Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Artificial Intelligence
biblio
Individualization of Anonymous Identities Using Artificial Intelligence (AI)
Submitted by aekwall on Tue, 03/09/2021 - 10:57am
data privacy
unique identity
stereo image processing
standards
specific personal characteristics
Scalability
Resiliency
Reliability
Regulation
pubcrawl
Metrics
individualization
identity anonymization
Human-computer interaction
human body measures
Fingerprint recognition
biometric encryption
Cryptography
COVID-19
computer vision
communication
but still anonymous
blockchain
biometrics (access control)
biometric identity
biometric footprint
authorisation
Artificial Intelligence (AI)
Artificial Intelligence
anonymous identity
anonymous identities
additional personal information being
biblio
AI-driven Zero-touch Operations, Security and Trust in Multi-operator 5G Networks: a Conceptual Architecture
Submitted by grigby1 on Thu, 03/04/2021 - 2:05pm
Spectrum sharing
network services
Pervasive networking
policy-based governance
pubcrawl
QoS profiles
quality of service
resilience
Resiliency
Scalability
security
service lifecycle automation
multioperator 5G networks
telecommunication network management
telecommunication security
truly production-level stage
trust architecture
trust orchestration mechanisms
ubiquitous computing
Zero Touch Automation
zero trust
zero-touch automation
zero-touch security
computer architecture
Metrics
5G
5G initial visions
5G mobile communication
5G network solutions
AI-driven operations
Artificial Intelligence
automated end-to-end network operations
automation
cognitive network orchestration
Pervasive Computing Security
conceptual architecture
cross-domain security
distributed Artificial Intelligence
distributed ledger technologies
distributed security
Europe
highly pervasive network
Human Factors
minimal manual interventions
mobile computing
biblio
Phishing Attack Detection using Machine Learning Classification Techniques
Submitted by grigby1 on Thu, 03/04/2021 - 1:57pm
Metrics
Zero day attacks
Uniform resource locators
Training
Resiliency
resilience
pubcrawl
phishing attack detection
phishing attack
Phishing
Artificial Intelligence
machine learning
Logistics
defense
Decision Tree
Conferences
computer science
composability
Classification algorithms
biblio
Investigation of an Innovative Approach for Identifying Human Face-Profile Using Explainable Artificial Intelligence
Submitted by aekwall on Mon, 03/01/2021 - 4:02pm
explanation
Pixel Segmentation
Human Profile Recognition
human face profile identification
human face identification
Geometric Ratios
geometric ratio expressions
feature vectors
feature vector
feature set diagnosis
Facial features
facial feature extraction
faces
Ear
biometric identification research
Scalability
explainable artificial intelligence
xai
Identification
Nose
face recognition
DNN
Artificial Intelligence
biometrics (access control)
image segmentation
biometrics
pubcrawl
Resiliency
feature extraction
biblio
XAI-Driven Explainable Multi-view Game Cheating Detection
Submitted by aekwall on Mon, 03/01/2021 - 4:02pm
multiple game productions
cheating detection
debugging
EMGCD
evidence generation
game health
game industries
illegal automated plugins
model compression
model debugging
cheating classifiers
NetEase Games
online game
Online Games
online gaming
online persistent virtual world
player enjoyment
reason generation
trustworthy performance
XAI-driven explainable multiview game cheating detection
explainable AI
Task Analysis
Data models
Resiliency
pubcrawl
internet
Games
Predictive models
visualization
Artificial Intelligence
Scalability
virtual reality
artificial intelligence techniques
computer games
xai
industrial application
AI models
detection framework
explainable artificial intelligence
audience profiles
biblio
Constrained Interval Type-2 Fuzzy Classification Systems for Explainable AI (XAI)
Submitted by aekwall on Mon, 03/01/2021 - 4:01pm
xai
type-reduction step
output interval centroid
IT2
interval type-2 fuzzy logic
inherently interpretable structure
fuzzy logic systems
explainable type-2 fuzzy systems
explainable CIT2 classifiers
constrained interval type-2 fuzzy sets
constrained interval type-2 fuzzy classification systems
Constrained interval type-2
classification reliability
explainable artificial intelligence
Intelligent systems
Scalability
explainable AI
Artificial Intelligence
Switches
Linguistics
Fuzzy sets
Indexes
Generators
fuzzy set theory
Fuzzy logic
natural language
pattern classification
Shape
pubcrawl
Resiliency
biblio
A Decentralized Approach to Explanatory Artificial Intelligence for Autonomic Systems
Submitted by aekwall on Mon, 03/01/2021 - 4:01pm
Autonomic systems
XAI solution
XAI functions
SISSY systems
generic decentralized architecture
explanatory artificial intelligence
explanatory AI
explanation
Decentralised Architecture
D-CAN
black box methods
autonomic management system
Autonomic Management
user trust
Scalability
xai
smart home domain
Power demand
Artificial Intelligence
Smart Home
home automation
Smart homes
cognition
fault tolerant computing
pubcrawl
Resiliency
cyber-physical systems
Runtime
biblio
XAI-Based Fuzzy SWOT Maps for Analysis of Complex Systems
Submitted by aekwall on Mon, 03/01/2021 - 4:00pm
Optimized production technology
XAI-Based system analysis
SWOT+CWW network
SWOT analyses
software tool
fuzzy SWOT maps network structure
Fuzzy SWOT Maps
explanation
explainable artificial intelligence
Dynamic SWOT analysis
computing with words
Fuzzy cognitive maps
Scalability
xai
FCM
cognitive systems
Artificial Intelligence
complex systems
cognition
software tools
fuzzy set theory
pubcrawl
Resiliency
real-time systems
biblio
Black Box Attacks on Explainable Artificial Intelligence(XAI) methods in Cyber Security
Submitted by aekwall on Mon, 03/01/2021 - 3:59pm
security
gradient-based XAI
learning (artificial intelligence)
Metrics
ML models
Predictive models
privacy
pubcrawl
Resiliency
Robustness
Scalability
explainable artificial intelligence methods
security domain
security of data
security-relevant data-sets
threat models
white box
White Box Security
white box setting
xai
XAI methods
composability
adversarial attack
Analytical models
Artificial Intelligence
artificial intelligence security
binary output
black box attack
Black Box Attacks
black box encryption
black box settings
black-box models
predictive security metrics
computer security
cyber security
cybersecurity domain
data analysis
Data models
deep learning
domain experts
exact properties
explainable artificial intelligence
biblio
Enhanced Privacy and Data Protection using Natural Language Processing and Artificial Intelligence
Submitted by aekwall on Mon, 02/22/2021 - 12:39pm
natural language processing
unsupervised machine learning
unlabeled domain-specific documents corpora
text analysis
Task Analysis
specific-domain knowledge data sets
sensitive information
Sensitive Data Extraction
Scalability
Resiliency
pubcrawl
privacy preservation
physical documents
expert systems
Medical services
machine learning
knowledge transfer
Human behavior
digital documents
Data protection
data privacy
data obfuscation procedures
artificial intelligence training
artificial intelligence systems
Artificial Intelligence
privacy
« first
‹ previous
…
12
13
14
15
16
17
18
19
20
…
next ›
last »