Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Perturbation methods
biblio
TAaMR: Targeted Adversarial Attack against Multimedia Recommender Systems
Submitted by aekwall on Tue, 08/31/2021 - 11:48am
Measurement
Task Analysis
visualization
Human Factors
Perturbation methods
Scalability
feature extraction
pubcrawl
Resiliency
recommender systems
Adversarial Machine Learning
Multimedia systems
biblio
Vulnerability of Person Re-Identification Models to Metric Adversarial Attacks
Submitted by grigby1 on Mon, 08/02/2021 - 3:42pm
Measurement
Metrics
metrics testing
Perturbation methods
Protocols
pubcrawl
Robustness
Task Analysis
testing
Training
biblio
A Two-Layer Moving Target Defense for Image Classification in Adversarial Environment
Submitted by grigby1 on Mon, 08/02/2021 - 3:11pm
deep learning
Training
Predictive models
machine learning
machine learning algorithms
pubcrawl
Metrics
Scalability
Perturbation methods
Image Processing
Robustness
image classification
adversarial sample
defensive technique
biblio
Evaluation of Adversarial Attacks Based on DL in Communication Networks
Submitted by aekwall on Tue, 07/27/2021 - 1:58pm
Resiliency
Metrics
pubcrawl
Perturbation methods
Reliability
information security
Neural networks
testing
Individual Identification
Deep Neural Network
communication security
Communication networks
adversarial example
Black Box Attacks
composability
biblio
Improved Adversarial Attack against Black-box Machine Learning Models
Submitted by aekwall on Tue, 07/27/2021 - 1:58pm
composability
Resiliency
Metrics
pubcrawl
optimization
Perturbation methods
security
PSO
particle swarm optimization
machine learning models
boundary attack
Biological neural networks
adversarial samples
Black Box Attacks
convergence
search problems
biblio
Proposing Innovative Perturbation Algorithm for Securing Portable Data on Cloud Servers
Submitted by grigby1 on Thu, 07/08/2021 - 2:38pm
Program processors
user privacy in the cloud
user privacy
tools
Technological innovation
Servers
security
Scalability
Resiliency
resilience
pubcrawl
cloud
privacy
Perturbation methods
perturbation
Noise addition
Metrics
encryption
decryption
data privacy
Cloud Computing
biblio
Effects of Forward Error Correction on Communications Aware Evasion Attacks
Submitted by grigby1 on Wed, 06/30/2021 - 3:26pm
Adversarial Machine Learning
Cognitive Radios
composability
encoding
forward error correction
machine learning
Metrics
modulation
Perturbation methods
pubcrawl
radio frequency machine learning
radio transmitters
Receivers
resilience
Resiliency
security
biblio
Real-time False Data Injection Attack Detection in Connected Vehicle Systems with PDE modeling
Submitted by grigby1 on Wed, 06/30/2021 - 3:22pm
Ghost Vehicle
vehicle dynamics
Resiliency
resilience
pubcrawl
Perturbation methods
partial differential equation
Observers
Mathematical model
Human Factors
Human behavior
Acceleration
false data injection attack
False Data Detection
estimation
detection
Data models
cyber physical systems
connected vehicles
composability
Communication networks
biblio
Adversarial Deception in Deep Learning: Analysis and Mitigation
Submitted by aekwall on Mon, 06/28/2021 - 12:32pm
predictive security metrics
Computational modeling
deep learning
false trust
Measurement
Mitigation strategy
Perturbation methods
policy-based governance
Predictive models
pubcrawl
Resiliency
Scalability
Speech recognition
targeted and untargeted adversarial attacks
Training
Trust and dependability risks in deep learning
biblio
Privacy Preserving Average Consensus by Adding Edge-based Perturbation Signals
Submitted by grigby1 on Wed, 06/02/2021 - 12:20pm
Control Theory
convergence
Cryptography
Heuristic algorithms
Human behavior
multi-agent systems
Perturbation methods
privacy
pubcrawl
resilience
Resiliency
Scalability
Signal processing algorithms
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »