Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
adaptive filtering
biblio
GRASP-based Feature Selection for Intrusion Detection in CPS Perception Layer
Submitted by grigby1 on Mon, 12/28/2020 - 12:49pm
adaptive filtering
Metrics
pubcrawl
resilience
Resiliency
Scalability
biblio
Effectiveness of Random Deep Feature Selection for Securing Image Manipulation Detectors Against Adversarial Examples
Submitted by grigby1 on Mon, 12/28/2020 - 12:49pm
image manipulation detectors
Support vector machines
security of data
secure classification
Scalability
Resiliency
resilience
randomization-based defences
random feature selection approach
random deep feature selection
pubcrawl
Metrics
linear SVM
learning (artificial intelligence)
adaptive filtering
image manipulation detection tasks
image manipulation detection
image classification
fully connected neural network
Feature Selection
feature randomization
feature extraction
deep learning for forensics
deep learning features
CNN image manipulation detector
adversarial multimedia forensics
Adversarial Machine Learning
biblio
A Binary Relevance Adaptive Model-Selection for Ensemble Steganalysis
Submitted by grigby1 on Mon, 12/28/2020 - 12:49pm
Metrics
Training
Task Analysis
steganalysis
Scalability
Resiliency
resilience
pubcrawl
Model-Selection
adaptive filtering
Labeling
information security
Gabor filters
FLD
feature extraction
Ensemble
cognition
Binary Relevance
biblio
BlurNet: Defense by Filtering the Feature Maps
Submitted by grigby1 on Mon, 12/28/2020 - 12:48pm
Scalability
malicious examples
Metrics
neural nets
Neural networks
Perturbation methods
pubcrawl
resilience
Resiliency
robust physical perturbations
Robustness
RP
malicious adversary
security of data
standard blur kernels
standard-architecture traffic sign classifiers
standards
stop signs
substitute model
targeted misclassification rates
traffic engineering computing
victim model
white stickers
white-box attacks
frequency analysis
adaptive attack evaluation
adaptive filtering
adversarial defense
adversarial images
Adversarial Machine Learning
Adversarial robustness
attack algorithms
black stickers
blackbox transfer attack
BlurNet
depthwise convolution layer
Adaptation models
gradient information
high frequency noise
image recognition
image restoration
input image
Kernel
layer feature maps
learning (artificial intelligence)
low-pass filters
lowpass filtering behavior
biblio
Anomaly Detection in Video Data Based on Probabilistic Latent Space Models
Submitted by grigby1 on Mon, 12/28/2020 - 12:48pm
particle filtering (numerical methods)
video signal processing
video sequences
video frames
video data
vehicles
Variational autoencoder
semiautonomous vehicle
security of data
Scalability
robot vision
Resiliency
resilience
pubcrawl
probability
probabilistic latent space models
Adapted Markov Jump Particle Filter
particle filtering
object detection
neural nets
multimodal architecture
mobile robots
Metrics
Markov processes
latent space information generation
Kalman filtering
image sequences
discrete inference levels
continuous inference levels
autonomous vehicles
Anomaly Detection
adaptive filtering
biblio
Mitigation of Frequency-Hopped Tick Jamming Signals
Submitted by grigby1 on Mon, 12/28/2020 - 12:48pm
jamming components
tick signals
STRIKE3 project
standardisation of GNSS threat reporting and receiver testing through international knowledge exchange
Scalability
satellite navigation
Robust Interference Mitigation techniques
RIM techniques
Resiliency
resilience
radio receivers
pubcrawl
notch filters
Metrics
jamming to noise power ratio
jamming power
adaptive filtering
Jamming
interference suppression
interference mitigation
Interference
instantaneous frequency
GNSS jamming
GNSS
Global Navigation Satellite System jamming
frequency-hopped tick Jamming signals
frequency hop communication
frequency discontinuities
experimentation and exploitation
ANF
adaptive notch filters
adaptive filters
biblio
Evaluating Bad Hosts Using Adaptive Blacklist Filter
Submitted by grigby1 on Mon, 12/28/2020 - 12:47pm
incident evaluation
unreliable alerts
telecommunication traffic
Scalability
Resiliency
resilience
publicly available blacklists
pubcrawl
network flow data
national backbone network
Metrics
internet
adaptive blacklist filter
flow-based monitoring
false positives
evidence capture
evaluator module
digital signatures
computer network security
blacklists
bad hosts
automated evaluation techniques
adaptive filters
adaptive filtering
biblio
Contextually Aware Agile-Security in the Future of Systems Engineering
Submitted by grigby1 on Mon, 12/28/2020 - 12:47pm
Metrics
ubiquitous computing
systems engineering
social symbiosis
security of data
Scalability
Resiliency
resilience
pubcrawl
adaptive filtering
general systems engineering
FuSE
contextually aware agile-security
contextually aware adaptive system security
contextual-awareness
cohesion
Agile Security
biblio
Adaptive filtering of non-fluctuation interference when receiving signals with multi-position phase shift keying
Submitted by grigby1 on Mon, 12/28/2020 - 12:47pm
non-fluctuation interference
weighting coefficients
signal with multi-position phase shift keying
Signal to noise ratio
Scalability
Resiliency
resilience
recursive filters
receiving signals
Receivers
quadrature coherent signal receiver
pubcrawl
Power harmonic filters
Phase shift keying
optimal filter parameters
nonfluctuation interference
adaptation coefficient
noise immunity
multiposition phase shift keying
Metrics
interference (signal)
Interference
harmonic interference
Harmonic analysis
filtering theory
constant envelope
Bit error rate
adjustment algorithm
adaptive nonrecursive filter
adaptive filters
adaptive filtering
adaptive filter
biblio
A Segregated Architecture for a Trust-based Network of Internet of Things
Submitted by aekwall on Mon, 08/03/2020 - 10:29am
internal devices
adaptive trust model
additional firewall
entities
external devices
external level
homes
industrial systems
inhabitants
inner level
internal network
internal level
segmented architectures
segregated architecture
smart home devices
trust rules
trust-based network
trusted environment
adaptive filtering
pubcrawl
Monitoring
Scalability
Internet of Things
security
attack surface
Internet of Things (IoT)
Trusted Computing
Resiliency
computer network security
privacy
Peer-to-peer computing
Metrics
trust
internet
security threats
Smart homes
Smart Home
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »