Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Task Analysis
biblio
Organisation and Implementation of ResNet Face Recognition Architectures in the Environment of Zigbee-based Data Transmission Protocol
Submitted by grigby1 on Thu, 01/28/2021 - 1:34pm
pubcrawl
Zigbee
wireless sensor networks
Wireless fidelity
Task Analysis
Scalability
ResNet
Resiliency
resilience
Raspberry Pi
android encryption
Protocols
Metrics
IEEE 802.15.4
Human behavior
face recognition
computer architecture
Cameras
Arduino
biblio
PERT: Payload Encoding Representation from Transformer for Encrypted Traffic Classification
Submitted by grigby1 on Thu, 01/28/2021 - 1:34pm
natural language processing
Traffic identification
telecommunication traffic
Task Analysis
Scalability
Resiliency
resilience
pubcrawl
Payloads
android encryption
Metrics
Image coding
Human behavior
feature extraction
Encrypted traffic classification
dynamic word embedding
deep learning
Cryptography
biblio
Enhancing Resilience of Deep Learning Networks By Means of Transferable Adversaries
Submitted by grigby1 on Thu, 01/28/2021 - 1:10pm
neural nets
transferable adversaries
Training
Task Analysis
single-step adversaries
security of data
Scalability
Resiliency
resilience enhancement
resilience
pubcrawl
Perturbation methods
pattern classification
Neural networks
Adversarial training
Multi-step Adversaries
Metrics
machine learning
learning (artificial intelligence)
Information systems
Human behavior
defense methods
deep learning networks
deep learning
classification decision model
Artificial Neural Networks
Adversary Models
biblio
Link Prediction Adversarial Attack Via Iterative Gradient Attack
Submitted by aekwall on Mon, 01/25/2021 - 1:01pm
gradient information
attack graphs
adversarial attack
adversarial graph
deep models
defense
GAE
gradient attack (GA)
gradient attack strategy
gradient methods
graph autoencode
graph evolved tasks
iterative gradient attack
Link prediction
link prediction adversarial attack problem
node classification
real-world graphs
trained graph autoencoder model
Robustness
data privacy
Task Analysis
learning (artificial intelligence)
Resiliency
pubcrawl
composability
graph theory
privacy
security of data
neural nets
Prediction algorithms
security problem
Predictive models
Predictive Metrics
deep neural networks
Perturbation methods
biblio
IoT-APIScanner: Detecting API Unauthorized Access Vulnerabilities of IoT Platform
Submitted by grigby1 on Wed, 01/20/2021 - 4:22pm
IoT security
Web API
user privacy
unauthorized access
tools
timing
Task Analysis
Smart homes
security
Resiliency
resilience
pubcrawl
program testing
permission verification
IoT-APIScanner
API
IoT devices
Internet of Things
formal verification
data privacy
Compositionality
cloud services
Cloud Computing
cloud API
authorisation
application programming interface
application program interfaces
APIs
API unauthorized access vulnerability detection
API test cases
biblio
Fluid Intelligence Doesn't Matter! Effects of Code Examples on the Usability of Crypto APIs
Submitted by grigby1 on Wed, 01/20/2021 - 4:20pm
Libraries
usability
Task Analysis
software engineering
security
Resiliency
resilience
pubcrawl
Particle measurements
API
intelligence
Example Code
Cryptography
Computer bugs
Compositionality
application programming interface
APIs
biblio
Dynamic Model of Cyber Defense Diagnostics of Information Systems With The Use of Fuzzy Technologies
Submitted by aekwall on Mon, 01/18/2021 - 11:34am
fuzzy technologies
cryptographic level
cyber defense diagnostics
cyber defense systems
cyberattack intensity
cybersecurity status
delayed differential equation theory
dynamic model
fuzzy function
differential equations
information activity
logical fuzzy function
membership function
negative consequence probability
probability distribution density.
security status diagnosis
Fuzzy Cryptography
Trojan horses
Scalability
Cryptography
Task Analysis
information security
Resiliency
pubcrawl
Metrics
Cybersecurity
cyberattack
Fuzzy logic
probability
fuzzy set theory
security level
Information systems
information system
cyberattacks
biblio
I Can Get Some Satisfaction: Fuzzy Ontologies for Partial Agreements in Blockchain Smart Contracts
Submitted by aekwall on Mon, 01/18/2021 - 11:26am
Semantics
Fuzzy Cryptography
partial agreement
Pareto-optimal solutions
Fuzzy sets
fuzzy ontology reasoning task
fuzzy ontologies
blockchain smart contracts
best satisfiability degree
Pareto optimisation
blockchain systems
fuzzy reasoning
Ethereum blockchain
inference mechanisms
Scalability
cognition
contracts
smart contracts
fuzzy set theory
cryptocurrencies
ontologies (artificial intelligence)
blockchain
Metrics
Cryptography
pubcrawl
Resiliency
Task Analysis
Ontologies
biblio
Fuzzy-Import Hashing: A Malware Analysis Approach
Submitted by aekwall on Mon, 01/18/2021 - 11:25am
Import Hashing
Task Analysis
Scalability
Resiliency
Ransomware
pubcrawl
Metrics
Malware Analysis
invasive software
Attack Surfaces
fuzzy-import hashing
fuzzy set theory
Fuzzy Hashing
Fuzzy Cryptography
fuzzy c-means clustering
Electronic mail
Cryptography
counterfeit malware samples
biblio
On the Generality of Facial Forgery Detection
Submitted by grigby1 on Fri, 01/15/2021 - 12:14pm
GANnotation
DeepFake
Deepfakes
Face2Face
Forgery
CNN architectures
detection architectures
FaceSwap
facial forgery detection
video streaming
ICface
image forgery detection
MesoNet
multiple spoofing techniques
unseen spoofing techniques
unseen techniques
X2Face
XceptionNet
Resiliency
tools
feature extraction
CNN
convolutional neural nets
pubcrawl
Human behavior
Human Factors
resilience
computer architecture
Scalability
Streaming media
Metrics
Task Analysis
face recognition
convolutional neural networks
object detection
Face
« first
‹ previous
…
21
22
23
24
25
26
27
28
29
…
next ›
last »