Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
neural network
biblio
Using Deep Learning Techniques for Network Intrusion Detection
Submitted by grigby1 on Tue, 02/23/2021 - 1:47pm
learning (artificial intelligence)
feature extraction
machine learning
CNN
convolutional neural nets
Intrusion Detection
pubcrawl
Metrics
resilience
Resiliency
computer network security
network security
recurrent neural nets
composability
deep learning
convolutional neural networks
recurrent neural network
Recurrent neural networks
network intrusion detection
deep learning techniques
neural network
convolutional neural network
cyber-security attacks
intelligent network intrusion detection system
network intrusion attacks
RNN
biblio
An intrusion detection system integrating network-level intrusion detection and host-level intrusion detection
Submitted by grigby1 on Tue, 02/23/2021 - 1:46pm
learning (artificial intelligence)
machine learning
security
Data mining
convolutional neural nets
Intrusion Detection
pubcrawl
Metrics
resilience
Resiliency
computer network security
cyber security
intrusion detection system
Computer crime
composability
cyber-attacks
software reliability
neural network
network intrusion detection
Scalability
software quality
NSL-KDD dataset
ADFA dataset
cyber-attackers
host-level IDS
host-level intrusion detection
IDS field
network-level intrusion detection
scalable neural-network-based hybrid IDS framework
biblio
Identifying Ubiquitious Third-Party Libraries in Compiled Executables Using Annotated and Translated Disassembled Code with Supervised Machine Learning
Submitted by aekwall on Mon, 02/22/2021 - 12:44pm
Software
Task Analysis
Support vector machines
machine learning
pubcrawl
graph theory
internet
tools
Libraries
supply chain management
neural network
Measurement
Databases
reverse engineering
Predictive Metrics
Microprogramming
Classification algorithms
supervised learning
nearest neighbor search
Bayes method
clustering methods
k-nearest neighbor search
Matrices
vector
biblio
A THz Image Edge Detection Method Based on Wavelet and Neural Network
Submitted by grigby1 on Mon, 02/08/2021 - 1:00pm
Canny operator method
composability
edge detection
edge image fusion
Electromagnetic radiation
frequency
Image analysis
Image edge detection
image fusion
Image Processing
image recognition
information security
low-frequency subimage detection
Metrics
neural nets
neural network
neural network method
Neural networks
Pattern recognition
pubcrawl
resilience
Resiliency
Scalability
security
terahertz wave imaging
terahertz waves
THz image edge detection method
wavelet
wavelet analysis
wavelet decomposition
wavelet transform method
wavelet transforms
biblio
Method of Image Style Transfer Based on Edge Detection
Submitted by aekwall on Mon, 02/01/2021 - 10:43am
Scalability
Resiliency
pubcrawl
neural nets
random processes
neural network
Markov processes
edge detection
Predictive Metrics
neural style transfer
image style transfer
content image edge structure
edge information image
edge information loss
Markov random field
markov random field neural network algorithm
neural network processing
neural network style transfer
biblio
Training Neural Network Over Encrypted Data
Submitted by aekwall on Mon, 01/18/2021 - 10:27am
Scalability
Cryptography
encrypted data
encryption
learning (artificial intelligence)
Resiliency
pubcrawl
Metrics
pattern classification
Training
convolutional neural nets
convolutional neural networks
Image color analysis
neural network
image classification
convolutional classifier
convolutional neural network classifier
image data encryption
image permutation
plain data
private company policy
Fuzzy Cryptography
biblio
Deepfake: A Survey on Facial Forgery Technique Using Generative Adversarial Network
Submitted by grigby1 on Fri, 01/15/2021 - 11:11am
Training
authorisation
machine learning
behavioural sciences computing
Neural networks
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
Generators
Scalability
neural nets
deep learning
Metrics
face recognition
social networking (online)
generative adversarial network
generative adversarial networks
Motion pictures
Face
neural network
video signal processing
DeepFake
AI technology
authentic people
celebrities
character defamation
Deepfake technique
election process
face video forgery technique
facial forgery technique
high-profile politician
social media platform
unauthentic spurious video
biblio
Neural Network and ROS based Threat Detection and Patrolling Assistance
Submitted by grigby1 on Thu, 12/17/2020 - 12:38pm
autonomous navigation
autonomously moving bots
Cameras
computer architecture
computer vision
computer vision algorithms
control engineering computing
convolutional neural networks
daily ergonomics
ergonomics
hardware components
Human behavior
Human Factors
Lasers
mobile robots
navigation
neural nets
neural network
object detection
operating systems (computers)
patrolling assistance
policy-based governance
pubcrawl
resilience
Resiliency
Robot Operating System
robot operating systems
robot vision
Robot vision systems
robotic automation
ROS based threat detection
security
Service robots
Software Architecture
software architecture design
Weapons
YOLO
biblio
A Novel Jamming Attacks Detection Approach Based on Machine Learning for Wireless Communication
Submitted by aekwall on Mon, 12/14/2020 - 11:32am
Receivers
telecommunication security
game theory
machine learning algorithms
Support vector machines
support vector machine
learning (artificial intelligence)
machine learning
Resiliency
pubcrawl
composability
Vegetation
neural network
Fuzzy logic
probability
telecommunication computing
signal detection
Predictive Metrics
wireless channels
5G
time series
Transmitters
Wireless communication
random forests
Jamming
wireless network
Forestry
random forest algorithm
channel surfing
detection probability
false alarm probability
jamming attacks
jamming attacks detection
jamming signal detection
millimeter wave bands
Random Fores
smart jammers
biblio
Enhanced Style Transfer in Real-Time with Histogram-Matched Instance Normalization
Submitted by grigby1 on Fri, 12/11/2020 - 1:55pm
AdaIN layer
adaptive normalization
adaptive normalization layer
Conferences
content feature maps
feature extraction
feedforward neural nets
Feedforward neural networks
histogram matching
histogram-matched instance normalization
Histograms
image matching
Image reconstruction
image texture
impedance matching
Metrics
neural network
Neural networks
neural style transfer
pubcrawl
real-time systems
resilience
Resiliency
Scalability
statistical analysis
statistical information
style feature maps
style transfer
style transfer method
style-swap layer
texture clarity
trustworthy quality
1
2
3
4
5
6
7
next ›
last »