Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Extraction
biblio
Adversarial Biometric Recognition : A review on biometric system security from the adversarial machine-learning perspective
Submitted by Katie Dey on Mon, 08/06/2018 - 12:27pm
face spoofing attack
Signal processing algorithms
security
Pattern recognition
machine-learning
machine learning algorithms
machine learning
learning (artificial intelligence)
image recognition
feature extraction
adaptive face-recognition system
Extraction
biometrics (access control)
biometric systems
biometric system security
biometric security
biometric recognition systems
Behavioral science
adversarial biometric recognition
Cognitive Security
Articles of Interest
Extraction
C3E 2019
biblio
Towards Making Systems Forget with Machine Unlearning
Submitted by Katie Dey on Mon, 08/06/2018 - 12:24pm
learning (artificial intelligence)
usability perspective
Training data
summation form
statistical query learning
security perspective
security of data
recommender systems
recommendation engine
privacy risks
machine unlearning
machine learning algorithms
Learning systems
Adversarial Machine Learning
forgetting systems
Forgetting System
Feature Selection
feature modeling
feature extraction
Extraction
data privacy
Data models
data lineage
Computational modeling
complex data propagation network
Cognitive Security
Articles of Interest
Extraction
C3E 2019
biblio
Adversarial Machine Learning in Malware Detection: Arms Race between Evasion Attack and Defense
Submitted by Katie Dey on Mon, 08/06/2018 - 12:23pm
feature manipulations
Windows application programming interface calls
Windows API calls
security regularization term
secure-learning paradigm
SecDefender
portable executable files
PE files
pattern classification
malware detection
malware
learning-based classifier
learning (artificial intelligence)
invasive software
Adversarial Machine Learning
feature extraction
Extraction
EvnAttack
evasion cost
evasion attack model
Evasion Attack and Defense
Data models
Data mining
computer security
Comodo cloud security center
classifier retraining technique
application program interfaces
Cognitive Security
Articles of Interest
Extraction
C3E 2019