Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
adversarial environment
biblio
Adversarial Multimedia Forensics: Overview and Challenges Ahead
Submitted by aekwall on Wed, 05/08/2019 - 9:42am
information forensics
Transform coding
tools
tampering detection
Signal processing algorithms
Scalability
resilience
pubcrawl
multimedia forensics tools
multimedia documents
multimedia computing
Metrics
information retrieval
adversarial environment
Human behavior
game theory
Forensics
forensic techniques
forensic analysis
distortion
Digital Forensics
Detectors
counter-forensic tools
Cameras
adversarial multimedia forensics
biblio
Fine Tuning Lasso in an Adversarial Environment against Gradient Attacks
Submitted by grigby1 on Mon, 03/19/2018 - 1:59pm
robust classifier
known weaknesses
labeled training data
learning (artificial intelligence)
Metrics
optimization
pattern classification
probability
pubcrawl
resilience
Resiliency
Input variables
Scalability
security of data
single convex optimization
source domain
supervised learning
Synthetic Data
Task Analysis
testing
Toxicology
Training
data set testing
adversarial data
adversarial environment
adversarial learning research
adversarial learning setting
Adversarial Machine Learning
Adversary Models
convex programming
data analysis
Data mining
data mining algorithms
adversarial component
data testing
domain adaptation
domain adaption
feature extraction
Feature Selection
fine tuning lasso
fixed probability distribution
gradient attacks
Human behavior
biblio
Automated U.S diplomatic cables security classification: Topic model pruning vs. classification based on clusters
Submitted by K_Hooper on Wed, 01/10/2018 - 11:14am
Springs
pubcrawl
Resiliency
Scalability
security
security of data
sensitive information leaks
sensitive text data
Sensitivity
protection mechanism
text analysis
text leakage
text security classification
topic model pruning
Training
untrusted channels
US government
WikiLeaks dataset
Electronic mail
automated US diplomatic cables security classification
automatic unstructured text security class detection
cyberattacks
data infrastructure protection
data leak prevention system
Data protection
DLP system
Edward Snowden incident
adversarial environment
email leakage
feature extraction
government data processing
Human behavior
Insider Threats
natural language processing
pattern classification
printers