Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Toxicology
biblio
A Robust Framework for Adaptive Selection of Filter Ensembles to Detect Adversarial Inputs
Submitted by grigby1 on Fri, 01/06/2023 - 4:25pm
neural network
Pareto optimization
Multi-Objective BLPP
AI/ML Security
Toxicology
adaptive filters
Learning systems
AI Poisoning
Adversarial Machine Learning
Adaptation models
resilience
Perturbation methods
programming
Scalability
optimization
Resiliency
Human behavior
pubcrawl
biblio
Bullseye Polytope: A Scalable Clean-Label Poisoning Attack with Improved Transferability
Submitted by grigby1 on Tue, 03/15/2022 - 2:18pm
Training
security
Neural networks
pubcrawl
Scalability
Robustness
Observers
Scalable Security
transfer learning
Dataset Poisoning
Machine Learning Robustness
Toxicology
biblio
The Hammer and the Nut: Is Bilevel Optimization Really Needed to Poison Linear Classifiers?
Submitted by grigby1 on Wed, 02/09/2022 - 2:46pm
denial-of-service attack
data poisoning
Computational modeling
AI Poisoning
Adversarial Machine Learning
Training data
Training
Toxicology
System performance
secure AI
Scalability
Resiliency
resilience
pubcrawl
Neural networks
Human behavior
biblio
Deep Poisoning: Towards Robust Image Data Sharing against Visual Disclosure
Submitted by grigby1 on Wed, 02/09/2022 - 2:46pm
visualization
Training data
Training
Toxicology
Scalability
Resiliency
resilience
pubcrawl
image representation
Human behavior
Conferences
computer vision
AI Poisoning
biblio
Adversary Instantiation: Lower Bounds for Differentially Private Machine Learning
Submitted by aekwall on Mon, 12/20/2021 - 12:30pm
differential privacy
Adversary Models
Upper bound
Toxicology
Membership-Inference
machine-learning
DP-SGD
Differentially-private-(DP)-machine-learning
Differentially-private
Deep-learning
privacy
Human behavior
Resiliency
Metrics
Scalability
pubcrawl
Games
Training
deep learning
biblio
Poisoning Attack on Show and Tell Model and Defense Using Autoencoder in Electric Factory
Submitted by aekwall on Thu, 06/24/2021 - 11:49am
Training data
AI Poisoning
Toxicology
show and tell model
poisoning attack
defense
autoencoder
AI
Dogs
Scalability
image recognition
image restoration
Neural networks
pubcrawl
Human behavior
Resiliency
Data models
biblio
Using k-nearest neighbor method to identify poison message failure
Submitted by grigby1 on Fri, 07/06/2018 - 2:06pm
pubcrawl
unstable network
Toxicology
Telephony
telecommunications networks
telecommunication security
telecommunication network reliability
telecommunication network management
telecommunication computing
System testing
statistical distributions
Scalability
Routing
Resiliency
resilience
AI Poisoning
Protocols
Probability distribution
probabilistic k-nearest neighbor method
poison message failure identification
network fault management
machine learning
learning (artificial intelligence)
Large-scale systems
IP networks
Human behavior
Data mining
control systems
computer science
Computer bugs
biblio
Fine Tuning Lasso in an Adversarial Environment against Gradient Attacks
Submitted by grigby1 on Mon, 03/19/2018 - 1:59pm
robust classifier
known weaknesses
labeled training data
learning (artificial intelligence)
Metrics
optimization
pattern classification
probability
pubcrawl
resilience
Resiliency
Input variables
Scalability
security of data
single convex optimization
source domain
supervised learning
Synthetic Data
Task Analysis
testing
Toxicology
Training
data set testing
adversarial data
adversarial environment
adversarial learning research
adversarial learning setting
Adversarial Machine Learning
Adversary Models
convex programming
data analysis
Data mining
data mining algorithms
adversarial component
data testing
domain adaptation
domain adaption
feature extraction
Feature Selection
fine tuning lasso
fixed probability distribution
gradient attacks
Human behavior