Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
White Box Security
biblio
Defense Against Adversarial Attacks Using High-Level Representation Guided Denoiser
Submitted by aekwall on Wed, 01/16/2019 - 1:10pm
Predictive models
resilience
pubcrawl
Metrics
composability
Training
Adaptation models
Neural networks
Perturbation methods
Image reconstruction
noise reduction
White Box Security
biblio
Fooling End-To-End Speaker Verification With Adversarial Examples
Submitted by aekwall on Wed, 01/16/2019 - 1:10pm
adversarial examples
White Box Security
YOHO
original speaker examples
NTIMIT
MFCC
Mel frequency cepstral coefficient
fooling end-to-end speaker verification
end-to-end deep neural models
deep end-to-end network
black-box attacks
automatic speaker verification systems
Automatic speaker verification
security of data
Perturbation methods
Neural networks
neural nets
Task Analysis
Training
speaker recognition
composability
Metrics
pubcrawl
resilience
standards
biblio
Audio Adversarial Examples: Targeted Attacks on Speech-to-Text
Submitted by aekwall on Wed, 01/16/2019 - 1:10pm
automatic speech recognition
White Box Security
white-box iterative optimization-based attack
targeted audio adversarial examples
targeted attacks
speech-to-text
Probability distribution
neural network
Mozilla implementation DeepSpeech end
Iterative methods
Distortion measurement
distortion
security of data
audio waveform
adversarial example
Perturbation methods
Neural networks
Speech recognition
composability
Metrics
pubcrawl
resilience
optimisation
biblio
Black-Box Generation of Adversarial Text Sequences to Evade Deep Learning Classifiers
Submitted by aekwall on Wed, 01/16/2019 - 1:10pm
sentiment analysis
Perturbation methods
Prediction algorithms
program debugging
pubcrawl
real-world text datasets
Recurrent neural networks
resilience
scoring strategies
pattern classification
Task Analysis
text analysis
text classification
text input
text perturbations
White Box Security
word embedding
adversarial samples
misclassification
Metrics
machine learning
learning (artificial intelligence)
IMDB movie reviews
Enron spam emails
DeepWordBug
deep learning classifiers
deep learning
composability
character-level transformations
black-box generation
black-box attack
black box attack
adversarial text sequences
biblio
Adversarial Examples Construction Towards White-Box Q Table Variation in DQN Pathfinding Training
Submitted by aekwall on Wed, 01/16/2019 - 1:10pm
Pathfinding
White-box Q table variation
White-Box attack
White Box Security
Training
Task Analysis
security
robots
robotic automatic pathfinding application
resilience
research hotspot
representative Deep Q Network algorithm
pubcrawl
Prediction algorithms
adversarial examples
optimal path finding
Metrics
machine learning
learning (artificial intelligence)
DQN pathfinding training
DQN algorithm attack
DQN
deep reinforcement learning
countermeasure application scenario
composability
Artificial Intelligence
adversarial samples
adversarial examples construction
biblio
Multi-objective Black-box Test Case Selection for Cost-effectively Testing Simulation Models
Submitted by aekwall on Wed, 01/16/2019 - 1:09pm
resilience
pubcrawl
Metrics
composability
search-based testing
simulation models
test selection
White Box Security
biblio
Stochastic Substitute Training: A Gray-box Approach to Craft Adversarial Examples Against Gradient Obfuscation Defenses
Submitted by aekwall on Wed, 01/16/2019 - 1:09pm
resilience
pubcrawl
Metrics
composability
adversarial example
gradients obfuscation
gray-box attack
substitute training
White Box Security
biblio
DryVR 2.0: A Tool for Verification and Controller Synthesis of Black-box Cyber-physical Systems
Submitted by aekwall on Wed, 01/16/2019 - 1:09pm
resilience
pubcrawl
Metrics
composability
White Box Security
biblio
Explanation Mining: Post Hoc Interpretability of Latent Factor Models for Recommendation Systems
Submitted by aekwall on Wed, 01/16/2019 - 1:09pm
association rules
black-box
composability
Explanations
interpretability
latent factor models
Metrics
pubcrawl
recommendation systems
resilience
White Box Security
white-box
« first
‹ previous
1
2
3
4
5