Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
security of data
biblio
A Study on Combating Emerging Threat of Deepfake Weaponization
Submitted by
grigby1
on Fri, 01/15/2021 - 11:03am
deep learning
learning (artificial intelligence)
security of data
machine learning
pubcrawl
Human behavior
Human Factors
Metrics
Resiliency
Scalability
Medical services
neural nets
resilience
human computer interaction
generative adversarial networks
Videos
Weapons
DeepFake
Information integrity
deepfake detection
audio-visual systems
audios
autoencoders
believable synthetic content
combating emerging threat
deepfake technology
deepfake weaponization
fake content
Fake image
Fake Video
Forgery
genuine content
low-tech doctored images
Multimedia systems
signature forgery
spatial steganalysis
temporal steganalysis
biblio
Deepfake Detection with Clustering-based Embedding Regularization
Submitted by
grigby1
on Fri, 01/15/2021 - 11:01am
learning (artificial intelligence)
security of data
pubcrawl
Human behavior
Human Factors
Metrics
Resiliency
embedded systems
Scalability
resilience
face recognition
feature extraction
social networking (online)
pattern clustering
detection accuracy
object detection
video signal processing
Regularization
DeepFake
deepfake detection
AI-synthesized face swapping videos
clustering-based
clustering-based embedding regularization
deepfake datasets
deepfake detection competitions
deepfake video detection
face swapping
false video
video quality
biblio
Physical Security Detectors for Critical Infrastructures Against New-Age Threat of Drones and Human Intrusion
Submitted by
grigby1
on Mon, 01/11/2021 - 12:58pm
complex cyber-physical systems
continuous stream
critical infrastructure operators
critical infrastructure security
critical infrastructures
cyber incidents
deep video
Deep-learning
DEFENDER project
distributed cyber-physical systems
drone detection
early stage threat detection
fast restoration
human intruders
human intrusion
Intrusion Detection
learning (artificial intelligence)
Media Data
Metrics
modern critical infrastructures
multithreaded media input streams
neural nets
neural network deep-learning model
NVIDIA GeForce GTX 1080
NVIDIA GeForce RTX 2070 Max-Q Design
physical intrusion
physical security detectors
physical security sensors
proactive protection
pubcrawl
real-time threat identification
Region based Fully Connected Neural Network (RFCN)
remotely operated vehicles
resilience
Resiliency
Scalability
security of data
video analytics solution
Vulnerability
biblio
Secure Federated Averaging Algorithm with Differential Privacy
Submitted by
aekwall
on Mon, 01/11/2021 - 12:42pm
security of data
Scalability
Servers
data privacy
Data models
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
composability
privacy
convergence
convergence rate
Prediction algorithms
Analytical models
client-server systems
differential privacy
Stochastic processes
gradient methods
distributed machine learning
Gaussian noise
federated learning
message exchange
stochastic gradient descent
algorithm communication efficiency
client sensitive information
convergence analysis
differential attacks
federating averaging algorithm
local model parameters
message obfuscation
Model averaging
secure FedAvg algorithm
secure federated averaging algorithm
biblio
Private FL-GAN: Differential Privacy Synthetic Data Generation Based on Federated Learning
Submitted by
aekwall
on Mon, 01/11/2021 - 12:41pm
security of data
Scalability
data privacy
information security
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
composability
neural nets
differential privacy
data sharing
data handling
federated learning
data generation
data-holders
differential privacy generative adversarial network model
differential privacy sensitivity
differential privacy synthetic data generation
GAN training
high-quality synthetic data generation
Lipschitz limit
private FL-GAN
realistic fake data generation
strict privacy guarantee
biblio
Challenges and Designs for Secure Deletion in Storage Systems
Submitted by
aekwall
on Mon, 01/11/2021 - 12:30pm
security of data
Scalability
Data Security
encryption
pubcrawl
privacy
storage management
Law
Data Sanitization
flash memories
Hard disks
data scrubbing
deletion design security
disc drives
flash-based solid-state drives
hard disk drives
legal compliance requirements
magnetic recording
programming strategy
secure deletion
storage systems
user data protection
data deletion
biblio
Network-based Anomaly Intrusion Detection System in MANETS
Submitted by
grigby1
on Mon, 12/28/2020 - 12:01pm
ad hoc network
Ad hoc networks
component
Compositionality
fixed wired network
IDS
infrastructure-less networks
intrusion detection system
intrusion detection techniques
MANETs
Metrics
mobile ad hoc networks
mobile adhoc networks
mobile radio
network protocols
Network Simulator-2
Network-based anomaly intrusion detection system
pre-existing unfolding solutions
pubcrawl
resilience
Resiliency
Routing protocols
security
security of data
telecommunication security
wired environment
wireless Adhoc networks
wireless network
wireless networks
biblio
Packet Loss Avoidance in Mobile Adhoc Network by using Trusted LDoS Techniques
Submitted by
grigby1
on Mon, 12/28/2020 - 12:01pm
security of data
pubcrawl
Metrics
resilience
Resiliency
computer network security
telecommunication security
security
quality of service
telecommunication network routing
telecommunication traffic
Routing protocols
DDoS
Compositionality
wireless LAN
MANET
mobile ad hoc networks
transport protocols
mobile radio
ad hoc network
malicious node
Adhoc community
assault statistics packets
attacks
brief time period
cell system
community multifractal
confident facts communication
covered direction-finding
essential underlying reasons
FGA
full-size module
impenetrable direction advent
LDOS
LDoS attack
LDoS cyber-attacks
malicious events
MANET protection systems
marginal end-to-end facts packet interval
Mobile adhoc Network
more advantageous facts communication
packet evaluation method
packet loss avoidance
packet radio networks
PDR
QoS advantages
routing protection
time programs
traditional trust-based techniques
trust based approach routing choices
trusted LDoS techniques
unbiased have faith table
unobjectionable records forfeiture
Wi-Fi network
wicked nodes
wireless security
biblio
Effectiveness of Random Deep Feature Selection for Securing Image Manipulation Detectors Against Adversarial Examples
Submitted by
grigby1
on Mon, 12/28/2020 - 11:49am
adaptive filtering
Adversarial Machine Learning
adversarial multimedia forensics
CNN image manipulation detector
deep learning features
deep learning for forensics
feature extraction
feature randomization
Feature Selection
fully connected neural network
image classification
image manipulation detection
image manipulation detection tasks
image manipulation detectors
learning (artificial intelligence)
linear SVM
Metrics
pubcrawl
random deep feature selection
random feature selection approach
randomization-based defences
resilience
Resiliency
Scalability
secure classification
security of data
Support vector machines
biblio
BlurNet: Defense by Filtering the Feature Maps
Submitted by
grigby1
on Mon, 12/28/2020 - 11:48am
Adaptation models
adaptive attack evaluation
adaptive filtering
adversarial defense
adversarial images
Adversarial Machine Learning
Adversarial robustness
attack algorithms
black stickers
blackbox transfer attack
BlurNet
depthwise convolution layer
frequency analysis
gradient information
high frequency noise
image recognition
image restoration
input image
Kernel
layer feature maps
learning (artificial intelligence)
low-pass filters
lowpass filtering behavior
malicious adversary
malicious examples
Metrics
neural nets
Neural networks
Perturbation methods
pubcrawl
resilience
Resiliency
robust physical perturbations
Robustness
RP
Scalability
security of data
standard blur kernels
standard-architecture traffic sign classifiers
standards
stop signs
substitute model
targeted misclassification rates
traffic engineering computing
victim model
white stickers
white-box attacks
1
2
3
4
5
6
7
8
9
…
next ›
last »