Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Perturbation methods
biblio
Context-aware Collaborative Neuro-Symbolic Inference in IoBTs
Submitted by grigby1 on Fri, 02/24/2023 - 4:44pm
deep learning
Training
collaboration
pubcrawl
Resiliency
Scalability
Data models
Decision Making
Perturbation methods
resilience
surveillance
iobt
Human Factors
Neuro-symbolic inference
robust learning
biblio
CR-Spectre: Defense-Aware ROP Injected Code-Reuse Based Dynamic Spectre
Submitted by aekwall on Fri, 02/17/2023 - 10:40am
Human Factors
Perturbation methods
pubcrawl
Scalability
Resiliency
composability
machine learning
side-channel attacks
malware
Program processors
programming
codes
rop attacks
biblio
An Effective Steganalysis for Robust Steganography with Repetitive JPEG Compression
Submitted by grigby1 on Fri, 02/03/2023 - 4:59pm
signal processing
pubcrawl
Metrics
privacy
composability
Manuals
Perturbation methods
social networking (online)
Image coding
Transform coding
Steganography
steganalysis
steganography detection
feature combination
Repetitive Compression
Robust Steganography
biblio
When Deep Learning Meets Steganography: Protecting Inference Privacy in the Dark
Submitted by grigby1 on Fri, 02/03/2023 - 4:58pm
deep learning
pubcrawl
Metrics
privacy
data privacy
Cloud Computing
composability
Perturbation methods
edge computing
Image edge detection
Weapons
adversarial attacks
Steganography
steganography detection
inference privacy
biblio
Strong PUF Security Metrics: Response Sensitivity to Small Challenge Perturbations
Submitted by grigby1 on Fri, 01/13/2023 - 4:18pm
Training
machine learning
pubcrawl
Metrics
Hardware
Perturbation methods
Measurement
Sensitivity
Security Metrics
Machine Learning Attacks on PUFs
Modeling Attacks on PUFs
Parametric statistics
Strong PUF Attacks
Strong PUF Security
Strong PUFs
biblio
A Robust Framework for Adaptive Selection of Filter Ensembles to Detect Adversarial Inputs
Submitted by grigby1 on Fri, 01/06/2023 - 4:25pm
neural network
Pareto optimization
Multi-Objective BLPP
AI/ML Security
Toxicology
adaptive filters
Learning systems
AI Poisoning
Adversarial Machine Learning
Adaptation models
resilience
Perturbation methods
programming
Scalability
optimization
Resiliency
Human behavior
pubcrawl
biblio
Facial Privacy Preservation using FGSM and Universal Perturbation attacks
Submitted by grigby1 on Fri, 01/06/2023 - 4:11pm
AI
White-Box attack
Universal Perturbation
Privacy attributes
Fast Gradient Sign Method (FGSM)
Facial Privacy
Facial Aesthetic preservation
DeepFool algorithm
black-box attack
Human Factors
Adversarial Machine Learning
pubcrawl
parallel processing
face recognition
visualization
Prediction algorithms
Perturbation methods
data privacy
privacy
Scalability
Resiliency
resilience
biblio
SPA: An Efficient Adversarial Attack on Spiking Neural Networks using Spike Probabilistic
Submitted by aekwall on Tue, 12/20/2022 - 5:21pm
Perturbation methods
white-box
White Box Security
transferability
Spiking Neural Networks
SNNs
security
Resiliency
pubcrawl
Probabilistic logic
adversarial attacks
perturbation
Neural networks
Metrics
Medical diagnosis
Linear programming
Degradation
composability
black-box
biblio
FALIoTSE: Towards Federated Adversarial Learning for IoT Search Engine Resiliency
Submitted by grigby1 on Fri, 11/18/2022 - 5:43pm
neural network resiliency
White-Box attack
IoT search engine (IoTSE)
deep generative model
federated learning
Sensor Systems
Recurrent neural networks
Time series analysis
Adversarial Machine Learning
search engines
Perturbation methods
Resiliency
resilience
pubcrawl
Training
biblio
Protecting Reward Function of Reinforcement Learning via Minimal and Non-catastrophic Adversarial Trajectory
Submitted by grigby1 on Tue, 09/20/2022 - 1:27pm
Reinforcement learning
reward function
non-catastrophic
expert trajectory
Costs
Human Factors
adversarial attack
expert systems
Clustering algorithms
Predictive models
Prediction algorithms
Measurement
Perturbation methods
privacy
Scalability
Human behavior
pubcrawl
1
2
3
4
5
6
7
8
9
next ›
last »