Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Artificial Intelligence
file
Socially Assistive Robotics
Submitted by Brian Scassellati on Thu, 12/20/2018 - 8:18pm. Contributors:
Brian Scassellati
Maja Mataric
Cynthia Breazeal
Clifford Nass
Artificial Intelligence
autism
education
human-robot interaction
robotics
Posters
1139078
Expeditions PI Meeting 2018
2018
Poster
biblio
A Social Science-based Approach to Explanations for (Game) AI
Submitted by grigby1 on Mon, 12/10/2018 - 10:41am
human working memory limitation
xai
working memory
super-sensors
social sciences
social science-based approach
Scalability
Resiliency
resilience
pubcrawl
Object oriented modeling
learning (artificial intelligence)
image recognition
AI revolution
GVGAI framework
Games
explainable AI
deep learning methods
computer games
Complexity theory
complex algorithmic systems
collaboration
Brain modeling
bottom-up approach
baseline definition
Artificial Intelligence
biblio
Explainable AI for Understanding Decisions and Data-Driven Optimization of the Choquet Integral
Submitted by grigby1 on Mon, 12/10/2018 - 10:41am
Indexes
XAI-ChI methods
xai
sensor fusion
Scalability
Resiliency
resilience
remote sensing
pubcrawl
parametric nonlinear aggregation function
optimization
optimisation
machine learning
learning (artificial intelligence)
Artificial Intelligence
heterogeneous deep convolutional neural networks
Fuzzy integral
fusion solution
Frequency modulation
feedforward neural nets
explainable AI
Electronic mail
data-driven optimization
data-centric XAI tools
convolutional neural networks
convolution
Choquet integral
biblio
Analyst Intuition Inspired High Velocity Big Data Analysis Using PCA Ranked Fuzzy K-Means Clustering with Multi-Layer Perceptron (MLP) to Obviate Cyber Security Risk
Submitted by grigby1 on Wed, 11/14/2018 - 12:21pm
pattern classification
learning (artificial intelligence)
log history annotation
malware
malware attacks
manually labelled data
MLP
Monitoring
Multi-layer Perceptron (MLP)
multilayer perceptrons
network datasets
network protocols
network user
neural network classifier multilayer perceptron base
IP networks
pattern clustering
PCA ranked fuzzy k-means clustering
principal component analysis
Principal Component Analysis (PCA)
pubcrawl
resilience
Resiliency
Scalability
scoring system
security
special semisupervise method
statistical data generation
Virus
cyber threats
analyst intuition inspired high velocity big data analysis
Artificial Intelligence
attacker IP addresses characteristics
Big Data
Clustering algorithms
computer networks
computer network security
computer security
cyber-attacks
cyber security
cyber security expert
cyber security log classification
cyber security risk
Analyst Intuition
data analysis
Data mining
efficient security monitoring system
Expectation Regulated
expert system
expert systems
Fuzzy k-means (FKM)
fuzzy set theory
High Velocity
Human behavior
integrated datasets
invasive software
biblio
Mixed-Initiative Creative Interfaces
Submitted by grigby1 on Thu, 08/23/2018 - 10:59am
Artificial Intelligence
composability
computational creativity
computer-aided design
confinement
creativity support tools
cyber-physical systems
interactive machine learning
mixed-initiative interaction
privacy
pubcrawl
resilience
Resiliency
biblio
An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack
Submitted by grigby1 on Thu, 06/07/2018 - 2:13pm
SQL injection attack
pubcrawl
receiver operating characteristic curve
Resiliency
ROC curve
secure backend storage
security
security of data
smart devices
SQL
SQL injection
privacy
SQLIA
SQLIA big data
SQLIA Data analytics
SQLIA hashing
SQLIA Pattern-driven data set
Structured Query Language
structured query language injection attack
supervised learning
supervised learning model
Support vector machines
IoT
back-end database
Big Data
Cloud Computing
cloud-hosted Web applications
collaboration
confidential data
Data mining
Data models
Human behavior
Internet of Things
Artificial Intelligence
learning (artificial intelligence)
learning automata
Microsoft Azure Machine Learning
ML algorithms
pattern classification
pattern-driven corpus
Policy
policy-based governance
Policy-Governed Secure Collaboration
Predictive Analytics
biblio
Dummy Location Selection Scheme for K-Anonymity in Location Based Services
Submitted by grigby1 on Mon, 04/02/2018 - 11:31am
mobile computing
Servers
security of data
Security analysis
security
Resiliency
resilience
query processing
query probability
pubcrawl
probability
privacy concerns
privacy
optimization
optimisation
multiobjective optimization problem
anonymity
Metrics
low complexity dummy location selection scheme
location based services
localization information
LBS
k-anonymity
K-1 dummy locations
Human behavior
Geometry
dummy location
data privacy
composability
Complexity theory
cloaking area based algorithm
Artificial Intelligence
biblio
Adversarial Authorship, Interactive Evolutionary Hill-Climbing, and Author CAAT-III
Submitted by grigby1 on Mon, 03/19/2018 - 12:37pm
Adversarial Authorship
Adversarial Stylometry
Artificial Intelligence
AuthorWebs
Blogs
computer science
feature extraction
Fingerprint recognition
Human behavior
Interactive Evolutionary Hill-Climbing
Metrics
pubcrawl
stylometry
testing
Writing
biblio
Enforcing Generalized Refinement-Based Noninterference for Secure Interface Composition
Submitted by K_Hooper on Wed, 02/28/2018 - 10:31am
noninterference
Theorem Proving
Software systems
security of data
security
secure interface composition
refinement-based security properties
Refinement
pubcrawl
object-oriented programming
Artificial Intelligence
Lattices
interface automata
information flow security
generalized refinement-based noninterference
Compositionality
compositional enforcement
Component-Based Software
Component architectures
automata
biblio
A Conceptual Security Approach with Awareness Strategy and Implementation Policy to Eliminate Ransomware
Submitted by grigby1 on Thu, 02/15/2018 - 10:39am
AI
Artificial Intelligence
Browser Add-on
Human behavior
human factor
Human Factors
privacy
pubcrawl
Ransomware
resilience
Resiliency
Scalability
Security Awareness
WannaCry
« first
‹ previous
…
24
25
26
27
28
29
30
31
32
next ›
last »