Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
FGSM
biblio
Dual Graphs of Polyhedral Decompositions for the Detection of Adversarial Attacks
Submitted by grigby1 on Thu, 06/22/2023 - 1:44pm
adversarial attack
polyhedral decomposition
Hamming graph
Firing
ensemble voting
dual graph
DAmageNet
convex polyhedra
bit vectors
decomposition
digital images
ResNet
Neural networks
FGSM
Hamming distance
Image edge detection
Detectors
network architecture
composability
Big Data
Metrics
Human behavior
pubcrawl
biblio
Fooling A Deep-Learning Based Gait Behavioral Biometric System
Submitted by grigby1 on Thu, 03/04/2021 - 2:34pm
Metrics
FGSM
FGSM iterations
gait behavioral biometrics
gradient methods
LSTM
machine learning algorithms
machine learning model
mature techniques
fast gradient sign method
privacy
pubcrawl
resilience
Resiliency
shadow model
Training
user behavioral information
white-box attacks
black-box attack
white box
security
adversarial learning attacks
Adversarial Machine Learning
authentication
authorisation
Biological system modeling
biometrics (access control)
White Box Security
Classification algorithms
composability
counter spoofing threats
deep learning (artificial intelligence)
Deep-learning
deep-learning based gait behavioral biometric system
end-user devices
extent FGSM
biblio
Creation of Adversarial Examples with Keeping High Visual Performance
Submitted by grigby1 on Fri, 09/11/2020 - 11:46am
visualization
intelligence
image recognition technology
human readability
high visual performance
FGSM
convolutional neural network (CNN)
character string CAPTCHA
character recognition
character images
artificial
CAPTCHA
captchas
image recognition
convolutional neural network
learning (artificial intelligence)
adversarial examples
image classification
Resistance
Perturbation methods
composability
Mathematical model
security
Human behavior
pubcrawl
Neural networks
convolutional neural nets
CNN
machine learning