Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
optimization
file
Cyber Physical Regional Freight Transportation System
Submitted by Genevieve Giuliano on Thu, 01/16/2020 - 3:28pm. Contributors:
Petros Ioannou
Maged Dessouky
Genevieve Giuliano
co-simulation
optimization
freight load balancing
user equilibrium
social cost
Posters
1545130
CPS PI Meeting 2019
2019
NSF
U.S. Government
Poster
biblio
Consideration of security for PLNC with untrusted relay in game theoretic perspective
Submitted by aekwall on Mon, 12/30/2019 - 12:26pm
power control
Nash Equilibrium
game theoretic perspective
informed CSI
interfered signal
optimal control
physical layer network coding
physical layer security
PLNC
telecommunication control
received signal
relay station
secure wireless communication link
transmit power control
Transmit Power Control Channel State Information
untrusted relay
game theoretic security
Scalability
channel state information
relay networks (telecommunication)
network coding
Predictive Metrics
Human Factors
Games
Relays
radio networks
Physical layer
optimisation
optimization
Wireless communication
pubcrawl
game theory
telecommunication security
biblio
Differential Privacy of Online Distributed Optimization under Adversarial Nodes
Submitted by grigby1 on Mon, 12/16/2019 - 3:53pm
graph theory
sensitive data
Scalability
Resiliency
resilience
regular node
pubcrawl
privacy
preliminary attempt
optimization
online learning
online distributed optimization
network topology
learning (artificial intelligence)
important data information
Human behavior
adversarial
distributed optimization
distributed online learning algorithm
Distributed databases
differential privacy
different adversary models
data privacy
data analysis
cyber-physical systems
cyber physical systems
Cyber Physical System
Control Theory and Privacy
Control Theory
big data analysis methods
Big Data
adversarial nodes
biblio
A Multiple Objective PSO-Based Approach for Data Sanitization
Submitted by aekwall on Mon, 12/16/2019 - 1:47pm
resilience
privacy-preserving and security
nondominated solutions
multiple objective PSO-based approach
multiple objective
multiobjective particle swarm optimization-based framework
grid-based algorithm
Itemsets
genetic algorithms
Data Sanitization
Compositionality
security
probability
privacy
Data mining
particle swarm optimization
particle swarm optimisation
optimization
pubcrawl
Human behavior
Task Analysis
biblio
A Swarm-based Data Sanitization Algorithm in Privacy-Preserving Data Mining
Submitted by aekwall on Mon, 12/16/2019 - 1:47pm
artificial cost
swarm-based data sanitization algorithm
privacy-preserving data mining
PPDM
Pareto solutions
multiobjective PSO
multiobjective
missing cost
Itemsets
hierarchical clustering methods
hierarchical clustering method
hiding failure
genetic algorithms
clustering methods
data privacy
Data Sanitization
Compositionality
resilience
pattern clustering
privacy
Data mining
Clustering algorithms
Data protection
PSO
optimization
particle swarm optimisation
pubcrawl
Human behavior
biblio
Improving the Efficiency of IDPS by Using Hybrid Methods from Artificial Intelligence
Submitted by grigby1 on Mon, 12/09/2019 - 2:01pm
intrusion detection system
security
Reinforcement learning
pubcrawl
optimization
network and information security
multiagent systems
multi-agent systems
Monitoring
IP networks
intrusion prevention system
Intrusion Detection Systems
artificial intelligence security
hybrid methods
Fuzzy logic
cyber defense
Cryptography
computer networks security
computer network security
Computational modeling
computational intelligence
Compositionality
composability
Artificial Intelligence
biblio
SoK: Shining Light on Shadow Stacks
Submitted by aekwall on Mon, 12/02/2019 - 12:08pm
return oriented programming
metadata
Metrics
optimization
Payloads
performance comparisons
program compilers
program diagnostics
pubcrawl
Registers
Resiliency
Memory Protection
return-oriented-programming
Scalability
security
security of data
shadow stack design
shadow stacks
shadow-stacks
Software
software security mitigations
virtual calls
control-flow-integrity
C++ languages
CFI mitigations
compatibility
compiler designers
compiler security
composability
Compositionality
control-flow hijacking attacks
control-flow integrity solutions
control-flow-hijacking
backward edge
defense mechanisms
deployed mitigations
dominant attack vector
forward edge
fully precise mechanism
Human Factors
indirect calls
language-based-security
low performance overhead
biblio
Information-Flow Preservation in Compiler Optimisations
Submitted by aekwall on Mon, 12/02/2019 - 12:07pm
Scalability
optimization
passive side-channel attacks
program optimisations
Program processors
program transformations
program verification
pubcrawl
Resiliency
optimising compilers
Semantics
side-channel
side-channel attacks
source program
standard compiler passes
standards
target program
I-O Systems
Micromechanical devices
Metrics
information-flow preserving program transformation
information-flow preservation
information-flow leaks
Information Flow
IFP
correct compilers
Compositionality
compiler security
compiler optimisations
compiler
CompCert C compiler
security
i-o systems security
biblio
Understand Code Style: Efficient CNN-Based Compiler Optimization Recognition System
Submitted by aekwall on Mon, 12/02/2019 - 12:07pm
recurrent neural nets
compiler security
understand code style
RNN-based model
optimising compilers
compiler optimization algorithms
CNN-based compiler optimization recognition system
CNN-based compiler optimization level recognition model
closed source compilers
binary security analysis
binary file processing
Compositionality
Semantics
security of data
convolution
Analytical models
convolutional neural nets
optimization
Metrics
pubcrawl
Resiliency
Task Analysis
Software
security
Scalability
biblio
What You Get is What You C: Controlling Side Effects in Mainstream C Compilers
Submitted by aekwall on Mon, 12/02/2019 - 12:07pm
language security
compiler performance
compiler upgrade
compiler writers
compilers
constant-time
CPUs
crypto code
cryptographic algorithm
cryptographic protocol security
erasing
implicit properties
compiler optimizations
LLVM
mainstream C compilers
secure code
Security Engineers
side channels
side effects
stack
timing channel
zeroing
compiler security
timing
Cryptography
Cryptographic Protocols
Program processors
Resiliency
pubcrawl
Metrics
standards
optimization
Libraries
optimisation
program verification
Scalability
Security Properties
Compositionality
program compilers
C
C abstract machine
C++ language
careful programmer
Clang
compiler commands
Compiler Optimization
« first
‹ previous
…
14
15
16
17
18
19
20
21
22
…
next ›
last »