Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
classifier
biblio
A Novel Hybrid Pyramid Texture-Based Facial Expression Recognition
Submitted by grigby1 on Tue, 07/05/2022 - 12:26pm
frequency-domain analysis
pyramid images
local phase quantization
Gaussian filter
facial expression recognition
local binary pattern
Image analysis
Transforms
classifier
image recognition
pubcrawl
facial recognition
Quantization (signal)
face recognition
Metrics
Databases
Resiliency
resilience
Human behavior
biblio
ES2Vec: Earth Science Metadata Keyword Assignment using Domain-Specific Word Embeddings
Submitted by grigby1 on Thu, 08/05/2021 - 2:57pm
Semantics
Word2Vec
Keyword Classification
geoscience
classifier
user interfaces
Metadata Discovery Problem
neural network
natural language processing
tools
Compositionality
Task Analysis
metadata
Scalability
Resiliency
resilience
pubcrawl
machine learning
biblio
Neural Algebra of Classifiers
Submitted by grigby1 on Mon, 10/05/2020 - 2:02pm
image recognition
visualization
visual recognition benchmarks
Training
simple visual classifiers
pubcrawl
Neural networks
neural network modules
neural nets
neural algebra
algebra
image classification
Compositionality
complex visual concept
classifier
boolean algebra operations
Boolean algebra
Birds
Beak
biblio
Machine Learning Bluetooth Profile Operation Verification via Monitoring the Transmission Pattern
Submitted by grigby1 on Fri, 09/04/2020 - 4:27pm
radio frequency output power
electronic engineering computing
Hardware Security
hardware-software security
integrated circuit manufacture
k-nearest neighbor
license communication IC
low computational complexity
low-cost legacy technology
mobile radio
profile classification algorithm
custom low-frequency integrated circuit
RF envelope detector
RF output power
RF Power
signal classification
smart descriptive time-domain feature extraction
Supervisory Circuit
support vector machine
transmission pattern
Cyber Physical System
bluetooth security
cyber physical systems
telecommunication security
pubcrawl
composability
Resiliency
resilience
Human behavior
machine learning
feature extraction
classifier
learning (artificial intelligence)
security
formal verification
Decision Tree
system-on-chip
telecommunication computing
Bluetooth
Blue-tooth
Bluetooth profile operation verification
Bluetooth SoC
Bluetooth System-on-Chip
communication complexity
biblio
Research on Intrusion Detection Based on Improved DBN-ELM
Submitted by aekwall on Mon, 08/24/2020 - 1:37pm
pattern classification
majority voting
Deep confidence network
DBN-ELM
classifier
Deep Belief Network
extreme learning machine
NSL-KDD dataset
belief networks
feedforward neural nets
Training
Intrusion Detection
Neurons
classification
composability
pubcrawl
Resiliency
feature extraction
machine learning algorithms
Classification algorithms
security of data
biblio
A Machine Learning Approach for URL Based Web Phishing Using Fuzzy Logic as Classifier
Submitted by grigby1 on Fri, 04/10/2020 - 12:35pm
learning (artificial intelligence)
Web sites
Web Mining
URL based Web phishing
Uniform resource locators
security of data
pubcrawl
phishing URL
phishing site
Phishing Detection
phishing attacks
Phishing
pattern classification
machine learning
classifier
internet
Human Factors
Human behavior
fuzzy logic classifier
Fuzzy logic
financial information
feature extraction
Databases
Data mining
credential information
Conferences
Computer crime
biblio
Graph Centrality Based Spam SMS Detection
Submitted by grigby1 on Mon, 02/10/2020 - 11:18am
Measurement
unsolicited e-mail
unlabeled SMS
unclassified SMS
Support vector machines
status updates
spam SMS detection
spam messages
spam detection
social networking (online)
short messages usage
short messages
security of data
Scalability
pubcrawl
Metrics
centrality scores
labeled SMS
Human Factors
Human behavior
Hidden Markov models
graphs centrality metrics
graph theory
graph centrality measures
Graph Centrality
feature extraction
electronic messaging
degree centrality
Data preprocessing
Data mining
classifier
biblio
Malware Classification Using Deep Convolutional Neural Networks
Submitted by grigby1 on Mon, 06/10/2019 - 2:01pm
privacy
learning models
machine learning
malware
malware binaries
malware classification
malware images
Metrics
neural network
object detection
Pattern recognition
learning (artificial intelligence)
pubcrawl
resilience
Resiliency
support vector machine
support vector machine classifier training
Support vector machines
transfer learning
visual patterns
visualization
feature extraction
classification
classifier
convolutional neural nets
convolutional neural network
convolutional neural networks
Correlation
DCNN classification
deep convolutional neural networks
deep learning techniques
accuracy levels
Gray-scale
Hamming distance
Human behavior
image classification
image features
image representation
image type
improved image representation
invasive software
biblio
Drone Detection and Identification System Using Artificial Intelligence
Submitted by grigby1 on Fri, 02/08/2019 - 4:14pm
drone imagery
surveillance
robot vision
Resiliency
pubcrawl
OpenCV library
object detection
Metrics
machine learning
learning (artificial intelligence)
Image Processing
Human behavior
feature extraction
drones
drone industry
approaching drone
drone identification system
Detectors
detection
deep learning
control engineering computing
comprehensive drone detection system
composability
classifier
Cameras
camera images
autonomous aerial vehicles
artificial intelligence security
Artificial Intelligence
biblio
Adversarial Examples for Generative Models
Submitted by grigby1 on Mon, 01/21/2019 - 12:38pm
learning (artificial intelligence)
variational techniques
VAE-GAN architecture attacks
vae gan
vae
Training
target generative network
target generative model
Scalability
Resiliency
Receivers
pubcrawl
neural net architectures
neural net architecture
Metrics
machine learning
adversarial example
input data distribution model
image representation
Image reconstruction
Image coding
image classification
Human behavior
Generative Models
deep learning architectures
deep generative models
Decoding
Data models
classifier
classification-based adversaries
Adversary Models
adversarial examples
1
2
next ›
last »