Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
deep neural networks
biblio
Style transfer-based image synthesis as an efficient regularization technique in deep learning
Submitted by grigby1 on Fri, 12/11/2020 - 2:54pm
Resiliency
Neural networks
neural style transfer
newly created images
pubcrawl
Regularization
regularization techniques e.g
relatively poor generalization abilities
representative neural architectures
resilience
Metrics
Scalability
Skin
skin lesions
style transfer-based image synthesis
Task Analysis
Training
transfer learning
unlabeled images
Image analysis
challenging skin lesion classification case study
convolutional neural nets
convolutional neural networks
data augmentation
decision support system
deep learning
deep neural networks
Diagnosis
efficient regularization technique
base image
image classification
image classification purposes
image synthesis
labeled images
learning (artificial intelligence)
learning algorithms
Lesions
machine learning
biblio
Development of Real-Time Style Transfer for Video System
Submitted by grigby1 on Fri, 12/11/2020 - 2:52pm
Scalability
optical flow
optical losses
perceptual loss
pubcrawl
real-time style transfer
real-time systems
relatively time-consuming
resilience
Resiliency
neural style transfer
Streaming media
style reconstruction loss
style transfer
video sequences
video signal processing
video style transfer
video stylization
video system
feed-forward CNN approach
artistic images
Artistic Style
computer machine
convolutional neural nets
convolutional neural networks
deep neural networks
defined time loss function
end-to-end system
fast style transformation
artificial system
feed-forward network
feedforward neural nets
high perceptual quality
Image reconstruction
Image resolution
Metrics
neural network
Neural networks
biblio
Masked Neural Style Transfer using Convolutional Neural Networks
Submitted by aekwall on Mon, 12/07/2020 - 12:09pm
feature extraction
visualization
visual perceptions
visual perception
visual experiences
VGG-19 model
Technological innovation
Semantics
object detection
masking
masked neural style transfer
Histograms
neural style transfer
face recognition
deep neural networks
convolutional neural networks
convolutional neural nets
content image
Biological neural networks
pubcrawl
Predictive Metrics
Resiliency
Scalability
biblio
TrISec: Training Data-Unaware Imperceptible Security Attacks on Deep Neural Networks
Submitted by grigby1 on Wed, 11/04/2020 - 2:15pm
pubcrawl
learning (artificial intelligence)
machine learning
ML Security
multilevel security system
object detection
Object recognition
optimization
Optimization algorithms
perceptible noise
pre-trained DNNs
Inference algorithms
resilience
Resiliency
Scalability
security
security of data
structural similarity analysis
traffic sign detection
Training
training data-unaware imperceptible security attacks
training dataset
feature extraction
AI Poisoning
automation
autonomous vehicles
convolutional neural nets
Correlation
data manipulation attacks
data poisoning attacks
Deep Neural Network
deep neural networks
DNNs
Adversarial Machine Learning
generated attack images
German Traffic Sign Recognition Benchmarks dataset
Human behavior
image classification
Image coding
image recognition
imperceptibility factor
imperceptible attack images
Imperceptible Attack Noise
biblio
Deep Learning Poison Data Attack Detection
Submitted by grigby1 on Wed, 11/04/2020 - 2:15pm
model definitions
variational inference approach
Variational inference
transfer learning
training phase
testing data
system-critical applications
Scalability
Resiliency
resilience
pubcrawl
pre-trained model parameters
poisonous data
poisoned training data
neural nets
network attack
adversarial information
MNIST data
maximum entropy principle
Maximum Entropy method
learning (artificial intelligence)
Human behavior
Entropy
deep neural networks
deep learning poison data attack detection
deep learning
computer network security
CNN model
Bayesian statistic
attacking training data
AI Poisoning
biblio
TensorClog: An Imperceptible Poisoning Attack on Deep Neural Network Applications
Submitted by grigby1 on Wed, 11/04/2020 - 2:12pm
resilience
neural nets
Neural networks
Perturbation methods
poisoning attack
privacy
privacy protection purpose
pubcrawl
real-world application
lower inference accuracy
Resiliency
Scalability
security of data
TensorClog poisoning technique
test error
Training
user data
user privacy violations
deep neural network applications
adversarial attack
AI Poisoning
CIFAR-10 dataset results
converged training loss
data converges
data privacy
data results
deep learning
abusive data collection
deep neural networks
different limited information attack scenarios
feature extraction
Human behavior
imperceptible poisoning attack
internet
Internet application providers
learning (artificial intelligence)
biblio
Towards Efficient Malware Detection and Classification using Multilayered Random Forest Ensemble Technique
Submitted by grigby1 on Thu, 10/29/2020 - 11:12am
malware authors
Vision-based malware analysis
traditional malware
Resiliency
resilience
pubcrawl
privacy
pattern classification
multilayered random forest ensemble technique
microsoft windows
Metrics
malware patterns
malware images
malware detection
malware classification
Adaptation models
malware
learning (artificial intelligence)
invasive software
hybrid model
Human behavior
Gray-scale
Forestry
feature extraction
Ensemble forest
deep neural networks
deep learning models
cyber security
Computational modeling
biblio
Multi-Scale Deformable CNN for Answer Selection
Submitted by grigby1 on Mon, 10/05/2020 - 1:49pm
question answering (information retrieval)
multiscale deformable convolutional neural network
n-gram models
natural language
natural language processing
nonconsecutive n-gram features
nonconsecutive words
pubcrawl
question answering
multiscale deformable CNN
question answering systems
Semantics
sentence modeling
Task Analysis
text analysis
text features
traditional CNN
variable length n-gram features
convolutional neural networks
Human behavior
Human Factors
Computing Theory and Compositionality
Answer selection
answer selection task
automatic question answering system
convolution
convolutional neural nets
Compositionality
deep neural networks
deformable convolution neural network
feature extraction
fixed-length convolutional kernels
Kernel
Knowledge Discovery
mine multiscale n-gram features
multiple deformable convolutional layers
biblio
AOGNets: Compositional Grammatical Architectures for Deep Learning
Submitted by grigby1 on Mon, 10/05/2020 - 1:49pm
object detection
image segmentation
ImageNet-1K classification benchmark
input feature map
learning (artificial intelligence)
model interpretability score
MS-COCO object detection
network dissection
network generator
neural architectures
neural nets
image classification
phrase structure grammar
pubcrawl
Recognition: Detection
Reconfigurability
representation learning
ResNeXt
retrieval
segmentation benchmark
SENet
deep learning
Human behavior
Human Factors
Computing Theory and Compositionality
AND-OR Grammar
AOG building block
AOGNet
AOGNets
attention based variants
categorization
deep compositional grammatical architectures
Compositionality
deep neural networks
DenseNet
dependency grammar
DNNs
DualPathNet
feature channels
feature exploration
grammar models
grammars
biblio
Vulnerability Severity Prediction With Deep Neural Network
Submitted by aekwall on Mon, 09/28/2020 - 12:35pm
standard cross site scripting vulnerability text data
deep neural networks
network security incidents
XSS vulnerability
false negative rate
huge economic losses
multiple deep learning methods
optimal CNN network
recurrent convolutional neural networks
Deep Neural Network
text classification
TextRCNN
vulnerability risk levels
vulnerability severity prediction
vulnerability text classification evaluation
vulnerability text information
Cross Site Scripting
computer network security
recurrent neural nets
convolution
Communication networks
text categorization
convolutional neural nets
machine learning
Neural networks
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
Data models
security
Scalability
network security
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »