Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Perturbation methods
biblio
Black Box Explanation Guided Decision-Based Adversarial Attacks
Submitted by grigby1 on Fri, 09/04/2020 - 4:10pm
Training data
Black Box Security
targeted deep neural networks
performing decision-based black-box attacks
imperceptive adversarial perturbation
imperceptible adversarial example
derivative-free and constraint optimization problem
decision-based black-box adversarial attack
decision-based adversarial attacks
Constraint optimization
boundary attack
black box explanation guided decision-based adversarial attacks
black box explanation
attack efficiency
artificial intelligence security
Logistics
Cryptography
Perturbation methods
neural nets
Neural networks
learning (artificial intelligence)
resilience
Resiliency
Metrics
composability
pubcrawl
search problems
Artificial Intelligence
optimisation
telecommunication security
Cats
Computational modeling
biblio
Trajectory Anonymity Based on Quadratic Anonymity
Submitted by grigby1 on Thu, 08/13/2020 - 5:33pm
adjacent anonymous area
trajectory anonymous algorithm
trajectory anonymity publishing
synchronous trajectory data
Synchronous trajectory
Sensitive region
quadratic anonymity
privacy information
original Regional anonymity
original location
Location mappings
location mapping
Location area division
K-anonymous
forged location
current sensitive region
Servers
k-anonymity
Trajectory
anonymity
Euclidean distance
Metrics
Perturbation methods
Data protection
computer science
composability
data privacy
privacy
Resiliency
resilience
Human behavior
pubcrawl
biblio
An Analytical Framework for Security-Tuning of Artificial Intelligence Applications Under Attack
Submitted by grigby1 on Thu, 08/13/2020 - 5:07pm
artificial intelligence applications
artificial intelligence security
signal classification
security-tuning
perturbation attack
parameters tuning
ML parameters
ML experts
ML algorithms
medical signal processing
k-nearest neighbors algorithm
input data perturbation attack
electroencephalography
electroencephalogram signals
EEG dataset
data classification
learning (artificial intelligence)
analytical framework
AI application
classification accuracy
tuning
testing
Prediction algorithms
Perturbation methods
machine learning algorithms
optimization
pubcrawl
Artificial Intelligence
security
machine learning
security of data
biblio
Query-Efficient Black-Box Attack by Active Learning
Submitted by aekwall on Mon, 07/20/2020 - 10:55am
Jacobian matrices
white box cryptography
white-box attack methods
white-box attack approaches
query-efficient black-box attack
query efficiency
generated adversarial examples
CIFAR-10 dataset
adversarial attack
active learning strategy
active learning
MNIST dataset
Learning systems
Perturbation methods
Cryptography
Deep Neural Network
Entropy
machine learning model
convolutional neural nets
Training
Labeling
query processing
Neural networks
Metrics
composability
pubcrawl
Resiliency
learning (artificial intelligence)
biblio
Adversarial Machine Learning Attack on Modulation Classification
Submitted by grigby1 on Fri, 07/03/2020 - 5:05pm
modulation
Task Analysis
Support vector machines
Signal to noise ratio
security of data
Scalability
Robustness
Resiliency
resilience
pubcrawl
Perturbation methods
pattern classification
Modulation classification
Adversarial Machine Learning
ML-based modulation classifiers
ML-based modulation classification methods
ML models
Mathematical model
learning (artificial intelligence)
Human behavior
Deterrence
cognitive self-driving networks
Carlini & Wagner attack
adversarial ML examples
adversarial machine learning attack
biblio
Adversarial Video Captioning
Submitted by grigby1 on Fri, 07/03/2020 - 1:15pm
targeted attacks
adversarial video captioning
cosine similarity
deep learning models
image captioning attack
image captioning attacks
image domain
Streaming media
target captions
targeted
adversarial machine learning techniques
video captioning
video captioning model
video captioning task
video domain
video playback quality
video stream
video streaming
deep video
machine learning
Scalability
computer architecture
Task Analysis
pubcrawl
Metrics
Resiliency
resilience
Force
learning (artificial intelligence)
security of data
deep learning
optimization
computer vision
Perturbation methods
video signal processing
adversarial
adversarial attack
Adversarial Machine Learning
biblio
A Topology Based Differential Privacy Scheme for Average Path Length Query
Submitted by aekwall on Mon, 06/22/2020 - 11:19am
Erbium
topology based differential privacy scheme
query function
privacy control parameters
node privacy protection
network vertices
edge-weighted privacy protection
differential privacy security mechanism
data query
average path length query
APL query
network topology
Euclidean distance
Scalability
Perturbation methods
Sensitivity
privacy protection
differential privacy
query processing
data availability
privacy
composability
pubcrawl
Human behavior
Resiliency
data privacy
biblio
Detecting Adversarial Examples for Deep Neural Networks via Layer Directed Discriminative Noise Injection
Submitted by grigby1 on Fri, 06/19/2020 - 11:49am
machine learning
Training
Sensitivity
Scalability
Resiliency
resilience
pubcrawl
Policy-Governed Secure Collaboration
policy-based governance
Perturbation methods
noninvasive universal perturbation attack
Neural networks
natural scenes
natural images
MobileNet
adversarial examples
learning (artificial intelligence)
layer directed discriminative noise
false trust
false positive rate
dominant layers
distortion
discriminative noise injection strategy
deep neural networks
deep learning
convolutional neural nets
computer vision tasks
computer vision
computer architecture
adversarial images
biblio
PRESERVING PARAMETER PRIVACY IN SENSOR NETWORKS
Submitted by aekwall on Mon, 04/20/2020 - 10:24am
Cramér-Rao lower bound
privacy models and measurement
utility loss
public parameter estimation
private parameter estimation
privacy gain functions
predefined privacy gain threshold
perturbation
parameter privacy preservation
parameter estimation
information privacy
inference allowance
decentralized sensors.
Cramér-Rao lower bounds
pubcrawl
linear model
Loss measurement
Perturbation methods
sensor networks
Silicon
data privacy
Noise measurement
sensor fusion
Indexes
Metrics
privacy
wireless sensor networks
biblio
PRESERVING PARAMETER PRIVACY IN SENSOR NETWORKS
Submitted by aekwall on Mon, 04/20/2020 - 10:24am
Cramér-Rao lower bound
privacy models and measurement
utility loss
public parameter estimation
private parameter estimation
privacy gain functions
predefined privacy gain threshold
perturbation
parameter privacy preservation
parameter estimation
information privacy
inference allowance
decentralized sensors.
Cramér-Rao lower bounds
pubcrawl
linear model
Loss measurement
Perturbation methods
sensor networks
Silicon
data privacy
Noise measurement
sensor fusion
Indexes
Metrics
privacy
wireless sensor networks
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »