Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
machine learning model
biblio
Fooling A Deep-Learning Based Gait Behavioral Biometric System
Submitted by grigby1 on Thu, 03/04/2021 - 2:34pm
Metrics
FGSM
FGSM iterations
gait behavioral biometrics
gradient methods
LSTM
machine learning algorithms
machine learning model
mature techniques
fast gradient sign method
privacy
pubcrawl
resilience
Resiliency
shadow model
Training
user behavioral information
white-box attacks
black-box attack
white box
security
adversarial learning attacks
Adversarial Machine Learning
authentication
authorisation
Biological system modeling
biometrics (access control)
White Box Security
Classification algorithms
composability
counter spoofing threats
deep learning (artificial intelligence)
Deep-learning
deep-learning based gait behavioral biometric system
end-user devices
extent FGSM
biblio
Fidelity: Towards Measuring the Trustworthiness of Neural Network Classification
Submitted by aekwall on Mon, 12/07/2020 - 12:32pm
pattern classification
security-critical tasks
neural network system
neural network classification
adversarial settings
adversarial attack detection
adversarial examples
Perturbation methods
trustworthiness
machine learning model
machine learning
security of data
Neural networks
neural nets
Statistics
Sociology
Computational modeling
composability
pubcrawl
learning (artificial intelligence)
Trusted Computing
Task Analysis
biblio
AutoAttacker: A reinforcement learning approach for black-box adversarial attacks
Submitted by grigby1 on Fri, 09/04/2020 - 4:10pm
adversarial-machine-learning
Black Box Security
white-box access
reinforcement-learning
Reinforcement learning
perturbed inputs
classifier attack
black-box-attack
black-box model
black-box adversarial attacks
AutoAttacker
Cryptography
adversarial example discovery
machine learning model
learning (artificial intelligence)
Data mining
pattern classification
resilience
Resiliency
Metrics
composability
pubcrawl
biblio
Query-Efficient Black-Box Attack by Active Learning
Submitted by aekwall on Mon, 07/20/2020 - 10:55am
Jacobian matrices
white box cryptography
white-box attack methods
white-box attack approaches
query-efficient black-box attack
query efficiency
generated adversarial examples
CIFAR-10 dataset
adversarial attack
active learning strategy
active learning
MNIST dataset
Learning systems
Perturbation methods
Cryptography
Deep Neural Network
Entropy
machine learning model
convolutional neural nets
Training
Labeling
query processing
Neural networks
Metrics
composability
pubcrawl
Resiliency
learning (artificial intelligence)
biblio
Predicting and Preventing Malware in Machine Learning Model
Submitted by grigby1 on Thu, 07/09/2020 - 1:57pm
Random Forest
machine learning model
malware prediction
malware prevention
pattern classification
Predictive models
privacy
privacy preserving technique
pubcrawl
machine learning algorithms
random forests
resilience
Resiliency
Scalability
security
support vector machine
Support vector machines
Training
Decision Tree
Algorithm robustness enhancement
Causative attack
Classification algorithms
Compositionality
data deletion
Data models
data privacy
Data Sanitization
AdaBoost
Decision trees
exploratory attack
Human behavior
Human Factors
invasive software
K-nearest-neighbors classifier
KNN classifier
machine learning
biblio
A Honeypot with Machine Learning based Detection Framework for defending IoT based Botnet DDoS Attacks
Submitted by aekwall on Mon, 06/01/2020 - 10:43am
Protocols
learning (artificial intelligence)
machine learning
machine learning model
machine learning techniques
malware
malware detection
Metrics
network security
IoT security
pubcrawl
Resiliency
Scalability
Training
Zero-day attacks
Zero-Day DDoS Attack
zero-day DDoS attacks
Human Factors
Computer crime
computer network security
Data models
DDoS attack detection
detection framework
honey pots
honeypot-based approach
Human behavior
composability
Internet of Things
invasive software
IoT botnet DDoS attacks
IoT Botnets
IoT honeypot
IoT Honeypots
IoT malware
biblio
Machine Learning Models for Activity Recognition and Authentication of Smartphone Users
Submitted by aekwall on Mon, 04/06/2020 - 10:06am
Smartphone Authentication
pattern locks
technological advancements
smartphone users
smartphone embedded sensor data
personal identification numbers
daily physical activity
daily activities
Behavioral biometrics
authentication scheme
Activity Recognition
Scalability
private data
biometrics (access control)
message authentication
machine learning model
smart phones
machine learning
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
biblio
CSPoweR-Watch: A Cyber-Resilient Residential Power Management System
Submitted by aekwall on Mon, 02/10/2020 - 12:06pm
pubcrawl
Intrusion Detection
learning (artificial intelligence)
library call lists
machine learning model
malicious activity
malicious actors
modern energy management systems
performance evaluation
power electronics
PowerWatch
Internet-connected resources
Resiliency
security of data
smart energy management system
Smart Grid
Smart Grid Sensors
Smart Grids
smart power grids
smart-grid
system call tracing
vital information
energy management
bogus sensor data
Compositionality
Computer crime
critical firmware
CSPoweR-Watch
CSPR
cyber-resilient residential power management system
cyber-secure power router
Cyber-security
EMS
Router Systems Security
energy management system (EMS)
energy management systems
energy resources
functional versions
global energy consumption
Hardware
Human Factors
Information analysis
internet
biblio
Classification for Authorship of Tweets by Comparing Logistic Regression and Naive Bayes Classifiers
Submitted by aekwall on Mon, 03/04/2019 - 10:46am
regression analysis
machine learning techniques
Metrics
mobile phone
Naive Bayes
naïve Bayes classifier
pattern classification
pre-processed data
privacy
pubcrawl
Python
machine learning model
security
social computing
social media
social networking (online)
text analysis
text classification
Training
tweets authorship
Twitter
Twitter account
fake news
attribution
authorisation
authorship attribution
authorship attribution techniques
Bayes methods
classification
composability
digital identities
dubious sources
Electronic mail
anonymity
feature extraction
feature vector
Human behavior
human-in-the-loop security center paradigm
learning (artificial intelligence)
logistic regression
logistic regression based classifier
Logistics
machine learning
biblio
Automated Threat Report Classification over Multi-Source Data
Submitted by grigby1 on Mon, 01/21/2019 - 12:37pm
multisource data
Training
threat report documents
Threat report
Standards organizations
security of data
security
Scalability
Resiliency
pubcrawl
pattern classification
Organizations
NLP
natural language processing techniques
natural language processing
advanced persistent threats
Metrics
machine learning model
learning (artificial intelligence)
Human behavior
feature extraction
enterprise system defenders
document handling
defense systems
Data mining
command and control systems
collaboration
business data processing
bias correction
automated threat report classification
1
2
next ›
last »