Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Perturbation methods
biblio
Adversarial Defense via Learning to Generate Diverse Attacks
Submitted by grigby1 on Fri, 04/17/2020 - 10:58am
neural nets
White Box Security
Training
stochastic generator
security of data
Robustness
Resiliency
resilience
recursive generator
pubcrawl
Perturbation methods
pattern classification
optimization
one-shot perturbation
Neural networks
adversarial defense
Metrics
malicious attacks
machine learning
learning (artificial intelligence)
Generators
deterministic generator
deep neural networks
deep learning
Compositionality
composability
classification performance
black-box attacks
Adversarial training
biblio
Component-Based Refinement and Verification of Information-Flow Security Policies for Cyber-Physical Microservice Architectures
Submitted by grigby1 on Fri, 04/03/2020 - 12:05pm
microservices
software architects
service-oriented architecture
Servers
security restrictions
security of data
security
resulting microlevel policies
real-time behavior
pubcrawl
Protocols
protocol verification
policy-based governance
Policy Based Governance
Perturbation methods
CoCoME case study
microservice architectural style
message passing
macro-level security policy
macro-level policy
information-flow security policies
Information systems
information leaks
Information Flow
individual microservices
Formal Specification
cyber-physical systems
cyber-physical microservice architectures
computer architecture
collaboration
biblio
Malware Evasion Attack and Defense
Submitted by grigby1 on Tue, 02/18/2020 - 11:53am
malware detection systems
white-box evasion attacks
White Box Security
white box cryptography
Training data
Training
security
Resiliency
resilience
pubcrawl
Perturbation methods
pattern classification
ML-based malware detector
ML classifier
Metrics
malware evasion attack
adversarial example
malware
machine learning classifiers
learning (artificial intelligence)
invasive software
grey-box evasion attacks
Evasion Attack
Detectors
defense approaches
defense
Data models
composability
black-box attacks
Adversarial Machine Learning
adversarial examples
biblio
Towards Understanding Limitations of Pixel Discretization Against Adversarial Attacks
Submitted by grigby1 on Tue, 02/18/2020 - 11:52am
neural nets
white-box attacks
white box cryptography
Training
Robustness
Resiliency
resilience
pubcrawl
preprocessing defense methods
preprocessing defense
pixel discretization defense method
pixel discretization
Perturbation methods
Neural networks
adversarial attacks
MNIST
Metrics
Measurement
machine learning
low computational overhead
ImageNet
Image Processing
deep learning
Data models
Cryptography
composability
Artificial Neural Networks
biblio
A Robust Control Architecture for Mitigating Sensor and Actuator Attacks on PV Converter
Submitted by aekwall on Mon, 01/13/2020 - 12:17pm
DC-DC photovoltaic converter
actuator security
μ-synthesis robust controller exhibits
system uncertainty perturbations
system state matrix
Sensor and Actuator Attacks
PV converter system
photovoltaic power systems
Photovoltaic Converter
Perturbation methods
p-synthesis robust control architecture
mitigating sensor
mitigating potential cyberattacks
injected attack signals
DC-DC power convertors
security of data
controller design
control system synthesis
actuator attacks
actuators
uncertainty
Cybersecurity
robust control
Metrics
composability
pubcrawl
Human behavior
Resiliency
cyber-physical systems
Computer crime
biblio
TMk-Anonymity: Perturbation-Based Data Anonymization Method for Improving Effectiveness of Secondary Use
Submitted by grigby1 on Thu, 01/31/2019 - 12:19pm
perturbation
TMk-anonymity
Resiliency
resilience
pubcrawl
privacy preservation
privacy
Pk-anonymity
Perturbation methods
anonymity
Metrics
k-anonymity
Human Factors
Human behavior
Global Positioning System
gaussian distribution
composability
anonymization
biblio
Defense Against Adversarial Attacks Using High-Level Representation Guided Denoiser
Submitted by aekwall on Wed, 01/16/2019 - 2:10pm
Predictive models
resilience
pubcrawl
Metrics
composability
Training
Adaptation models
Neural networks
Perturbation methods
Image reconstruction
noise reduction
White Box Security
biblio
Fooling End-To-End Speaker Verification With Adversarial Examples
Submitted by aekwall on Wed, 01/16/2019 - 2:10pm
adversarial examples
White Box Security
YOHO
original speaker examples
NTIMIT
MFCC
Mel frequency cepstral coefficient
fooling end-to-end speaker verification
end-to-end deep neural models
deep end-to-end network
black-box attacks
automatic speaker verification systems
Automatic speaker verification
security of data
Perturbation methods
Neural networks
neural nets
Task Analysis
Training
speaker recognition
composability
Metrics
pubcrawl
resilience
standards
biblio
Audio Adversarial Examples: Targeted Attacks on Speech-to-Text
Submitted by aekwall on Wed, 01/16/2019 - 2:10pm
automatic speech recognition
White Box Security
white-box iterative optimization-based attack
targeted audio adversarial examples
targeted attacks
speech-to-text
Probability distribution
neural network
Mozilla implementation DeepSpeech end
Iterative methods
Distortion measurement
distortion
security of data
audio waveform
adversarial example
Perturbation methods
Neural networks
Speech recognition
composability
Metrics
pubcrawl
resilience
optimisation
biblio
Black-Box Generation of Adversarial Text Sequences to Evade Deep Learning Classifiers
Submitted by aekwall on Wed, 01/16/2019 - 2:10pm
sentiment analysis
Perturbation methods
Prediction algorithms
program debugging
pubcrawl
real-world text datasets
Recurrent neural networks
resilience
scoring strategies
pattern classification
Task Analysis
text analysis
text classification
text input
text perturbations
White Box Security
word embedding
adversarial samples
misclassification
Metrics
machine learning
learning (artificial intelligence)
IMDB movie reviews
Enron spam emails
DeepWordBug
deep learning classifiers
deep learning
composability
character-level transformations
black-box generation
black-box attack
black box attack
adversarial text sequences
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »