Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Support vector machines
biblio
Exposing Deep Fakes Using Inconsistent Head Poses
Submitted by grigby1 on Fri, 01/15/2021 - 11:14am
stereo image processing
synthesized face region splicing
Media Forensics
inconsistent head poses
Head Pose Estimation
deepfake detection
Deep Fakes
classification method
AI-generated fake face images
3D head poses
DeepFake
SVM classifier
pose estimation
Videos
Face
Support vector machines
Three-dimensional displays
Cameras
image classification
feature extraction
face recognition
Metrics
Scalability
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
Neural networks
biblio
Image Feature Detectors for Deepfake Video Detection
Submitted by grigby1 on Fri, 01/15/2021 - 11:11am
feature-detector-descriptors
BRISK
comprehensive test
deep fake video detection
DeepFake Video
digital media forensics
false video detection
FAST
FAST algorithms
feature point extraction
DeepFake
feature-point detectors
HOG
image feature detectors
Information integrity
KAZE
ORB
support vector machine regression
SURF
SVM regression
Metrics
feature extraction
Support vector machines
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
Scalability
Classification algorithms
Training
image classification
Detectors
regression analysis
Image forensics
object detection
Videos
video signal processing
SVM classifier
biblio
OC-FakeDect: Classifying Deepfakes Using One-class Variational Autoencoder
Submitted by grigby1 on Fri, 01/15/2021 - 11:02am
detecting Deepfakes
Face
DeepFake
binary-classification based detection
binary-classification based methods
class-based approach
computer-generated image
data scarcity limitations
deepfakes data
deepfakes detection
deepfakes generation methods
Image reconstruction
detection performance
detects nonreal images
fake face images
image forgery method
OC-FakeDect
one-class anomaly detection problem
one-class variational autoencoder
person
sufficient fake images data
Support vector machines
Training
Anomaly Detection
pubcrawl
Human behavior
Human Factors
Metrics
Resiliency
data privacy
Scalability
privacy issues
learning (artificial intelligence)
Streaming media
Benchmark testing
resilience
Forensics
face recognition
feature extraction
image classification
pattern clustering
object detection
biblio
The Value of Collaboration in Convex Machine Learning with Differential Privacy
Submitted by aekwall on Mon, 01/11/2021 - 12:41pm
financial datasets
financial data processing
privacy budget
multiple data owners
convex machine learning
credit card fraud detection
differentially-private gradient queries
differentially-private gradients
distributed datasets
distributed private data
fraud
fitness cost
loan interest rates
nonoverlapping training datasets
privacy-aware data owners
privacy-aware learning algorithms
Regression
Stochastic gradient algorithm.
stochastic gradient descent
privacy
data privacy
Data models
Support vector machines
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
composability
Scalability
Computational modeling
Prediction algorithms
Training
machine learning
regression analysis
collaboration
differential privacy
gradient methods
biblio
Computational Approaches to Detect Illicit Drug Ads and Find Vendor Communities Within Social Media Platforms
Submitted by aekwall on Mon, 01/11/2021 - 12:39pm
drugs
Text Mining
Opioid Abuse Epidemic
Illicit Drug Ads
Flickr
community detection
Bipartite graph
social media
Deterrence
Scalability
deep learning
machine learning
pubcrawl
Human behavior
Resiliency
Electronic mail
Support vector machines
biblio
Effectiveness of Random Deep Feature Selection for Securing Image Manipulation Detectors Against Adversarial Examples
Submitted by grigby1 on Mon, 12/28/2020 - 11:49am
image manipulation detectors
Support vector machines
security of data
secure classification
Scalability
Resiliency
resilience
randomization-based defences
random feature selection approach
random deep feature selection
pubcrawl
Metrics
linear SVM
learning (artificial intelligence)
adaptive filtering
image manipulation detection tasks
image manipulation detection
image classification
fully connected neural network
Feature Selection
feature randomization
feature extraction
deep learning for forensics
deep learning features
CNN image manipulation detector
adversarial multimedia forensics
Adversarial Machine Learning
biblio
A Novel Jamming Attacks Detection Approach Based on Machine Learning for Wireless Communication
Submitted by aekwall on Mon, 12/14/2020 - 11:32am
channel surfing
5G
time series
Transmitters
Wireless communication
random forests
Jamming
wireless network
Forestry
random forest algorithm
wireless channels
detection probability
false alarm probability
jamming attacks
jamming attacks detection
jamming signal detection
millimeter wave bands
Random Fores
smart jammers
pubcrawl
telecommunication security
game theory
machine learning algorithms
Support vector machines
support vector machine
learning (artificial intelligence)
machine learning
Resiliency
Receivers
composability
Vegetation
neural network
Fuzzy logic
probability
telecommunication computing
signal detection
Predictive Metrics
biblio
A Malware Detection Method Based on Improved Fireworks Algorithm and Support Vector Machine
Submitted by aekwall on Mon, 12/14/2020 - 11:31am
Levy Flights
SVM
Support vector machines
support vector machine
signature-based anti-virus systems
Resiliency
pubcrawl
Predictive Metrics
penalty factor
pattern classification
particle swarm optimization
particle swarm optimisation
optimal parameter combination
Malware detection method
malware detection
machine learning methods
threat vectors
learning (artificial intelligence)
kernel function parameter
invasive software
improved fireworks algorithm
genetic algorithms
Fireworks algorithm
Evolutionary algorithms
differential evolution
Decision trees
computer systems
composability
classification performance
privacy
Measurement
biblio
Detecting Malicious Web Requests Using an Enhanced TextCNN
Submitted by aekwall on Mon, 12/14/2020 - 11:31am
Convolutional Neural Network for Text Classification (TextCNN)
Web servers
deep learning
Semantics
Uniform resource locators
Predictive Metrics
web security
deep learning models
convolutional neural network for text classification
file servers
HTTP Dataset CSIC 2010
malicious Web request detection
Malicious Web requests detection
support vector machine (SVM)
TextCNN
Transferable statistical features
Web attack detection
composability
Data models
Support vector machines
support vector machine
feature extraction
learning (artificial intelligence)
machine learning
Resiliency
pubcrawl
security of data
pattern classification
internet
text analysis
convolutional neural nets
convolutional neural networks
text classification
statistical analysis
biblio
Machine-Learning Based DDOS Attack Classifier in Software Defined Network
Submitted by aekwall on Mon, 12/14/2020 - 11:31am
linear SVM
Switches
Software Defined Network
Predictive Metrics
SDN architecture
service attacks
DDoS Attacks
centralized control
centralized controller
DDoS
SDN
machine-learning based DDOS attack classifier
network administrators
normal attack traffic
polynomial SVM
programmable capability
RYU
RYU SDN controller
scapy
software defined networking
Computer crime
computer network security
IP networks
telecommunication traffic
telecommunication security
computer network management
machine learning algorithms
SDN network
security of data
Support vector machines
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
composability
pattern classification
SVM
« first
‹ previous
…
13
14
15
16
17
18
19
20
21
…
next ›
last »