Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
social network
biblio
Relevance-Aware Anomalous Users Detection in Social Network via Graph Neural Network
Submitted by grigby1 on Tue, 03/08/2022 - 2:32pm
social network
Manifolds
Heterogeneous graph neural network
explosives
Abnormal social users detection
graph neural networks
Aggregates
social networking (online)
Neural Network Security
Robustness
Metrics
Resiliency
resilience
policy-based governance
pubcrawl
feature extraction
biblio
Dynamic information-theoretic measures for security informatics
Submitted by aekwall on Thu, 04/08/2021 - 4:42pm
instruction sequence
security domain
vehicle dynamics
information theoretic security
activity trace
behavior prediction
dynamic information-theoretic measure
dynamical process analysis
innocent computer network activity
Informatics
legitimate software
malicious computer network activity
Predictive Analytics
security application
Security informatics
social network dynamics
stochastic dynamical system
Social network services
Cryptography
malware
invasive software
cyber security
Resiliency
Human behavior
pubcrawl
policy-based governance
Scalability
social networking (online)
Metrics
social network
natural language processing
information theory
Markov processes
static analysis
biblio
Unsupervised Discovery Of Semantically Aware Communities With Tensor Kruskal Decomposition: A Case Study In Twitter
Submitted by aekwall on Mon, 02/15/2021 - 4:47pm
recursive community structure
functional Twitter elements
hashtag semantics
heavy degree distribution tail
high clustering coefficient values
higher order analytics
higher order counterpart
Julia
Kruskal decomposition
low diameter
news aggregators
Political Campaigns
politics
rank one tensors
functional coherency
semantic weight
semantically aware communities
Structural coherency
structural Twitter elements
substantial empirical evidence
synthetic graph generation models
tensor algebra
tensor kruskal decomposition
tensor representation
Tucker tensor decomposition
Twitter subgraph
unofficial form
unsupervised discovery
tensors
graph theory
social networking (online)
Twitter
Metrics
social network
network theory (graphs)
cyber physical systems
Unsupervised Learning
Semantics
Compositionality
Periodic structures
singular value decomposition
SVD
pubcrawl
Tucker decomposition
decomposition
analytical methodologies
Blogs
clustered graph spectrum
Community discovery
community structure discovery
compact community size distribution
digital marketing
Facebook groups
fact checking
followfollower relationships
biblio
Generation And Analysis Of Trust Networks
Submitted by grigby1 on Wed, 12/02/2020 - 2:15pm
social network
wiki administrator network data sets
Trusted Computing
trust-based social graphs
trust networks
trust
triad
synthetic generation
standard generative modeling techniques
social networking (online)
social network data sets
clustering coefficient
social graph data sets
pubcrawl
original social graphs
original graphs
human social relationships
Human Factors
Human behavior
graph theory
Generative Models
Computing Theory
biblio
Analysis of Adversarial Movement Through Characteristics of Graph Topological Ordering
Submitted by aekwall on Mon, 10/12/2020 - 11:43am
Heating systems
Human Behavior and Cybersecurity
topological sort networks
network theory
movement association
mixed methods
graph topological ordering
dynamic decision-making
adversarial team
adversarial movement complexity
adaptive human behavior
Human behavior
security of data
cyberattacks
integrated circuits
Sorting
network theory (graphs)
social network
Training
Decision Making
tools
graph theory
pubcrawl
Computer crime
biblio
Modeling and analyzing privacy-awareness social behavior network
Submitted by aekwall on Mon, 09/28/2020 - 11:54am
privacy protection
Computing Theory and Privacy
social behavior network
privacy driven model
privacy disclosure behavior
networked human society
network evolutions
highly dynamical network behaviors
Habitual privacy
driving force
decision process
privacy awareness
behavioural sciences computing
Social Behavior
Sensitivity
Scalability
information theory
complex networks
social network
social networking (online)
Computational modeling
Social network services
privacy
pubcrawl
Human behavior
Resiliency
security
Conferences
data privacy
biblio
Flexible Modelling using Conversational Agents
Submitted by grigby1 on Thu, 07/16/2020 - 12:31pm
natural language processing
software services
software engineering tasks
software engineering
software agents
social networks
social networking (online)
social network
Scalability
pubcrawl
chatbots
Metrics
meta-model relaxation
Human behavior
flexible modelling
domain-specific modelling
conversational modelling framework
conversational agents
conversational agent
biblio
The Anti-Data-Mining (ADM) Framework - Better Privacy on Online Social Networks and Beyond
Submitted by aekwall on Mon, 07/13/2020 - 11:06am
New Paradigms for Privacy
big data security
Cloud Privacy
data centers
deception
eavesdropping governments
enhanced privacy
enormous growth
Financial Terminal Privacy
financial terminal providers
Financial Terminal Security
Future of Privacy
information accumulators
big data privacy
Obfuscation for Privacy
Privacy against Ad Networks
Privacy against timing attacks
Search Engine Privacy
sensitive data suppression
social network
social-bots
unprecedented growth
user privacy
users privacy
user privacy in the cloud
obfuscation
Big Data
data privacy
security
Resiliency
pubcrawl
privacy
Facebook
online social networks
social networking (online)
Metrics
Data mining
Scalability
Cloud Computing
Cloud Security
search engines
disinformation
ADM
Adversarial Face Detection
Adversarial Face Recognition
Adversarial Machine Learning
adversaries
Advertising Privacy
Anti-Data-Mining
anti-data-mining principle
biblio
Anomaly Detection using Graph Neural Networks
Submitted by grigby1 on Fri, 05/08/2020 - 2:43pm
security of data
Neural networks
pattern classification
pattern clustering
Peer-to-peer computing
policy-based governance
pubcrawl
Resiliency
security
Neural Network Security
social connection graphs
social network
social network statistical measures
social networking (online)
statistical analysis
Twitter
Twitter dataset
Twitter network
email network
Artificial Neural Networks
classification
clustering
Clustering algorithms
collaboration
cyber physical systems
deep learning
deep neural networks
Anomaly Detection
Enron dataset
Graph Neural Network
graph neural networks
graph structure
graph theory
learning (artificial intelligence)
Metrics
neural nets
biblio
An Improved Privacy Protection Method Based on k-degree Anonymity in Social Network
Submitted by aekwall on Mon, 04/20/2020 - 10:31am
Metrics
structural modifications
social networking (online)
social network
Publishing
pubcrawl
privacy protection
privacy models and measurement
privacy
pattern clustering
original social network
node degrees
network theory (graphs)
network structure stable
network nodes
anonymity
Mathematical model
Loss measurement
k-subgraph method
k-degree anonymous graph
k-degree anonymity
k-anonymity
information losses
information loss
improved privacy protection method
graph theory
data privacy
computer security
Clustering algorithms
anonymity models
1
2
3
next ›
last »