Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Big Data
biblio
Defense Against Adversarial Images Using Web-Scale Nearest-Neighbor Search
Submitted by grigby1 on Fri, 05/22/2020 - 1:34pm
adversarial image
Web-scale nearest-neighbor search
Web-scale image database
Visual Reasoning
visual databases
representation learning
nearest-neighbor defense settings
Large Scale Methods
ImageNet
image representation
image manifold
Datasets and Evaluation
data distribution
security of data
nearest neighbor search
convolutional networks
adversarial perturbations
nearest neighbour methods
Measurement
Metrics
deep learning
Big Data
internet
pubcrawl
convolutional neural nets
biblio
Big Data Security Issues and Natural Language Processing
Submitted by aekwall on Mon, 05/18/2020 - 9:54am
Computer crime
natural language processing technology
DNS
cyber security issues
big data security issues
advanced persistent threat detection
Phishing
Information Assurance
data privacy
natural language processing
cyber-attacks
spam detection
Vulnerability Analysis
advanced persistent threat
pubcrawl
Human behavior
Resiliency
information security
cyber security
security
malware
Conferences
Organizations
Big Data
Scalability
biblio
On Application of Natural Language Processing in Machine Translation
Submitted by aekwall on Mon, 05/18/2020 - 9:53am
Mathematical model
statistical corpora
Scalability
Resiliency
pubcrawl
pub
Neural networks
neural nets
neural machine translation
natural language processing
Big Data
machine translation
learning (artificial intelligence)
language translation
Human behavior
History
Google
deep learning
Decoding
biblio
A Multi-Agent Model for Network Intrusion Detection
Submitted by aekwall on Mon, 05/11/2020 - 10:18am
Anomaly Detection
network requirements
network intrusions
Multi Agent System
MAS agents
Hadoop distributed file system
distribution
distributed intrusion detection model
DIDS
Big networks
big computer infrastructure
multiagent system
autonomy
Intrusion Detection
computer network security
computer security
MAS
Databases
network intrusion detection
multi-agent systems
Metrics
composability
pubcrawl
Resiliency
security
Big Data
IDS
biblio
Real-Time Early Warning of Network Security Threats Based on Improved Ant Colony Algorithm
Submitted by grigby1 on Fri, 05/08/2020 - 1:44pm
energy consumption
Neural Network Security
Threat early warning
optimized algorithm
network security threat real-time early warning
network security threat perception algorithm
network security threat detection process
Improved ant colony algorithm
ant colony optimisation
ant colony algorithm
Alarm systems
neural network
security
Metrics
Artificial Intelligence
stability
network security
real-time systems
Big Data
Communication networks
computer network security
collaboration
policy-based governance
pubcrawl
biblio
Optimized Data de-Identification Using Multidimensional k-Anonymity
Submitted by aekwall on Mon, 04/20/2020 - 9:24am
data quality
privacy models and measurement
privacy protection mechanism
privacy preserving
privacy leak risk
priority weight-adjusted method
personal privacy
personal information
optimized multidimensional method
multidimensional k-anonymity
mean difference recommending tree method
MDR tree method
k-anonymity
information loss rate
globalized knowledge economy
de-identification
Big Data
data authenticity preservation
big data analysis
anonymization-based de-identification method
information loss
greedy algorithms
Big Data Analytics
Numerical models
data privacy
Measurement
data analysis
Data protection
Metrics
privacy
pubcrawl
Data models
biblio
Optimized Data de-Identification Using Multidimensional k-Anonymity
Submitted by aekwall on Mon, 04/20/2020 - 9:24am
data quality
privacy models and measurement
privacy protection mechanism
privacy preserving
privacy leak risk
priority weight-adjusted method
personal privacy
personal information
optimized multidimensional method
multidimensional k-anonymity
mean difference recommending tree method
MDR tree method
k-anonymity
information loss rate
globalized knowledge economy
de-identification
Big Data
data authenticity preservation
big data analysis
anonymization-based de-identification method
information loss
greedy algorithms
Big Data Analytics
Numerical models
data privacy
Measurement
data analysis
Data protection
Metrics
privacy
pubcrawl
Data models
file
SMART IRRIGATION- Big Data approach for accurate water stress detection and precision irrigation in vineyards
Submitted by manoj on Fri, 04/10/2020 - 9:19am. Contributors:
Manoj Karkee
Markus Keller
Yinghui Wu
Qin Zhang
Big Data
Smart Irrigation
Irrigation Scheduling
Spectral analysis
Water stress
Lightning Talks
1739184
CPS PI Meeting 2019
Lightning Talks
Presentation
biblio
A Study on Data Security and Query privacy in Cloud
Submitted by grigby1 on Fri, 04/03/2020 - 11:33am
multifactor authentication
wide set
security policies
security of data
scalable resources
Scalability
Safety
pubcrawl
privacy problems
Privacy Policies
privacy contemplations
privacy
power system security
Oblivious RAM
noteworthy economic assistances
multioccupancy
authentication
Human behavior
high-tech tasks
encryption
effective resolutions
Economics
decreased operational expenditures
data privacy
data defence failures
confidentiality
Cloud Security
cloud platforms
cloud computing situations
Cloud Computing
Big Data
biblio
Policy-Based De-Identification Test Framework
Submitted by grigby1 on Fri, 04/03/2020 - 11:33am
Privacy Policies
pseudonymization
privacy protection
privacy preserving
privacy models
policy-based de-identification test framework
personal privacy anonymization
General Data Protection Regulation
Domain-Specific Language
domain specific language
Distributed Information Systems
data-centered society
privacy
Data protection
Load modeling
Big Data
data privacy
Data models
Scalability
performance evaluation
Generators
Human behavior
pubcrawl
« first
‹ previous
…
24
25
26
27
28
29
30
31
32
…
next ›
last »