Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
DNN
biblio
Ransomware Detection Using Deep Learning in the SCADA System of Electric Vehicle Charging Station
Submitted by grigby1 on Mon, 03/14/2022 - 12:38pm
Compositionality
EVSE
electric vehicle charging
SCADA Systems Security
RNN
denial-of-service attack
Ransomware
LSTM
DNN
SCADA
Internet of Things
Smart Grids
SCADA systems
cyber-physical security
Resiliency
resilience
Human behavior
pubcrawl
CNN
deep learning
biblio
Network Security Evaluation Using Deep Neural Network
Submitted by aekwall on Thu, 09/30/2021 - 11:52am
Resiliency
Neural Network Security
security evaluating
Network
Human Factors
DNN
policy-based governance
Communication networks
cyber-physical systems
security
Metrics
pubcrawl
network security
computer networks
internet
Task Analysis
Neural networks
biblio
Blockchain Based End-to-End Tracking System for Distributed IoT Intelligence Application Security Enhancement
Submitted by aekwall on Tue, 06/01/2021 - 1:24pm
IoT
Cryptography
security
Data models
pubcrawl
composability
Computational modeling
blockchain
computational intelligence
tools
Training
edge computing
Compositionality
DNN
data centers
biblio
NeuroAttack: Undermining Spiking Neural Networks Security through Externally Triggered Bit-Flips
Submitted by aekwall on Thu, 05/13/2021 - 11:32am
Hardware
Spiking Neural Networks
SNN
security
Resiliency
resilience
Reliability
pubcrawl
policy-based governance
Metrics
machine learning
Cross Layer Security
fault-injection attacks
DNN
deep neural networks
cyber physical systems
cross-layer
Biological system modeling
Biological neural networks
Artificial Neural Networks
adversarial attacks
biblio
Is Spiking Secure? A Comparative Study on the Security Vulnerabilities of Spiking and Deep Neural Networks
Submitted by aekwall on Tue, 04/27/2021 - 1:10pm
Biological neural networks
Spiking Neural Networks
SNN
adversarial examples
belief networks
Deep Neural Network
Perturbation methods
DNN
Vulnerability
attack
image recognition
security
resilience
Neural networks
Training
Neurons
Robustness
machine learning
pubcrawl
Resiliency
cyber-physical systems
biblio
Investigation of an Innovative Approach for Identifying Human Face-Profile Using Explainable Artificial Intelligence
Submitted by aekwall on Mon, 03/01/2021 - 5:02pm
explanation
Pixel Segmentation
Human Profile Recognition
human face profile identification
human face identification
Geometric Ratios
geometric ratio expressions
feature vectors
feature vector
feature set diagnosis
Facial features
facial feature extraction
faces
Ear
biometric identification research
Scalability
explainable artificial intelligence
xai
Identification
Nose
face recognition
DNN
Artificial Intelligence
biometrics (access control)
image segmentation
biometrics
pubcrawl
Resiliency
feature extraction
biblio
A Test Cases Generation Technique Based on an Adversarial Samples Generation Algorithm for Image Classification Deep Neural Networks
Submitted by aekwall on Mon, 11/02/2020 - 2:47pm
Measurement
test cases generation technique
test cases generation
Software algorithms
Software
pubcrawl
program testing
Neural networks
neural nets
Metrics
metrics testing
adversarial samples
learning (artificial intelligence)
image classification deep neural networks
image classification
Filtering
DNN
deep learning
coverage metric
Classification algorithms
artificial intelligence tasks
adversarial samples generation algorithm
biblio
Symbolic Execution for Attribution and Attack Synthesis in Neural Networks
Submitted by grigby1 on Fri, 08/28/2020 - 12:22pm
DNN validation
Symbolic Execution
pubcrawl
program analysis
neural nets
Metrics
Importance Analysis
Image resolution
image classification
Human behavior
adversarial attacks
DNN
DeepCheck lightweight symbolic analysis
deep neural networks
core ideas
composability
attribution
attack synthesis
adversarial generation
biblio
CEPHEID: the infrastructure-less indoor localization using lighting fixtures' acoustic frequency fingerprints
Submitted by aekwall on Mon, 08/03/2020 - 10:16am
CEPHEID scheme
Acoustic Fingerprints
self localization
MLP
infrastructure-less indoor localization
indoor positioning experiments
Indoor Positioning
indoor localization scheme
environmental fingerprint
DNN classifier
discrete electronic components
Computer peripherals
CHEPEID
characteristic flickering pattern
Resiliency
ceiling lighting fixtures
indoor radio
lighting
Discrete Fourier transforms
light emitting diodes
DNN
estimation
Cameras
Mathematical model
wireless sensor networks
composability
pubcrawl
Human behavior
biblio
Privacy Preserving Big Data Publication On Cloud Using Mondrian Anonymization Techniques and Deep Neural Networks
Submitted by aekwall on Mon, 07/13/2020 - 11:07am
privacy
k-anonymity
machine learning
Mondrian anonymization techniques
Mondrian based k-anonymity approach
neural nets
Neural networks
personal data
personally identifiable information
predominant factor
high-dimensional data deep neural network based framework
privacy breach
privacy preservation
privacy preserving big data publication
privacy-preservation
protection
Resiliency
security
user privacy in the cloud
data analysis
pubcrawl
Human Factors
resilience
Scalability
Metrics
Big Data
Big Data Analytics
Cloud Computing
compromising privacy
big data privacy
data management
Data models
data privacy
data utility
Databases
deep neural networks
differential privacy
DNN
1
2
next ›
last »