aekwall on Mon, 01/20/2020 - 10:48am
optimization
test
Solovey-Strassen fast exponentiation probablistic test binary algorithm
Solovey-Strassen
Software algorithms
Scalability
Resiliency
pubcrawl
probability test
probability
Probabilistic logic
Algorithm
Jacobian matrices
Jacobi symbol
Information systems
Fermat's little theorem
Fermat
exponentiation
C\# programming language
C\# languages
Cryptography
binary exponentiation
biblio
Attack and Defense of Dynamic Analysis-Based, Adversarial Neural Malware Detection Models
Submitted by aekwall on Mon, 06/24/2019 - 1:43pm
Human behavior
Training
static analysis-based malware classifiers
Resiliency
pubcrawl
program diagnostics
pattern classification
Neural networks
Metrics
malware detection
malware classification accuracy
Malware Analysis
malware
learning (artificial intelligence)
Jacobian matrices
invasive software
adversarial attacks
Engines
Dynamic Malware Classification
dynamic analysis-based
deep learning-based systems
deep learning classification systems
deep learning
crafting adversarial samples
computer security
classification algorithm
anti-malware engine
anti-malware companies
adversarial neural malware detection models
adversarial learning-based attacks
adversarial learning
biblio
GPU-Accelerated Batch-ACPF Solution for N-1 Static Security Analysis
Submitted by grigby1 on Wed, 02/21/2018 - 12:37pm
pubcrawl
Multicore Computing
multicore computing security
multicore CPU parallel computing solution
Multicore processing
N-1 static security analysis
parallel processing
parallelism
power systems
program diagnostics
Metrics
QR factorization
resilience
Resiliency
Scalability
security
security of data
SSA
Static security analysis (SSA)
UMFPACK-library-based single-CPU counterpart
GPU-accelerated batch-Jacobian-matrix
ACPF problem
Algorithm design and analysis
alternating current power flow
batch-solving method
contingency analysis
contingency screening
float-pointing calculation
GPU-accelerated
GPU-accelerated batch-ACPF solution
Acceleration
GPU-accelerated batch-QR solver
graphics processing unit
graphics processing units
High performance computing
high performance computing (HPC)
Intel Xeon E5-2620
Jacobian matrices
KLU library
memory bandwidth
biblio
An overflow free fixed-point eigenvalue decomposition algorithm: Case study of dimensionality reduction in hyperspectral images
Submitted by grigby1 on Thu, 12/28/2017 - 12:16pm
formal methods
satisfiability-modulo-theory
range analysis
pubcrawl
overflow
Metrics
Jacobian matrices
interval arithmetic
integer bit-width allocation
Hyperspectral imaging
Affine arithmetic
fixed-point arithmetic
estimation
Eigenvalues and eigenfunctions
eigenvalue decomposition
decomposition
Covariance matrices
Compositionality
Algorithm design and analysis
biblio
Detecting, locating, amp; quantifying false data injections utilizing grid topology through optimized D-FACTS device placement
Submitted by BrandonB on Tue, 05/05/2015 - 11:32am
power grids
Voltage control
Vectors
Transmission line measurements
topology perturbation
Topology
state estimation
situational awareness method
power system state estimation
power system security
AC state estimation
Perturbation methods
optimized D-FACTS device placement
Jacobian matrices
grid topology
flexible AC transmission systems
false data injection attack vector
Distributed Flexible AC Transmission Systems
distributed flexible AC transmission system devices
bad data detection scheme
1
2
next ›
last »