Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Approximation algorithms
biblio
Fast Scalable Approximate Nearest Neighbor Search for High-dimensional Data
Submitted by aekwall on Mon, 02/22/2021 - 12:45pm
machine learning algorithms
learning (artificial intelligence)
machine learning
pubcrawl
graph theory
Big Data
query processing
trees (mathematics)
Data mining
Measurement
application program interfaces
Predictive Metrics
Partitioning algorithms
approximation theory
Approximation algorithms
message passing
search problems
nearest neighbor search
Load management
high-dimensional data
graph-based sequential approximate k-NN search algorithm
hierarchical navigable small world
HNSW
k-d tree-based solution
k-nearest neighbor search
K-NN search
load balancing
MPI one-sided communication
MPI-OpenMP solution
Nearest neighbor methods
parallel algorithms
similarity search
Vantage Point Tree
vantage point trees
biblio
The State of the Uniform: Attacks on Encrypted Databases Beyond the Uniform Query Distribution
Submitted by aekwall on Mon, 02/22/2021 - 12:43pm
Servers
Cryptography
encryption
nearest neighbour methods
pubcrawl
query processing
Databases
Measurement
database management systems
estimation
Predictive Metrics
Histograms
encrypted databases
Approximation algorithms
data distribution
nearest neighbor search
range queries
distribution-agnostic reconstruction attacks
first value reconstruction attacks
k-nearest-neighbor queries
k-NN attack
known structured encryption schemes
known value reconstruction attacks
leakage-abuse attacks
plaintext values
range attack
search tokens
search-pattern leakage
skewed query distributions
support size estimator
uniform query distribution
uniformly distributed queries
biblio
Development of Decomposition Methods for Empirical Modes Based on Extremal Filtration
Submitted by aekwall on Mon, 02/15/2021 - 3:45pm
Conferences
pubcrawl
Metrics
cyber physical systems
Manganese
Signal processing algorithms
Time-frequency Analysis
Compositionality
signal processing
Approximation algorithms
wavelet transforms
filtration
alternating components
decomposition methods
Empirical mode decomposition
empirical modes decomposition
extremal filtration
extremal filtration method
known components
method development
method distribution
rapid analysis of signals
signal decomposition
simple mathematical basis
Spectral analysis
time-frequency feature
decomposition
biblio
Pitfalls in Machine Learning-based Adversary Modeling for Hardware Systems
Submitted by grigby1 on Thu, 01/28/2021 - 12:12pm
Adversary Models
Approximation algorithms
Boolean functions
Composed Hardware
cryptanalysis attacks
cryptographic scheme
Cryptography
Hardware
Human behavior
learning (artificial intelligence)
logic locking
machine learning
machine learning-based adversary model
machine learning-based attacks
Metrics
physically unclonable functions
Picture archiving and communication systems
pubcrawl
resilience
Resiliency
Root-of-trust
Scalability
biblio
Detection of Sybil Attack on Tor Resource Distribution
Submitted by aekwall on Mon, 12/14/2020 - 11:42am
computer network security
network security
Resiliency
pubcrawl
composability
detection
Sybil attack
graph theory
resource management
Metrics
sybil attacks
Web sites
Relays
integer programming
Communication Systems
Approximation algorithms
Bridges
detection method
Linear programming
Bipartite graph
anonymous communication system
computer program
Distribution strategy
enumeration attacks
Integer Linear Program
minimum malicious user
resource distribution
resource distribution process
suspicious malicious users
tor anonymous communication system
tor resource distribution
biblio
An Improved Multi-objective Particle Swarm Optimization
Submitted by aekwall on Mon, 12/14/2020 - 11:40am
pubcrawl
composability
convergence
particle swarm optimisation
Swarm Intelligence
optimization
particle swarm optimization
Sociology
Statistics
genetic algorithms
Sorting
Compositionality
evolutionary computation
Approximation algorithms
MOEA/D
MOPSO
multi-objective optimization algorithm
multi-objective particle swarm optimization
multiobjective evolutionary algorithm based on decomposition
multiobjective particle swarm optimization
nondominated sorting genetic algorithm II
NSGA-II
Pareto optimisation
track planning problems
ZDT\textbackslashtextbackslashDTLZ test functions
biblio
KHyperLogLog: Estimating Reidentifiability and Joinability of Large Data at Scale
Submitted by aekwall on Mon, 10/12/2020 - 10:32am
Scalability
data privacy
Organizations
Runtime
Human behavior
pubcrawl
privacy
regression analysis
Measurement
anonymity
Indexes
Human Factors
Approximation algorithms
Data Governance
approximate counting techniques
Approximate-Counting
data characteristics
Data-Privacy
joinability analysis
joinability risks
KHLL
KHyperLogLog
privacy relevant characteristics
proprietary data sets
pseudonymous identified data sets
publicly available data sets
reidentifiability
very large databases
Expert Systems and Privacy
biblio
Targeted Adversarial Examples for Black Box Audio Systems
Submitted by grigby1 on Fri, 09/04/2020 - 3:10pm
security of data
Task Analysis
pubcrawl
composability
Metrics
Resiliency
resilience
Decoding
genetic algorithms
Sociology
Statistics
deep neural networks
adversarial attack
recurrent neural nets
Approximation algorithms
adversarial perturbations
adversarial generation
audio systems
audio transcription
automatic speech recognition systems
black box audio systems
black-box
deep recurrent networks
estimation
fooling ASR systems
gradient estimation
gradient methods
Speech recognition
speech-to-text
white-box attacks
Black Box Security
biblio
Deletion Propagation for Multiple Key Preserving Conjunctive Queries: Approximations and Complexity
Submitted by grigby1 on Fri, 07/10/2020 - 10:41am
approximation
Approximation algorithms
approximations
Complexity theory
computational complexity
computer science
conjunctive queries
conjunctive query
data cleaning
data deletion
data lineage
Databases
debugging
deletion propagation
dichotomy
dynamic programming
Heuristic algorithms
investigated problem
key preserving
multiple key preserving conjunctive queries
multiple project-free
multiple queries
nontrivial set
polynomials
privacy
problem funda-mental
pubcrawl
quality management
query feedback
query processing
realistic case
repairing data
Scalability
single query case
standard deletion propagation problem
tuples
view propagation
view side-effect
biblio
Supervised Max Hashing for Similarity Image Retrieval
Submitted by grigby1 on Fri, 06/12/2020 - 11:08am
-Convolutional-Neural-Networks
-Learning-to-Hash
-Winner-Take-All-Hash-Family
Approximation algorithms
argmax function
Compositionality
convolutional neural nets
convolutional neural networks
deep neural network architecture
feature extraction
feature vector generation
file organisation
gradient descent methods
gradient methods
hand-crafted feature vectors
hash algorithm
hash algorithms
hash code
Hash Function
Hash functions
hashing
image retrieval
k-ary base
labeled image datasets
learning (artificial intelligence)
mathematically differentiable approximation
nearest neighbor search
pubcrawl
Quantization (signal)
resilience
Resiliency
rich feature vectors
Semantics
similarity image retrieval
storage efficiency
supervised hashing methods
supervised max hashing
Training
1
2
3
next ›
last »