Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Adaptation models
biblio
Categorization and Organization of Database Forensic Investigation Processes
Submitted by grigby1 on Thu, 04/08/2021 - 5:10pm
Adaptation models
database management systems
Servers
Digital Forensics
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
Data models
digital data
Databases
information forensics
Terminology
acquisition and preservation category
analysis and reconstruction category
Database forensic investigation
database forensic investigation processes
database forensics
design science research methodology
harmonized DBFI process
investigation process model
Planning
preparation and pre-response category
biblio
The EGRBAC Model for Smart Home IoT
Submitted by aekwall on Thu, 04/08/2021 - 4:35pm
authorisation
Access Control
Internet of Things
smart devices
Adaptation models
Resiliency
pubcrawl
Computational modeling
Smart homes
home automation
Compositionality
Context modeling
Information Reuse and Security
RBAC
AWS-IoT Greengrass
EGRBAC model
extended generalized role based access control model
smart home IoT
smart houses
biblio
An Improved Fuzzy Min–Max Neural Network for Data Classification
Submitted by aekwall on Mon, 03/22/2021 - 1:12pm
Adaptation models
nearest neighbour methods
Resiliency
pubcrawl
pattern classification
Training
fuzzy set theory
Artificial Neural Networks
Biological neural networks
image classification
data classification
expandability
Compositionality
adaptive systems
minimax techniques
Brain modeling
Enhanced fuzzy min–max (EFMM) model
Euclidian geometry
fuzzy min-max network
fuzzy min–max (FMM) neural network
fuzzy neural nets
histopathological images
hyperbox classifier
hyperbox semiperimeter
IFMM network
improved FMM network
improved fuzzy min-max network
k-nearest FMM
pattern classification problems
semiperimeter
biblio
Provenance-based Classification Policy based on Encrypted Search
Submitted by aekwall on Mon, 03/22/2021 - 1:08pm
Cloud Computing
Access Control
authorisation
Cryptography
encryption
cloud storage
data integrity
security
Adaptation models
Resiliency
pubcrawl
pattern classification
information retrieval
Public key
Games
storage management
document handling
Predictive Metrics
Compositionality
security protection
digital signatures
encryption audits
sensitive information
data quality
cloud data
semantic security
cloud document classification
digital provenance
document category
encrypted provenance
Encrypted Search
integrity data
keyword searching
Offline Guessing Attack
Privacy Third Party Auditing
provenance-based classification policy
biblio
IMPACT: A Trust Model for Human-Agent Teaming
Submitted by aekwall on Mon, 02/01/2021 - 11:39am
Adaptation models
authorization
autonomous agents
collaboration
collaborative team
Decision Making
Human behavior
human partners
human trust
human-agent teaming
human-autonomy interaction
IMPACT model
intelligent adaptive decision aid
large scale joint exercise controlling multiple unmanned vehicles
multi-agent systems
Predictive models
pubcrawl
remotely operated vehicles
target engagement
Task Analysis
trust
unmanned vehicle
Weapons
biblio
A service-oriented adaptive anonymity algorithm
Submitted by grigby1 on Thu, 01/28/2021 - 1:59pm
Adaptation models
anonymity
anonymity group partition process
anonymized data
anonymous results
attribute value distribution
attribute values distribution
composability
contribution value differences
data handling
data privacy
dispersion
distribution characteristics
Human behavior
Internet of Things
k-anonymity
K-anonymity algorithms
Metrics
Partitioning algorithms
privacy
privacy preservation
privacy-preserving data publishing
pubcrawl
Publishing
Quasi-identifier Attributes
quasiidentifier attributes
released data
resilience
Resiliency
sensitive attributes
service-oriented adaptive anonymity algorithm
service-oriented architecture
splitting value
biblio
Defending Against Model Stealing Attacks With Adaptive Misinformation
Submitted by grigby1 on Thu, 01/28/2021 - 1:12pm
Adaptation models
Adaptive Misinformation
Adversary Models
attacker
attacker clone model
black-box query access
clone model
Cloning
Computational modeling
Data models
deep neural networks
Human behavior
labeled dataset
learning (artificial intelligence)
Metrics
model stealing attacks
neural nets
OOD queries
out-of-distribution inputs
Perturbation methods
Predictive models
pubcrawl
query processing
resilience
Resiliency
Scalability
security
security of data
training dataset
biblio
BlurNet: Defense by Filtering the Feature Maps
Submitted by grigby1 on Mon, 12/28/2020 - 12:48pm
Adaptation models
adaptive attack evaluation
adaptive filtering
adversarial defense
adversarial images
Adversarial Machine Learning
Adversarial robustness
attack algorithms
black stickers
blackbox transfer attack
BlurNet
depthwise convolution layer
frequency analysis
gradient information
high frequency noise
image recognition
image restoration
input image
Kernel
layer feature maps
learning (artificial intelligence)
low-pass filters
lowpass filtering behavior
malicious adversary
malicious examples
Metrics
neural nets
Neural networks
Perturbation methods
pubcrawl
resilience
Resiliency
robust physical perturbations
Robustness
RP
Scalability
security of data
standard blur kernels
standard-architecture traffic sign classifiers
standards
stop signs
substitute model
targeted misclassification rates
traffic engineering computing
victim model
white stickers
white-box attacks
biblio
Policy-Based Access Control for Robotic Applications
Submitted by grigby1 on Thu, 12/17/2020 - 1:38pm
Access Control
access control mechanism
Adaptation models
authorisation
basic permission control mechanism
data privacy
extended policy-based access control model
Human behavior
Human Factors
modern robots
operating systems
permissions
Policy-based access control
policy-based governance
privacy leakage
pubcrawl
resilience
Resiliency
Robot Operating System
robot operating systems
robot programming
Robot sensing systems
robotic applications
robotic systems
robots
ROS
security
security aspects
Service robots
biblio
Asynchronous Parallel Surrogate Optimization Algorithm Based on Ensemble Surrogating Model and Stochastic Response Surface Method
Submitted by grigby1 on Fri, 11/20/2020 - 1:53pm
Adaptation models
Predictive models
pubcrawl
resilience
Resiliency
optimization
Scalability
Computational modeling
Stochastic processes
Load modeling
optimisation
ensemble model
inference mechanisms
approximation theory
parallel algorithms
uncertainty handling
asynchronous parallel surrogate optimization algorithm
asynchronous parameter optimization
black-box function optimization
ensemble surrogating model
model integration mode
parallel computing
parallel computing framework
parallel computing resources
parallel computing technology
parallel optimization algorithm
parallel parameter space sampling mechanism
parallel sampling mechanism
Quantitative Trading
response surface methodology
stochastic response surface method
surrogate model-based optimization algorithm
Stochastic Computing Security
1
2
3
4
5
6
7
8
9
next ›
last »