Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Support vector machines
biblio
A Hardware-Software Codesign Approach to Identity, Trust, and Resilience for IoT/CPS at Scale
Submitted by aekwall on Mon, 09/28/2020 - 11:16am
enhanced device identity
communication technologies
communication reliability
operational efficiency
hardware-software codesign
cyber physical systems
quality of services
Blockchain protocols
Byzantine actor
citizen welfare
distribution framework
Transmitters
entity trust
hardware-software codesign approach
IoT-CPS
multitier methodology
radio frequency-distinct native attributes
RF-DNA
RF-DNA Fingerprinting
system trustworthiness
trust-building
CPS Privacy
Wireless communication
computer network security
data privacy
Internet of Things
Cryptographic Protocols
Trusted Computing
Support vector machines
cyber-physical systems
Human behavior
pubcrawl
Communication system security
IoT
blockchain
internet
privacy
cryptocurrencies
quality of service
authentication
Human Factors
smart cities
Trust management
biblio
Learning from Mutants: Using Code Mutation to Learn and Monitor Invariants of a Cyber-Physical System
Submitted by aekwall on Mon, 09/28/2020 - 11:11am
data logs
Mutation testing
actuators
CPS
model checking
cyber-physical system
supervised machine learning
code mutation
code-modification attacks
cross-validation
formal verification
invariants
learnt model
real-world water purification plant
Statistical Model Checking
SVM-based model
system modelling
water treatment systems
CPS Privacy
pubcrawl
Software
attestation
Data models
Support vector machines
feature extraction
learning (artificial intelligence)
machine learning
Human behavior
Monitoring
program testing
privacy
attacks
Anomaly Detection
cyber physical systems
program diagnostics
sensors
Human Factors
biblio
A radio-fingerprinting-based vehicle classification system for intelligent traffic control in smart cities
Submitted by aekwall on Mon, 09/28/2020 - 11:10am
precise vehicle classification
comprehensive measurements
cost-efficiency
dynamic control methods
dynamic type-specific lane assignments
global system parameters
highly sophisticated traffic control methods
highly-dynamic Cyber Physical System
individual vehicles
intelligent traffic control systems
key element
machine learning based approach
key performance indicators
radio-fingerprint
radio-fingerprinting
real-time
road traffic control
specific data
street network
Traffic flow
up-to-date traffic
vehicle classification system
vehicle type information
CPS Privacy
vehicular ad hoc networks
traffic engineering computing
data privacy
Receivers
Measurement
Support vector machines
feature extraction
learning (artificial intelligence)
Human behavior
pubcrawl
privacy preservation
Roads
road vehicles
pattern classification
machine learning
privacy
cyber physical systems
Human Factors
smart cities
system state
CPS
System performance
radio transmitters
biblio
Framework for Detecting Control Command Injection Attacks on Industrial Control Systems (ICS)
Submitted by grigby1 on Fri, 09/18/2020 - 1:07pm
pubcrawl
Zero-day attacks
Terms Industrial Control Systems
Support vector machines
signal sampling technique
signal sampling
Sensory Channels
sensory channel
security of data
Resiliency
resilience
Anomaly Detection
Metrics
intrusion detection system
Industrial Control Systems
industrial control
IDS framework
feature extraction
control command injection attacks
composability
command injection attacks
biblio
Black-box Adversarial Machine Learning Attack on Network Traffic Classification
Submitted by grigby1 on Fri, 09/04/2020 - 3:10pm
machine learning
Training
telecommunication traffic
telecommunication computing
Support vector machines
security threat
security
Resiliency
resilience
pubcrawl
Perturbation methods
pattern classification
Neural networks
Network traffic classification
Metrics
Adversarial Machine Learning
learning (artificial intelligence)
deep machine learning-based classifiers
deep machine learning techniques
deep machine learning models
Data models
computer network security
composability
black-box adversarial machine
black-box adversarial attack
Black Box Security
autonomous networks
adversarial threats
adversarial perturbations
biblio
Fraud Detection using Machine Learning and Deep Learning
Submitted by aekwall on Mon, 08/24/2020 - 12:37pm
credit card
Europe
Forestry
Credit cards
area under the ROC curve
Australian dataset
autoencoder
benchmark multiple machine learning methods
Boltzmann machines
cost of failure
financial data processing
data mining techniques
Deep belief networks
EU
European dataset
German dataset
k nearest neighbor
Matthews correlation coefficient
restricted boltzmann machine
security checks
pattern classification
Support vector machines
support vector machine
learning (artificial intelligence)
machine learning
Random Forest
Resiliency
pubcrawl
composability
deep learning
Data models
convolutional neural nets
deep learning methods
Data mining
convolutional neural networks
Artificial Neural Networks
belief networks
fraud
fraud detection
biblio
Selective Poisoning Attack on Deep Neural Network to Induce Fine-Grained Recognition Error
Submitted by aekwall on Mon, 08/10/2020 - 9:36am
MNIST
Training data
Training
Support vector machines
Speech recognition
selective poisoning attack
security of data
Resiliency
pubcrawl
policy-based governance
poisoning attack
Pattern recognition
nuclear facilities
Neurons
Neural networks
neural nets
AI Poisoning
malicious training data
machine learning library
machine learning
learning (artificial intelligence)
image recognition
fine-grained recognition error
DNN training process
DNN security
distortion
Deep Neural Network
Data models
cyber physical systems
CIFAR10
chosen class
Artificial Neural Networks
biblio
Performance Comparison of Support Vector Machine, K-Nearest-Neighbor, Artificial Neural Networks, and Recurrent Neural networks in Gender Recognition from Voice Signals
Submitted by aekwall on Mon, 08/10/2020 - 9:36am
mel frequency kepstrum coefficients
voice signals
Voice Signal
Support vector machines
support vector machine
Resiliency
Recurrent Neural Networks (RNN)
Recurrent neural networks
recurrent neural nets
pubcrawl
policy-based governance
Artificial Neural Networks
K-Nearest-Neighbor
k-nearest neighborhood method
gender recognition
feature extraction
cyber physical systems
biometrics (access control)
biometric data
audio signal processing
audio signal
biblio
Android-Based Smartphone Authentication System Using Biometric Techniques: A Review
Submitted by aekwall on Mon, 08/10/2020 - 9:33am
Face
android encryption
smartphone information leakage
performance index
mobile internet
identity authentication systems
encryption technology
Biometric Recognition
Android-based smartphone authentication system
Android-based biometric verification systems
Android OS accounts
android operation system
algorithmic framework
Metrics
biometric
biometric techniques
Scalability
Humanoid robots
Androids
Android (operating system)
Information Assurance
biometrics (access control)
authentication
smart phones
pubcrawl
Human behavior
Resiliency
feature extraction
Support vector machines
mobile computing
Cryptography
authorisation
biblio
Voltage Based Authentication for Controller Area Networks with Reinforcement Learning
Submitted by aekwall on Mon, 07/20/2020 - 9:44am
testing
spoofing model
spoofing attacks
physical authentication scheme
linear regression
ECU signals
CAN bus
authentication mode
electronic control units
controller area networks
controller area network security
Computers
computer network security
machine learning
Reinforcement learning
Neural networks
pubcrawl
Resiliency
learning (artificial intelligence)
cyber-physical systems
Support vector machines
computer architecture
Internet of Things
authorisation
« first
‹ previous
…
16
17
18
19
20
21
22
23
24
…
next ›
last »