Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Reinforcement learning
biblio
Smart Security Audit: Reinforcement Learning with a Deep Neural Network Approximator
Submitted by aekwall on Tue, 04/27/2021 - 12:29pm
Scalability
Task Analysis
Adaptation models
Resiliency
Human behavior
pubcrawl
audit
Reinforcement learning
tools
Penetration Testing
Biological neural networks
Deep Neural Network
Security Audits
pentesting
q-learning
biblio
Cognitive Radio Networks: Recent Advances in Spectrum Sensing Techniques and Security
Submitted by aekwall on Mon, 03/15/2021 - 11:04am
wireless nodes
Cognitive Radio Security
wireless spectrum
spectrum sensing techniques
spectrum resources
spectrum access
Dynamic Spectrum Allocation
Channel allocation
spectrum sensing
cognitive radio networks
cognitive radio
wireless network
Reinforcement learning
radio spectrum management
telecommunication security
Energy Efficiency
wireless networks
wireless channels
signal detection
sensors
radio networks
wireless devices
Communication system security
resource management
wireless sensor networks
pubcrawl
Resiliency
biblio
Reinforcement Learning for Dynamic Resource Optimization in 5G Radio Access Network Slicing
Submitted by grigby1 on Tue, 02/16/2021 - 11:47am
resource management
dynamic networks
Q-learning solution
network slicing
network slice requests
network optimization
frequency-time blocks
dynamic resource optimization
Dynamic Resource Allocation
computational constraints
5G security
5G radio access network slicing
Bit error rate
Reinforcement learning
learning (artificial intelligence)
Radio Access Network
Dynamic scheduling
resource allocation
telecommunication computing
composability
radio access networks
5G mobile communication
optimization
Throughput
Resiliency
resilience
Metrics
pubcrawl
biblio
Automated Adversary Emulation for Cyber-Physical Systems via Reinforcement Learning
Submitted by grigby1 on Thu, 01/28/2021 - 12:11pm
Adversary Emulation
Adversary Models
cyber-physical security
cyber-physical systems
emulation
Human behavior
hybrid attack graph
Metrics
Numerical models
pubcrawl
Reinforcement learning
resilience
Resiliency
Scalability
security
uncertainty
biblio
ATMoS: Autonomous Threat Mitigation in SDN using Reinforcement Learning
Submitted by grigby1 on Fri, 01/22/2021 - 1:38pm
Internet of Things
threat vectors
software-defined networking
software defined networking
sequential decision making problems
SDN
Scalability
RL-based threat mitigation
resilience
Reinforcement learning
pubcrawl
neural fitted Q-learning agent
network security management
network behaviour
machine learning
learning (artificial intelligence)
threat mitigation
global network view
Decision Making
computer networks
computer network security
autonomous threat mitigation
autonomous network systems
ATMoS
APT
advanced persistent threat
ad-hoc solutions
active threat mitigation
Human behavior
Metrics
Resiliency
biblio
Reinforcement Learning with Budget-Constrained Nonparametric Function Approximation for Opportunistic Spectrum Access
Submitted by grigby1 on Wed, 12/02/2020 - 12:54pm
learning (artificial intelligence)
telecommunication congestion control
state spaces
single-channel carrier-sense multiple-access
Scalability
Resiliency
resilience
reinforcement learning-based radio
Reinforcement learning
Receivers
radio spectrum management
Radio frequency
pubcrawl
opportunistic spectrum access
multichannel adversarial radio
Acceleration
kernel-based reinforcement learning approach
Kernel Method
Kernel
intrinsic state-action space
idle slots
function approximation
Dictionaries
coupled congestion control
congested bands
cognitive radio
channel access actions
carrier sense multiple access
budget-constrained sparsification technique
budget-constrained nonparametric function approximation
biblio
Intelligent Decentralized Dynamic Power Allocation in MANET at Tactical Edge based on Mean-Field Game Theory
Submitted by grigby1 on Tue, 11/17/2020 - 1:51pm
probability
mean-field game theory
military computing
mobile ad hoc network
mobile ad hoc networks
neural nets
neural network
online reinforcement learning
optimal decentralized power allocation
optimal power allocation algorithms
Mean-field game
pubcrawl
Reinforcement learning
resource management
Scalability
self-organizing features
tactical edge
Transmitters
wireless connection population
Human Factors
Artificial Neural Networks
Cost function
dynamic power allocation
Fokker-Planck equation
Fokker-Planck-Kolmogorov equation
game theory
Hamiltonian-Jacobian-Bellman equation
Heuristic algorithms
actor-critic-mass algorithm
intelligent decentralized dynamic power allocation
Interference
Internet of battlefield things
Internet of Things
iobt
learning (artificial intelligence)
MANET
Mathematical model
biblio
Reinforcement Learning inspired Deep Learned Compositional Model for Decision Making in Tracking
Submitted by grigby1 on Mon, 10/05/2020 - 1:01pm
previous location
neural nets
object tracking
occlusion handling
partial occlusions
partially observable Markov decision making
penalty based training
pose estimation
pose estimation capabilities
multiple large video datasets
pubcrawl
Reinforcement learning
skeleton based part representation
Streaming media
target tracking
tracker
tracking
video signal processing
heuristic methods
Compositional Models
Compositionality
Computational modeling
computer science
Decision Making
deep learned compositional model
Deep Neural Network
deep reinforcement
cluttered background
human bodies
human inputs
image representation
incessant decision making
learning (artificial intelligence)
Markov processes
Mathematical model
biblio
Automatic XSS Detection and Automatic Anti-Anti-Virus Payload Generation
Submitted by aekwall on Mon, 09/28/2020 - 11:35am
parameter characteristics
SVM algorithm
XSS vulnerability
automatic anti-anti-virus payload generation tool
automatic bypassing
automatic detection
automatic XSS detection tool
DQN algorithm
malicious XSS attacks
malicious XSS parameters
Web application
RNN LSTM algorithm
rule-based WAF
user input parameters
user interaction
Web 2.0 era
XSS attack
XSS attack codes
Cross Site Scripting
internet
Support vector machines
feature extraction
learning (artificial intelligence)
machine learning
Resiliency
Human behavior
pubcrawl
Reinforcement learning
Scalability
tools
cross-site scripting
Training
recurrent neural nets
automatic generation
computer viruses
Payloads
Browsers
biblio
Can Reinforcement Learning Address Security Issues? an Investigation into a Clustering Scheme in Distributed Cognitive Radio Networks
Submitted by grigby1 on Fri, 09/18/2020 - 12:56pm
radio networks
White spaces
volatile operating environment
volatile environment
telecommunication security
security issues
security
Scalability
RL parameters
RL model
resource management
Resiliency
resilience
reinforcement learning model
Reinforcement learning
attacks
pubcrawl
pattern clustering
operating region
network scalability
learning rate
learning (artificial intelligence)
launch attacks
Heuristic algorithms
distributed cognitive radio networks
discount factor
Cognitive Radio Security
cognitive radio
clustering scheme
clustering
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »