Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
gradient methods
biblio
Link Prediction Adversarial Attack Via Iterative Gradient Attack
Submitted by aekwall on Mon, 01/25/2021 - 12:01pm
security of data
data privacy
Task Analysis
learning (artificial intelligence)
Resiliency
pubcrawl
composability
graph theory
privacy
Robustness
neural nets
Prediction algorithms
security problem
Predictive models
Predictive Metrics
deep neural networks
Perturbation methods
gradient methods
attack graphs
adversarial attack
adversarial graph
deep models
defense
GAE
gradient attack (GA)
gradient attack strategy
gradient information
graph autoencode
graph evolved tasks
iterative gradient attack
Link prediction
link prediction adversarial attack problem
node classification
real-world graphs
trained graph autoencoder model
biblio
Mathematical Model For Information Security System Effectiveness Evaluation Against Advanced Persistent Threat Attacks
Submitted by grigby1 on Fri, 01/22/2021 - 12:38pm
security of data
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
advanced persistent threat
APT
gradient methods
APT attack
advanced persistent threat attacks
Mathematical model
objective function
information security system
Investment
APT attacks
attack minimization
effectiveness evaluation
formulated efficiency criterion
generalized efficiency criterion
generalized reduced gradient method
information security controls optimization
information security system effectiveness evaluation
information security systems effectiveness
mathematical programming
security investment maximization
biblio
On the Effective Capacity of an Underwater Acoustic Channel under Impersonation Attack
Submitted by grigby1 on Wed, 01/20/2021 - 3:08pm
Acoustic Fingerprints
artificial neural network
Artificial Neural Networks
authentication
authentication constraints
channel coding
composability
effective capacity
feature-based authentication
gradient methods
gradient-descent technique
GTJ method
Human behavior
impersonation attack
Kuiper belt
malicious data
malicious node
markov chain
Markov processes
neural nets
probability
pubcrawl
Quality-of-Service
resilience
Resiliency
state-transition probabilities
telecommunication computing
telecommunication security
threshold-based decoding error model
underwater acoustic
underwater acoustic channel
underwater acoustic communication
UWA channel
wireless channels
biblio
Adversarial Perturbations Fool Deepfake Detectors
Submitted by grigby1 on Fri, 01/15/2021 - 11:02am
Training
Unsupervised Learning
convolutional neural nets
Neural networks
pubcrawl
Human behavior
Human Factors
Metrics
Resiliency
Scalability
Perturbation methods
Electronics packaging
resilience
gradient methods
adversarial perturbations
feature extraction
Detectors
generative adversarial networks
image enhancement
DeepFake
faces
Deep Image Prior
deepfake detectors
deepfake image enhancement
Deepfakes
fast gradient sign method
generative convolutional neural networks
image restoration
Lipschitz regularization
biblio
Secure Federated Averaging Algorithm with Differential Privacy
Submitted by aekwall on Mon, 01/11/2021 - 12:42pm
security of data
Scalability
Servers
data privacy
Data models
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
composability
privacy
convergence
convergence rate
Prediction algorithms
Analytical models
client-server systems
differential privacy
Stochastic processes
gradient methods
distributed machine learning
Gaussian noise
federated learning
message exchange
stochastic gradient descent
algorithm communication efficiency
client sensitive information
convergence analysis
differential attacks
federating averaging algorithm
local model parameters
message obfuscation
Model averaging
secure FedAvg algorithm
secure federated averaging algorithm
biblio
The Value of Collaboration in Convex Machine Learning with Differential Privacy
Submitted by aekwall on Mon, 01/11/2021 - 12:41pm
Scalability
data privacy
Data models
Support vector machines
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
composability
privacy
Computational modeling
Prediction algorithms
Training
machine learning
regression analysis
collaboration
differential privacy
gradient methods
fraud
financial data processing
privacy budget
multiple data owners
convex machine learning
credit card fraud detection
differentially-private gradient queries
differentially-private gradients
distributed datasets
distributed private data
financial datasets
fitness cost
loan interest rates
nonoverlapping training datasets
privacy-aware data owners
privacy-aware learning algorithms
Regression
Stochastic gradient algorithm.
stochastic gradient descent
biblio
An Improved Collaborative Filtering Recommendation Algorithm Based on Differential Privacy
Submitted by aekwall on Mon, 01/11/2021 - 12:40pm
Scalability
data privacy
Resiliency
Human behavior
pubcrawl
composability
collaborative filtering
privacy
Prediction algorithms
Stochastic processes
software engineering
Predictive models
differential privacy
privacy protection
recommender systems
Perturbation methods
gradient methods
differential privacy protection
Matrix decomposition
matrix factorization
centralized recommendation
collaborative filtering recommendation model
differential privacy constraint
differential privacy matrix factorization model
MovieLens
Netflix
noise matrix factorization model
potential characteristic matrix
recommendation accuracy loss
recommendation systems
stochastic gradient descent algorithm
ε-differential privacy
biblio
Multi-Robot System Based on Swarm Intelligence for Optimal Solution Search
Submitted by aekwall on Mon, 12/14/2020 - 11:37am
pubcrawl
composability
mobile robots
multi-robot systems
Swarm Intelligence
particle swarm optimization
Vectors
sensors
Compositionality
gradient methods
Systems engineering and theory
Artificial Neural Networks
angular velocity control
DC motor rotational speed
DC motors
Gradient Field
gradient vector
gradient vectors
Multi-Robot System
multirobot system
neurocontrollers
operation system
optimal solution search
radiation sources
radio-electro-magnetic devices
Search Space
system structure
temperature generating sources
biblio
Image Style Transfer with Multi-target Loss for loT Applications
Submitted by aekwall on Mon, 12/07/2020 - 11:10am
neural style transfer
Scalability
Resiliency
Predictive Metrics
pubcrawl
arbitrary images
artistic images
computer vision
content style
context image
feature extraction
feature map
Filter banks
fundamental problem
gradient methods
Image reconstruction
image style transfer
Information filters
input images
input style image
learning (artificial intelligence)
loss function
multitarget loss
neural nets
output image
pre-trained deep convolutional neural network VGG19
visualization
biblio
CoDRL: Intelligent Packet Routing in SDN Using Convolutional Deep Reinforcement Learning
Submitted by grigby1 on Wed, 12/02/2020 - 1:03pm
CoDRL model
Convolution layer
Convolutional Deep Reinforcement Learning
convolutional layer
convolutional neural nets
coupled congestion control
current SDN systems
Deep Deterministic Policy Gradient (DDPG)
Deep Deterministic Policy Gradients deep agent
deep reinforcement learning
deep reinforcement learning agent
dynamic packet routing
dynamic traffic engineering
flexible traffic engineering
gradient methods
intelligent packet routing
less efficient resource utilization
mean network delay
network congestion
network data
network performance
Packet loss rate
pubcrawl
q-learning
real-time modification
resilience
Resiliency
resource allocation
routing computation
routing configuration
routing optimization
routing strategies
Scalability
SDN controller
Software Defined Network (SDN)
software defined networking
telecommunication control
telecommunication network routing
telecommunication traffic
1
2
3
next ›
last »