Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
ML models
biblio
Black Box Attacks on Explainable Artificial Intelligence(XAI) methods in Cyber Security
Submitted by aekwall on Mon, 03/01/2021 - 4:59pm
security
gradient-based XAI
learning (artificial intelligence)
Metrics
ML models
Predictive models
privacy
pubcrawl
Resiliency
Robustness
Scalability
explainable artificial intelligence methods
security domain
security of data
security-relevant data-sets
threat models
white box
White Box Security
white box setting
xai
XAI methods
composability
adversarial attack
Analytical models
Artificial Intelligence
artificial intelligence security
binary output
black box attack
Black Box Attacks
black box encryption
black box settings
black-box models
predictive security metrics
computer security
cyber security
cybersecurity domain
data analysis
Data models
deep learning
domain experts
exact properties
explainable artificial intelligence
biblio
Generative Adversarial Networks For Launching and Thwarting Adversarial Attacks on Network Intrusion Detection Systems
Submitted by grigby1 on Tue, 12/01/2020 - 1:48pm
intrusion detection system
Robustness
Resiliency
resilience
pubcrawl
Probes
Perturbation methods
network security suite
network intrusion detection systems
ML-based IDS
ML models
malware
malicious network traffic
malicious intrusions
adversarial attacks thwarting
IDS
generative adversarial networks
gan
Gallium nitride
feature extraction
computer network security
composability
anomalous traffic
adversary
adversarial perturbations
adversarial ML attack
Adversarial Machine Learning
biblio
Synonym-based Attack to Confuse Machine Learning Classifiers Using Black-box Setting
Submitted by grigby1 on Fri, 09/04/2020 - 4:11pm
machine learning algorithms
ML models
black-box setting
black-box attack
Blogs
bot tweets
bots
convolutional neural network
deep learning classifiers
testing
machine learning classifiers
ML-based bot detection algorithms
ML-based models
popular content sharing platform
supervised learning
synonym-based attack
vulnerability constraints
Black Box Security
Resiliency
computer network security
invasive software
feature extraction
social networking (online)
Artificial Intelligence
pubcrawl
composability
Metrics
Cryptography
resilience
pattern classification
Training
learning (artificial intelligence)
machine learning
deep learning
Predictive models
biblio
PRADA: Protecting Against DNN Model Stealing Attacks
Submitted by aekwall on Mon, 08/03/2020 - 10:38am
nontargeted adversarial examples
Adversarial Machine Learning
API queries
confidentiality protection
DNN model extraction attacks
DNN model stealing attacks
machine learning applications
ML models
model extraction attacks
model stealing
model extraction
PRADA
prediction accuracy
prediction API
prior model extraction attacks
stolen model
transferable adversarial examples
well-defined prediction APIs
Adversary Models
Neural networks
Scalability
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
Computational modeling
Metrics
neural nets
security of data
query processing
Business
Training
Mathematical model
Data mining
Predictive models
Deep Neural Network
application program interfaces
biblio
Adversarial Machine Learning Attack on Modulation Classification
Submitted by grigby1 on Fri, 07/03/2020 - 5:05pm
modulation
Task Analysis
Support vector machines
Signal to noise ratio
security of data
Scalability
Robustness
Resiliency
resilience
pubcrawl
Perturbation methods
pattern classification
Modulation classification
Adversarial Machine Learning
ML-based modulation classifiers
ML-based modulation classification methods
ML models
Mathematical model
learning (artificial intelligence)
Human behavior
Deterrence
cognitive self-driving networks
Carlini & Wagner attack
adversarial ML examples
adversarial machine learning attack