Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Training data
biblio
Pattern Extraction for Behaviours of Multi-Stage Threats via Unsupervised Learning
Submitted by grigby1 on Fri, 01/22/2021 - 12:39pm
security of data
feature extraction
Anomaly Detection
data analysis
Unsupervised Learning
IP networks
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Correlation
Scalability
Cybersecurity
Training data
advanced persistent threat
APT
Clustering algorithms
pattern clustering
advanced persistent threats
Behaviour Analysis
Cyber Threats Intelligence
heterogeneous log-files
Log-files Analysis
malicious behaviour
Multi-stage threats
multistage threats
pattern extraction
biblio
Sparse Support Vector Machine for Network Behavior Anomaly Detection
Submitted by aekwall on Mon, 12/14/2020 - 11:30am
computer network security
Data models
Support vector machines
feature extraction
Feature Selection
learning (artificial intelligence)
Resiliency
pubcrawl
composability
optimization
pattern classification
SVM
Training
Anomaly Detection
Predictive Metrics
Training data
adopted training weights
general machine learning approach
NBAD features
network behavior anomaly detection
related weights matching
sparse support vector machine
sparse SVM
support vector machine approach
biblio
XSS Attack Detection With Machine Learning and n-Gram Methods
Submitted by aekwall on Mon, 12/14/2020 - 11:29am
security of data
Bayes methods
machine learning algorithms
nearest neighbour methods
Support vector machines
support vector machine
feature extraction
learning (artificial intelligence)
machine learning
Resiliency
pubcrawl
composability
Web sites
cross-site scripting
SVM
Uniform resource locators
Predictive Metrics
Training data
XSS attacks
website
XSS attack
cookies
detection script
k-nearest neighbour
KNN
malicious script
malicious scripts
N-gram
n-gram method
Naive Bayes
vulnerable
XSS attack detection
biblio
Poisoning Attack in Federated Learning using Generative Adversarial Nets
Submitted by grigby1 on Wed, 11/04/2020 - 1:14pm
AI Poisoning
Computational modeling
convolutional neural nets
Data models
deep learning model
federated learning
federated learning architecture
federated learning system
Gallium nitride
gan
Generative Adversarial Nets
Human behavior
learning (artificial intelligence)
poisoning attack
privacy
private training data
pubcrawl
resilience
Resiliency
Scalability
security
Servers
Task Analysis
Training
Training data
biblio
Poisoning Attack on Load Forecasting
Submitted by grigby1 on Wed, 11/04/2020 - 1:14pm
AI Poisoning
closed-form solution
Data models
data poisoning strategy
forecasting
Global Energy Forecasting Competition data
Human behavior
load forecasting
Load modeling
MLR attacking solution
MLR model
multiple linear regression
neural network
Numerical models
outlier detection
poisoning attack
poisoning attack solution
power engineering computing
power grids
power system security
Predictive models
pubcrawl
regression analysis
resilience
Resiliency
Scalability
security of data
short-term load forecasting systems
simulated annealing
statistical methods
Training data
biblio
Rethinking Location Privacy for Unknown Mobility Behaviors
Submitted by aekwall on Mon, 09/28/2020 - 11:02am
Scalability
mobile computing
Data models
Resiliency
Human behavior
pubcrawl
privacy
Data protection
Training
testing
data privacy
Training data
location privacy
design phase
blank-slate approach
blank-slate models
location privacy protections
location privacy service
location privacy-preserving mechanisms
LPPM design
mechanism design
Mobility Models
mobility patterns
nonsporadic location privacy scenarios
privacy properties
profile estimation-based LPPM
Quantifying privacy
sporadic hardwired models
unknown mobility
Zirconium
Computing Theory and Privacy
biblio
Detection of Near Field Communication (NFC) Relay Attack Anomalies in Electronic Payment Cases using Markov Chain
Submitted by aekwall on Tue, 09/08/2020 - 8:59am
security of data
Scalability
security
Data models
Resiliency
pubcrawl
Google
relay attack
Relays
embedded system security
Markov processes
Training data
Near Field Communication
attack anomalies
electronic payment cases
intrusive detection system
markov chain
near-field communication
target NFC network
Chained Attacks
biblio
Black Box Explanation Guided Decision-Based Adversarial Attacks
Submitted by grigby1 on Fri, 09/04/2020 - 3:10pm
Cryptography
Computational modeling
Cats
telecommunication security
optimisation
Artificial Intelligence
search problems
pubcrawl
composability
Metrics
Resiliency
resilience
learning (artificial intelligence)
Neural networks
neural nets
Perturbation methods
Training data
Logistics
artificial intelligence security
attack efficiency
black box explanation
black box explanation guided decision-based adversarial attacks
boundary attack
Constraint optimization
decision-based adversarial attacks
decision-based black-box adversarial attack
derivative-free and constraint optimization problem
imperceptible adversarial example
imperceptive adversarial perturbation
performing decision-based black-box attacks
targeted deep neural networks
Black Box Security
biblio
Selective Poisoning Attack on Deep Neural Network to Induce Fine-Grained Recognition Error
Submitted by aekwall on Mon, 08/10/2020 - 9:36am
AI Poisoning
Artificial Neural Networks
chosen class
CIFAR10
cyber physical systems
Data models
Deep Neural Network
distortion
DNN security
DNN training process
fine-grained recognition error
image recognition
learning (artificial intelligence)
machine learning
machine learning library
malicious training data
MNIST
neural nets
Neural networks
Neurons
nuclear facilities
Pattern recognition
poisoning attack
policy-based governance
pubcrawl
Resiliency
security of data
selective poisoning attack
Speech recognition
Support vector machines
Training
Training data
biblio
Estimating the Number of Hidden Nodes of the Single-Hidden-Layer Feedforward Neural Networks
Submitted by grigby1 on Fri, 07/03/2020 - 3:54pm
Artificial Neural Networks
attribute-based data normalization
Compositionality
computer architecture
cyber physical systems
data normalization
decomposition
Eigenvalues and eigenfunctions
feedforward neural nets
Feedforward neural networks
hidden nodes
Metrics
normalized data
optimal number
pubcrawl
sample-based data normalization
single-hidden-layer feedforward neural network
singular value decomposition
Training
Training data
1
2
3
4
next ›
last »