Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
black-box approach
biblio
Black-Box Modelling of a DC-DC Buck Converter Based on a Recurrent Neural Network
Submitted by aekwall on Tue, 03/09/2021 - 12:04pm
autoregressive processes
Training
System Identification
switching convertors
static behavior
recurrent nonlinear autoregressive exogenous neural network
prediction
power converter
nonsynchronous buck converter model
DC-DC power converter
DC-DC buck converter
black-box modelling
black-box model
black-box approach
Resiliency
black-box models
radial basis function networks
Artificial Neural Networks
multilayer perceptrons
DC-DC power convertors
recurrent neural network
recurrent neural nets
black box encryption
power engineering computing
neural network
Metrics
composability
pubcrawl
biblio
A Black-Box Approach to Generate Adversarial Examples Against Deep Neural Networks for High Dimensional Input
Submitted by grigby1 on Fri, 09/04/2020 - 4:11pm
linear regression model
black-box setting
CNNs
data science
extensive recent works
generate adversarial examples
generating adversarial samples
high dimensional
image classification
learning models
linear fine-grained search
black-box approach
minimizing noncontinuous function
model parameters
noncontinuous step function problem
numerous advanced image classifiers
queries
white-box setting
Zeroth order
zeroth order optimization algorithm
zeroth-order optimization method
Black Box Security
Cyberspace
query processing
Conferences
optimisation
pubcrawl
composability
Metrics
Resiliency
resilience
learning (artificial intelligence)
neural nets
security of data
machine-to-machine communications
regression analysis
Iterative methods
deep neural networks
face recognition
adversarial perturbations
gradient methods
adversarial examples
approximation theory