Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Knowledge engineering
biblio
Black-box Attacks on DNN Classifier Based on Fuzzy Adversarial Examples
Submitted by grigby1 on Thu, 05/20/2021 - 10:53am
fuzzy adversarial examples
white box cryptography
Training
security
resilience
pubcrawl
Knowledge engineering
Image Processing
generative adversarial networks
Black Box Attacks
functionally equivalent network
Entropy
deep learning
black-box attack
Resiliency
Metrics
composability
biblio
Binarized Attributed Network Embedding via Neural Networks
Submitted by grigby1 on Tue, 02/23/2021 - 1:36pm
Hamming space
Knowledge engineering
autoencoder
attribute similarity penalizing term
Attributed Network
binary code learning
data reduction
dimension reduction
feature aggregation
network coding
learned binary representation vectors
network embedding
node classification
node clustering
relaxation-quantization method
unsupervised neural based binarized attributed network embedding
Weisfeiler-Lehman Proximity Matirx
Weisfeiler-Lehman proximity matrix
composability
feature extraction
Neural networks
pubcrawl
Metrics
resilience
Resiliency
matrix algebra
optimization
learning (artificial intelligence)
Data mining
pattern classification
neural nets
Task Analysis
network theory (graphs)
pattern clustering
Binary codes
neural network training
biblio
Collaborative Distillation for Ultra-Resolution Universal Style Transfer
Submitted by aekwall on Mon, 02/01/2021 - 10:44am
linear embedding loss
compressed models
convolutional filters
deep convolutional neural network models
encoder-decoder based neural style transfer
encoder-decoder pairs
exclusive collaborative relationship
feature size mismatch
knowledge distillation method
leverage rich representations
collaborative distillation
student network
style transfer models
trained models
ultra-resolution images
ultra-resolution universal style transfer
universal style transfer
universal style transfer methods
VGG-19
Image coding
Task Analysis
learning (artificial intelligence)
Resiliency
pubcrawl
Decoding
convolutional neural nets
optimisation
data compression
Scalability
collaboration
Image resolution
Predictive Metrics
Knowledge engineering
encoding
graphics processing units
Image reconstruction
neural style transfer
biblio
A Quantitative Framework to Model Reconnaissance by Stealthy Attackers and Support Deception-Based Defenses
Submitted by grigby1 on Thu, 01/28/2021 - 12:13pm
Metrics
tools
stealthy attackers
Scalability
Resiliency
resilience
Reconnaissance
quantitative framework
pubcrawl
persistent cyber adversaries
passive reconnaissance techniques
Organizations
network reconnaissance capabilities
model reconnaissance
military computing
Network reconnaissance
Knowledge engineering
Human behavior
foothold
Electronic mail
defensive capabilities
deception-based defenses
cyber deception
critical capability
Computer worms
computer network security
Computer crime
Adversary Models
advanced adversaries
biblio
Clustering Using a Similarity Measure Approach Based on Semantic Analysis of Adversary Behaviors
Submitted by grigby1 on Thu, 01/28/2021 - 12:10pm
similarity measure
security
security analysts
security of data
semantic analysis
semantic links
Semantics
shared information
similarity degree
Scalability
similarity measure approach
Software
standards
statistical characteristics
threat intelligence
three-layer model
tracking attacks
adversary behaviors
Resiliency
resilience
pubcrawl
pattern clustering
Metrics
Meta path
Knowledge engineering
Human behavior
complex networks
community groups
Community discovery
Biological system modeling
APT groups
Analytical models
Adversary Models
biblio
Detecting Cyber Threats in Non-English Hacker Forums: An Adversarial Cross-Lingual Knowledge Transfer Approach
Submitted by grigby1 on Fri, 01/15/2021 - 11:24am
hacker forums
Semantics
pubcrawl
privacy
machine learning algorithms
Long short-term memory
knowledge transfer
Knowledge engineering
Human Factors
Human behavior
Generative Adversarial Learning
generative adversarial networks
dark web
cross-lingual knowledge transfer
Computer hacking
adversarial learning
Scalability
Predictive Metrics
Resiliency
biblio
Situation Awareness-Oriented Cybersecurity Education
Submitted by grigby1 on Wed, 11/04/2020 - 12:59pm
Knowledge engineering
teaching modules
teaching
Situation Awareness
Servers
security of data
pubcrawl
professional aspects
privacy
network security course
multiple-step attack
mission-driven analytics
microscopic perspectives
big picture
isolation problem
educational courses
cybersecurity profession
cybersecurity education
cyber physical systems
Curriculum development
cross-layer situation knowledge reference model
computer security
computer science education
computer aided instruction
Business
biblio
Modeling the Operational Phases of APT Campaigns
Submitted by grigby1 on Fri, 08/07/2020 - 2:57pm
APT
Tactics Techniques and Procedures
operational reading
operational phases
Knowledge engineering
final objectives achievement
cyberspace operations
cyber threat intelligence
Cyber Kill Chain
attack chronology
APT campaigns
advanced persistent threat attacks
APT attack
Context modeling
pubcrawl
advanced persistent threat
Metrics
Decision Making
NIST
Computational modeling
Data models
Scalability
Analytical models
computer network security
Resiliency
resilience
Human behavior
biblio
Assertion Detection in Clinical Natural Language Processing: A Knowledge-Poor Machine Learning Approach
Submitted by aekwall on Mon, 05/18/2020 - 9:54am
disease modeling
assertion modifiers
assertion status
bidirectional long short-term memory networks
clinical assertion
clinical context
clinical entities
clinical information
clinical natural language processing
clinical NLP systems
assertion detection
diseases
electronic health record
knowledge poor deep-learning system
knowledge-poor machine learning approach
Medical diagnostic imaging
Pain
patient diagnosis
word embedding
machine learning
electronic health records
Task Analysis
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
deep learning
Training
Scalability
natural language processing
Measurement
RNN
recurrent neural nets
attention mechanism
LSTM
Knowledge engineering
assertion assignment
biblio
Reliable and Secure Multishot Network Coding using Linearized Reed-Solomon Codes
Submitted by aekwall on Mon, 04/06/2020 - 8:55am
cyber physical systems
zero-error communication
worst-case adversarial setting
wire-tap channel
unbounded computational resources
sum-subspace codes
sum-rank metric
secure multishot network coding
reliable multishot network coding
random codes
network error-correction
multishot network coding
linearized Reed-Solomon codes
linear network code
inject erroneous packets
coding scheme
telecommunication security
linear codes
Reed-Solomon codes
network coding
Knowledge engineering
error correction codes
encoding
Predictive Metrics
telecommunication network topology
computational complexity
network topology
Reliability
Decoding
composability
pubcrawl
Resiliency
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »