Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Computational modeling
biblio
Design and Implementation of a Software Disaster Recovery Service for Cloud Computing-Based Aerospace Ground Systems
Submitted by grigby1 on Fri, 01/06/2023 - 3:32pm
Cloud Computing
security
pubcrawl
resilience
Resiliency
Software
Computational modeling
data centers
Circuits and systems
Aerospace accidents
aerospace ground systems
disaster recovery service mode
System recovery
biblio
Detection and Mitigation of Targeted Data Poisoning Attacks in Federated Learning
Submitted by grigby1 on Fri, 01/06/2023 - 3:25pm
Training
Servers
pubcrawl
Human behavior
Resiliency
Scalability
Data models
Computational modeling
Big Data
Training data
resilience
federated learning
data poisoning attacks
AI Poisoning
Adversarial Machine Learning
security for AI
biblio
FIBA: Frequency-Injection based Backdoor Attack in Medical Image Analysis
Submitted by grigby1 on Fri, 01/06/2023 - 3:24pm
resilience
biological and cell microscopy
Adversarial attack and defense
Privacy and federated learning
codes
medical
AI Poisoning
frequency-domain analysis
image segmentation
Training
Semantics
Computational modeling
Scalability
Resiliency
Human behavior
pubcrawl
Predictive models
biblio
Poisoning Attack against Online Regression Learning with Maximum Loss for Edge Intelligence
Submitted by grigby1 on Fri, 01/06/2023 - 3:18pm
Artificial Intelligence
regression task
edge intelligence
online learning
AI Poisoning
poisoning attack
Market research
resilience
Task Analysis
pubcrawl
edge computing
quantum computing
Computational modeling
Data models
Scalability
Resiliency
Human behavior
biblio
PPIoV: A Privacy Preserving-Based Framework for IoV- Fog Environment Using Federated Learning and Blockchain
Submitted by grigby1 on Fri, 01/06/2023 - 3:12pm
Computational modeling
Internet-of-Vehicles (IoV)
federated learning (FL)
privacy preservation
Human Factors
Collaborative Work
AI
Fog computing
Training data
Adaptation models
data privacy
privacy
Scalability
Resiliency
resilience
pubcrawl
blockchain
Training
biblio
Mixed Differential Privacy in Computer Vision
Submitted by grigby1 on Fri, 01/06/2023 - 3:10pm
transparency
retrieval
Recognition: Detection
Privacy and federated learning
privacy and ethics in vision
fairness
categorization
Human Factors
computer vision
AI
differential privacy
Training
Upper bound
visualization
accountability
Computational modeling
privacy
Scalability
Resiliency
resilience
pubcrawl
biblio
Auditing a Software-Defined Cross Domain Solution Architecture
Submitted by grigby1 on Fri, 01/06/2023 - 3:05pm
Access Control
trusted systems
Cross Domain Solution
Configuration Security
Architecture Description Language
trustworthiness
Security analysis
Data protection
Trusted Computing
Mission critical systems
Air gaps
computer architecture
composability
Computational modeling
Data models
Hardware
Software
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Design of an Advance Intrusion Detection System for IoT Networks
Submitted by aekwall on Thu, 01/05/2023 - 4:08pm
Robustness
Support vector machines
Computational modeling
Intrusion Detection
machine learning
pubcrawl
composability
Compositionality
Classification algorithms
intrusion detection system
IoT security
Biological system modeling
Linear programming
Swarm Intelligence
biblio
Multi-objective Gray Wolf Optimization Algorithm for Multi-agent Pathfinding Problem
Submitted by aekwall on Thu, 01/05/2023 - 4:08pm
security
Computational modeling
Heuristic algorithms
Sociology
Statistics
pubcrawl
composability
particle swarm optimization
Compositionality
Linear programming
Swarm Intelligence
multi-agent pathfinding
multi-objective gray wolf optimization
biblio
X-Swarm: Adversarial DRL for Metamorphic Malware Swarm Generation
Submitted by aekwall on Thu, 01/05/2023 - 4:07pm
pervasive computing
zero-day attack
Swarm Attack
metamorphic malware
Industry 4.0 Security
Endpoint protection
Deep Policy Reinforcement
Adversarial-RL
Swarm Intelligence
Computational modeling
Data mining
malware
Ransomware
Compositionality
Reinforcement learning
composability
pubcrawl
Conferences
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
…
next ›
last »