Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Deep Neural Network
biblio
Network Anomaly Detection Based on Deep Support Vector Data Description
Submitted by aekwall on Mon, 12/14/2020 - 12:30pm
network anomaly detection
Unsupervised Learning
Training
telecommunication traffic
Support vector machines
support data vector description
security of data
Resiliency
representation learning
pubcrawl
Predictive Metrics
normal traffic features
Neural networks
network traffic anomaly detection
False Data Detection
malicious traffic detection system
KDD CUP99 dataset
intrusion detection system
feature extraction
Deep-SVDD
deep support vector data description
Deep Neural Network
Data models
convolutional neural network
convolutional neural nets
composability
Big Data
Anomaly Detection
biblio
DeepRing: Protecting Deep Neural Network With Blockchain
Submitted by grigby1 on Tue, 12/01/2020 - 2:00pm
DeepRing
technical perspectives
Public key
pubcrawl
optimizers
object detection
neural nets
machine learning
learning (artificial intelligence)
learned parameters
human trust
human intervention
Human behavior
face recognition
appropriate loss functions
Deep Neural Network
deep learning based architectures
decryption algorithms
cybersecurity industry
Cryptography
cryptographic hash
computer vision applications
computer vision
computer architecture
commercial perspectives
centralized authority
blockchain
authorisation
biblio
TrISec: Training Data-Unaware Imperceptible Security Attacks on Deep Neural Networks
Submitted by grigby1 on Wed, 11/04/2020 - 2:15pm
pubcrawl
learning (artificial intelligence)
machine learning
ML Security
multilevel security system
object detection
Object recognition
optimization
Optimization algorithms
perceptible noise
pre-trained DNNs
Inference algorithms
resilience
Resiliency
Scalability
security
security of data
structural similarity analysis
traffic sign detection
Training
training data-unaware imperceptible security attacks
training dataset
feature extraction
AI Poisoning
automation
autonomous vehicles
convolutional neural nets
Correlation
data manipulation attacks
data poisoning attacks
Deep Neural Network
deep neural networks
DNNs
Adversarial Machine Learning
generated attack images
German Traffic Sign Recognition Benchmarks dataset
Human behavior
image classification
Image coding
image recognition
imperceptibility factor
imperceptible attack images
Imperceptible Attack Noise
biblio
Reinforcement Learning inspired Deep Learned Compositional Model for Decision Making in Tracking
Submitted by grigby1 on Mon, 10/05/2020 - 2:01pm
previous location
neural nets
object tracking
occlusion handling
partial occlusions
partially observable Markov decision making
penalty based training
pose estimation
pose estimation capabilities
multiple large video datasets
pubcrawl
Reinforcement learning
skeleton based part representation
Streaming media
target tracking
tracker
tracking
video signal processing
heuristic methods
Compositional Models
Compositionality
Computational modeling
computer science
Decision Making
deep learned compositional model
Deep Neural Network
deep reinforcement
cluttered background
human bodies
human inputs
image representation
incessant decision making
learning (artificial intelligence)
Markov processes
Mathematical model
biblio
Vulnerability Severity Prediction With Deep Neural Network
Submitted by aekwall on Mon, 09/28/2020 - 12:35pm
standard cross site scripting vulnerability text data
deep neural networks
network security incidents
XSS vulnerability
false negative rate
huge economic losses
multiple deep learning methods
optimal CNN network
recurrent convolutional neural networks
Deep Neural Network
text classification
TextRCNN
vulnerability risk levels
vulnerability severity prediction
vulnerability text classification evaluation
vulnerability text information
Cross Site Scripting
computer network security
recurrent neural nets
convolution
Communication networks
text categorization
convolutional neural nets
machine learning
Neural networks
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
Data models
security
Scalability
network security
biblio
Semi-black-box Attacks Against Speech Recognition Systems Using Adversarial Samples
Submitted by grigby1 on Fri, 09/04/2020 - 4:10pm
automatic speech recognition systems
Black Box Security
targeted ASR systems
semiblack-box attack
semi-black-box attacks
security vulnerabilities
Kaldi
high attack success rate
gradient-independent genetic algorithm
gradient descent algorithm
adversary-expected transcript texts
adversarial samples
adversarial attacks
white-box attacks
Speech recognition
gradient methods
security of data
Deep Neural Network
Perturbation methods
deep neural networks
Statistics
Sociology
genetic algorithms
neural nets
resilience
Resiliency
Metrics
composability
pubcrawl
Hidden Markov models
Computational modeling
biblio
Selective Poisoning Attack on Deep Neural Network to Induce Fine-Grained Recognition Error
Submitted by aekwall on Mon, 08/10/2020 - 10:36am
MNIST
Training data
Training
Support vector machines
Speech recognition
selective poisoning attack
security of data
Resiliency
pubcrawl
policy-based governance
poisoning attack
Pattern recognition
nuclear facilities
Neurons
Neural networks
neural nets
AI Poisoning
malicious training data
machine learning library
machine learning
learning (artificial intelligence)
image recognition
fine-grained recognition error
DNN training process
DNN security
distortion
Deep Neural Network
Data models
cyber physical systems
CIFAR10
chosen class
Artificial Neural Networks
biblio
PRADA: Protecting Against DNN Model Stealing Attacks
Submitted by aekwall on Mon, 08/03/2020 - 10:38am
nontargeted adversarial examples
Adversarial Machine Learning
API queries
confidentiality protection
DNN model extraction attacks
DNN model stealing attacks
machine learning applications
ML models
model extraction attacks
model stealing
model extraction
PRADA
prediction accuracy
prediction API
prior model extraction attacks
stolen model
transferable adversarial examples
well-defined prediction APIs
Adversary Models
Neural networks
Scalability
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
Computational modeling
Metrics
neural nets
security of data
query processing
Business
Training
Mathematical model
Data mining
Predictive models
Deep Neural Network
application program interfaces
biblio
Attacks on Digital Watermarks for Deep Neural Networks
Submitted by grigby1 on Thu, 07/30/2020 - 1:54pm
deep learning models
watermark
statistical distribution
model prediction
Mobile app
intellectual property theft
fast response times.
Digital Watermarks
deep neural networks training
Deep Neural Network
At-tack
ip protection
copy protection
Watermarking
learning (artificial intelligence)
detection algorithms
neural nets
composability
standards
Computational modeling
industrial property
Mathematical model
Resiliency
resilience
policy-based governance
pubcrawl
Neural networks
Training
biblio
Protecting the Intellectual Properties of Digital Watermark Using Deep Neural Network
Submitted by grigby1 on Thu, 07/30/2020 - 1:53pm
ip protection
Watermarking
watermark
Speech recognition
security
Resiliency
resilience
pubcrawl
policy-based governance
ownership verification
neural nets
natural language processing
machine learning
learning (artificial intelligence)
Artificial Intelligence
intellectual property security
intellectual property
industrial property
Image Processing
embedding watermarks
embedded
DNN algorithms
Digital Watermark
Deep Neural Network
deep learning models
counter-watermark attacks
composability
« first
‹ previous
1
2
3
4
5
next ›
last »