Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Reinforcement learning
biblio
Sequential Node/Link Recovery Strategy of Power Grids Based on Q-Learning Approach
Submitted by grigby1 on Mon, 03/02/2020 - 12:36pm
power system reliability
System recovery
smart power grids
Smart Grids
sequential recovery
sequential node-link recovery strategy
security of data
restoration process
Resiliency
resilience
Reinforcement learning
recovery strategies
Q-learning approach
q-learning
pubcrawl
power system restoration
Cascading Failures
Power system protection
power system faults
power grids
power grid test benchmarks
Power Grid
power generation
power flow cascading failure
power engineering computing
physical attacks
Load flow
learning (artificial intelligence)
large-scale smart grids
grid defender
Cyber Attacks
file
Data-Driven Reinforcement Learning Control of Large CPS Networks using Multi-Stage Hierarchical Decompositions
Submitted by aranya on Thu, 01/16/2020 - 4:02pm. Contributor:
Aranya Chakrabortty
machine learning
Reinforcement learning
Hierarchical Control
power systems
Posters
1931932
CPS PI Meeting 2019
2019
NSF
U.S. Government
Poster
file
Benchmarks for Reinforcement Learning in Mixed Autonomy Traffic
Submitted by bayen on Fri, 01/10/2020 - 3:37pm. Contributors:
Alex Bayen
Eugene Vinitsky
Aboudy Kreidieh
Luc Le Flem
Nishant Kheterpal
Kathy Jang
Cathy Wu
Fangyu Wu
Richard Liaw
Eric Liang
autonomous vehicles
Reinforcement learning
Posters
1837244
CPS PI Meeting 2019
2019
NSF
U.S. Government
Poster
biblio
Adaptive Fog-Based Output Security for Augmented Reality
Submitted by aekwall on Mon, 12/30/2019 - 11:15am
Scalability
Resiliency
pubcrawl
Reinforcement learning
edge computing
Fog computing
augmented reality
policy optimization
visual output security
Fog Computing and Security
biblio
Improving the Efficiency of IDPS by Using Hybrid Methods from Artificial Intelligence
Submitted by grigby1 on Mon, 12/09/2019 - 1:01pm
intrusion detection system
security
Reinforcement learning
pubcrawl
optimization
network and information security
multiagent systems
multi-agent systems
Monitoring
IP networks
intrusion prevention system
Intrusion Detection Systems
artificial intelligence security
hybrid methods
Fuzzy logic
cyber defense
Cryptography
computer networks security
computer network security
Computational modeling
computational intelligence
Compositionality
composability
Artificial Intelligence
biblio
A Game-Theoretical Approach to Cyber-Security of Critical Infrastructures Based on Multi-Agent Reinforcement Learning
Submitted by grigby1 on Thu, 09/05/2019 - 10:28am
resilience
multiagent general sum game
multiagent reinforcement learning
Nash Equilibrium
optimal security configuration
optimal trade-off between prevention actions
protected CI
pubcrawl
Reinforcement learning
multi-agent systems
Resiliency
security
security of data
simulation results
stochastic games
system vulnerabilities
Vulnerability Management
zero-sum variant
critical infrastructures
attack strategy
attack-defense problem
composability
composable security
Control Strategy
Control Theory
critical infrastructure
Critical Infrastructure Protection
Aerospace electronics
cyber-physical system defense
Cyber-security
damage possible
European Project ATENA
game theory
game-theoretical approach
Games
learning (artificial intelligence)
biblio
Computational Model of the User's Learning Process When Cued by a Social Versus Non-Social Agent
Submitted by grigby1 on Mon, 02/25/2019 - 2:19pm
Decision Making
pubcrawl
Human behavior
Scalability
Human Factors
Reinforcement learning
Social Agents
eye-tracking
gaze cueing
reversal
biblio
Learning How to Flock: Deriving Individual Behaviour from Collective Behaviour with Multi-agent Reinforcement Learning and Natural Evolution Strategies
Submitted by aekwall on Thu, 02/21/2019 - 12:03pm
composability
evolution strategies
multi-agent systems
neural networks/deep learning
pubcrawl
Reinforcement learning
Swarm Intelligence
biblio
A Reinforcement Learning Approach for Attack Graph Analysis
Submitted by grigby1 on Fri, 02/08/2019 - 3:28pm
Handheld computers
transition graph
simplified graph
security of data
Resiliency
resilience
reinforcement learning approach
Reinforcement learning
q-learning
pubcrawl
possible attack routes
multistage vulnerability analysis
Metrics
learning (artificial intelligence)
internet
Control Theory
graph theory
data privacy
cyber security
Conferences
computer security
computer network security
composability
Big Data
attack graphs
attack graph size
attack graph analysis
attack graph
approximate analysis approach
security
file
Self-Improving Cyber-Physical Systems
Submitted by susmitj on Tue, 01/22/2019 - 6:58pm. Contributor:
Susmit Jha
Reinforcement learning
Temporal Logic
neurosymbolic methods
Posters (Sessions 8 & 11)
1740079
CPS-PI Meeting 2018
2018
Poster
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »