Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Unsupervised Learning
biblio
Application of Deep Learning for Crowd Anomaly Detection from Surveillance Videos
Submitted by grigby1 on Mon, 04/25/2022 - 3:54pm
deep learning
security
Anomaly Detection
pubcrawl
resilience
Resiliency
Scalability
Metrics
Error analysis
surveillance
one-class classification
Unsupervised Learning
video surveillance
deep video
visual analytics
biblio
A Malware Detection Approach Using Malware Images and Autoencoders
Submitted by aekwall on Tue, 09/21/2021 - 11:08am
Task Analysis
pubcrawl
Resiliency
Human behavior
privacy
Training data
malware
malware detection
Sensor Systems
Malware Analysis
autoencoders
Labeling
malware images
supervised learning
Unsupervised Learning
Predictive Metrics
biblio
Analysing the Role of Supervised and Unsupervised Machine Learning in IoT
Submitted by aekwall on Tue, 09/21/2021 - 10:45am
security
Support vector machines
Clustering algorithms
Internet of Things (IoT)
machine learning
Classification algorithms
malware
supervised learning
Unsupervised Learning
ML techniques
Supervised Learning and Unsupervised Learning
biblio
An Attack-Resilient Architecture for the Internet of Things
Submitted by grigby1 on Thu, 09/16/2021 - 1:10pm
Access Control
Analytical models
Anomaly Detection
Data models
Internet of Things
Intrusion Detection
machine learning
network security
pubcrawl
resilience
Resiliency
Resilient Security Architectures
Unsupervised Learning
biblio
Practical and White-Box Anomaly Detection through Unsupervised and Active Learning
Submitted by grigby1 on Thu, 03/04/2021 - 2:35pm
pubcrawl
white-box anomaly detection
user experience
Unsupervised Learning
Unsupervised Anomaly Detection
Time series analysis
time series
supervised learning
security of data
RRCF algorithm
RRCF
robust random cut forest
Resiliency
resilience
random forests
White Box Security
Neural networks
Monitoring
Metrics
Labeling
KPI anomaly detection framework
key performance indicators
iRRCF
Forestry
composability
Anomaly Detection
active learning
security
white box
biblio
Unsupervised Discovery Of Semantically Aware Communities With Tensor Kruskal Decomposition: A Case Study In Twitter
Submitted by aekwall on Mon, 02/15/2021 - 4:47pm
recursive community structure
functional Twitter elements
hashtag semantics
heavy degree distribution tail
high clustering coefficient values
higher order analytics
higher order counterpart
Julia
Kruskal decomposition
low diameter
news aggregators
Political Campaigns
politics
rank one tensors
functional coherency
semantic weight
semantically aware communities
Structural coherency
structural Twitter elements
substantial empirical evidence
synthetic graph generation models
tensor algebra
tensor kruskal decomposition
tensor representation
Tucker tensor decomposition
Twitter subgraph
unofficial form
unsupervised discovery
tensors
graph theory
social networking (online)
Twitter
Metrics
social network
network theory (graphs)
cyber physical systems
Unsupervised Learning
Semantics
Compositionality
Periodic structures
singular value decomposition
SVD
pubcrawl
Tucker decomposition
decomposition
analytical methodologies
Blogs
clustered graph spectrum
Community discovery
community structure discovery
compact community size distribution
digital marketing
Facebook groups
fact checking
followfollower relationships
biblio
Pattern Extraction for Behaviours of Multi-Stage Threats via Unsupervised Learning
Submitted by grigby1 on Fri, 01/22/2021 - 1:39pm
Training data
pattern extraction
multistage threats
Multi-stage threats
malicious behaviour
Log-files Analysis
heterogeneous log-files
Cyber Threats Intelligence
Behaviour Analysis
advanced persistent threats
pattern clustering
Clustering algorithms
APT
advanced persistent threat
security of data
Cybersecurity
Scalability
Correlation
Resiliency
resilience
Metrics
Human behavior
pubcrawl
IP networks
Unsupervised Learning
data analysis
Anomaly Detection
feature extraction
biblio
Adversarial Perturbations Fool Deepfake Detectors
Submitted by grigby1 on Fri, 01/15/2021 - 12:02pm
adversarial perturbations
Lipschitz regularization
image restoration
generative convolutional neural networks
fast gradient sign method
Deepfakes
deepfake image enhancement
deepfake detectors
Deep Image Prior
faces
DeepFake
image enhancement
generative adversarial networks
Detectors
feature extraction
Training
gradient methods
resilience
Electronics packaging
Perturbation methods
Scalability
Resiliency
Metrics
Human Factors
Human behavior
pubcrawl
Neural networks
convolutional neural nets
Unsupervised Learning
biblio
Network Anomaly Detection Based on Deep Support Vector Data Description
Submitted by aekwall on Mon, 12/14/2020 - 12:30pm
network anomaly detection
Unsupervised Learning
Training
telecommunication traffic
Support vector machines
support data vector description
security of data
Resiliency
representation learning
pubcrawl
Predictive Metrics
normal traffic features
Neural networks
network traffic anomaly detection
False Data Detection
malicious traffic detection system
KDD CUP99 dataset
intrusion detection system
feature extraction
Deep-SVDD
deep support vector data description
Deep Neural Network
Data models
convolutional neural network
convolutional neural nets
composability
Big Data
Anomaly Detection
biblio
Graph Embedding Based Familial Analysis of Android Malware using Unsupervised Learning
Submitted by grigby1 on Fri, 12/11/2020 - 2:32pm
Malware Analysis
Unsupervised Learning
supervised learning
SRA
smart phones
similarity relationships
Semantics
security
Resiliency
resilience
pubcrawl
privacy
pattern clustering
pattern classification
Metrics
malware link network
analytical workload
malware
learning (artificial intelligence)
invasive software
Human behavior
graph theory
graph embedding techniques
graph embedding
GefDroid
feature extraction
familial analysis
Face
detection algorithms
application program interfaces
Android malware
1
2
3
4
next ›
last »