Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
adversarial examples
biblio
Detecting Adversarial Examples for Deep Neural Networks via Layer Directed Discriminative Noise Injection
Submitted by grigby1 on Fri, 06/19/2020 - 10:49am
machine learning
Training
Sensitivity
Scalability
Resiliency
resilience
pubcrawl
Policy-Governed Secure Collaboration
policy-based governance
Perturbation methods
noninvasive universal perturbation attack
Neural networks
natural scenes
natural images
MobileNet
adversarial examples
learning (artificial intelligence)
layer directed discriminative noise
false trust
false positive rate
dominant layers
distortion
discriminative noise injection strategy
deep neural networks
deep learning
convolutional neural nets
computer vision tasks
computer vision
computer architecture
adversarial images
biblio
Certified Robustness to Adversarial Examples with Differential Privacy
Submitted by aekwall on Mon, 04/20/2020 - 9:31am
machine learning models
privacy models and measurement
Sophisticated Attacks
PixelDP
norm-bounded attacks
machine-learning
ImageNet
Google Inception network
defense
Deep-learning
cryptographically-inspired privacy formalism
certified robustness
certified defense
Adversarial-Examples
adversarial examples
Cryptography
deep neural networks
differential privacy
Predictive models
Measurement
Mathematical model
Databases
neural nets
standards
Robustness
Metrics
pubcrawl
learning (artificial intelligence)
security
data privacy
biblio
Malware Evasion Attack and Defense
Submitted by grigby1 on Tue, 02/18/2020 - 10:53am
malware detection systems
white-box evasion attacks
White Box Security
white box cryptography
Training data
Training
security
Resiliency
resilience
pubcrawl
Perturbation methods
pattern classification
ML-based malware detector
ML classifier
Metrics
malware evasion attack
adversarial example
malware
machine learning classifiers
learning (artificial intelligence)
invasive software
grey-box evasion attacks
Evasion Attack
Detectors
defense approaches
defense
Data models
composability
black-box attacks
Adversarial Machine Learning
adversarial examples
file
Sharif_Gen_framework_adv_examples_Bauer.pdf
Submitted by Jamie Presken on Mon, 07/08/2019 - 9:33am
adversarial examples
face recognition
machine learning
Neural networks
2019: July
CMU
Metrics
Resilient Architectures
Safety Critical ML
Securing Safety-Critical Machine Learning Algorithms
biblio
A General Framework for Adversarial Examples with Objectives
Submitted by Jamie Presken on Mon, 07/08/2019 - 9:33am
2019: July
adversarial examples
CMU
face recognition
machine learning
Metrics
Neural networks
Resilient Architectures
Safety Critical ML
Metrics
Resilient Architectures
CMU
Securing Safety-Critical Machine Learning Algorithms
2019: July
biblio
Defending IT Systems against Intelligent Malware
Submitted by grigby1 on Mon, 06/10/2019 - 1:02pm
privacy
malware binaries
malware classification
malware detection
malware families
malware images
malware variants
Metrics
neural nets
Malware Analysis
pubcrawl
resilience
Resiliency
Signatures
static analysis
Training
unsupervised deep neural networks
adversarial examples
malware
machine learning algorithms
machine learning
learning (artificial intelligence)
IT systems
invasive software
intelligent malware
Human behavior
generative adversarial networks
generative adversarial network
Gallium nitride
dynamic analysis
Classification algorithms
ART
Antivirus Software vendors
biblio
Adversarial Product Review Generation with Word Replacements
Submitted by grigby1 on Thu, 02/14/2019 - 10:15am
adversarial examples
composability
fake text detection
Human Factors
Metrics
pubcrawl
Scalability
Security Heuristics
text analytics
text classification
biblio
Adversarial Examples Against Deep Neural Network Based Steganalysis
Submitted by grigby1 on Fri, 02/08/2019 - 3:17pm
policy-based governance
steganography detection
Steganography
steganalysis
security
Science of Security
Scalability
Resiliency
pubcrawl
adversarial examples
Metrics
Human behavior
Deep Neural Network
cyber physical systems
comparability
collaboration
Artificial Neural Networks
biblio
Adversarial Examples for Generative Models
Submitted by grigby1 on Mon, 01/21/2019 - 11:38am
learning (artificial intelligence)
variational techniques
VAE-GAN architecture attacks
vae gan
vae
Training
target generative network
target generative model
Scalability
Resiliency
Receivers
pubcrawl
neural net architectures
neural net architecture
Metrics
machine learning
adversarial example
input data distribution model
image representation
Image reconstruction
Image coding
image classification
Human behavior
Generative Models
deep learning architectures
deep generative models
Decoding
Data models
classifier
classification-based adversaries
Adversary Models
adversarial examples
biblio
Intrusion detection systems vulnerability on adversarial examples
Submitted by grigby1 on Mon, 01/21/2019 - 11:14am
Intrusion Detection Systems
vulnerability detection
Training
security of data
security events
Resiliency
pubcrawl
Neurons
Metrics
intrusion detection systems vulnerability
adversarial examples
Intrusion Detection
Human behavior
Compositionality
Classification algorithms
Biological neural networks
attack vector
anomaly-based intrusion detection
anomaly detection systems ability
Anomaly Detection
« first
‹ previous
1
2
3
next ›
last »