Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Adversary Models
biblio
PRADA: Protecting Against DNN Model Stealing Attacks
Submitted by aekwall on Mon, 08/03/2020 - 10:38am
nontargeted adversarial examples
Adversarial Machine Learning
API queries
confidentiality protection
DNN model extraction attacks
DNN model stealing attacks
machine learning applications
ML models
model extraction attacks
model stealing
model extraction
PRADA
prediction accuracy
prediction API
prior model extraction attacks
stolen model
transferable adversarial examples
well-defined prediction APIs
Adversary Models
Neural networks
Scalability
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
Computational modeling
Metrics
neural nets
security of data
query processing
Business
Training
Mathematical model
Data mining
Predictive models
Deep Neural Network
application program interfaces
biblio
On the Use of Cyber Threat Intelligence (CTI) in Support of Developing the Commander's Understanding of the Adversary
Submitted by aekwall on Mon, 08/03/2020 - 10:38am
cyberspace operations
threat models
Adversary Attribution
adversary tactics
ATT&CK framework
ATT&CK®
communication and information system security
CTI field
cyber related crimes
decision making process
deception techniques
Decoys
military organization
Mission Planning
NATO Allied Command Transformation
NATO Communication and Information Agency
Adversary Models
tools
Servers
Organizations
security
Resiliency
Human behavior
pubcrawl
Metrics
Computer crime
Scalability
testing
indicators of compromise
Workstations
Cyberspace
military computing
cyber threat intelligence
advanced persistent threats
biblio
A Vehicle Trajectory Adversary Model Based on VLPR Data
Submitted by aekwall on Mon, 08/03/2020 - 10:38am
traffic engineering computing
qualified identifier attributes
Resiliency
road average speed
road traffic
road vehicles
Roads
Scalability
target trajectory
pubcrawl
Trajectory
trajectory linking
vehicle information
vehicle license plate recognition data
vehicle suspicion list
vehicle trajectory adversary model
VLPR system
image recognition
Adversary Modeling
Adversary Models
closest time method
Data models
data privacy
desensitized VLPR data
Foshan City VLPR data
Human behavior
adversary model
ITS
Licenses
Metrics
privacy
privacy attacking method
privacy disclosure
privacy protection
biblio
Detection of Adversary Nodes in Machine-To-Machine Communication Using Machine Learning Based Trust Model
Submitted by grigby1 on Fri, 06/19/2020 - 11:48am
security
MLBT evaluation model
particle swarm optimisation
Peer-to-peer computing
policy-based governance
Policy-Governed Secure Collaboration
pubcrawl
resilience
Resiliency
Scalability
Metrics
security solutions
security threats
Supervisory Control and Data Supervisory Acquisition (SCADA)
telecommunication security
Trusted Computing
VBM2M-C network
vehicular ad hoc networks
vehicular based M2M-C network
XGBoost model
Internet of Things (IoTs)
advsersary node detection
binary particle swarm optimization
Computational modeling
Entropy
entropy based feature engineering
extreme gradient boosting model
false trust
feature extraction
Human behavior
Adversary Models
Internet of Vehi-cles(IoVs)
learning (artificial intelligence)
machine learning
Machine Learning Based Trust (MLBT)
machine learning based trust evaluation model
machine-to-machine (M2M)
machine-to-machine communication
machine-to-machine communications
malicious activity detection
biblio
On the Impossibility of Approximation-Resilient Circuit Locking
Submitted by grigby1 on Thu, 03/12/2020 - 12:02pm
IC
signature based defense
security guarantees
Scalability
Resiliency
resilience
relaxed notion
pubcrawl
original circuit
microscopy
malicious foundry
long-standing hardness assumptions
logic locking
learning (artificial intelligence)
Integrated circuit modeling
Integrated Circuit Camouflaging
Adversary Models
Foundries
formally defined notions
formal approach
exponentially approximation-resilient
exact-recovery-resiliency
digital signatures
Cryptography
Computational modeling
cL
Boolean functions
boolean circuits
benchmark circuits
approximation-resilient Circuit locking
approximation-resiliency
algorithmic attacks
biblio
Vulnerability analysis of power systems based on cyber-attack and defense models
Submitted by grigby1 on Mon, 01/21/2019 - 12:39pm
Power system protection
Vulnerability Analysis
system operators
Substations
Smart Grid
security of data
Scalability
SCADA
RTUs
Resiliency
resilience
pubcrawl
power transmission lines
power systems
power system security
Adversary Models
power system faults
power engineering computing
Monitoring
Metrics
Load modeling
Human behavior
game-theoretic approach
game theory
defense models
defender modeling
cyber-attack
Cascading Failures
blackouts
Attacker Modeling
biblio
Adversarial mRMR against Evasion Attacks
Submitted by grigby1 on Mon, 01/21/2019 - 12:39pm
security
novel adversary-aware feature selection algorithm
pattern classification
Perfect Knowledge attack scenarios
popular filter algorithms
pubcrawl
Resiliency
robust feature selection algorithms
Scalability
mRMR
security of data
security sensitive applications
Time complexity
Traditional Wrapped Feature Selection algorithm
Training
TWFS
WAFS
wrapped adversarial feature selection algorithm
Feature Selection
adversarial mRMR
adversary attacks
Adversary Models
Classification algorithms
computational complexity
evasion attacks
FAFS
feature extraction
adversarial feature selection
feature selection process
filter model
filtering algorithms
Human behavior
learning (artificial intelligence)
machine learning
machine learning algorithms
Metrics
biblio
Modeling of quantum channel parameters impact on information exchange security
Submitted by grigby1 on Mon, 01/21/2019 - 12:39pm
Polarization
unauthorized access
software packages
Scalability
Resiliency
Quantum Key Distribution
quantum information exchange computer emulator
quantum computing security
quantum computing
quantum computer
quantum communication channel
quantum channel parameters impact modeling
quantum channel imperfections
Qt Creator C++ program package
pubcrawl
Protocols
adversary
photons
Photonics
Metrics
information security
information exchange security
Human behavior
Cryptography
cryptographic security
cryptanalysis
C++ language
authorisation
attenuation
attack on the protocol
Adversary Models
biblio
Preventing Neural Network Model Exfiltration in Machine Learning Hardware Accelerators
Submitted by grigby1 on Mon, 01/21/2019 - 12:39pm
Metrics
Training
Side-Channels
Scalability
Resiliency
pubcrawl
Neural networks
neural network
model theft
model exfiltration
Adversary Models
memory probing
machine learning
inference
Human behavior
Hardware Security
Hardware
Data models
Context modeling
Computational modeling
biblio
PUF Modeling Attack using Active Learning
Submitted by grigby1 on Mon, 01/21/2019 - 12:39pm
learning efficiency
uncertainty
Training
state-of-the-art attacking methods
security
secure hardware systems
Scalability
Resiliency
PUF modeling attack
pubcrawl
physical unclonable function modeling attack
passive learning
Noise measurement
Metrics
active learning techniques
learning (artificial intelligence)
intelligent adversaries
Human behavior
hardware security techniques
hardware security field
Hardware
delays
Cryptography
CRP
Computational modeling
challenge-response pair
Adversary Models
adaptive adversaries
« first
‹ previous
1
2
3
4
5
6
next ›
last »