Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
training dataset
biblio
Defending Against Model Stealing Attacks With Adaptive Misinformation
Submitted by grigby1 on Thu, 01/28/2021 - 1:12pm
Metrics
training dataset
security of data
security
Scalability
Resiliency
resilience
query processing
pubcrawl
Predictive models
Perturbation methods
out-of-distribution inputs
OOD queries
neural nets
model stealing attacks
Adaptation models
learning (artificial intelligence)
labeled dataset
Human behavior
deep neural networks
Data models
Computational modeling
Cloning
clone model
black-box query access
attacker clone model
attacker
Adversary Models
Adaptive Misinformation
biblio
TrISec: Training Data-Unaware Imperceptible Security Attacks on Deep Neural Networks
Submitted by grigby1 on Wed, 11/04/2020 - 2:15pm
pubcrawl
learning (artificial intelligence)
machine learning
ML Security
multilevel security system
object detection
Object recognition
optimization
Optimization algorithms
perceptible noise
pre-trained DNNs
Inference algorithms
resilience
Resiliency
Scalability
security
security of data
structural similarity analysis
traffic sign detection
Training
training data-unaware imperceptible security attacks
training dataset
feature extraction
AI Poisoning
automation
autonomous vehicles
convolutional neural nets
Correlation
data manipulation attacks
data poisoning attacks
Deep Neural Network
deep neural networks
DNNs
Adversarial Machine Learning
generated attack images
German Traffic Sign Recognition Benchmarks dataset
Human behavior
image classification
Image coding
image recognition
imperceptibility factor
imperceptible attack images
Imperceptible Attack Noise
biblio
DP-CGAN: Differentially Private Synthetic Data and Label Generation
Submitted by grigby1 on Fri, 08/07/2020 - 3:48pm
generative adversarial networks
training dataset
spent privacy budget
single-digit epsilon parameter
research communities
Renyi differential privacy accountant
original sensitive datasets
label generation
GAN models
DP-CGAN
differentially private synthetic data
differentially private conditional GAN training framework
AI
MNIST dataset
learning (artificial intelligence)
Scalability
Gallium nitride
privacy
Data models
data privacy
Generators
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
Training
biblio
Feature-based transfer learning for network security
Submitted by K_Hooper on Wed, 02/14/2018 - 11:59am
signature-based detection systems
network data
network security
nonlabeled testing sets
pattern classification
pubcrawl
Resiliency
Robustness
Scalability
security of data
network attack detection
supervised learning approaches
testing
testing datasets
Training
training dataset
transfer learning
unseen attacks
unseen network attacks
unseen variants
Knowledge engineering
artificial intelligence security
attack behaviors
common base classifier
computer security
different distribution
feature distribution
feature extraction
feature-based transfer learning technique
Human behavior
Analytical models
labeled datasets
labeled training sets
learned model
learned models
learning (artificial intelligence)
machine learning
machine learning-based approaches
Metrics
biblio
Robust Hashing With Local Models for Approximate Similarity Search
Submitted by BrandonB on Wed, 05/06/2015 - 11:55am
robust hashing
Nickel
optimal hash code
query data point
query hash code
query processing
real-life datasets
RHLM
robust hash function learning
loss function
robust hashing-with-local models
Robustness
search efficiency
search quality
Training
Training data
training data points
training dataset
high-dimensional data
approximate similarity search
binary hash codes
computational complexity
database point
Databases
dimensionality curse
feature dimensionality
file organisation
1-norm minimization
high-dimensional data point mapping
indexing
l2
Laplace equations
Linear programming
local hashing model
local structural information