Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
estimation
biblio
Vulnerability Assessment framework for a Smart Grid
Submitted by grigby1 on Fri, 01/20/2023 - 4:06pm
Smart Grids
WLS
Pressing
FDIA
Power system dynamics
smart grid security
Power system protection
Measurement
Metrics
security
estimation
Smart Grid
cyber security
Scalability
Resiliency
resilience
pubcrawl
biblio
Efficient 5G Network Slicing Selection with Privacy in Smart Grid
Submitted by grigby1 on Fri, 01/20/2023 - 4:03pm
feature extraction
pubcrawl
Metrics
Resiliency
Safety
privacy
5G mobile communication
Smart Grid
estimation
Smart Grids
privacy protection
network slicing
5G network slicing selection
match estimation
Smart Grid Privacy
biblio
An End-to-End Cyber-Physical Infrastructure for Smart Grid Control and Monitoring
Submitted by aekwall on Fri, 01/20/2023 - 3:17pm
Data visualization
Smart Grid Situational Awareness
topology estimation
full stack
cyber-physical system
network topology
Phasor Measurement Unit
Predictive Metrics
distribution networks
real-time systems
data analysis
Smart Grid
Smart Grids
composability
Resiliency
pubcrawl
estimation
testbed
biblio
A Privacy-preserving Approach to Distributed Set-membership Estimation over Wireless Sensor Networks
Submitted by grigby1 on Fri, 01/06/2023 - 3:11pm
security
pubcrawl
resilience
Resiliency
Scalability
privacy
wireless sensor networks
estimation
Delay effects
differential privacy
AI
Privacy-preserving
Human Factors
sensor systems and applications
Set-membership estimator
unknown but bounded noise
biblio
Automatic Selection Attacks Framework for Hard Label Black-Box Models
Submitted by aekwall on Tue, 12/20/2022 - 4:21pm
composability
transferability
substitute model
adversarial example
adversarial attack
White Box Security
Adaptation models
black-box attack
machine learning
Computational modeling
Resiliency
Metrics
pubcrawl
Conferences
face recognition
estimation
feature extraction
deep learning
biblio
Anti-attack Fault-tolerant Control of Multi-agent Systems with Complicated Actuator Faults and Cyber Attacks
Submitted by grigby1 on Fri, 12/09/2022 - 5:08pm
Fault tolerant systems
actuator security
fault-tolerant control
actuator faults
Observers
simulation
multi-agent systems
actuators
Cyber Attacks
pubcrawl
fault tolerance
composability
estimation
Protocols
Resiliency
resilience
Metrics
biblio
Bus Factor in Practice
Submitted by grigby1 on Thu, 12/01/2022 - 11:55am
Measurement
truck factor
Software algorithms
Software
Scalability
Resiliency
resilience
pubcrawl
Prediction algorithms
work factor metrics
knowledge management
Knowledge engineering
intelligent collaboration tools
estimation
control systems
case study
bus factor
biblio
Learn Travel Time Distribution with Graph Deep Learning and Generative Adversarial Network
Submitted by grigby1 on Wed, 11/02/2022 - 11:57am
deep learning
Predictive models
feature extraction
pubcrawl
Metrics
resilience
Resiliency
Analytical models
Scalability
Data models
estimation
generative adversarial networks
Generative Adversarial Learning
biblio
Event-Triggered Adaptive Fuzzy Asymptotic Tracking Control for Single Link Robot Manipulator with Prescribed Performance
Submitted by grigby1 on Fri, 09/16/2022 - 3:47pm
adaptive systems
security
pubcrawl
Metrics
resilience
estimation
control systems
event-triggered control
Fuzzy logic
manipulators
Resiliency
integral equations
asymptotic tracking control
Brushes
fuzzy logic systems
prescribed performance
biblio
Deep Metric Learning for Code Authorship Attribution and Verification
Submitted by grigby1 on Fri, 09/09/2022 - 1:28pm
machine learning
pubcrawl
Human behavior
Metrics
deep learning
estimation
Measurement
Plagiarism
face recognition
stylometry
copyright protection
codes
authorship identification
authorship verification
malware recognition
metric learning
1
2
3
4
5
6
7
8
9
…
next ›
last »