Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
deep learning
biblio
Neural Encoder-Decoder based Urdu Conversational Agent
Submitted by aekwall on Mon, 12/16/2019 - 2:26pm
attention driven deep encoder-decoder based neural conversational agent
conversational agent
Urdu language
sequence to sequence
rule based methods
recurrent neural network
neural network based techniques
neural encoder-decoder based Urdu conversational agent
language translation
deep encoder-decoder based neural conversational agent
conversational model
conversation agents
chatbot
Scalability
conversational agents
encoding
recurrent neural nets
natural language processing
knowledge based systems
multi-agent systems
Metrics
deep learning
pubcrawl
Human behavior
machine learning
biblio
Phishing E-Mail Detection by Using Deep Learning Algorithms
Submitted by grigby1 on Tue, 11/26/2019 - 3:48pm
classification
deep learning
Human behavior
human factor
machine learning
malware detection
Phishing
pubcrawl
supervised learning
biblio
Cross-Entropy: A New Metric for Software Defect Prediction
Submitted by grigby1 on Tue, 11/12/2019 - 4:26pm
pubcrawl
Task Analysis
source code (software)
source code
software repository
software quality assurance
software quality
software metrics
software defect prediction
software bugs
Software
Semantics
recurrent neural network language model
recurrent neural nets
code metric
program debugging
predictive security metrics
Predictive models
natural language processing
Metrics
Measurement
language model
Entropy
DefectLearner
deep learning
cross-entropy
Computer bugs
code naturalness
biblio
Challenging Machine Learning Algorithms in Predicting Vulnerable JavaScript Functions
Submitted by grigby1 on Tue, 11/12/2019 - 4:25pm
Snyk platform
pattern classification
performing algorithm
performing models
Prediction algorithms
prediction models
Predictive models
predictive security metrics
pubcrawl
public databases
re-sampling strategies
security
security vulnerabilities
node security project
software metrics
software security issues
static source code metrics
Support vector machines
SVM
viable practical approach
Vulnerability
vulnerability information
vulnerable components
vulnerable functions
vulnerable javascript functions
Java
code fixing patches
code metrics
Computer crime
cyber-crime activities
Databases
dataset
deep learnin
deep learning
extensive grid-search algorithm
F-measure
forest based classifiers
GitHub
challenging machine
JavaScript
JavaScript programs
learning (artificial intelligence)
machie learning
machine learning
machine learning algorithms
Measurement
Metrics
mitigation techniques
natural language processing
nearest neighbour methods
biblio
Static and Dynamic Analysis of Third Generation Cerber Ransomware
Submitted by aekwall on Mon, 10/07/2019 - 11:42am
malicious ransomware software
third generation cerber ransomware
technical analysis
social power
Resiliency
Ransomware
pubcrawl
political power
official databases
Metrics
malware detection
malware
Big Data
invasive software
encryption
economical scumming
deep learning
cyber terrorism
cyber criminals
Cryptography
criminal justice
Computer crime
composability
Cerber
biblio
Attention in Recurrent Neural Networks for Ransomware Detection
Submitted by aekwall on Mon, 10/07/2019 - 11:42am
Metrics
Windows environment
user access
Scalability
Resiliency
Recurrent neural networks
recurrent neural nets
ransomware sequences
ransomware executables
ransomware detection
ransomware attacks
Ransomware
pubcrawl
pattern locks
organizational level
Microprocessors
attention mechanisms
malware detection
malicious software
LSTM models
LSTM
Long short-term memory
Logic gates
learning (artificial intelligence)
invasive software
Human behavior
deep learning methods
deep learning
computer security
computer architecture
composability
biblio
Machine Learning for Network Resiliency and Consistency
Submitted by grigby1 on Wed, 10/02/2019 - 2:55pm
global overview
software defined networking
security system
security
SDN
Resiliency
resilience
pubcrawl
programmable networking
network resiliency
network resilience
network consistency
network configurations
machine learning
learning (artificial intelligence)
adaptability
flow tables
feature extraction
deep learning architectures
deep learning
data privacy
convolutional neural networks
convolutional neural nets
consistency verification system
consistency test scenario
computer architecture
artificial intelligence resiliency system
Artificial Intelligence
ARS
biblio
A Study of Network Covert Channel Detection Based on Deep Learning
Submitted by grigby1 on Thu, 09/05/2019 - 11:25am
detection model
Training
security
Scalability
resilience
network covert channel detection
network covert channel
machine learning algorithms
machine learning
learning (artificial intelligence)
information security
feature extraction
algorithmic model
detection algorithms
deep learning model
deep learning algorithm
deep learning
Data models
covert channels
covert channel detection
computer network security
computer covert channel
Compositionality
complex covert channels
biblio
YOLO Approach in Digital Object Definition in Military Systems
Submitted by aekwall on Mon, 08/12/2019 - 9:46am
object detection
YOLO approach
visual surveillance
Videos
video surveillance
video processing
two-dimensional videos
traffic monitoring
surveillance
Scalability
Resiliency
real-time generation detection
pubcrawl
Pattern recognition
outdoor monitoring applications
object tracking
Big Data
multimedia content-based indexing
military systems
military computing
military applications
Metrics
information acquisition
indoor monitoring applications
human tracking
distributed cross-camera surveillance systems
digital object definition
deep video
deep learning
cyber terrorism
Cameras
biblio
Zynq FPGA Based System Design for Video Surveillance with Sobel Edge Detection
Submitted by aekwall on Mon, 08/12/2019 - 9:46am
Surveillance systems and ARM processor
learning (artificial intelligence)
live traffic analysis
Metrics
pubcrawl
Reconfigurability
Resiliency
Scalability
security
Sobel edge detection
Streaming media
surveillance
input composite video surveillance
Thermal Imaging
VGA
video coding
video interface
video streaming
video surveillance
Xilinx ZC702 platfor
ZC702
Zynq FPGA based system design
Zynq-7000
field programmable gate arrays
analog composite video interface
analog CVBS
camera
Cameras
computer architecture
computer vision
Decoding
deep learning
deep video
edge detection
edge detection filter
ADAS
FPGA
Hardware
HDMI-MIPI CSI
high speed serial interfaces
image classification
Image edge detection
image filtering
Image resolution
industrial automation
input composite video decoding
« first
‹ previous
…
50
51
52
53
54
55
56
57
58
…
next ›
last »