Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Robustness
biblio
Perceptually Transparent Robust Audio Watermarking Algorithm Using Multi Resolution Decomposition Cordic QR Decomposition
Submitted by grigby1 on Fri, 07/03/2020 - 4:54pm
information security
Watermarking
Signal to noise ratio
Signal resolution
Signal processing algorithms
Robustness
robust audio watermarking algorithm
pubcrawl
perceptual transparency
Payloads
multiresolution decomposition
Multi Resolution Decomposition
Metrics
audio coding
embedded watermark
digital watermarking
decomposition
data hiding
cyber physical systems
cordic QR decomposition
Compositionality
binary data embedding capacity
AWGN
audio watermarking
audio signal processing attacks
biblio
Dynamic Threshold Design Based on Kalman Filter in Multiple Fault Diagnosis
Submitted by aekwall on Mon, 05/18/2020 - 10:48am
aircraft engine
uncertain systems
time domain response range calculation formula
state space equation
sensitivity requirements
Kalman filter
isolation systems
dynamic threshold range changes
dynamic threshold design
dynamic threshold algorithm
dynamic threshold
diagnosis system
current methods
constant threshold
bounded norm uncertainty
aircraft engine fault detection
Resiliency
aerospace engines
multiple fault diagnosis
fault diagnosis
Eigenvalues and eigenfunctions
Kalman filters
Time factors
Human Factors
Engines
cyber physical systems
uncertainty
Mathematical model
Robustness
robust control
Metrics
pubcrawl
biblio
Certified Robustness to Adversarial Examples with Differential Privacy
Submitted by aekwall on Mon, 04/20/2020 - 10:31am
machine learning models
privacy models and measurement
Sophisticated Attacks
PixelDP
norm-bounded attacks
machine-learning
ImageNet
Google Inception network
defense
Deep-learning
cryptographically-inspired privacy formalism
certified robustness
certified defense
Adversarial-Examples
adversarial examples
Cryptography
deep neural networks
differential privacy
Predictive models
Measurement
Mathematical model
Databases
neural nets
standards
Robustness
Metrics
pubcrawl
learning (artificial intelligence)
security
data privacy
biblio
Adversarial Defense via Learning to Generate Diverse Attacks
Submitted by grigby1 on Fri, 04/17/2020 - 10:58am
neural nets
White Box Security
Training
stochastic generator
security of data
Robustness
Resiliency
resilience
recursive generator
pubcrawl
Perturbation methods
pattern classification
optimization
one-shot perturbation
Neural networks
adversarial defense
Metrics
malicious attacks
machine learning
learning (artificial intelligence)
Generators
deterministic generator
deep neural networks
deep learning
Compositionality
composability
classification performance
black-box attacks
Adversarial training
biblio
Uncertainty-Aware Opinion Inference Under Adversarial Attacks
Submitted by grigby1 on Fri, 04/17/2020 - 10:58am
Robustness
Probabilistic logic
probabilistic model
probabilistic soft logic
probability
Probability density function
PSL
pubcrawl
resilience
Resiliency
possible adversarial attacks
security of data
Silicon
Training
uncertain evidence
uncertainty
uncertainty-aware opinion inference
unknown opinions
white box adversarial attacks
White Box Security
data mining tasks
adversarial collective opinion inference
adversarial evidence
black box adversarial attacks
collective subjective logic
composability
Compositionality
computational complexity
CSL
Data mining
Adv-COI
Data models
Decision Making
highly scalable opinion inference
inference mechanisms
learning (artificial intelligence)
logic-rule based structured data
Metrics
minimax techniques
biblio
Towards Understanding Limitations of Pixel Discretization Against Adversarial Attacks
Submitted by grigby1 on Tue, 02/18/2020 - 11:52am
neural nets
white-box attacks
white box cryptography
Training
Robustness
Resiliency
resilience
pubcrawl
preprocessing defense methods
preprocessing defense
pixel discretization defense method
pixel discretization
Perturbation methods
Neural networks
adversarial attacks
MNIST
Metrics
Measurement
machine learning
low computational overhead
ImageNet
Image Processing
deep learning
Data models
Cryptography
composability
Artificial Neural Networks
biblio
An Improved Video Steganography: Using Random Key-Dependent
Submitted by grigby1 on Mon, 02/10/2020 - 11:42am
privacy
video signal processing
video recording
video frames RGB channels
steganography performance criteria
steganography detection
Steganography
security
secret text
secret data hiding
Robustness
Random Key -Dependent Data
quality assessment
pubcrawl
composability
nonsecret digital carrier
Metrics
Media
information technology
information insurance
improved video steganography
Image edge detection
image colour analysis
Hiding information and Key-Dependent Data Technique
Exact Matching Algorithm
current communications channels insurance advancements
cover media
file
Safe Learning in Co-robots--Theory, Experiments and Education
Submitted by francesco on Thu, 01/09/2020 - 5:59pm. Contributors:
Francesco Borrelli
Benjamin Rechtand
Koushil Sreenath
Safety
personalization
control
dynamics
learning
Robustness
Locomotion
Posters
1931853
CPS PI Meeting 2020
2020
NSF
U.S. Government
Poster
biblio
Deep-Reinforcement Learning Multiple Access for Heterogeneous Wireless Networks
Submitted by grigby1 on Thu, 12/05/2019 - 10:52am
resilience
neural nets
Neural networks
optimal MAC strategy
Policy
Policy Based Governance
policy governance
prior knowledge
pubcrawl
radio networks
network layers
Resiliency
Robustness
share spectrum
telecommunication computing
time division multiple access
time-slotted networks
traditional reinforcement learning
universal MAC protocol
wireless networks
DRL algorithmic framework
clean-slate design
collaboration
convergence
DARPA SC2
deep reinforcement learning
deep-reinforcement learning multiple access
design framework
DLMA
DRL agent
clean slate
heterogeneous wireless networks
Human behavior
Human Factors
learning (artificial intelligence)
MAC design
machine learning
machine-learning technique
Media Access Protocol
Metrics
biblio
Digital Watermarking for Relational Database Security Using mRMR Based Binary Bat Algorithm
Submitted by aekwall on Mon, 11/04/2019 - 11:22am
mRMR based binary bat algorithm
data protection issues
data tempering attacks
Database-security
deletion attacks
evolutionary computation
evolutionary technique
feature-subset-selection
insertion attacks
data accuracy
mRMR based feature subset selection technique
numerical relational database
relational data
relational database security
reversible watermarking
security protection
watermark creation
security of data
constraints optimization technique
Constraint optimization
binary-bat-algorithm
alteration attacks
relational databases
digital watermarking
Watermarking
Clustering algorithms
Robustness
Metrics
composability
pubcrawl
Human behavior
Resiliency
data integrity
« first
‹ previous
…
12
13
14
15
16
17
18
19
20
…
next ›
last »