Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
optimization
biblio
EFM: An Edge-Computing-Oriented Forwarding Mechanism for Information-Centric Networks
Submitted by aekwall on Thu, 04/08/2021 - 4:28pm
edge computing
edge networks
forwarding strategy
Image edge detection
Information Centric Networks
information-centric networking
Logic gates
optimization
Packet loss
pubcrawl
Resiliency
Scalability
simulation
biblio
Optimization of Secret Key using cuckoo Search Algorithm for ensuring data integrity in TPA
Submitted by aekwall on Mon, 03/22/2021 - 1:07pm
optimization
TPA
third party auditors
secret key generation algorithms
Secret key
search problems
Resiliency
public key cryptography
pubcrawl
Predictive Metrics
auditing
encryption audits
encryption
decryption purpose
data integrity
cuckoo search algorithm
Cuckoo search
Compositionality
Cloud Computing
biblio
An Optimization Approach to Graph Partitioning for Detecting Persistent Attacks in Enterprise Networks
Submitted by grigby1 on Wed, 03/17/2021 - 12:44pm
attack graphs
Chained Attacks
underlying attack
smaller incidents
skilled adversaries
security-context
security-aware partitions
Persistent attacks
optimization approach
multistep attacks
kill chain progression
graph partitioning
false-positives
enterprise networks
actual attack plan
advanced persistent threats
security of data
Linear programming
security perspective
graph theory
detection algorithms
standards
Topology
Scalability
Correlation
optimization
computer network security
Resiliency
resilience
pubcrawl
security
biblio
ComPy-Learn: A toolbox for exploring machine learning representations for compilers
Submitted by aekwall on Mon, 03/15/2021 - 12:07pm
compilers
program compilers
Clang
LLVM
compiler security
empirical evaluation
Clang compiler
Code Representations
compiler heuristics
Compositionality
ComPy-Learn
developer productivity
graph representations
LLVM compiler backend
program code
software engineering tools
software performance
syntax-level language information
tools
Task Analysis
Program processors
learning (artificial intelligence)
Resiliency
pubcrawl
machine learning
Metrics
optimization
Scalability
Training
software engineering
public domain software
Vulnerability prediction
program diagnostics
Predictive models
Pipelines
biblio
Optimized Spectrum sensing Techniques for Enhanced Throughput in Cognitive Radio Network
Submitted by aekwall on Mon, 03/15/2021 - 12:02pm
added delay
Cognitive Radio Security
wireless communication system
wireless applications
transmission delay
throughput optimization
spectrum scarcity
Sensing throughput tradeoff
secondary users
primary users security
optimized spectrum sensing techniques
optimal sensing time
finite resource
enhanced throughput
Cooperative Spectrum Sensing(CSS)
Cognitive Radio Network
software defined radio
cognitive radio networks
cognitive radio
signal quality
radio spectrum management
Cascading style sheets
signal detection
Throughput
sensors
software radio
radio networks
Signal to noise ratio
optimization
pubcrawl
Resiliency
biblio
Physical-Layer Security with Finite Blocklength over Slow Fading Channels
Submitted by aekwall on Mon, 03/15/2021 - 11:56am
physical-layer security
wiretap code
transmission policy
telecommunication security
telecommunication network reliability
statistical channel state information
statistical analysis
ST
slow fading channels
secrecy throughput
Resiliency
Reliability
pubcrawl
adaptive optimization schemes
optimization
nonadaptive optimization schemes
Metrics
legitimate user pair coexisting
instantaneous channel state information
finite-blocklength secrecy coding
finite blocklength
fading channels
critical secrecy rate
composability
code rates
channel coding
biblio
Detecting Botnet Attacks in IoT Environments: An Optimized Machine Learning Approach
Submitted by grigby1 on Tue, 03/09/2021 - 2:24pm
Metrics
Surges
Robustness
Resiliency
resilience
pubcrawl
performance evaluation
optimization
Microelectronics
Bayesian optimization
machine learning
IoT
Decision trees
composability
botnets
Botnet detection
botnet
biblio
Evading Deepfake-Image Detectors with White- and Black-Box Attacks
Submitted by grigby1 on Thu, 03/04/2021 - 2:35pm
security of data
neural nets
neural network
optimization
Perturbation methods
popular forensic approach
pubcrawl
resilience
Resiliency
Robustness
Metrics
significant vulnerabilities
social networking (online)
state- of-the-art classifier
synthesizer
synthetic content
synthetically-generated content
target classifier
Training
Twitter
fraudulent social media profiles
white box
security
attack case studies
AUC
black-box attack
composability
deepfake-image detectors
disinformation campaigns
Forensics
White Box Security
Generators
image area
image classification
Image forensics
image generators
image representation
image sensors
image-forensic classifiers
learning (artificial intelligence)
biblio
Approximate Symbolic Explanation for Neural Network Enabled Water-Filling Power Allocation
Submitted by aekwall on Mon, 03/01/2021 - 5:03pm
fading channels
symbolic mapping
slow iterative search
OFDM sub-channels
NN power allocation solution
neural network enabled water-filling power allocation
Meijer G-function
iterative WF threshold search process
direct high-dimensional mapping
channel gain
approximate symbolic explanation
Search Space
OFDM modulation
Transforms
xai
Scalability
approximation theory
wireless
Artificial Neural Networks
telecommunication computing
neural nets
optimization
Iterative methods
Wireless communication
resource management
deep learning
pubcrawl
Resiliency
machine learning
biblio
Traffic Off-Loading over Uncertain Shared Spectrums with End-to-End Session Guarantee
Submitted by aekwall on Mon, 03/01/2021 - 4:46pm
search problems
Wireless Mesh Network Security
Vehicular and wireless technologies
stochastic optimization
spectrum uncertainty
Spectrum sharing
Iterative algorithms
end-to-end guarantee
delay-tolerant traffic off-loading
Resiliency
Heuristic algorithms
uncertainty
optimization
Metrics
simulation
composability
pubcrawl
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »