Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
recommender systems
biblio
A Visual Similarity Recommendation System using Generative Adversarial Networks
Submitted by grigby1 on Fri, 06/12/2020 - 12:21pm
learning (artificial intelligence)
visualization
visual similarity recommendation system
Training
Scalability
Resiliency
resilience
recommender systems
recommendation system strategy
query item
pubcrawl
product image
neural nets
Metrics
content-based recommendation system
image similarity
image retrieval
Generators
generative adversarial networks
generative adversarial network based image retrieval system
Generative Adversarial Learning
Footwear
feature extraction
e-commerce platform
deep learning network
deep learning
Convolutional codes
content-based retrieval
biblio
Assisting the Development of Secure Mobile Apps with Natural Language Processing
Submitted by aekwall on Mon, 05/18/2020 - 10:53am
natural language processing
user privacy protection
tools
secure mobile apps development
Scalability
Resiliency
recommender systems
rapid growth
pubcrawl
Androids
Mobile Security
mobile devices
mobile computing
largest worldwide market share
Humanoid robots
Human behavior
data privacy
biblio
Trustworthy Misinformation Mitigation with Soft Information Nudging
Submitted by aekwall on Mon, 04/13/2020 - 10:22am
social networking (online)
misinformation mitigation techniques
news sources
nudge theory
Organizations
pubcrawl
recommendation
recommender systems
Resiliency
Social network services
misinformation
social recommendation algorithms
soft information nudging
technological solutions
technology solutions
trust nudging
Trusted Computing
trusted sources
trustworthy misinformation mitigation
Trustworthy Systems
cyber physical systems
trust
cognition
Companies
composability
Compositionality
computer science
Computer Theory and Trust
conspiracy news consumers
conspiracy theories
Computing Theory
Decision support systems
disinformation
Economics
Feeds
information consumption
information decisions
information sources
information trust
Media
biblio
Targeted Poisoning Attacks on Social Recommender Systems
Submitted by aekwall on Mon, 03/23/2020 - 1:31pm
computer security
Human Factors
Information systems
Motion pictures
optimization
pubcrawl
recommender systems
Resiliency
Scalability
Social network services
Sparse matrices
biblio
Trust in Cyber Security Recommendations
Submitted by aekwall on Mon, 03/23/2020 - 1:31pm
cyber security knowledge permeation
trust scores
trust measures
recommending agent
private contexts
personal recommendations
personal magazine recommendations
manufacturer information
institutional recommendations
human factor research
expert recommendations
expert magazine recommendations
cyber security tool
cyber security recommendations
Cyber-security
-user-characteristics
-security-recommendations
-organizational-security
-human-modeling
recommender systems
Human Factors
social media
social networking (online)
pubcrawl
Resiliency
Trusted Computing
Scalability
biblio
Ontology-Driven Security Requirements Recommendation for APT Attack
Submitted by aekwall on Mon, 03/23/2020 - 1:31pm
Advanced Persistent Threat (APT)
system domain knowledge
security requirement
ontology-driven security requirements recommendation
ontology knowledge base
Ontology
knowledge base
general security knowledge ontology
domain-specific knowledge ontology
APT ontology
advanced persistent threat
recommender systems
cyber threats
Human Factors
APT attack
ontologies (artificial intelligence)
pubcrawl
Resiliency
Scalability
security of data
biblio
Demo: DroidNet - An Android Permission Control Recommendation System Based on Crowdsourcing
Submitted by aekwall on Mon, 03/23/2020 - 1:31pm
Human Factors
technical expertise
recommendation
mobile application security
expert users
DroidNet
crowdsourcing
crowd-sourced Android recommendation tool
apps
application
app
Android permission control recommendation system
Permission
recommender systems
Android (operating system)
android
security of data
Web Application Security
smart phones
smartphone
control systems
Data mining
tools
internet
Databases
privacy
pubcrawl
Resiliency
mobile computing
data privacy
Scalability
Monitoring
biblio
Research on Privacy Security Risk Evaluation of Intelligent Recommendation Mobile Applications Based on a Hierarchical Risk Factor Set
Submitted by aekwall on Mon, 03/23/2020 - 1:31pm
Human Factors
security of data
risk evaluation
recommender systems
pubcrawl
privacy security
network security
mobile computing
Mobile Applications
IR App
intelligent recommendation mobile application
intelligent recommendation
Intelligent Data and Security
hierarchical risk factor set
hierarchical factor set based privacy security risk evaluation method
hierarchical
data privacy
Data mining
data lifecycle factors
consumer privacy security
Scalability
Resiliency
Compositionality
Intelligent Data Security
biblio
A Co-Occurrence Recommendation Model of Software Security Requirement
Submitted by aekwall on Mon, 03/23/2020 - 1:30pm
software products
software SRs
software security threat
semantic similarity
security-critical software systems
security threat
security target documents
security requirements
nonsecurity specialists
natural language processing
CoRM model
co-occurrence recommendation model
Co-occurrence Recommend Model (CoRM)
security of data
recommender systems
Semantics
Human Factors
Unified modeling language
software engineering
Training
pubcrawl
Resiliency
Software
security
Scalability
biblio
Privacy-Enabled Recommendations for Software Vulnerabilities
Submitted by aekwall on Mon, 03/23/2020 - 1:30pm
recommender systems
vulnerability profiles
vulnerability prioritization data
software vulnerabilities
software reliability
Software
slow process
SGX
security of data
security
Scalability
Resiliency
Complexity theory
recommender system
recommender
pubcrawl
privacy-enabled recommendations
privacy
Organizations
malicious operator
Human Factors
data privacy
data integrity
costly process
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »