Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
White Box Security
biblio
Black Box Attacks on Explainable Artificial Intelligence(XAI) methods in Cyber Security
Submitted by aekwall on Mon, 03/01/2021 - 3:59pm
security
gradient-based XAI
learning (artificial intelligence)
Metrics
ML models
Predictive models
privacy
pubcrawl
Resiliency
Robustness
Scalability
explainable artificial intelligence methods
security domain
security of data
security-relevant data-sets
threat models
white box
White Box Security
white box setting
xai
XAI methods
composability
adversarial attack
Analytical models
Artificial Intelligence
artificial intelligence security
binary output
black box attack
Black Box Attacks
black box encryption
black box settings
black-box models
predictive security metrics
computer security
cyber security
cybersecurity domain
data analysis
Data models
deep learning
domain experts
exact properties
explainable artificial intelligence
biblio
Adversarial Defense via Learning to Generate Diverse Attacks
Submitted by grigby1 on Fri, 04/17/2020 - 9:58am
neural nets
White Box Security
Training
stochastic generator
security of data
Robustness
Resiliency
resilience
recursive generator
pubcrawl
Perturbation methods
pattern classification
optimization
one-shot perturbation
Neural networks
adversarial defense
Metrics
malicious attacks
machine learning
learning (artificial intelligence)
Generators
deterministic generator
deep neural networks
deep learning
Compositionality
composability
classification performance
black-box attacks
Adversarial training
biblio
Uncertainty-Aware Opinion Inference Under Adversarial Attacks
Submitted by grigby1 on Fri, 04/17/2020 - 9:58am
Robustness
Probabilistic logic
probabilistic model
probabilistic soft logic
probability
Probability density function
PSL
pubcrawl
resilience
Resiliency
possible adversarial attacks
security of data
Silicon
Training
uncertain evidence
uncertainty
uncertainty-aware opinion inference
unknown opinions
white box adversarial attacks
White Box Security
data mining tasks
adversarial collective opinion inference
adversarial evidence
black box adversarial attacks
collective subjective logic
composability
Compositionality
computational complexity
CSL
Data mining
Adv-COI
Data models
Decision Making
highly scalable opinion inference
inference mechanisms
learning (artificial intelligence)
logic-rule based structured data
Metrics
minimax techniques
biblio
Feature Denoising for Improving Adversarial Robustness
Submitted by grigby1 on Fri, 04/17/2020 - 9:58am
image classification systems
White Box Security
security of data
retrieval
Resiliency
resilience
Recognition: Detection
pubcrawl
pattern classification
nonlocal means
network architectures
Metrics
learning (artificial intelligence)
Iterative methods
image denoising
10-iteration PGD white-box attacks
image classification
feature extraction
feature denoising
deep learning
convolutional networks
Compositionality
composability
categorization
black-box attack settings
Adversarial training
Adversarial robustness
adversarial perturbations
adversarial attacks
2000-iteration PGD white-box attacks
biblio
White Box Analysis at the Service of Low Rate Saturation Attacks on Virtual SDN Data Plane
Submitted by grigby1 on Fri, 04/17/2020 - 9:58am
Protocols
White Box Security
white box analysis
virtualisation
Virtual Switches
Virtual Switch
virtual SDN data plane
static code analysis techniques
software switch functionalities
software defined networking
security
SDN
Resiliency
resilience
pubcrawl
Cloud Computing
programmable virtual switches
OpenFlow communication protocol
Metrics
low rate saturation attacks
low rate saturation attack
legacy network protocols
effective low profile attacks
dynamic code analysis techniques
computer network security
computer centres
Compositionality
composability
cloud data center
biblio
Open-TEE is No Longer Virtual: Towards Software-Only Trusted Execution Environments Using White-Box Cryptography
Submitted by grigby1 on Fri, 04/17/2020 - 9:57am
Secure storage
WhiteBox-TEE
white-box cryptography
White Box Security
trusted execution environments
Trusted Execution Environment
tools
telecommunication security
TEE-enabled device
SPACE algorithm
Software algorithms
Software
security properties hardware TEEs
composability
Resiliency
resilience
pubcrawl
Open-TEE
open-source GlobalPlatform-compliant software TEE emulator
Mobile handsets
Metrics
Hardware
GP TEE specifications
Cryptography
Compositionality
biblio
Cross-Domain Secure Sharing of Video Based on White-Box Encryption
Submitted by grigby1 on Fri, 04/17/2020 - 9:57am
composability
Compositionality
encrypted video
key management
Metrics
pubcrawl
resilience
Resiliency
secure sharing
security grading
White Box Security
white-box cryptography theory
biblio
Malware Evasion Attack and Defense
Submitted by grigby1 on Tue, 02/18/2020 - 10:53am
malware detection systems
white-box evasion attacks
White Box Security
white box cryptography
Training data
Training
security
Resiliency
resilience
pubcrawl
Perturbation methods
pattern classification
ML-based malware detector
ML classifier
Metrics
malware evasion attack
adversarial example
malware
machine learning classifiers
learning (artificial intelligence)
invasive software
grey-box evasion attacks
Evasion Attack
Detectors
defense approaches
defense
Data models
composability
black-box attacks
Adversarial Machine Learning
adversarial examples
biblio
Comprehensive Privacy Analysis of Deep Learning: Passive and Active White-Box Inference Attacks against Centralized and Federated Learning
Submitted by grigby1 on Tue, 02/18/2020 - 10:52am
Resiliency
Inference-Attacks
learning (artificial intelligence)
Membership-Inference
Metrics
neural nets
privacy
privacy leakage
pubcrawl
resilience
inference mechanisms
stochastic gradient descent algorithm
Stochastic processes
Stochastic-Gradient-Descent
Training
Training data
white box cryptography
White Box Security
white-box membership inference attacks
data privacy
active white-box inference attacks
black-box attacks
centralized learning
CIFAR dataset
composability
comprehensive privacy analysis
Computational modeling
Data models
active membership inference attacks
deep learning
deep learning models
deep neural networks
Deep-learning
federated learning setting
Federated-Learning
gradient methods
Inference algorithms
biblio
White-Box Cryptography Based Data Encryption-Decryption Scheme for IoT Environment
Submitted by grigby1 on Tue, 02/18/2020 - 10:52am
IoT environment
white-box cryptography based data encryption-decryption scheme
white-box cryptography
White Box Security
white box cryptography
transportation monitoring
symmetric encryptions algorithms
resource constrained environments
Resiliency
resilience
pubcrawl
pedestrian levels
Metrics
medical devices
Matrix decomposition
manufacturing process
advanced encryption standard
IoT devices
Internet of Things
infusion pumps
implanted devices
encryption
encoding
differential attacks
Cryptography
computer network security
composability
code lifting attacks
Ciphers
cipher block chaining mode
CBC mode.
Block Cipher
« first
‹ previous
1
2
3
4
5
next ›
last »