Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
white box cryptography
biblio
Light-weight white-box encryption scheme with random padding for wearable consumer electronic devices
Submitted by aekwall on Mon, 07/20/2020 - 10:45am
white-box attacks
white box cryptography
white-box attack contexts
wearabledevices
wearable consumer electronic devices
wearable computing
random secret components
random padding
physical nature
low computational power
limited memory
lightweight white box encryption scheme
decryption algorithms
Consumer electronics
Cryptography
cryptosystem
wearable computers
Wearable devices
Context
privacy protection
pubcrawl
Data mining
Metrics
composability
Resiliency
performance evaluation
encryption
biblio
White-Box vs. Black-Box Complexity of Search Problems: Ramsey and Graph Property Testing
Submitted by aekwall on Mon, 07/20/2020 - 10:45am
box times
white box cryptography
white-box Ramsey problem
white-box model
white-box hardness
white-box complexity
the Ramsey problem
TFNP problems
succinct black-box
Ramsey theory
hard property
graph size
graph property testing
description size
collision-resistant hashing
Resiliency
black-box hardness
black-box complexity
search problems
Resistance
Integrated circuit modeling
pubcrawl
Complexity theory
computational complexity
testing
Metrics
Computational modeling
Cryptography
graph theory
composability
biblio
Malware Evasion Attack and Defense
Submitted by grigby1 on Tue, 02/18/2020 - 11:53am
malware detection systems
white-box evasion attacks
White Box Security
white box cryptography
Training data
Training
security
Resiliency
resilience
pubcrawl
Perturbation methods
pattern classification
ML-based malware detector
ML classifier
Metrics
malware evasion attack
adversarial example
malware
machine learning classifiers
learning (artificial intelligence)
invasive software
grey-box evasion attacks
Evasion Attack
Detectors
defense approaches
defense
Data models
composability
black-box attacks
Adversarial Machine Learning
adversarial examples
biblio
Representation of White- and Black-Box Adversarial Examples in Deep Neural Networks and Humans: A Functional Magnetic Resonance Imaging Study
Submitted by grigby1 on Tue, 02/18/2020 - 11:53am
resilience
Metrics
neural nets
neural network
neurophysiology
Noise
pubcrawl
representation patterns
representational similarity
medical image processing
Resiliency
Task Analysis
vision
visual perception
visual representation
Visual systems
visualization
white box cryptography
DNNs
Biological neural networks
biomedical MRI
black-box adversarial examples
brain
brain-inspired deep neural networks
complex level visual tasks
composability
computer vision
adversarial example
Facial animation
fMRI
Functional magnetic resonance imaging
functional magnetic resonance imaging study
high-level visual tasks
human performance
human vision
human visual system
biblio
White-Box Atomic Multicast
Submitted by grigby1 on Tue, 02/18/2020 - 11:53am
genuine atomic multicast protocol
white-box optimisations
white-box atomic multicast
white box cryptography
Resiliency
resilience
replication
pubcrawl
optimisation
multicast protocols
Metrics
message delays
Atomic multicast
Fault tolerant systems
fault tolerance
destination processes
destination groups
delays
Concurrency
composability
Clocks
classical Skeen's multicast protocol
atomic multicast needs
biblio
Test4Deep: An Effective White-Box Testing for Deep Neural Networks
Submitted by grigby1 on Tue, 02/18/2020 - 11:52am
Neurons
white-box testing framework
white box testing
white box cryptography
testing
Test4Deep
test cases
Software
Resiliency
resilience
pubcrawl
program testing
Prediction algorithms
optimization
Biological neural networks
neuron coverage
neural nets
multiple DNNs
Metrics
machine learning
learning (artificial intelligence)
generated test inputs
DNNs
diversity
DeepXplore
deep neural networks
Deep Learning testing
composability
biblio
Comprehensive Privacy Analysis of Deep Learning: Passive and Active White-Box Inference Attacks against Centralized and Federated Learning
Submitted by grigby1 on Tue, 02/18/2020 - 11:52am
Resiliency
Inference-Attacks
learning (artificial intelligence)
Membership-Inference
Metrics
neural nets
privacy
privacy leakage
pubcrawl
resilience
inference mechanisms
stochastic gradient descent algorithm
Stochastic processes
Stochastic-Gradient-Descent
Training
Training data
white box cryptography
White Box Security
white-box membership inference attacks
data privacy
active white-box inference attacks
black-box attacks
centralized learning
CIFAR dataset
composability
comprehensive privacy analysis
Computational modeling
Data models
active membership inference attacks
deep learning
deep learning models
deep neural networks
Deep-learning
federated learning setting
Federated-Learning
gradient methods
Inference algorithms
biblio
White Visor: Support of White-Box Switch in SDN-Based Network Hypervisor
Submitted by grigby1 on Tue, 02/18/2020 - 11:52am
Routing
white-box switch
white visor
white box cryptography
Virtualization
virtualisation
virtual network
virtual machines
Virtual machine monitors
Switches
software-defined networking
software defined networking
composability
Resiliency
resilience
pubcrawl
Pipelines
networking fabrics
network virtualization
network topology
network management
network hypervisor
Metrics
computer network management
biblio
S℡LAR: A Generic EM Side-Channel Attack Protection through Ground-Up Root-Cause Analysis
Submitted by grigby1 on Tue, 02/18/2020 - 11:52am
signature attenuation hardware
low-overhead solution
Metals
Metrics
noninvasive attacker
noninvasive electromagnetic side-channel attacks
power side-channel countermeasures
Probes
pubcrawl
resilience
Resiliency
resource-constrained Internet-connected devices
Routing
side-channel analysis attacks
signature attenuation embedded CRYPTO
low-level metal routing
size 32.0 nm
size 65.0 nm
S℡LAR
S℡LAR hardware
system-level EM simulations
system-level implementation
telecommunication network routing
top-level metal layers
TSMC 65 nm CMOS technology
two-stage solution
white-box analysis
white box cryptography
white-box understanding
external attacker
composability
critical encryption signature
critical signal radiation
Cryptographic Hardware
Cryptography
EM leakage
EM probes
EM SCA attack
EM Side-channel attack
encryption
entire cryptographic core
entire crypto IP
example cryptographic block
CMOS integrated circuits
frequency 40.0 MHz
Generic countermeasure
generic EM side-channel attack protection
Ground-up EM Leakage Modeling
ground-up root-cause analysis
higher-level metal layers
high-resolution electromagnetic probes
integrated circuit
Integrated circuit modeling
Intel 32 nm CMOS technology interconnect stack
internet
lower-level metal layers
lower-level metal routing
biblio
Towards Understanding Limitations of Pixel Discretization Against Adversarial Attacks
Submitted by grigby1 on Tue, 02/18/2020 - 11:52am
neural nets
white-box attacks
white box cryptography
Training
Robustness
Resiliency
resilience
pubcrawl
preprocessing defense methods
preprocessing defense
pixel discretization defense method
pixel discretization
Perturbation methods
Neural networks
adversarial attacks
MNIST
Metrics
Measurement
machine learning
low computational overhead
ImageNet
Image Processing
deep learning
Data models
Cryptography
composability
Artificial Neural Networks
« first
‹ previous
1
2
3
4
5
6
next ›
last »