Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Computational modeling
biblio
Research on Communication Network Security Detection System based on Computer Big Data
Submitted by grigby1 on Fri, 03/31/2023 - 11:17am
Communication Network
security detection
model analysis
computer big data
Resiliency
Web and internet services
data centers
big data security in the cloud
security framework
Cloud Computing
Virtual machining
Big Data
Computational modeling
Scalability
Analytical models
resilience
Metrics
pubcrawl
biblio
Adversarial Eigen Attack on BlackBox Models
Submitted by aekwall on Fri, 03/31/2023 - 9:35am
Adversarial attack and defense
Black Box Attacks
composability
Computational modeling
computer vision
Data models
deep learning
Jacobian matrices
machine learning
Metrics
Optimization methods
Perturbation methods
pubcrawl
Resiliency
Training data
biblio
Towards Efficient Data Free Blackbox Adversarial Attack
Submitted by aekwall on Fri, 03/31/2023 - 9:35am
Computational modeling
Data models
data privacy
pubcrawl
Metrics
Resiliency
composability
machine learning
Black Box Attacks
Training data
generative adversarial networks
computer vision
Adversarial attack and defense
biblio
Accuracy Analysis for Predicting Human Behaviour Using Deep Belief Network in Comparison with Support Vector Machine Algorithm
Submitted by grigby1 on Fri, 03/31/2023 - 8:28am
belief networks
Predictive models
Organizations
Support vector machines
pubcrawl
Metrics
Analytical models
Computational modeling
computer science
prediction
computer vision
support vector machine
classification
human behaviour
Novel Deep Belief Network
biblio
Predicting Terror Attacks Using Neo4j Sandbox and Machine Learning Algorithms
Submitted by grigby1 on Fri, 03/17/2023 - 12:14pm
resilience
Neo4j Sandbox
Machine Learning Graph Database
relational database security
graph embedding
Terrorism
composability
Computational modeling
Resiliency
deep learning
Metrics
Human behavior
pubcrawl
Support vector machines
machine learning algorithms
relational databases
Predictive models
biblio
Secure Recommender System based on Neural Collaborative Filtering and Federated Learning
Submitted by grigby1 on Fri, 03/17/2023 - 12:11pm
collaborative filtering
Computational modeling
Data models
data privacy
federated learning
Human behavior
Human Factors
privacy
pubcrawl
recommender system
recommender systems
resilience
Resiliency
Scalability
security and privacy
Training
biblio
Toward a BCI-Based Personalized Recommender System Using Deep Learning
Submitted by grigby1 on Fri, 03/17/2023 - 12:11pm
Human Factors
Scalability
Resiliency
resilience
recommender systems
recommender system
pubcrawl
preference prediction
Predictive models
Big Data
Human behavior
eeg
deep learning
Conferences
Computational modeling
brain-computer Interfaces (BCI)
brain-computer interfaces
Brain modeling
biblio
Recommendation-based Security Model for Ubiquitous system using Deep learning Technique
Submitted by grigby1 on Fri, 03/17/2023 - 12:11pm
Recommendation-based
Unfair recommendation
ubiquitous computing
Trust models
Sensitivity
Scalability
Resiliency
resilience
recommender systems
collaboration
pubcrawl
Human Factors
Human behavior
feature extraction
deep learning
control systems
Computational modeling
biblio
A Design of Key Generation Unit Based on SRAM PUF
Submitted by grigby1 on Fri, 03/17/2023 - 11:35am
Data Security
key
random key generation
Resiliency
SRAM PUF
Reliability engineering
ECC
Random access memory
resilience
information security
Layout
real-time systems
Computational modeling
Scalability
Metrics
Human Factors
Human behavior
pubcrawl
biblio
MPTCP-based Security Schema in Fog Computing
Submitted by grigby1 on Fri, 03/17/2023 - 10:20am
Fog computing
security
Cloud Computing
Computational modeling
Fog-Computing Security
IoT security
Linux
man-in-the-middle attack
Multipath-TCP
performance evaluation
pubcrawl
resilience
Resiliency
resource management
software defined network security
Technological innovation
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »