Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
deep neural networks
biblio
Test4Deep: An Effective White-Box Testing for Deep Neural Networks
Submitted by grigby1 on Tue, 02/18/2020 - 10:52am
Neurons
white-box testing framework
white box testing
white box cryptography
testing
Test4Deep
test cases
Software
Resiliency
resilience
pubcrawl
program testing
Prediction algorithms
optimization
Biological neural networks
neuron coverage
neural nets
multiple DNNs
Metrics
machine learning
learning (artificial intelligence)
generated test inputs
DNNs
diversity
DeepXplore
deep neural networks
Deep Learning testing
composability
biblio
Comprehensive Privacy Analysis of Deep Learning: Passive and Active White-Box Inference Attacks against Centralized and Federated Learning
Submitted by grigby1 on Tue, 02/18/2020 - 10:52am
Resiliency
Inference-Attacks
learning (artificial intelligence)
Membership-Inference
Metrics
neural nets
privacy
privacy leakage
pubcrawl
resilience
inference mechanisms
stochastic gradient descent algorithm
Stochastic processes
Stochastic-Gradient-Descent
Training
Training data
white box cryptography
White Box Security
white-box membership inference attacks
data privacy
active white-box inference attacks
black-box attacks
centralized learning
CIFAR dataset
composability
comprehensive privacy analysis
Computational modeling
Data models
active membership inference attacks
deep learning
deep learning models
deep neural networks
Deep-learning
federated learning setting
Federated-Learning
gradient methods
Inference algorithms
biblio
SECO: A Scalable Accuracy Approximate Exponential Function Via Cross-Layer Optimization
Submitted by aekwall on Mon, 01/20/2020 - 10:49am
pubcrawl
exponential operation
exponentiation
fault tolerant control
gradient methods
intrinsic error resilience
neural nets
Nickel
Observers
optimisation
power consumption
exponential function unit
Resiliency
runtime optimization method
Scalability
scalable accuracy approximate exponential function
SECO
signal processing
signal processing applications
Silicon
spiking neuron models
Taylor expansion
Design Time
approximate computing
approximate EFU designs
approximation theory
arithmetic units
convergence
Cross-Layer Approximation
cross-layer design method
Cross-layer optimization
deep neural networks
design space
adaptive exponential integrate-fire neuron model
Dynamic Accuracy Scaling
Eigenvalues and eigenfunctions
energy-accuracy-optimal approximate multiplier
energy-efficient computing
Error analysis
error analysis method
Error Modeling
error-resilient applications
Exponential Function
file
Protecting Confidentiality and Integrity of Deep Neural Networks against Side-channel and Fault Attacks
Submitted by Yunsi Fei on Wed, 01/08/2020 - 3:18pm. Contributors:
Yunsi Fei
Shelley Xue Lin
Thomas Wahl
Project Slides
Formal Methods and Language-based Security
Hardware Security Architecture
Hardware Security Design
Software
deep neural networks
1929300
SaTC PI Meeting 2019
biblio
Context Sensitive Conversational Agent Using DNN
Submitted by aekwall on Mon, 12/16/2019 - 1:26pm
Aerospace electronics
conversational agent
user query
storage system
speech processing
software agents
interactive systems
intelligent conversational agent
DNN
dialog system
deep neural networks
Coversational Agent
context sensitive conversational agent
context identification
conversation agents
deep learning
Scalability
information retrieval
natural language processing
knowledge based systems
knowledge base
query processing
multi-agent systems
Neural networks
neural nets
Metrics
Computational modeling
pubcrawl
Human behavior
machine learning algorithms
Conferences
biblio
An Energy-Efficient Stochastic Computational Deep Belief Network
Submitted by grigby1 on Wed, 03/06/2019 - 3:29pm
random number generation
high energy consumption
Human behavior
learning (artificial intelligence)
Metrics
neural nets
Neurons
nonlinearly separable patterns
pattern classification
policy-based governance
pubcrawl
Hardware
random number generators
rectifier linear unit
resilience
Resiliency
RNGs
SC-DBN design
Scalability
Stochastic computing
Stochastic processes
DNNs
belief networks
Biological neural networks
Cognitive Computing
collaboration
composability
computation speed
Correlation
Deep Belief Network
deep neural networks
approximate SC activation unit
effective machine learning models
Electronic mail
energy consumption
energy-efficient deep belief network
energy-efficient stochastic computational deep belief network
fixed point arithmetic
fixed-point implementation
floating point arithmetic
floating-point design
biblio
An ADMM-Based Universal Framework for Adversarial Attacks on Deep Neural Networks
Submitted by grigby1 on Fri, 02/08/2019 - 3:18pm
admm (alternating direction method of multipliers)
adversarial attacks
Artificial Neural Networks
collaboration
cyber physical systems
deep neural networks
Metrics
policy-based governance
pubcrawl
Resiliency
biblio
Adversary Resistant Deep Neural Networks with an Application to Malware Detection
Submitted by grigby1 on Wed, 06/20/2018 - 11:56am
resilience
privacy
pubcrawl
Human behavior
image recognition
Metrics
Resiliency
deep neural networks
malware classification
adversarial sample
biblio
Spectrum-based Deep Neural Networks for Fraud Detection
Submitted by grigby1 on Thu, 06/07/2018 - 2:04pm
cyber physical systems
pubcrawl
Resiliency
resilience
Metrics
collaboration
Policy
deep neural networks
Policy-Governed Secure Collaboration
fraud detection
spectrum
neural networks security
policy-based governance
biblio
Hunting for Naval Mines with Deep Neural Networks
Submitted by grigby1 on Wed, 04/11/2018 - 1:49pm
sonar imaging
modest DNN model
naval engineering computing
neural nets
privacy
pubcrawl
remotely operated vehicles
robot vision
sea faring vessels
side-scan sonar imagery
Sonar
minelike objects
support vector machine
Support vector machines
threat vectors
Throughput
trainable parameter count
Training
Training data
Underwater vehicles
visualization technique
Weapons
DNN depth
autonomous unmanned underwater vehicle
Brain modeling
calculation requirements
computation requirements
Computational modeling
data distribution training
Data models
deep neural network methods
deep neural networks
detection efficacy
autonomous underwater vehicles
DNN models
explosive naval mines
explosives
feature extraction
image recognition
image recognition tasks
learning (artificial intelligence)
memory requirements
Metrics
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »