Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Data models
biblio
DeCrypto Pro: Deep Learning Based Cryptomining Malware Detection Using Performance Counters
Submitted by grigby1 on Fri, 01/22/2021 - 1:38pm
Cryptography
Predictive models
machine learning
Data mining
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
Data models
Computational modeling
random forests
recurrent neural nets
cyberattacks
deep learning
pattern classification
malware
invasive software
malware detection
nearest neighbour methods
k-nearest neighbors
Random Forest
advanced persistent threat
APT
deep neural networks
encoding
Long short-term memory
LSTM
defense mechanisms
advanced persistent threats
antivirus applications
APTs
behavior profiling
benign compression
classification model
collaborative attacks
computational resources
cryptographic operations
cryptojacking
cryptomining
DeCrypto Pro
DeCrypto Profiler framework
deep cryptomining profiler
mission-critical cybersystems
model selection
operating context profiling system
performance counters
Ransomware
system features
system functionalities
Trojan Laziok
utility function
Windows performance counters
biblio
Automated Analysis of PUF-based Protocols
Submitted by grigby1 on Wed, 01/20/2021 - 3:21pm
Analytical models
API
APIs
application programming interface
Compositionality
Cryptographic Protocols
Cryptography
Data models
error correction data
fingerprint identification
formal methods and verification
Hardware
hardware-based security
integrated circuit
integrated circuits
mutual authentication protocol
physical unclonable functions
Protocols
pubcrawl
PUF API
PUF-based protocols
pufs
resilience
Resiliency
Security Properties
security protocols
Tamarin prover
biblio
Secure Federated Averaging Algorithm with Differential Privacy
Submitted by aekwall on Mon, 01/11/2021 - 12:42pm
security of data
Scalability
Servers
data privacy
Data models
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
composability
privacy
convergence
convergence rate
Prediction algorithms
Analytical models
client-server systems
differential privacy
Stochastic processes
gradient methods
distributed machine learning
Gaussian noise
federated learning
message exchange
stochastic gradient descent
algorithm communication efficiency
client sensitive information
convergence analysis
differential attacks
federating averaging algorithm
local model parameters
message obfuscation
Model averaging
secure FedAvg algorithm
secure federated averaging algorithm
biblio
The Value of Collaboration in Convex Machine Learning with Differential Privacy
Submitted by aekwall on Mon, 01/11/2021 - 12:41pm
Scalability
data privacy
Data models
Support vector machines
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
composability
privacy
Computational modeling
Prediction algorithms
Training
machine learning
regression analysis
collaboration
differential privacy
gradient methods
fraud
financial data processing
privacy budget
multiple data owners
convex machine learning
credit card fraud detection
differentially-private gradient queries
differentially-private gradients
distributed datasets
distributed private data
financial datasets
fitness cost
loan interest rates
nonoverlapping training datasets
privacy-aware data owners
privacy-aware learning algorithms
Regression
Stochastic gradient algorithm.
stochastic gradient descent
biblio
Lightweight Crypto-Assisted Distributed Differential Privacy for Privacy-Preserving Distributed Learning
Submitted by aekwall on Mon, 01/11/2021 - 12:40pm
Scalability
Servers
encryption
data privacy
distributed processing
Cryptographic Protocols
Data models
learning (artificial intelligence)
privacy leakage
Resiliency
Human behavior
pubcrawl
composability
privacy
differential privacy
mean square error methods
mean squared error
Privacy-preserving
privacy-utility tradeoff
centralized differential privacy
distributed differential privacy
distributed learning
floating-point values
lightweight crypto-assisted distributed differential privacy
privacy guarantees
privacy-preserving distributed learning
private training data
three-layer encryption protocol
trusted server
unbiased encoding
biblio
Improving Efficiency of Pseudonym Revocation in VANET Using Cuckoo Filter
Submitted by aekwall on Mon, 01/11/2021 - 12:31pm
Compression
CRLs
data deletion
Data models
data structures
filtering algorithms
Fingerprint recognition
Information filters
privacy
pseudonyms
pubcrawl
Scalability
standards
VANETs
vehicular ad hoc networks
biblio
A Successive Framework: Enabling Accurate Identification and Secure Storage for Data in Smart Grid
Submitted by aekwall on Mon, 01/11/2021 - 12:31pm
Cloud Computing
Scalability
Cryptography
power aware computing
Data models
pubcrawl
blockchain
privacy
smart power grids
Substations
Distributed databases
Smart Grid
power engineering computing
Smart Grids
blockchain technology
data visualisation
quality assurance
computer vision
power data
data modification
CBFM
cloud-blockchain fusion model
Fabric
image data
malicious eavesdropping
Meter reading
Parallel vision
parallel visual system
performance evaluations
secure manners
Secure storage
security guarantee
tamper-proof characteristics
data deletion
biblio
De-identification and Privacy Issues on Bigdata Transformation
Submitted by grigby1 on Mon, 12/28/2020 - 11:39am
Big Data
big data privacy
Big Data transformation
controllable privacy level
data analysis
Data models
data privacy
de-identification processes
diseases
government sectors
Guidelines
Human behavior
ICT industry
Industries
k-anonymity
l-Diversity
Metrics
personal information
privacy
privacy attacks
pubcrawl
resilience
Resiliency
Scalability
t-closeness
biblio
Research on Intelligent Security Protection of Privacy Data in Government Cyberspace
Submitted by grigby1 on Mon, 12/28/2020 - 11:38am
agent-based intelligent masking middleware
automatic execution
automatic recommendation
big data privacy
categorization and classification
Classification algorithms
data analysis
data masking algorithm
Data models
data privacy
data source
dynamic masking
Government
government cyberspace
government data masking process
government data processing
government privacy data
government unstructured text
Human behavior
improved masking process
intelligent discovery
intelligent security protection
learning (artificial intelligence)
machine learning
Metrics
middleware
NLP
open systems
privacy protection
protection efficiency
pubcrawl
resilience
Resiliency
Scalability
security
sensitive data discovery
static masking
structured privacy data
unstructured privacy data
biblio
Detecting Malicious Web Requests Using an Enhanced TextCNN
Submitted by aekwall on Mon, 12/14/2020 - 11:31am
security of data
Data models
Support vector machines
support vector machine
feature extraction
learning (artificial intelligence)
machine learning
Resiliency
pubcrawl
composability
pattern classification
internet
text analysis
convolutional neural nets
convolutional neural networks
text classification
statistical analysis
file servers
Web servers
deep learning
Semantics
Uniform resource locators
Predictive Metrics
web security
deep learning models
convolutional neural network for text classification
Convolutional Neural Network for Text Classification (TextCNN)
HTTP Dataset CSIC 2010
malicious Web request detection
Malicious Web requests detection
support vector machine (SVM)
TextCNN
Transferable statistical features
Web attack detection
1
2
3
4
5
6
7
8
9
…
next ›
last »