Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
recurrent neural nets
biblio
Constructing Browser Fingerprint Tracking Chain Based on LSTM Model
Submitted by grigby1 on Fri, 04/05/2019 - 10:27am
LSTM
training set
track Web attackers
stateless tracking technique
Stability analysis
LSTM model
input feature vector
browser fingerprint tracking chain
browser fingerprint evolution
browser fingerprint
recurrent neural nets
Time series analysis
time series
Resiliency
security of data
Compositionality
Browser Security
tracking
Fingerprint recognition
online front-ends
Recurrent neural networks
computer architecture
Browsers
Training
Metrics
Human behavior
pubcrawl
resilience
biblio
Characterizing and Improving Stability in Neural Style Transfer
Submitted by grigby1 on Mon, 11/19/2018 - 12:30pm
recurrent neural nets
visible flickering
Videos
video signal processing
temporally consistent stylized videos
temporal consistency loss
stylized images
stability improvement
Stability analysis
solution set
Scalability
Resiliency
resilience
Gram matrix representing style
recurrent convolutional network
real-time video style transfer
real-time systems
real-time methods
pubcrawl
optimization
Optical imaging
Optical computing
neural style transfer
Metrics
matrix algebra
Integrated optics
biblio
Multi-level Anomaly Detection in Industrial Control Systems via Package Signatures and LSTM Networks
Submitted by grigby1 on Wed, 07/18/2018 - 10:05am
resilience
multilevel anomaly detection method
network package content analysis
package content level anomaly detection
package signatures
package traffic
pattern classification
production engineering computing
Protocols
pubcrawl
recurrent neural nets
LSTM networks
Resiliency
SCADA systems
Scalability
signature database
software packages
stacked long short term memory network-based softmax classifier
time series
time-series anomaly detection
time-series structure
field devices
baseline signature database
Bloom filter
Bloom filters
communication patterns
control engineering computing
data structures
database management systems
Databases
Detectors
digital signatures
Anomaly Detection
gas pipeline SCADA system
ICS Anomaly Detection
ICS networks
industrial control
Industrial Control Systems
integrated circuits
Intrusion Detection
learning (artificial intelligence)
long short term memory networks
biblio
A deep learning-based RNNs model for automatic security audit of short messages
Submitted by grigby1 on Mon, 11/20/2017 - 12:20pm
short message security audit
pubcrawl
recurrent neural nets
recurrent neural networks (RNNs)
Resiliency
security
Semantics
sentence feature vector
sentiment analysis
sentiment classification
prisons
short messages automatic security audit
Support vector machines
text categorization
text classification
Training
Vectors
word order information
Word2Vec
Governance
Artificial Neural Networks
bag of words
binary classification
collaboration
deep learning
deep learning-based recurrent neural networks
deep learning-based RNN model
electronic messaging
feature extraction
artificial neural network
Government
learning (artificial intelligence)
Logic gates
message authentication
pattern classification
police data processing
Policy
policy-based governance
biblio
Vessel track correlation and association using fuzzy logic and Echo State Networks
Submitted by BrandonB on Tue, 05/05/2015 - 11:22am
Recurrent neural networks
moving object tracking
naval engineering computing
Neural networks
object tracking
pattern clustering
Radar tracking
recurrent neural nets
recurrent neural network
Mathematical model
sensing modality
sensors
target tracking
Track Association
Track Correlation
Vectors
vessel track association
vessel track correlation
fuzzy k-nearest neighbours
computational-intelligence-based methods
Correlation
correlation methods
data fusion
Defence and Security
defense community
echo state networks
fuzzy c-means clustering
computational intelligence
Fuzzy logic
fuzzy set theory
Kalman filter
Kalman filters
Marine vehicles
Maritime Domain Awareness
maritime vessels
« first
‹ previous
1
2
3
4
5
6