Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
graph embedding
biblio
Smart Vulnerability Assessment for Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach
Submitted by grigby1 on Thu, 09/16/2021 - 4:04pm
resilience
vulnerability scanning
Virtual machining
virtual machine
software development management
security
Scientific cyberinfrastructure
Scientific Computing Security
Resiliency
Compositionality
pubcrawl
Metrics
Memory
Inspection
graph embedding
GitHub
genomics
Conferences
biblio
Gait Phase Segmentation Using Weighted Dynamic Time Warping and K-Nearest Neighbors Graph Embedding
Submitted by aekwall on Mon, 02/22/2021 - 1:46pm
Dynamic Time Warping
weighted dynamic time warping algorithm
self-collected IMU gait signals
neural network-based graph embedding scheme
k-nearest neighbors graph embedding
k-nearest neighbors algorithm
k-nearest neighbors
inertial measurement units
gait phase segmentation method
gait phase estimates
gait information
gait cycle
nearest neighbour methods
nearest neighbor search
diseases
gait analysis
graph embedding
Predictive Metrics
image segmentation
Measurement
neural nets
graph theory
pubcrawl
biblio
Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems
Submitted by grigby1 on Fri, 12/11/2020 - 2:32pm
privacy
invasive software
IoT malware samples
learning (artificial intelligence)
malware
Malware Analysis
malware detection
Metrics
off-the-shelf adversarial attack methods
Internet of Things
pubcrawl
resilience
Resiliency
robust detection tools
security
static analysis
tools
adversarial learning
Human behavior
graph-based IoT malware detection systems
graph theory
graph embedding
graph analysis
generated adversarial sample
GEA approach
feature extraction
deep learning networks
deep learning
craft adversarial IoT software
control flow graph-based features
CFG-based features
benign sample
augmentation method
biblio
Graph Embedding Based Familial Analysis of Android Malware using Unsupervised Learning
Submitted by grigby1 on Fri, 12/11/2020 - 2:32pm
Malware Analysis
Unsupervised Learning
supervised learning
SRA
smart phones
similarity relationships
Semantics
security
Resiliency
resilience
pubcrawl
privacy
pattern clustering
pattern classification
Metrics
malware link network
analytical workload
malware
learning (artificial intelligence)
invasive software
Human behavior
graph theory
graph embedding techniques
graph embedding
GefDroid
feature extraction
familial analysis
Face
detection algorithms
application program interfaces
Android malware
biblio
Static Detection of Control-Flow-Related Vulnerabilities Using Graph Embedding
Submitted by grigby1 on Mon, 02/10/2020 - 11:35am
static analysis challenge
program compilers
program diagnostics
pubcrawl
resilience
Resiliency
security of data
Semantics
Software
static analysis
program behavioral problems
static code analysis
static detection
static vulnerability detection
static vulnerability detectors
Training
vulnerabilities
vulnerability detection
vulnerable program
graph embedding
composability
Computer bugs
Compositionality
control-flow
control-flow-related vulnerabilities
Convolutional codes
feature extraction
general static analysis solutions
graph convolutional network
CFR vulnerabilities
graph embedding approach
graph theory
high-level control-flow information
high-level control-flow related vulnerabilities
Human behavior
learning (artificial intelligence)
machine-learning-based approaches
program analysis
biblio
BITS Darshini: A Modular, Concurrent Protocol Analyzer Workbench
Submitted by grigby1 on Thu, 01/02/2020 - 2:45pm
collaborative analysis
concurrent packet analysis
expert systems
graph embedding
Human behavior
measurement workbench
network measurements
packet analyzer
protocol parse graph
pubcrawl
resilience
Resiliency
Scalability
security
biblio
DLGraph: Malware Detection Using Deep Learning and Graph Embedding
Submitted by grigby1 on Mon, 06/10/2019 - 1:59pm
Metrics
Windows application programming interface calls
Windows API calls
Trojan horses
static analysis
stacked denoising autoencoders
softmax regression
SDA
Resiliency
representation learning
pubcrawl
privacy
pattern classification
noise reduction
neural nets
microsoft windows
application program interfaces
malware detection
Malware Analysis
learning (artificial intelligence)
invasive software
Human behavior
graph theory
graph embedding
function-call graphs
function-call graph
feature extraction
embedded vector
embedded systems
DLGraph
deep learning
combined feature vector classification