Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
graph neural networks
biblio
Graph Based Transforms based on Graph Neural Networks for Predictive Transform Coding
Submitted by aekwall on Tue, 03/01/2022 - 4:28pm
DCT
Transform coding
Predictive Transform Coding
neural network
mean square error methods
Laplace equations
KLT
GBT NN
GBT L
GBT
GBST
DST
Transforms
Compression
network coding
graph neural networks
Predictive Metrics
Decoding
Artificial Neural Networks
cyber-physical systems
composability
Resiliency
pubcrawl
biblio
Structure-Aware Hierarchical Graph Pooling using Information Bottleneck
Submitted by aekwall on Mon, 01/10/2022 - 12:50pm
attack graphs
Benchmark testing
codes
composability
Data models
graph classification
graph neural networks
Graph Pooling
Information bottleneck
Perturbation methods
Predictive Metrics
pubcrawl
Resiliency
Robustness
Stability analysis
biblio
MLTracer: Malicious Logins Detection System via Graph Neural Network
Submitted by grigby1 on Mon, 03/29/2021 - 1:15pm
Graph Neural Network
security
Scalability
real-time systems
pubcrawl
privacy
malicious logins detection
lateral movement
Human Factors
graph neural networks
Neural Network Security
expert systems
Data mining
convolutional neural networks
Conferences
co-attention mechanism
Metrics
policy-based governance
Resiliency
cyber-physical systems
biblio
Towards Deep Federated Defenses Against Malware in Cloud Ecosystems
Submitted by grigby1 on Fri, 12/11/2020 - 2:33pm
neural nets
machine learning
machine learning models
malware
Malware Analysis
malware containment
malware detection
Malware-Detection-Cloud-Computing-Graph-Neural-Networks-Federated-Learning-Multicloud-Natural-Language-Processing
Metrics
learning (artificial intelligence)
privacy
Privacy Requirements
pubcrawl
resilience
Resiliency
Task Analysis
Training
virtual machines
feature representation
Biological system modeling
Bit error rate
Cloud Computing
cloud computing environments
cloud-specific optimization problems
data privacy
deep federated defenses
feature extraction
attentional sequence models
federated learning
graph neural networks
graph theory
Human behavior
hypergraph learning models
inductive graph
invasive software
biblio
Malware Containment in Cloud
Submitted by grigby1 on Wed, 12/02/2020 - 2:14pm
graph neural networks
Trusted Computing
trust
smart contracts
pubcrawl
protection mechanisms
Privacy-invasive software
malware
invasive software
hyperledger
Human Factors
Human behavior
high risk trust assumptions
graph theory
blockchain
graph analytics
Dominance Frontier
Distributed databases
decentralized malware containment
Cryptography
contracts
containment process
Containment
Computing Theory
cloud computing environments
Cloud Computing
business processes
biblio
Anomaly Detection using Graph Neural Networks
Submitted by grigby1 on Fri, 05/08/2020 - 2:43pm
security of data
Neural networks
pattern classification
pattern clustering
Peer-to-peer computing
policy-based governance
pubcrawl
Resiliency
security
Neural Network Security
social connection graphs
social network
social network statistical measures
social networking (online)
statistical analysis
Twitter
Twitter dataset
Twitter network
email network
Artificial Neural Networks
classification
clustering
Clustering algorithms
collaboration
cyber physical systems
deep learning
deep neural networks
Anomaly Detection
Enron dataset
Graph Neural Network
graph neural networks
graph structure
graph theory
learning (artificial intelligence)
Metrics
neural nets
« first
‹ previous
1
2