Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
white-box
biblio
SPA: An Efficient Adversarial Attack on Spiking Neural Networks using Spike Probabilistic
Submitted by aekwall on Tue, 12/20/2022 - 4:21pm
Perturbation methods
white-box
White Box Security
transferability
Spiking Neural Networks
SNNs
security
Resiliency
pubcrawl
Probabilistic logic
adversarial attacks
perturbation
Neural networks
Metrics
Medical diagnosis
Linear programming
Degradation
composability
black-box
biblio
The application of white-box encryption algorithms for distributed devices on the Internet of Things
Submitted by aekwall on Tue, 12/20/2022 - 4:19pm
security
IoT
Internet of Things
encryption
pubcrawl
Metrics
Resiliency
composability
Cryptography
white-box
White Box Security
biblio
An Efficient Structural Analysis of SAS and its Application to White-Box Cryptography
Submitted by aekwall on Mon, 01/31/2022 - 3:11pm
Resiliency
white-box
White Box Security
Time complexity
Table lookup
Synthetic aperture sonar
structural analysis
security
SAS strcuture
white box cryptography
pubcrawl
IEEE Regions
encryption
Cryptography
Metrics
resilience
composability
biblio
Adversarial Attack on Fake-Faces Detectors Under White and Black Box Scenarios
Submitted by aekwall on Mon, 01/31/2022 - 3:11pm
Detectors
White Box Security
white-box
forensic models
Faked faces
black-box
adversarial attack
Forensics
Generators
security
generative adversarial networks
composability
Resiliency
Metrics
pubcrawl
Conferences
feature extraction
biblio
Hybrid Deep Neural Networks to Infer State Models of Black-Box Systems
Submitted by aekwall on Tue, 03/09/2021 - 11:04am
inferred states
automated software engineering tasks
Black-box Model Inference
black-box systems
black-box techniques
black-box third-party libraries
C code
detection techniques
entire source code
existing dynamic model inference techniques
hybrid deep neural network
infer state models
888 random recent system-level test cases
inferring behavior model
program comprehension
recurrent layers
run-time traces
running software system
Specification Mining
state change points
state classification algorithm
traditional time series change
UAV auto-pilot solution
white-box
Anomaly Detection
Time measurement
Classification algorithms
learning (artificial intelligence)
Resiliency
pubcrawl
composability
Metrics
neural nets
pattern classification
program testing
testing
Task Analysis
software engineering
black box encryption
aerospace computing
deep learning
Instruments
inference mechanisms
time series
convolutional neural network
Time series analysis
recurrent neural network
convolutional layers
biblio
Transparent IFC Enforcement: Possibility and (In)Efficiency Results
Submitted by grigby1 on Thu, 03/04/2021 - 1:34pm
security lattice
programming languages
pubcrawl
real-world programs
resilience
Resiliency
Runtime
secure information flow control
Secure Multi-Execution
secure programs
security condition
polynomial time
security of data
Semantics
SME family
termination insensitive noninterference
third-party systems
transparency
transparent enforcement
transparent IFC enforcement
white-box
FlowFox browser
white box
security
black-box
black-box enforcement
Browsers
composability
computational complexity
Computer languages
efficiency
faceted secure multiexecution
White Box Security
FSME
IFC community
Information Flow Control
Lattices
memory overhead
Metrics
Multiple Facets
no-write-down no-read-up style security policy
noninterference
biblio
Explanation Mining: Post Hoc Interpretability of Latent Factor Models for Recommendation Systems
Submitted by aekwall on Wed, 01/16/2019 - 1:09pm
association rules
black-box
composability
Explanations
interpretability
latent factor models
Metrics
pubcrawl
recommendation systems
resilience
White Box Security
white-box
biblio
A Grey-Box Approach for Detecting Malicious User Interactions in Web Applications
Submitted by K_Hooper on Wed, 11/01/2017 - 10:07am
Scalability
resilience
pubcrawl
Chained Attacks
black-box
web security
white-box