Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
adversarial attack
biblio
Dual Graphs of Polyhedral Decompositions for the Detection of Adversarial Attacks
Submitted by grigby1 on Thu, 06/22/2023 - 12:44pm
adversarial attack
polyhedral decomposition
Hamming graph
Firing
ensemble voting
dual graph
DAmageNet
convex polyhedra
bit vectors
decomposition
digital images
ResNet
Neural networks
FGSM
Hamming distance
Image edge detection
Detectors
network architecture
composability
Big Data
Metrics
Human behavior
pubcrawl
biblio
Catch Me If You Can: Blackbox Adversarial Attacks on Automatic Speech Recognition using Frequency Masking
Submitted by aekwall on Fri, 03/31/2023 - 8:34am
Measurement
Perturbation methods
pubcrawl
Metrics
Resiliency
composability
automatic speech recognition
Black Box Attacks
adversarial attack
navigation
Target recognition
Closed box
Blackbox
Frequency Masking
Psychoacoustic models
Psychoacoustics
biblio
DeepSteal: Advanced Model Extractions Leveraging Efficient Weight Stealing in Memories
Submitted by grigby1 on Tue, 12/20/2022 - 6:30pm
Computational modeling
rowhammer
bit leakage
white box cryptography
adversarial attack
model extraction
Clustering algorithms
Training data
composability
deep learning
privacy
Resiliency
resilience
Metrics
pubcrawl
Neural networks
Training
biblio
Automatic Selection Attacks Framework for Hard Label Black-Box Models
Submitted by aekwall on Tue, 12/20/2022 - 4:21pm
Computational modeling
White Box Security
transferability
substitute model
machine learning
feature extraction
face recognition
estimation
deep learning
Conferences
Black Box Attacks
black-box attack
adversarial example
adversarial attack
Adaptation models
pubcrawl
Metrics
composability
Resiliency
biblio
Protecting Reward Function of Reinforcement Learning via Minimal and Non-catastrophic Adversarial Trajectory
Submitted by grigby1 on Tue, 09/20/2022 - 12:27pm
Reinforcement learning
reward function
non-catastrophic
expert trajectory
Costs
Human Factors
adversarial attack
expert systems
Clustering algorithms
Predictive models
Prediction algorithms
Measurement
Perturbation methods
privacy
Scalability
Human behavior
pubcrawl
biblio
Adversarial Attack on Fake-Faces Detectors Under White and Black Box Scenarios
Submitted by aekwall on Mon, 01/31/2022 - 3:11pm
Detectors
White Box Security
white-box
forensic models
Faked faces
black-box
adversarial attack
Forensics
Generators
security
generative adversarial networks
composability
Resiliency
Metrics
pubcrawl
Conferences
feature extraction
biblio
Adversarial Attack and Defense on Graph-based IoT Botnet Detection Approach
Submitted by aekwall on Mon, 01/10/2022 - 11:49am
Classification algorithms
Malware Analysis and Graph Theory
privacy
Predictive Metrics
Human behavior
Resiliency
adversarial attack
attack graphs
botnet
Training
composability
Computational modeling
graph analysis
IoT Botnet detection
malware
pubcrawl
Reinforcement learning
supervised learning
biblio
Adversarial Attacks on GMM I-Vector Based Speaker Verification Systems
Submitted by grigby1 on Thu, 05/13/2021 - 11:22am
Degradation
x-vector
speaker verification
GMM i-vector
Gaussian mixture model
adversarial attack
measurement uncertainty
speech processing
Attack vectors
signal processing
Error analysis
Scalability
Resiliency
resilience
Human behavior
pubcrawl
Training
biblio
Black Box Attacks on Explainable Artificial Intelligence(XAI) methods in Cyber Security
Submitted by aekwall on Mon, 03/01/2021 - 3:59pm
security
gradient-based XAI
learning (artificial intelligence)
Metrics
ML models
Predictive models
privacy
pubcrawl
Resiliency
Robustness
Scalability
explainable artificial intelligence methods
security domain
security of data
security-relevant data-sets
threat models
white box
White Box Security
white box setting
xai
XAI methods
composability
adversarial attack
Analytical models
Artificial Intelligence
artificial intelligence security
binary output
black box attack
Black Box Attacks
black box encryption
black box settings
black-box models
predictive security metrics
computer security
cyber security
cybersecurity domain
data analysis
Data models
deep learning
domain experts
exact properties
explainable artificial intelligence
biblio
Link Prediction Adversarial Attack Via Iterative Gradient Attack
Submitted by aekwall on Mon, 01/25/2021 - 12:01pm
gradient information
attack graphs
adversarial attack
adversarial graph
deep models
defense
GAE
gradient attack (GA)
gradient attack strategy
gradient methods
graph autoencode
graph evolved tasks
iterative gradient attack
Link prediction
link prediction adversarial attack problem
node classification
real-world graphs
trained graph autoencoder model
Robustness
data privacy
Task Analysis
learning (artificial intelligence)
Resiliency
pubcrawl
composability
graph theory
privacy
security of data
neural nets
Prediction algorithms
security problem
Predictive models
Predictive Metrics
deep neural networks
Perturbation methods
1
2
next ›
last »