Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
transfer learning
biblio
Style transfer-based image synthesis as an efficient regularization technique in deep learning
Submitted by grigby1 on Fri, 12/11/2020 - 2:54pm
Resiliency
Neural networks
neural style transfer
newly created images
pubcrawl
Regularization
regularization techniques e.g
relatively poor generalization abilities
representative neural architectures
resilience
Metrics
Scalability
Skin
skin lesions
style transfer-based image synthesis
Task Analysis
Training
transfer learning
unlabeled images
Image analysis
challenging skin lesion classification case study
convolutional neural nets
convolutional neural networks
data augmentation
decision support system
deep learning
deep neural networks
Diagnosis
efficient regularization technique
base image
image classification
image classification purposes
image synthesis
labeled images
learning (artificial intelligence)
learning algorithms
Lesions
machine learning
biblio
Deep Learning Poison Data Attack Detection
Submitted by grigby1 on Wed, 11/04/2020 - 2:15pm
model definitions
variational inference approach
Variational inference
transfer learning
training phase
testing data
system-critical applications
Scalability
Resiliency
resilience
pubcrawl
pre-trained model parameters
poisonous data
poisoned training data
neural nets
network attack
adversarial information
MNIST data
maximum entropy principle
Maximum Entropy method
learning (artificial intelligence)
Human behavior
Entropy
deep neural networks
deep learning poison data attack detection
deep learning
computer network security
CNN model
Bayesian statistic
attacking training data
AI Poisoning
biblio
Few-Shot Transfer Learning for Text Classification With Lightweight Word Embedding Based Models
Submitted by aekwall on Mon, 11/02/2020 - 2:30pm
pooling strategy
Few-shot learning
few-shot transfer learning tasks
lightweight word embedding-based models
modified hierarchical pooling strategy
parameter-free pooling operations
parameter-free property
parameters training
plug-and-play way
deep learning architectures
semantic compositionality
Semantic Networks
semantic text
simple word embedding-based models
supervised data
unseen text sequences
word embedding based models
word processing
text categorization
Data models
feature extraction
Human behavior
pubcrawl
Computational modeling
pattern classification
Training
text analysis
Task Analysis
text classification
transfer learning
deep learning
Human Factors
Compositionality
Computing Theory and Compositionality
supervised learning
data-hungry deep models
biblio
An Xception Convolutional Neural Network for Malware Classification with Transfer Learning
Submitted by grigby1 on Thu, 10/29/2020 - 11:10am
Microsoft malware dataset
Xception model
Xception convolutional neural network
Xception
VGG16 model
transfer learning
Training
testing
Support vector machines
special CNN architecture
Resiliency
resilience
pubcrawl
privacy
Predictive models
pattern classification
CNN models
Metrics
malware image classification
malware classification problem
malware classification
malware
learning (artificial intelligence)
invasive software
image-based malware classification
image classification
Human behavior
Gray-scale
feature extraction
ensemble model
convolutional neural network (CNN)
convolutional neural nets
biblio
TrustSign: Trusted Malware Signature Generation in Private Clouds Using Deep Feature Transfer Learning
Submitted by grigby1 on Fri, 07/10/2020 - 1:08pm
supervised classifiers
Metrics
neural nets
private clouds
program diagnostics
pubcrawl
ransomware samples
resilience
Resiliency
static analysis
malware
transfer learning
Trusted Computing
trusted malware signature generation method
TrustSign signature generation process
unsupervised classifier
Unsupervised Learning
VGG-19 neural network model
virtualisation
volatile memory
distribution time
Cloud Computing
cloud virtualization technology
convolutional neural networks
Cryptography
cryptojacking
cryptojacking attacks
deep feature transfer learning
deep learning
digital signatures
Automatic Signature Generation
dynamic analysis
fileless malware
high-level deep features
Human behavior
Human Factors
ImageNet dataset
in-browser cryptojacking attacks
inspection procedure
invasive software
biblio
Preserving Privacy in Convolutional Neural Network: An ∊-tuple Differential Privacy Approach
Submitted by aekwall on Mon, 06/22/2020 - 11:20am
Deep Neural Network
ϵ-tuple differential privacy approach
Training data
significant accuracy degradation
salient data features
reusable output model
privacy preserving model
privacy concern
model inversion attack
model buildup data
financial data
deep neural networks
complex data features
medical data
CNN model
differential privacy
Cloud Computing
transfer learning
image recognition
convolutional neural network
convolutional neural nets
CNN
privacy
classification
composability
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
data privacy
Scalability
biblio
An Adaptive Approach for Anomaly Detector Selection and Fine-Tuning in Time Series
Submitted by grigby1 on Tue, 01/21/2020 - 11:59am
Anomaly Detection
Compositionality
expandability
joint learning network
pubcrawl
resilience
Resiliency
self-adaption
time series
transfer learning
file
Mitigating Uncertainties in Computer Numerical Control (CNC) as a Cloud Service using Data-Driven Transfer Learning
Submitted by Anonymous on Thu, 01/16/2020 - 5:02pm. Contributors:
Chinedum Okwudire
RaedAl Kontar
Cybermanufacturing
transfer learning
control;
Posters
1931950
CPS PI Meeting 2019
2019
NSF
U.S. Government
Poster
biblio
Learning Transferable Features For Open-Domain Question Answering
Submitted by aekwall on Mon, 11/25/2019 - 2:01pm
single open-domain QA model
open-domain QA models
open-domain question answering
open-domain Question-Answering models
pattern clustering
pubcrawl
question answering (information retrieval)
Question-Answering
sentence-level QA models
natural language processing
span-level QA benefits
Task Analysis
Training
training corpora
Training data
transfer learning
transferable feature learning
transferable features
domain-specific QA models
Analogies and Transference
clustering algorithm
complementary data
Data models
Deep Networks
domain adaptation approaches
domain-adaptation
domain-specific features
Adaptation models
Human behavior
Human Factors
information retrieval
Knowledge Discovery
learning (artificial intelligence)
Linear programming
natural language
biblio
Malware Classification Using Deep Convolutional Neural Networks
Submitted by grigby1 on Mon, 06/10/2019 - 2:01pm
privacy
learning models
machine learning
malware
malware binaries
malware classification
malware images
Metrics
neural network
object detection
Pattern recognition
learning (artificial intelligence)
pubcrawl
resilience
Resiliency
support vector machine
support vector machine classifier training
Support vector machines
transfer learning
visual patterns
visualization
feature extraction
classification
classifier
convolutional neural nets
convolutional neural network
convolutional neural networks
Correlation
DCNN classification
deep convolutional neural networks
deep learning techniques
accuracy levels
Gray-scale
Hamming distance
Human behavior
image classification
image features
image representation
image type
improved image representation
invasive software
« first
‹ previous
1
2
3
4
next ›
last »