Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
MNIST
biblio
Nested Pipeline Hardware Self-Organizing Map for High Dimensional Vectors
Submitted by aekwall on Mon, 03/22/2021 - 12:10pm
neural net architecture
fully parallel computation
high dimensional vectors
homogeneous modular structure
low-dimensional vectors
multiple clocks
nested architecture
nested pipeline hardware self-organizing map
neural chips
frequency 60.0 MHz
operable clock frequency
original nested SOM
pipeline computation
Self-Organizing Map
sequential computation
single vector
VHDL
weight vector update
Pipelines
FPGA
Hardware
computer architecture
Resiliency
pubcrawl
Neurons
clustering
Vectors
field programmable gate arrays
expandability
Compositionality
Clocks
pipeline processing
MNIST
self-organising feature maps
Self-organizing feature maps
biblio
Selective Poisoning Attack on Deep Neural Network to Induce Fine-Grained Recognition Error
Submitted by aekwall on Mon, 08/10/2020 - 9:36am
MNIST
Training data
Training
Support vector machines
Speech recognition
selective poisoning attack
security of data
Resiliency
pubcrawl
policy-based governance
poisoning attack
Pattern recognition
nuclear facilities
Neurons
Neural networks
neural nets
AI Poisoning
malicious training data
machine learning library
machine learning
learning (artificial intelligence)
image recognition
fine-grained recognition error
DNN training process
DNN security
distortion
Deep Neural Network
Data models
cyber physical systems
CIFAR10
chosen class
Artificial Neural Networks
biblio
Towards Understanding Limitations of Pixel Discretization Against Adversarial Attacks
Submitted by grigby1 on Tue, 02/18/2020 - 10:52am
neural nets
white-box attacks
white box cryptography
Training
Robustness
Resiliency
resilience
pubcrawl
preprocessing defense methods
preprocessing defense
pixel discretization defense method
pixel discretization
Perturbation methods
Neural networks
adversarial attacks
MNIST
Metrics
Measurement
machine learning
low computational overhead
ImageNet
Image Processing
deep learning
Data models
Cryptography
composability
Artificial Neural Networks