Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Semantics
biblio
AMDroid: Android Malware Detection Using Function Call Graphs
Submitted by grigby1 on Fri, 12/11/2020 - 2:32pm
learning (artificial intelligence)
structural semantic learning
static analysis
smart phones
Semantics
Resiliency
resilience
pubcrawl
privacy
opcode sequences
mobile operating system
mobile internet
Metrics
Malware Analysis
malware
machine learning
AMDroid
Kernel
invasive software
Human behavior
graph theory
graph kernels
function call graphs
function call graph
feature extraction
FCGs
countless malicious applications
application program interfaces
API calls
Android Malware Detection
Android (operating system)
biblio
Graph Embedding Based Familial Analysis of Android Malware using Unsupervised Learning
Submitted by grigby1 on Fri, 12/11/2020 - 2:32pm
Malware Analysis
Unsupervised Learning
supervised learning
SRA
smart phones
similarity relationships
Semantics
security
Resiliency
resilience
pubcrawl
privacy
pattern clustering
pattern classification
Metrics
malware link network
analytical workload
malware
learning (artificial intelligence)
invasive software
Human behavior
graph theory
graph embedding techniques
graph embedding
GefDroid
feature extraction
familial analysis
Face
detection algorithms
application program interfaces
Android malware
biblio
MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis
Submitted by grigby1 on Fri, 12/11/2020 - 2:31pm
Robustness
Metrics
mobile computing
mobile malware scanning
privacy
program analysis
program diagnostics
pubcrawl
resilience
Resiliency
market-wide malware scanning
semantic features
Semantics
social networking (online)
social-network-based centrality analysis
static analysis
syntax-based features
transformation attacks
zero-day malware including malware samples
graph theory
Android (operating system)
Android malware
Android Malware Detection
API Centrality
fault-tolerant representation
feature extraction
Google-Play app market
graph semantics
Analysis of variance
Human behavior
invasive software
Lightweight feature
lightweight graph-based approach
MalScan
malware
Malware Analysis
Market-wide
biblio
Image Style Transfer in Deep Learning Networks
Submitted by aekwall on Mon, 12/07/2020 - 12:11pm
convolution neural network
Semantics
Painting
Neural networks
learning (artificial intelligence)
images contents
image style transfer
image recognition
Image color analysis
deep learning network development process
deep learning
convolutional neural nets
neural style transfer
computer vision researchers
computer vision
CNN
classical style migration model
artistic styles
ART
pubcrawl
Predictive Metrics
Resiliency
Scalability
biblio
An improved style transfer approach for videos
Submitted by aekwall on Mon, 12/07/2020 - 12:10pm
motion estimation
Videos
video signal processing
style transfer approach
style transfer
shape deformation
Semantics
semantic segmentation
optical flow
occlusion
neural network
Motion segmentation
motion estimation methods
neural style transfer
image sequences
image segmentation
fully convolutional neural network
foreground object segmentation
feedforward neural nets
discontinuous segmentation
Coherence
background object segmentation
pubcrawl
Predictive Metrics
Resiliency
Scalability
biblio
Masked Neural Style Transfer using Convolutional Neural Networks
Submitted by aekwall on Mon, 12/07/2020 - 12:09pm
feature extraction
visualization
visual perceptions
visual perception
visual experiences
VGG-19 model
Technological innovation
Semantics
object detection
masking
masked neural style transfer
Histograms
neural style transfer
face recognition
deep neural networks
convolutional neural networks
convolutional neural nets
content image
Biological neural networks
pubcrawl
Predictive Metrics
Resiliency
Scalability
biblio
A Trust Logic for Pre-Trust Computations
Submitted by aekwall on Mon, 11/23/2020 - 11:37am
Human behavior
human trust
trust logic
subjective logic
social systems
pre-trust computations
logical language
JØsang Subjective Logic
formal languages
computational trust model
computational trust
security of data
formal logic
Semantics
Syntactics
Feeds
uncertainty
social networking (online)
Computational modeling
pubcrawl
Trusted Computing
security
biblio
Policy Text Analysis Based on Text Mining and Fuzzy Cognitive Map
Submitted by grigby1 on Fri, 11/20/2020 - 2:27pm
policy documents
time division multiplexing
Text Mining
text analysis
state owned capital layout adjustment
soft computing method
Semantics
Security Policies Analysis
pubcrawl
policy-based governance
policy text analysis
policy elements
causal relationships
partial association test
natural language processing
Layout
latent semantic analysis
fuzzy set theory
Fuzzy cognitive maps
fuzzy cognitive map
fuzzy association rule mining
FARM
Data models
Data mining
biblio
A Reliable Ring Analysis Engine for Establishment of Multi-Level Security Management in Clouds
Submitted by grigby1 on Fri, 11/20/2020 - 2:14pm
ring analysis engine
trust boundaries
syntactic analysis
structural index
service provider
Semantics
Semantic Mapping
semantic analysis
security requirements
Security Policies Analysis
security of data
security mechanism
security management
security levels
security
Cloud Computing
Reliability
pubcrawl
Protocols
policy-based governance
policy management framework
Policy Management
multilevel security management
mapping process
indexing
Indexes
index-based engine
Engines
collaboration
cloud customers
biblio
Completeness Integrity Protection for Outsourced Databases Using Semantic Fake Data
Submitted by aekwall on Mon, 11/16/2020 - 1:10pm
database management systems
semantic fake data
range query
outsourced databases
Order Preserving Encryption
data integrity problem
data completeness
CPDB
Completeness Protected Database
completeness integrity protection
Outsourced Database Integrity
Outsourced Database
outsourcing
Semantics
Cloud Computing
Data protection
Databases
query processing
Metrics
composability
pubcrawl
Resiliency
data integrity
data privacy
cloud storage
encryption
Cryptography
Servers
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
…
next ›
last »