Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
AI Poisoning
biblio
Security Analysis of Online Centroid Anomaly Detection
Submitted by grigby1 on Fri, 07/06/2018 - 1:07pm
adversarial
AI Poisoning
Anomaly Detection
computer security
Human behavior
network intrusion detection
pubcrawl
resilience
Resiliency
Scalability
Security analysis
support vector data description
biblio
Mitigating Poisoning Attacks on Machine Learning Models: A Data Provenance Based Approach
Submitted by grigby1 on Fri, 07/06/2018 - 1:06pm
security
pubcrawl
Human behavior
IoT
Scalability
Provenance
resilience
Resiliency
Adversarial Machine Learning
poisoning attacks
causative attacks
internet of the things
AI Poisoning
biblio
Robust Linear Regression Against Training Data Poisoning
Submitted by grigby1 on Fri, 07/06/2018 - 1:06pm
pubcrawl
Human behavior
defense
Scalability
resilience
Resiliency
Adversarial Machine Learning
poisoning attacks
AI Poisoning
biblio
Poisoning Behavioral Malware Clustering
Submitted by grigby1 on Fri, 07/06/2018 - 1:06pm
pubcrawl
Human behavior
Unsupervised Learning
clustering
Scalability
computer security
malware detection
resilience
Security Evaluation
Resiliency
Adversarial Machine Learning
AI Poisoning
biblio
SIN2: Stealth infection on neural network \#x2014; A low-cost agile neural Trojan attack methodology
Submitted by grigby1 on Fri, 07/06/2018 - 1:06pm
neural computing framework
Trojan horses
third-party cloud based machine learning as a service
static neural network model
software algorithm level
SIN2
security
Scalability
Runtime
Resiliency
resilience
pubcrawl
portable DNN computing engine
Payloads
Neural networks
neural nets
AI Poisoning
low-cost modular methodology-stealth infection on neural network
low-cost agile neural Trojan attack methodology
learning (artificial intelligence)
invasive software
Intelligent systems
intelligent supply chain
intelligent service supply chain
Human behavior
dynamic runtime system
DNN security
Deep Neural Network
Computational modeling
Cloud Computing
artificial intelligence industry
biblio
Using k-nearest neighbor method to identify poison message failure
Submitted by grigby1 on Fri, 07/06/2018 - 1:06pm
pubcrawl
unstable network
Toxicology
Telephony
telecommunications networks
telecommunication security
telecommunication network reliability
telecommunication network management
telecommunication computing
System testing
statistical distributions
Scalability
Routing
Resiliency
resilience
AI Poisoning
Protocols
Probability distribution
probabilistic k-nearest neighbor method
poison message failure identification
network fault management
machine learning
learning (artificial intelligence)
Large-scale systems
IP networks
Human behavior
Data mining
control systems
computer science
Computer bugs
biblio
Systematic Poisoning Attacks on and Defenses for Machine Learning in Healthcare
Submitted by grigby1 on Fri, 07/06/2018 - 1:06pm
Resiliency
malware
medical computing
Medical Informatics
models
Neoplasms
patient distress
pattern classification
poisoning attacks
pubcrawl
resilience
malicious data
Scalability
security
security breach
security of data
systematic poisoning attacks
targeted errors
Theoretical
Training
training datasets
health care
Algorithms
application domains
arbitrary errors
biomedicine
computer security
critical decisions
Databases
Factual
false diagnosis prompt users
false positive classification
AI Poisoning
health-related applications
Healthcare
Human behavior
Humans
learning (artificial intelligence)
life-threatening consequences
machine learning
machine learning algorithms
machine-learning algorithms
biblio
L-GEM based robust learning against poisoning attack
Submitted by grigby1 on Fri, 07/06/2018 - 1:05pm
Robustness
poisoning attack
pubcrawl
radial basis function networks
RBFNN
resampling
resilience
Resiliency
robust learning
perturbation techniques
sampling methods
Scalability
Sensitivity
sensitivity analysis
Support vector machines
Training
wavelet analysis
Accuracy
perturbation
Pattern recognition
nearest-first flips attack
Localized Generalization Error Model (L-GEM)
localized generalization error model
localized generalization error bound
learning process
learning (artificial intelligence)
label flip poisoning attacks
L-GEM based robust learning
Human behavior
farthest-first flips attack
classifier output
AI Poisoning
adversarial learning
biblio
The dose makes the poison \#x2014; Leveraging uncertainty for effective malware detection
Submitted by grigby1 on Fri, 07/06/2018 - 1:05pm
Resiliency
Organizations
OS processes
Plan B
potential malware
promising avenue
pubcrawl
received borderline classifications
resilience
malware
Scalability
sensitive information
software execution
Standards organizations
time-consuming
traditional ML detectors
traditional ML methods
uncertain environment
devastating consequences
AI Poisoning
analyzed benign software
behavioral-based malware detectors
Chameleon
CPU-bound software
deep analysis
deep learning models
Detectors
100 malware samples
effective malware detection
Human behavior
I/O-bound software
Interference
invasive software
learning (artificial intelligence)
Linux
biblio
A game-theoretic defense against data poisoning attacks in distributed support vector machines
Submitted by grigby1 on Fri, 07/06/2018 - 1:05pm
Resiliency
machine learning
multi-sensor classification
Nash Equilibrium
networked systems
pattern classification
prediction tasks
pubcrawl
resilience
learning algorithms
resilient DSVM algorithm
Scalability
secure DSVM algorithm
sensor fusion
sensors
Support vector machines
Training
DSVMs
Algorithm design and analysis
Computer crime
control units
data poisoning attacks
defense strategies
distributed algorithms
distributed support vector machines
DSVM learner
AI Poisoning
dynamic distributed algorithms
game theory
game-theoretic defense
game-theoretic framework
Games
Human behavior
learning (artificial intelligence)
« first
‹ previous
1
2
3
4
5
next ›
last »