Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
White Box Security
biblio
Securing Deep Spiking Neural Networks against Adversarial Attacks through Inherent Structural Parameters
Submitted by aekwall on Mon, 01/31/2022 - 3:13pm
analysis
White Box Security
Threshold voltage
structural engineering
Spiking Neural Networks
SNN
Problem-solving
parameters
Neuromorphic
Firing
security
adversarial attacks
composability
Resiliency
Metrics
pubcrawl
optimization
machine learning
deep learning
Robustness
biblio
Analysis of public-key cryptography using a 3-regular graph with a perfect dominating set
Submitted by aekwall on Mon, 01/31/2022 - 3:13pm
NP-hard problem
White Box Security
Resiliency
quantum computing
Pur
public-key cryptography
public key cryptography
pubcrawl
performance evaluation
perfect dominating set
white box cryptography
NP-complete
NIST
minus dominating function
encryption
Computers
3-regular graph
Metrics
resilience
composability
biblio
Generating Audio Adversarial Examples with Ensemble Substituted Models
Submitted by aekwall on Mon, 01/31/2022 - 3:12pm
Speech recognition
machine learning
Conferences
pubcrawl
Metrics
Resiliency
composability
automatic speech recognition
Stability analysis
genetic algorithm
black-box attack
White Box Security
biblio
A White-Box Decision Tree-Based Preventive Strategy for Real-Time Islanding Detection Using Wide-Area Phasor Measurement
Submitted by aekwall on Mon, 01/31/2022 - 3:12pm
Reliability
real-time systems
pubcrawl
Metrics
Resiliency
composability
Rotors
Generators
Decision trees
power system stability
Decision tree-based strategy
Islanding
power system dynamic security
power system reliability
wide-area phasor measurement systems
White Box Security
biblio
Beating White-Box Defenses with Black-Box Attacks
Submitted by aekwall on Mon, 01/31/2022 - 3:12pm
Neural networks
deep learning
Perturbation methods
feature extraction
pubcrawl
Metrics
Resiliency
composability
adversarial attacks
Evolutionary algorithms
White Box Security
biblio
White-Box Analysis over Machine Learning: Modeling Performance of Configurable Systems
Submitted by aekwall on Mon, 01/31/2022 - 3:11pm
Analytical models
Buildings
Compositionality
composability
Current measurement
dynamic analysis
machine learning
Metrics
Open Source Software
Performance influence modeling
pubcrawl
Resiliency
Software configuration
software engineering
Stakeholders
White Box Security
biblio
The Vulnerability of the Neural Networks Against Adversarial Examples in Deep Learning Algorithms
Submitted by aekwall on Mon, 01/31/2022 - 3:11pm
security
Neural networks
deep learning
pubcrawl
Metrics
Resiliency
composability
Classification algorithms
computer vision
natural language processing
data science
adversarial examples
black box
white box
White Box Security
biblio
An Efficient Structural Analysis of SAS and its Application to White-Box Cryptography
Submitted by aekwall on Mon, 01/31/2022 - 3:11pm
Resiliency
white-box
White Box Security
Time complexity
Table lookup
Synthetic aperture sonar
structural analysis
security
SAS strcuture
white box cryptography
pubcrawl
IEEE Regions
encryption
Cryptography
Metrics
resilience
composability
biblio
Adversarial Attack on Fake-Faces Detectors Under White and Black Box Scenarios
Submitted by aekwall on Mon, 01/31/2022 - 3:11pm
Detectors
White Box Security
white-box
forensic models
Faked faces
black-box
adversarial attack
Forensics
Generators
security
generative adversarial networks
composability
Resiliency
Metrics
pubcrawl
Conferences
feature extraction
biblio
Implementation White-Box Cryptography for Elliptic Curve Cryptography
Submitted by aekwall on Mon, 01/31/2022 - 3:10pm
white box cryptography
composability
resilience
Metrics
Elliptic curve cryptography
embedded computing
encryption
information processing
information security
Monitoring
Program processors
pubcrawl
Resiliency
White Box Security
white-box cryptography
« first
‹ previous
1
2
3
4
5
next ›
last »