Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
deep learning models
biblio
Protecting the Intellectual Properties of Digital Watermark Using Deep Neural Network
Submitted by grigby1 on Thu, 07/30/2020 - 1:53pm
ip protection
Watermarking
watermark
Speech recognition
security
Resiliency
resilience
pubcrawl
policy-based governance
ownership verification
neural nets
natural language processing
machine learning
learning (artificial intelligence)
Artificial Intelligence
intellectual property security
intellectual property
industrial property
Image Processing
embedding watermarks
embedded
DNN algorithms
Digital Watermark
Deep Neural Network
deep learning models
counter-watermark attacks
composability
biblio
Improving Deep Learning by Incorporating Semi-automatic Moving Object Annotation and Filtering for Vision-based Vehicle Detection*
Submitted by grigby1 on Fri, 07/03/2020 - 1:16pm
Task Analysis
Object segmentation
pubcrawl
resilience
Resiliency
road vehicles
Scalability
security monitoring systems
semiautomatic moving object annotation
semiautomatic moving object annotation method
street intersection surveillance videos
object detection
tools
traffic engineering computing
Training
Vehicle detection
video analytics applications
video frames
video signal processing
video surveillance
vision-based vehicle detection
deep learning you-only-look-once model
automatic foreground object extraction
big image data
computer vision
data augmentation
Data models
dataset construction
deep learning
deep learning models
deep learning neural networks
artifactual data
deep video
feature extraction
human-in-the-loop quick selection
image annotation
image filtering
image motion analysis
learning (artificial intelligence)
Metrics
neural nets
biblio
Adversarial Video Captioning
Submitted by grigby1 on Fri, 07/03/2020 - 1:15pm
targeted attacks
adversarial video captioning
cosine similarity
deep learning models
image captioning attack
image captioning attacks
image domain
Streaming media
target captions
targeted
adversarial machine learning techniques
video captioning
video captioning model
video captioning task
video domain
video playback quality
video stream
video streaming
deep video
machine learning
Scalability
computer architecture
Task Analysis
pubcrawl
Metrics
Resiliency
resilience
Force
learning (artificial intelligence)
security of data
deep learning
optimization
computer vision
Perturbation methods
video signal processing
adversarial
adversarial attack
Adversarial Machine Learning
biblio
Comprehensive Privacy Analysis of Deep Learning: Passive and Active White-Box Inference Attacks against Centralized and Federated Learning
Submitted by grigby1 on Tue, 02/18/2020 - 11:52am
Resiliency
Inference-Attacks
learning (artificial intelligence)
Membership-Inference
Metrics
neural nets
privacy
privacy leakage
pubcrawl
resilience
inference mechanisms
stochastic gradient descent algorithm
Stochastic processes
Stochastic-Gradient-Descent
Training
Training data
white box cryptography
White Box Security
white-box membership inference attacks
data privacy
active white-box inference attacks
black-box attacks
centralized learning
CIFAR dataset
composability
comprehensive privacy analysis
Computational modeling
Data models
active membership inference attacks
deep learning
deep learning models
deep neural networks
Deep-learning
federated learning setting
Federated-Learning
gradient methods
Inference algorithms
biblio
Deep in the Dark - Deep Learning-Based Malware Traffic Detection Without Expert Knowledge
Submitted by grigby1 on Thu, 01/02/2020 - 2:41pm
machine learning-based systems
Training
telecommunication traffic
Scalability
robust network security systems
raw-traffic feature representations
Raw Measurements
pubcrawl
privacy
pattern classification
networking attacks
network traffic
network security applications
malware network traffic
malware detection
malware
Expert Systems and Privacy
learning (artificial intelligence)
invasive software
Human Factors
feature extraction
expert systems
expert handcrafted features
deep learning-based malware traffic detection
deep learning models
deep learning
Data models
computer network security
computer architecture
classification
Analytical models
Human behavior
biblio
Deep Explanation Model for Facial Expression Recognition Through Facial Action Coding Unit
Submitted by aekwall on Mon, 12/30/2019 - 12:11pm
emotion classes
facial recognition
nonverbal emotional communication method
machine learning tasks
Justification
Hidden Markov models
Gold
FER tasks
facial muscle movements
facial expression recognition
facial action coding units
facial action coding unit
Facial Action Coding System
face recognition
Explanation Model
emotion recognition
Task Analysis
deep learning models
deep explanation model
CNN model
CK+ Dataset
deep learning
convolutional neural network model
convolutional neural nets
Metrics
Computational modeling
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
feature extraction
biblio
Research of Classical Machine Learning Methods and Deep Learning Models Effectiveness in Detecting Anomalies of Industrial Control System
Submitted by grigby1 on Mon, 06/10/2019 - 1:56pm
resilience
machine learning algorithms
machine learning methods
modern industrial control systems
neural nets
Neural networks
privacy
production engineering computing
pubcrawl
machine learning
Resiliency
security
security of data
signal correlations
Support vector machines
Tennessee Eastman process simulation data
Training
Anomaly Detection
linear algorithms
learning (artificial intelligence)
industrial process anomaly detection task
industrial control
ICS security
ICs
Feeds
deep learning models
deep learning
Decision trees
Data processing
Cyber Attacks
control engineering computing
composability
anomaly detection evaluation dataset
biblio
The dose makes the poison \#x2014; Leveraging uncertainty for effective malware detection
Submitted by grigby1 on Fri, 07/06/2018 - 2:05pm
Resiliency
Organizations
OS processes
Plan B
potential malware
promising avenue
pubcrawl
received borderline classifications
resilience
malware
Scalability
sensitive information
software execution
Standards organizations
time-consuming
traditional ML detectors
traditional ML methods
uncertain environment
devastating consequences
AI Poisoning
analyzed benign software
behavioral-based malware detectors
Chameleon
CPU-bound software
deep analysis
deep learning models
Detectors
100 malware samples
effective malware detection
Human behavior
I/O-bound software
Interference
invasive software
learning (artificial intelligence)
Linux
« first
‹ previous
1
2