Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Training
biblio
Demo Abstract: Cross-layer Authentication Based on Physical Channel Information using OpenAirInterface
Submitted by grigby1 on Tue, 05/25/2021 - 2:19pm
Cross Layer Security
authentication
Communication system security
composability
cross-layer authentication mechanism
fingerprint map
Fingerprint recognition
Long Term Evolution
OAI
pubcrawl
resilience
Resiliency
Training
Wireless communication
biblio
Encryption Inspired Adversarial Defense For Visual Classification
Submitted by grigby1 on Thu, 05/20/2021 - 11:55am
encryption
Training
machine learning
pubcrawl
Metrics
resilience
Resiliency
composability
Perturbation methods
computer vision
Transforms
Adversarial Machine Learning
adversarial defense
perceptual image encryption
white box cryptography
biblio
Black-box Attacks on DNN Classifier Based on Fuzzy Adversarial Examples
Submitted by grigby1 on Thu, 05/20/2021 - 11:53am
fuzzy adversarial examples
white box cryptography
Training
security
resilience
pubcrawl
Knowledge engineering
Image Processing
generative adversarial networks
Black Box Attacks
functionally equivalent network
Entropy
deep learning
black-box attack
Resiliency
Metrics
composability
biblio
An Efficient Vulnerability Extrapolation Using Similarity of Graph Kernel of PDGs
Submitted by aekwall on Tue, 05/18/2021 - 3:21pm
feature extraction
Resiliency
Human behavior
pubcrawl
privacy
Metrics
vulnerability detection
Labeling
Training
Compositionality
Open Source Software
Graph Kernel
supervised learning
extrapolation
program dependence graph
vulnerability extrapolation
biblio
An Empirical Study of High-Impact Factors for Machine Learning-Based Vulnerability Detection
Submitted by aekwall on Tue, 05/18/2021 - 3:18pm
Software
machine learning algorithms
feature extraction
Resiliency
Human behavior
pubcrawl
machine learning
Metrics
tools
Training
vulnerability detection
deep learning
Compositionality
Comparative Study
biblio
Adversarial Attacks on GMM I-Vector Based Speaker Verification Systems
Submitted by grigby1 on Thu, 05/13/2021 - 12:22pm
Degradation
x-vector
speaker verification
GMM i-vector
Gaussian mixture model
adversarial attack
measurement uncertainty
speech processing
Attack vectors
signal processing
Error analysis
Scalability
Resiliency
resilience
Human behavior
pubcrawl
Training
biblio
Identification of Smart Grid Attacks via State Vector Estimator and Support Vector Machine Methods
Submitted by grigby1 on Thu, 05/13/2021 - 12:20pm
Attack vectors
Cyber Attacks
Human behavior
machine learning
power systems
pubcrawl
Reliability
resilience
Resiliency
Scalability
Smart Grid
Smart Grids
state estimator
Support vector machines
Topology
Training
biblio
Weapon Detection using Artificial Intelligence and Deep Learning for Security Applications
Submitted by grigby1 on Thu, 05/13/2021 - 11:58am
Weapons
weapon detection
SSD
Faster RCNN
Communication Systems
CCTV
object detection
computer vision
artificial intelligence security
Artificial Intelligence (AI)
Training
graphics processing units
testing
composability
Conferences
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Bank Financial Innovation and Computer Information Security Management Based on Artificial Intelligence
Submitted by grigby1 on Thu, 05/13/2021 - 11:57am
Training
information security
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Big Data
composability
computer security
Artificial Intelligence
Technological innovation
artificial intelligence security
standardization
Bank financial innovation
information security management
biblio
Deep Learning for Threat Actor Attribution from Threat Reports
Submitted by aekwall on Thu, 05/13/2021 - 11:47am
malware
Task Analysis
Data models
Human behavior
pubcrawl
composability
deep learning
classification
Metrics
Training
attribution
threat intelligence
signal processing
Semantics
threat actor
« first
‹ previous
…
35
36
37
38
39
40
41
42
43
…
next ›
last »