Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
genetic algorithms
biblio
Semi-black-box Attacks Against Speech Recognition Systems Using Adversarial Samples
Submitted by grigby1 on Fri, 09/04/2020 - 4:10pm
automatic speech recognition systems
Black Box Security
targeted ASR systems
semiblack-box attack
semi-black-box attacks
security vulnerabilities
Kaldi
high attack success rate
gradient-independent genetic algorithm
gradient descent algorithm
adversary-expected transcript texts
adversarial samples
adversarial attacks
white-box attacks
Speech recognition
gradient methods
security of data
Deep Neural Network
Perturbation methods
deep neural networks
Statistics
Sociology
genetic algorithms
neural nets
resilience
Resiliency
Metrics
composability
pubcrawl
Hidden Markov models
Computational modeling
biblio
Targeted Adversarial Examples for Black Box Audio Systems
Submitted by grigby1 on Fri, 09/04/2020 - 4:10pm
adversarial perturbations
Black Box Security
white-box attacks
speech-to-text
Speech recognition
gradient methods
gradient estimation
fooling ASR systems
estimation
deep recurrent networks
black-box
black box audio systems
automatic speech recognition systems
audio transcription
audio systems
adversarial generation
security of data
Approximation algorithms
recurrent neural nets
adversarial attack
deep neural networks
Statistics
Sociology
genetic algorithms
Decoding
resilience
Resiliency
Metrics
composability
pubcrawl
Task Analysis
biblio
Security and Performance Modeling and Optimization for Software Defined Networking
Submitted by grigby1 on Fri, 08/28/2020 - 3:54pm
Performance modeling
Web servers
telecommunication traffic
software defined networking
security optimization approach
Security Optimization
Security modeling
security constraints
security
SDN
Scalability
Resiliency
resilience
queueing theory
pubcrawl
Computing Theory
performance constraints
optimization
networking capabilities
network traffic
Measurement
graphical security models
genetic algorithms
genetic algorithm
Generators
Databases
computer network security
communication demands
big data security metrics
Security Metrics
biblio
Research on a General Fast Analysis Algorithm Model for Pd Acoustic Detection System: The Algorithm Model Design and Its Application
Submitted by aekwall on Mon, 08/03/2020 - 10:16am
maintenance engineering
intelligent analysis
pattern identification
acoustical emission signals
algorithm model design
BP artificial neural network
genetic algorithm model design
identification with phase compensation
IPC
GIS
maintenance personnel
PD acoustic detection system
PRPD 2D histogram
standard GIGRE D1.33 444
standard IEC TS 62478-2016
statistic operators
Acoustic Fingerprints
Resiliency
gas insulated substations
acoustic emission
acoustic detection
fault diagnosis
3G mobile communication
Smart Grids
power engineering computing
genetic algorithms
IEC standards
automation
neural nets
Backpropagation
composability
pubcrawl
Human behavior
biblio
Hybrid Approach to Detect Network Based Intrusion
Submitted by aekwall on Mon, 07/27/2020 - 12:12pm
inference mechanisms
intrusion tolerance
PSO algorithm
population stochastic technique
network based intrusion
intrusion detection techniques
internet based communication
hybrid particle swarm optimization fuzzy rule based inference engine
host
Fuzzy
artificial intelligence systems
network intrusion detection system
Stochastic processes
genetic algorithms
Artificial Intelligence
security of data
Network
computer science
Fuzzy logic
Intrusion Detection
Anomaly Detection
internet
PSO
particle swarm optimisation
composability
pubcrawl
Resiliency
feature extraction
IDS
biblio
A Security-Constrained Islanding Feasibility Optimization Model in the Presence of Renewable Energy Sources
Submitted by grigby1 on Thu, 07/16/2020 - 11:57am
pubcrawl
off-line evaluation
optimal control
optimal control actions
optimization
possible islanding event
power distribution control
power distribution faults
power grids
power system security
power systems
Numerical models
renewable energy sources
representative HV subtransmission grid
RES available
resilience
Resiliency
security-constrained islanding feasibility optimization model
simulations
Smart Grids
supplied load
Wind farms
islanded operation feasibility
composability
CPS modeling
distributed power generation
dynamic simulations
frequency control
Generators
genetic algorithms
HV subtransmission level
integer programming
Islanded Operation
actual islanding
islanding conditions
load/generation shedding
loads
long-term security
Mathematical model
Metrics
mixed integer nonlinear problem
network operation
nonlinear programming
biblio
A genetic algorithm for obtaining memory constrained near-perfect hashing
Submitted by grigby1 on Fri, 06/12/2020 - 12:10pm
near-perfect hashing
uniform data distribution
Statistics
Sociology
search problems
Resiliency
resilience
pubcrawl
operating systems
open-addressing double-hashing approach
nonlinear transformation
Next generation networking
binary search
memory-constrained applications
Memory management
hash table
hash algorithms
genetic algorithms
genetic algorithm
file organisation
fast items retrieval
Compositionality
Cohttps://ieeexplore.ieee.org/document/8402794mplexity theory
biblio
A Hybrid Optimization Framework Based on Genetic Algorithm and Simulated Annealing Algorithm to Enhance Performance of Anomaly Network Intrusion Detection System Based on BP Neural Network
Submitted by grigby1 on Fri, 06/12/2020 - 12:10pm
optimization strategy
learning rate
momentum term
network anomaly detection
network infrastructure attacks
network intrusion detection system
network security
neural nets
Neural networks
Intrusion Detection
optimized ANIDS based BPNN
pubcrawl
resilience
Resiliency
simulated annealing
simulated annealing algorithm
soft computing tool
Training
computer networks
Anomaly Detection
anomaly network intrusion detection system
back propagation neural network
Backpropagation
BP Neural Network
Classification algorithms
Compositionality
computer network security
ANIDS BPNN-GASAA
computer security
Cryptography
fitness value hashing
genetic algorithm
genetic algorithms
hash algorithms
hybrid optimization
biblio
Fast Reconfigurable Hash Functions for Network Flow Hashing in FPGAs
Submitted by grigby1 on Fri, 06/12/2020 - 12:09pm
high-quality hash functions
Resiliency
resilience
Registers
reconfigurable hash function
reconfigurable design
reconfigurable architectures
pubcrawl
network flow hashing
multiobjective linear genetic programming
Monitoring
Linear programming
IP networks
Compositionality
high speed computer networks
hash function design
hash algorithms
hardware acceleration
Hardware
genetic programming
genetic algorithms
FPGA
field programmable gate arrays
field programmable gate array
fast reconfigurable hash functions
Cryptography
biblio
Extractive Persian Summarizer for News Websites
Submitted by aekwall on Mon, 05/18/2020 - 10:55am
pre-processing
Web sites
tools
textual information
text analysis
statistical methods
statistical
sentence length
Semantics
semantic methods
Scalability
salient sentences
salient features
Resiliency
pubcrawl
automatic extractive text summarization
Persian news articles
natural language processing
Libraries
Human behavior
heuristical and semantical
heuristic methods
genetic algorithms
feature vector
feature extraction
extractive text summarization
extractive Persian summarizer
English words
Data mining
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »