Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
adversarial example
biblio
Automatic Selection Attacks Framework for Hard Label Black-Box Models
Submitted by aekwall on Tue, 12/20/2022 - 5:21pm
Computational modeling
White Box Security
transferability
substitute model
machine learning
feature extraction
face recognition
estimation
deep learning
Conferences
Black Box Attacks
black-box attack
adversarial example
adversarial attack
Adaptation models
pubcrawl
Metrics
composability
Resiliency
biblio
NASGuard: A Novel Accelerator Architecture for Robust Neural Architecture Search (NAS) Networks
Submitted by grigby1 on Tue, 03/01/2022 - 4:35pm
Accelerator architectures
adversarial example
Computational modeling
deep learning
DNN accelerator
Network Security Architecture
Neural networks
parallel processing
pubcrawl
resilience
Resiliency
Robust NAS network
Robustness
search problems
biblio
Quantifying DNN Model Robustness to the Real-World Threats
Submitted by grigby1 on Tue, 10/12/2021 - 2:48pm
adversarial example
Cameras
Computational modeling
Detectors
Metrics
Neural networks
Perturbation methods
Predictive models
predictive security metrics
pubcrawl
Robustness
Safety
threat severity
biblio
Evaluation of Adversarial Attacks Based on DL in Communication Networks
Submitted by aekwall on Tue, 07/27/2021 - 1:58pm
Resiliency
Metrics
pubcrawl
Perturbation methods
Reliability
information security
Neural networks
testing
Individual Identification
Deep Neural Network
communication security
Communication networks
adversarial example
Black Box Attacks
composability
biblio
Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems
Submitted by grigby1 on Thu, 03/04/2021 - 2:57pm
security of data
network intrusion detection system
Neural networks
noise reduction
pubcrawl
reconstruction from partial observation
resilience
Resiliency
Robustness
network intrusion detection
signature-based NIDS
software defined networking
software-defined network
telecommunication traffic
traffic traversing
Zero day attacks
Zero-day attacks
defense
adversarial example attack
adversarial setting
Anomaly Detection
anomaly-based NIDS
attacks network systems
composability
computer network security
Cyber Attacks
adversarial example
denoising autoencoders
Intrusion Detection Systems
Malicious Traffic
Metrics
Monitoring
network attacks
network function virtualization
biblio
Robustness Analysis of CNN-based Malware Family Classification Methods Against Various Adversarial Attacks
Submitted by grigby1 on Thu, 10/29/2020 - 11:12am
image-based classification methods
security
Robustness
Resiliency
resilience
pubcrawl
privacy
Microsoft malware dataset
Metrics
malware family classification
malware classification
malware
invasive software
input image
imperceptible nonrandom perturbations
adversarial attacks
image colour analysis
Image color analysis
image classification
Human behavior
feature extraction
convolutional neural networks
convolutional neural network-based malware family classification methods
convolutional neural nets
Conferences
CNN-based malware family classification method
CNN-based classification methods
Analytical models
adversarial example
biblio
Novel Defense Method against Audio Adversarial Example for Speech-to-Text Transcription Neural Networks
Submitted by grigby1 on Fri, 03/27/2020 - 11:38am
computer security
speech-to-text transcription neural networks
speech-to-text
speech synthesis
Speech recognition
Sandbox Method
sandbox approach
Neural networks
defense method
Deep Speech
data representation
learning (artificial intelligence)
audio adversarial example
adversarial example
neural nets
sandboxing
composability
deep learning
policy-based governance
pubcrawl
collaboration
security of data
biblio
Malware Evasion Attack and Defense
Submitted by grigby1 on Tue, 02/18/2020 - 11:53am
malware detection systems
white-box evasion attacks
White Box Security
white box cryptography
Training data
Training
security
Resiliency
resilience
pubcrawl
Perturbation methods
pattern classification
ML-based malware detector
ML classifier
Metrics
malware evasion attack
adversarial example
malware
machine learning classifiers
learning (artificial intelligence)
invasive software
grey-box evasion attacks
Evasion Attack
Detectors
defense approaches
defense
Data models
composability
black-box attacks
Adversarial Machine Learning
adversarial examples
biblio
Representation of White- and Black-Box Adversarial Examples in Deep Neural Networks and Humans: A Functional Magnetic Resonance Imaging Study
Submitted by grigby1 on Tue, 02/18/2020 - 11:53am
resilience
Metrics
neural nets
neural network
neurophysiology
Noise
pubcrawl
representation patterns
representational similarity
medical image processing
Resiliency
Task Analysis
vision
visual perception
visual representation
Visual systems
visualization
white box cryptography
DNNs
Biological neural networks
biomedical MRI
black-box adversarial examples
brain
brain-inspired deep neural networks
complex level visual tasks
composability
computer vision
adversarial example
Facial animation
fMRI
Functional magnetic resonance imaging
functional magnetic resonance imaging study
high-level visual tasks
human performance
human vision
human visual system
biblio
Adversarial Examples for Generative Models
Submitted by grigby1 on Mon, 01/21/2019 - 12:38pm
learning (artificial intelligence)
variational techniques
VAE-GAN architecture attacks
vae gan
vae
Training
target generative network
target generative model
Scalability
Resiliency
Receivers
pubcrawl
neural net architectures
neural net architecture
Metrics
machine learning
adversarial example
input data distribution model
image representation
Image reconstruction
Image coding
image classification
Human behavior
Generative Models
deep learning architectures
deep generative models
Decoding
Data models
classifier
classification-based adversaries
Adversary Models
adversarial examples
1
2
next ›
last »