Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
machine-learning
biblio
Adversary Instantiation: Lower Bounds for Differentially Private Machine Learning
Submitted by aekwall on Mon, 12/20/2021 - 12:30pm
differential privacy
Adversary Models
Upper bound
Toxicology
Membership-Inference
machine-learning
DP-SGD
Differentially-private-(DP)-machine-learning
Differentially-private
Deep-learning
privacy
Human behavior
Resiliency
Metrics
Scalability
pubcrawl
Games
Training
deep learning
biblio
Industrial and Home Automation, Control, Safety and Security System using Bolt IoT Platform
Submitted by grigby1 on Wed, 02/03/2021 - 12:56pm
home computing
industrial automation
Temperature sensors
home automation
Internet of Things (IoT)
Pins
alert sub-system
Bolt IoT platform
cloud connectivity
Fasteners
Safety
Local Area Network (LAN)
machine-learning
safety systems
security subsystem
SMS
Temperature control
temperature data
temperature monitoring
security system
learning (artificial intelligence)
security of data
Cloud Computing
security
machine learning
pubcrawl
resilience
Resiliency
Internet of Things
Scalability
industrial control
control engineering computing
Industries
integrated circuits
Industrial Control Systems
production engineering computing
sensors
biblio
SWAN\_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods
Submitted by aekwall on Mon, 09/28/2020 - 11:33am
novel automated machine-learning approach SWAN
software metrics
graphical user interfaces
machine-learning
active machine learning
authentication methods
bug detection
code-specific methods
IntelliJ plugin
program debugging
program analysis
security-relevant methods
semiautomated detection
SRM
static analysis tools
SWAN\_ASSIST aids developers
SWAN\_ASSIST tool
time exactly those methods whose classification best impact
machine learning
learning (artificial intelligence)
Resiliency
pubcrawl
composability
pattern classification
vulnerability detection
Training
Libraries
security
authentication
public domain software
software maintenance
Automated Secure Software Engineering
Java
program diagnostics
software quality
biblio
Certified Robustness to Adversarial Examples with Differential Privacy
Submitted by aekwall on Mon, 04/20/2020 - 10:31am
machine learning models
privacy models and measurement
Sophisticated Attacks
PixelDP
norm-bounded attacks
machine-learning
ImageNet
Google Inception network
defense
Deep-learning
cryptographically-inspired privacy formalism
certified robustness
certified defense
Adversarial-Examples
adversarial examples
Cryptography
deep neural networks
differential privacy
Predictive models
Measurement
Mathematical model
Databases
neural nets
standards
Robustness
Metrics
pubcrawl
learning (artificial intelligence)
security
data privacy
biblio
Uncertain Requirements, Assurance and Machine Learning
Submitted by aekwall on Mon, 02/10/2020 - 12:10pm
pragmatic assurance
deductive verification
financial data processing
financial services
governing bodies
human judgement
inductive assurance
linked evidence
machine-learned components
machine-learning
open-world functionality
conventional machine-learned
predefined requirements
requirements engineering
safety assessment
safety-critical domains
software construction
Standards organizations
uncertain requirements
vehicle control
verification proofs
software assurance
uncertainty
Safety
Ontologies
Software
feature extraction
learning (artificial intelligence)
machine learning
pubcrawl
composability
social networking (online)
social networks
security
privacy
software engineering
software development
assurance
safety-critical software
Scalability
formal verification
assurance case
automotive
biblio
Adversarial Biometric Recognition : A review on biometric system security from the adversarial machine-learning perspective
Submitted by Katie Dey on Mon, 08/06/2018 - 1:27pm
face spoofing attack
Signal processing algorithms
security
Pattern recognition
machine-learning
machine learning algorithms
machine learning
learning (artificial intelligence)
image recognition
feature extraction
adaptive face-recognition system
Extraction
biometrics (access control)
biometric systems
biometric system security
biometric security
biometric recognition systems
Behavioral science
adversarial biometric recognition
Cognitive Security
Articles of Interest
Extraction
C3E 2019
biblio
Lightweight Obfuscation Techniques for Modeling Attacks Resistant PUFs
Submitted by grigby1 on Tue, 02/06/2018 - 1:55pm
message authentication
Ubiquitous Computing Security
ubiquitous computing
Support vector machines
Scalability
Resistance
Resiliency
resilience
PUF
pubcrawl
physical unclonable functions
physical unclonable function (PUF)
neural nets
Metrics
Arbiter-PUF
machine-learning
machine learning
low-cost pervasive devices
low-cost authentication
Logic gates
lightweight obfuscation
learning (artificial intelligence)
Human Factors
Human behavior
delays
authentication
Artificial Neural Networks
biblio
Motion, Captured: An Open Repository for Comparative Movement Studies
Submitted by grigby1 on Tue, 03/07/2017 - 1:04pm
annotation
clustering
community
crowd-sourcing
database
machine-learning
motion capture
movement
open-source
pubcrawl170201
Repository
translation
file
Machine Learning – Game Changer for CPS?
Submitted by Sandeep Neema on Mon, 05/16/2016 - 2:44pm
adaptability
ISIS- Vanderbilt University
machine-learning
predictability
2016
Academia
Presentation
Presentations