Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data distribution
biblio
Detecting Adversarial Examples for Network Intrusion Detection System with GAN
Submitted by aekwall on Mon, 03/29/2021 - 11:58am
machine learning
Training
security
Scalability
Resiliency
pubcrawl
Predictive Metrics
neural nets
network intrusion system
network intrusion detection
network and data security
machine learning algorithms
adversarial examples detection
learning (artificial intelligence)
intelligent network intrusion detection system
Generators
generative adversarial networks
Generative Adversarial Learning
gan
defense technology
data distribution
computer network security
bidirectional generative adversarial network
adversarial sample
biblio
The State of the Uniform: Attacks on Encrypted Databases Beyond the Uniform Query Distribution
Submitted by aekwall on Mon, 02/22/2021 - 1:43pm
range queries
uniformly distributed queries
uniform query distribution
support size estimator
skewed query distributions
search-pattern leakage
search tokens
range attack
plaintext values
leakage-abuse attacks
known value reconstruction attacks
known structured encryption schemes
k-NN attack
k-nearest-neighbor queries
first value reconstruction attacks
distribution-agnostic reconstruction attacks
Servers
nearest neighbor search
data distribution
Approximation algorithms
encrypted databases
Histograms
Predictive Metrics
estimation
database management systems
Measurement
Databases
query processing
pubcrawl
nearest neighbour methods
encryption
Cryptography
biblio
Large Scale Mobile and Pervasive Augmented Reality Games
Submitted by grigby1 on Fri, 08/28/2020 - 12:32pm
quality management
multimedia data heterogeneity
network management
network middleware
pervasive augmented reality games
pervasive computing
pervasive entertainment
Pervasive networking
privacy
pubcrawl
multimedia computing
quality of service
resilience
Scalability
security
security of data
service management
telecommunication network management
telecommunication security
ubiquitous computing
entertainment
ad-hoc networking
augmented reality
computer games
consistency
Context-aware services
data distribution
Data replication
Data Security
Dynamic Configuration
Ad hoc networks
gaming
geospatial location
geospatial orientation
Hardware
Human behavior
Large-scale systems
middleware
mobile computing
mobile entertainment
biblio
Explaining Visual Models by Causal Attribution
Submitted by grigby1 on Fri, 08/28/2020 - 12:23pm
factor alteration
visualization
visual models
Rain
pubcrawl
Metrics
machine learning
learning
intervened causal model
image generative models
Human behavior
Generators
feature extraction
attribution
Face
explanation
deep
Data models
data handling
data distribution
counterfactuals
Computational modeling
composability
causal counterfactuals
causal attribution
Causal
biblio
Enhancing Big Data Security using Elliptic Curve Cryptography
Submitted by grigby1 on Fri, 06/26/2020 - 12:55pm
map reduce Hadoop
Servers
security of data
security and privacy
Scalability
Resiliency
resilience
public key cryptography
pubcrawl
Metrics
Big Data
Indium tin oxide
Elliptic curve cryptography
data processing technology
data distribution
data configuration
data analysis
big data security
big data analytics.
biblio
Towards a TRansparent I/O Solution
Submitted by aekwall on Mon, 06/01/2020 - 10:49am
source code
preceding graph
pubcrawl
Regulated I/O
resilience
Resiliency
reusable components
security
security of data
Semantics
software reusability
policy-based governance
source code (software)
storage back-end
storage platforms
Strips
Transparent I/O
transparent I/O solution
Web service scenario security
web services
workload diversity
in-transit processing
complex storage solutions
composability
cost reduction
custom code
data distribution
data lands
encryption
graph chain
In transit engine
application behaviors
infrastructure level
infrastructure setup
infrastructure-related changes
Libraries
Logic gates
management code
metadata
middleware
middleware security
biblio
Defense Against Adversarial Images Using Web-Scale Nearest-Neighbor Search
Submitted by grigby1 on Fri, 05/22/2020 - 2:34pm
adversarial image
Web-scale nearest-neighbor search
Web-scale image database
Visual Reasoning
visual databases
representation learning
nearest-neighbor defense settings
Large Scale Methods
ImageNet
image representation
image manifold
Datasets and Evaluation
data distribution
security of data
nearest neighbor search
convolutional networks
adversarial perturbations
nearest neighbour methods
Measurement
Metrics
deep learning
Big Data
internet
pubcrawl
convolutional neural nets