Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
transfer learning
biblio
Style transfer-based image synthesis as an efficient regularization technique in deep learning
Submitted by
grigby1
on Fri, 12/11/2020 - 1:54pm
base image
challenging skin lesion classification case study
convolutional neural nets
convolutional neural networks
data augmentation
decision support system
deep learning
deep neural networks
Diagnosis
efficient regularization technique
Image analysis
image classification
image classification purposes
image synthesis
labeled images
learning (artificial intelligence)
learning algorithms
Lesions
machine learning
Metrics
Neural networks
neural style transfer
newly created images
pubcrawl
Regularization
regularization techniques e.g
relatively poor generalization abilities
representative neural architectures
resilience
Resiliency
Scalability
Skin
skin lesions
style transfer-based image synthesis
Task Analysis
Training
transfer learning
unlabeled images
biblio
Deep Learning Poison Data Attack Detection
Submitted by
grigby1
on Wed, 11/04/2020 - 1:15pm
adversarial information
AI Poisoning
attacking training data
Bayesian statistic
CNN model
computer network security
deep learning
deep learning poison data attack detection
deep neural networks
Entropy
Human behavior
learning (artificial intelligence)
Maximum Entropy method
maximum entropy principle
MNIST data
model definitions
network attack
neural nets
poisoned training data
poisonous data
pre-trained model parameters
pubcrawl
resilience
Resiliency
Scalability
system-critical applications
testing data
training phase
transfer learning
Variational inference
variational inference approach
biblio
Few-Shot Transfer Learning for Text Classification With Lightweight Word Embedding Based Models
Submitted by
aekwall
on Mon, 11/02/2020 - 1:30pm
Task Analysis
Data models
feature extraction
Human behavior
pubcrawl
Computational modeling
pattern classification
Training
text analysis
text categorization
text classification
transfer learning
deep learning
Human Factors
Compositionality
Computing Theory and Compositionality
supervised learning
data-hungry deep models
deep learning architectures
Few-shot learning
few-shot transfer learning tasks
lightweight word embedding-based models
modified hierarchical pooling strategy
parameter-free pooling operations
parameter-free property
parameters training
plug-and-play way
pooling strategy
semantic compositionality
Semantic Networks
semantic text
simple word embedding-based models
supervised data
unseen text sequences
word embedding based models
word processing
biblio
An Xception Convolutional Neural Network for Malware Classification with Transfer Learning
Submitted by
grigby1
on Thu, 10/29/2020 - 10:10am
CNN models
convolutional neural nets
convolutional neural network (CNN)
ensemble model
feature extraction
Gray-scale
Human behavior
image classification
image-based malware classification
invasive software
learning (artificial intelligence)
malware
malware classification
malware classification problem
malware image classification
Metrics
Microsoft malware dataset
pattern classification
Predictive models
privacy
pubcrawl
resilience
Resiliency
special CNN architecture
Support vector machines
testing
Training
transfer learning
VGG16 model
Xception
Xception convolutional neural network
Xception model
biblio
TrustSign: Trusted Malware Signature Generation in Private Clouds Using Deep Feature Transfer Learning
Submitted by
grigby1
on Fri, 07/10/2020 - 12:08pm
Automatic Signature Generation
Cloud Computing
cloud virtualization technology
convolutional neural networks
Cryptography
cryptojacking
cryptojacking attacks
deep feature transfer learning
deep learning
digital signatures
distribution time
dynamic analysis
fileless malware
high-level deep features
Human behavior
Human Factors
ImageNet dataset
in-browser cryptojacking attacks
inspection procedure
invasive software
malware
Metrics
neural nets
private clouds
program diagnostics
pubcrawl
ransomware samples
resilience
Resiliency
static analysis
supervised classifiers
transfer learning
Trusted Computing
trusted malware signature generation method
TrustSign signature generation process
unsupervised classifier
Unsupervised Learning
VGG-19 neural network model
virtualisation
volatile memory
biblio
Preserving Privacy in Convolutional Neural Network: An ∊-tuple Differential Privacy Approach
Submitted by
aekwall
on Mon, 06/22/2020 - 10:20am
Cloud Computing
Scalability
data privacy
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
composability
classification
privacy
CNN
convolutional neural nets
convolutional neural network
image recognition
transfer learning
Deep Neural Network
differential privacy
CNN model
medical data
complex data features
deep neural networks
financial data
model buildup data
model inversion attack
privacy concern
privacy preserving model
reusable output model
salient data features
significant accuracy degradation
Training data
ϵ-tuple differential privacy approach
biblio
An Adaptive Approach for Anomaly Detector Selection and Fine-Tuning in Time Series
Submitted by
grigby1
on Tue, 01/21/2020 - 10:59am
Anomaly Detection
Compositionality
expandability
joint learning network
pubcrawl
resilience
Resiliency
self-adaption
time series
transfer learning
file
Mitigating Uncertainties in Computer Numerical Control (CNC) as a Cloud Service using Data-Driven Transfer Learning
Submitted by Anonymous on Thu, 01/16/2020 - 4:02pm. Contributors:
Chinedum Okwudire
RaedAl Kontar
Cybermanufacturing
transfer learning
control;
Posters
1931950
CPS PI Meeting 2019
2019
NSF
U.S. Government
Poster
biblio
Learning Transferable Features For Open-Domain Question Answering
Submitted by
aekwall
on Mon, 11/25/2019 - 1:01pm
Adaptation models
Analogies and Transference
clustering algorithm
complementary data
Data models
Deep Networks
domain adaptation approaches
domain-adaptation
domain-specific features
domain-specific QA models
Human behavior
Human Factors
information retrieval
Knowledge Discovery
learning (artificial intelligence)
Linear programming
natural language
natural language processing
open-domain QA models
open-domain question answering
open-domain Question-Answering models
pattern clustering
pubcrawl
question answering (information retrieval)
Question-Answering
sentence-level QA models
single open-domain QA model
span-level QA benefits
Task Analysis
Training
training corpora
Training data
transfer learning
transferable feature learning
transferable features
biblio
Malware Classification Using Deep Convolutional Neural Networks
Submitted by
grigby1
on Mon, 06/10/2019 - 1:01pm
accuracy levels
classification
classifier
convolutional neural nets
convolutional neural network
convolutional neural networks
Correlation
DCNN classification
deep convolutional neural networks
deep learning techniques
feature extraction
Gray-scale
Hamming distance
Human behavior
image classification
image features
image representation
image type
improved image representation
invasive software
learning (artificial intelligence)
learning models
machine learning
malware
malware binaries
malware classification
malware images
Metrics
neural network
object detection
Pattern recognition
privacy
pubcrawl
resilience
Resiliency
support vector machine
support vector machine classifier training
Support vector machines
transfer learning
visual patterns
visualization
1
2
next ›
last »