Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Adversary Models
biblio
Fine Tuning Lasso in an Adversarial Environment against Gradient Attacks
Submitted by grigby1 on Mon, 03/19/2018 - 1:59pm
robust classifier
known weaknesses
labeled training data
learning (artificial intelligence)
Metrics
optimization
pattern classification
probability
pubcrawl
resilience
Resiliency
Input variables
Scalability
security of data
single convex optimization
source domain
supervised learning
Synthetic Data
Task Analysis
testing
Toxicology
Training
data set testing
adversarial data
adversarial environment
adversarial learning research
adversarial learning setting
Adversarial Machine Learning
Adversary Models
convex programming
data analysis
Data mining
data mining algorithms
adversarial component
data testing
domain adaptation
domain adaption
feature extraction
Feature Selection
fine tuning lasso
fixed probability distribution
gradient attacks
Human behavior
biblio
Data Injection Attacks in Electricity Markets: Stochastic Robustness
Submitted by grigby1 on Mon, 03/19/2018 - 1:59pm
Adversary Models
Electricity supply industry
Generators
Human behavior
Load modeling
Metrics
Pricing
pubcrawl
real-time systems
resilience
Resiliency
Scalability
Stochastic processes
uncertainty
biblio
Privacy Preserving Localization Using a Distributed Particle Filtering Protocol
Submitted by grigby1 on Mon, 03/19/2018 - 1:59pm
Protocols
spectrum sensing information
signal detection
sensors
sensing network
semihonest adversary model
Scalability
Resiliency
resilience
radio transmitters
public-key cryptography
public key cryptography
Public key
pubcrawl
Adversary Models
privacy preserving localization
privacy
Particle measurements
particle filtering (numerical methods)
multiple sensing radios
Metrics
Human behavior
distributed particle filtering protocol
cooperative communication
cognitive radios systems
cognitive radio
Atmospheric measurements
biblio
Models of Reliability of Fault-Tolerant Software Under Cyber-Attacks
Submitted by grigby1 on Mon, 03/19/2018 - 1:59pm
Software
on-demand software
Probabilistic logic
probabilistic model
pubcrawl
resilience
Resiliency
Scalability
security of data
noncompromised software
software fault tolerance
software fault-tolerance
software maintenance
software maintenance policies
software reliability
sophisticated synchronized attacks
synchronized attacks system reliability
telecommunication security
fault tolerant architecture
adversary
Adversary Models
computer security
cyber-attacks
cyber-security controls
diverse software
failure regions
fault tolerance
adequate adversary model
Fault tolerant systems
fault-tolerant software
Human behavior
independent attacks
industrial control applications
industrial protection systems
Metrics
biblio
An Adversary-Centric Behavior Modeling of DDoS Attacks
Submitted by grigby1 on Mon, 03/19/2018 - 1:58pm
industrial mitigation operation
Scalability
Resiliency
resilience
pubcrawl
Predictive models
Monitoring
Metrics
malware
internet
Adversary Models
Human behavior
feature extraction
distributed denial of service attack
DDoS attack model
Data-driven approach
computer network security
Computer crime
Analytical models
adversary-centric behavior model
biblio
Efficient Construction of Completely Non-Malleable CCA Secure Public Key Encryption
Submitted by K_Hooper on Wed, 10/04/2017 - 10:54am
Adversary Models
chosen-ciphertext attack
complete non-malleability
Human behavior
pubcrawl
public key encryption
Resiliency
scalabilty
standard model
biblio
Secure Kernel Machines against Evasion Attacks
Submitted by K_Hooper on Wed, 10/04/2017 - 10:54am
Adversary Models
Human behavior
pubcrawl
Resiliency
scalabilty
biblio
On Perfectly Secret Message Transmission in Digraphs Tolerating Dual Failures
Submitted by K_Hooper on Wed, 10/04/2017 - 10:54am
Adversary Models
directed networks
Human behavior
information theoretic security
mixed adversary
perfect security
pubcrawl
reliable and secure message transmission
Resiliency
scalabilty
threshold adversary
biblio
Boosting GSHADE Capabilities: New Applications and Security in Malicious Setting
Submitted by K_Hooper on Wed, 10/04/2017 - 10:54am
Adversary Models
biometrics
gshade
Human behavior
malicious adversaries
pubcrawl
Resiliency
scalabilty
secure two-party computation
semi-honest adversaries
biblio
Generic Attacks on Secure Outsourced Databases
Submitted by grigby1 on Mon, 06/05/2017 - 12:38pm
Adversary Models
attribute based encryption
composability
generic attacks
outsourced database security
pubcrawl
Resiliency
Scalability
searchable encryption
secure outsourced databases
Security Audits
« first
‹ previous
1
2
3
4
5
6
next ›
last »