Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
privacy
biblio
Detection of Induced False Negatives in Malware Samples
Submitted by grigby1 on Tue, 09/20/2022 - 2:12pm
privacy
false trust
Zero day Malware
Poisoning Defences
poisoning attacks
Resiliency
Adversarial Machine Learning
Training data
malware
Training
Scalability
Heuristic algorithms
resilience
policy-based governance
pubcrawl
machine learning
Predictive models
biblio
PGAN:A Generative Adversarial Network based Anomaly Detection Method for Network Intrusion Detection System
Submitted by grigby1 on Tue, 09/20/2022 - 1:28pm
real-time systems
Traffic identification
supervised learning
Human Factors
expert systems
Unsupervised Learning
generative adversarial network
generative adversarial networks
network security
Training
intrusion detection system
telecommunication traffic
privacy
Scalability
Human behavior
pubcrawl
Anomaly Detection
biblio
Research of the Innovative Integration of Artificial Intelligence and Vocational Education in the New Ecology of Education
Submitted by grigby1 on Tue, 09/20/2022 - 1:28pm
expert systems
vocational education
top-level strategy
Management information systems
integration
education ecology
Ecology
Human Factors
Decision support systems
Artificial Intelligence
education
innovation
Law
privacy
Scalability
Software
Human behavior
pubcrawl
biblio
Protecting Reward Function of Reinforcement Learning via Minimal and Non-catastrophic Adversarial Trajectory
Submitted by grigby1 on Tue, 09/20/2022 - 1:27pm
Reinforcement learning
reward function
non-catastrophic
expert trajectory
Costs
Human Factors
adversarial attack
expert systems
Clustering algorithms
Predictive models
Prediction algorithms
Measurement
Perturbation methods
privacy
Scalability
Human behavior
pubcrawl
biblio
A Named Entity Recognition Based Approach for Privacy Requirements Engineering
Submitted by grigby1 on Tue, 09/20/2022 - 1:27pm
machine learning
pubcrawl
Human behavior
Conferences
Scalability
privacy
Agile development
named entity recognition
Bridges
requirements engineering
Knowledge engineering
expert systems
Data protection
Human Factors
privacy requirements engineering
user stories
biblio
DDUO: General-Purpose Dynamic Analysis for Differential Privacy
Submitted by grigby1 on Tue, 09/20/2022 - 1:27pm
privacy
machine learning
machine learning algorithms
pubcrawl
Human behavior
Scalability
Libraries
Performance analysis
differential privacy
expert systems
Human Factors
sensitivity analysis
language-based-security
security-and-privacy-aspects-of-machine-learning
biblio
Privacy Protection Method for Experts' Evaluation Ability Calculation of Peer Review
Submitted by grigby1 on Tue, 09/20/2022 - 1:27pm
pubcrawl
Human behavior
Scalability
privacy
data privacy
Information systems
computer security
Perturbation methods
privacy protection
usability
expert systems
Human Factors
Data Perturbation
evaluation ability
peer review
biblio
Privacy Modelling in Contact Tracing
Submitted by grigby1 on Tue, 09/20/2022 - 1:27pm
security
pubcrawl
Human behavior
Scalability
privacy
Protocols
Computational modeling
scientific computing
expert systems
data privacy
Human Factors
COVID-19
Pandemics
Electric potential
Consumer electronics
Deceases
biblio
Privacy Increase in VLC System Based on Hyperchaotic Map
Submitted by grigby1 on Fri, 09/16/2022 - 4:54pm
BER
visible light communications
Hyperchaotic Map
EVM
Bellows
16-QAM
Bit rate
Resiliency
System performance
security
Bit error rate
forward error correction
modulation
composability
privacy
Metrics
pubcrawl
biblio
Trusted Fog Computing for Privacy Smart Contract Blockchain
Submitted by grigby1 on Fri, 09/16/2022 - 4:38pm
encryption
Cloud Computing
security
pubcrawl
resilience
Scalability
privacy
Fog computing
network security
smart contracts
Loss measurement
MPC
privacy computing
Resiliency
blockchains
Block Chain
« first
‹ previous
…
27
28
29
30
31
32
33
34
35
…
next ›
last »