Margaret Loper
Margaret Loper
Georgia Tech Research Institute
Bestätigte E-Mail-Adresse bei
Zitiert von
Zitiert von
A framework for evaluating gradient leakage attacks in federated learning
W Wei, L Liu, M Loper, KH Chow, ME Gursoy, S Truex, Y Wu
arXiv preprint arXiv:2004.10397, 2020
DIS today [Distributed interactive simulation]
RC Hofer, ML Loper
Proceedings of the IEEE 83 (8), 1124-1137, 1995
Performance and reliability analysis of relevance filtering for scalable distributed interactive simulation
MA Bassiouni, MH Chiu, M Loper, M Garnsey, J Williams
ACM Transactions on Modeling and Computer Simulation (TOMACS) 7 (3), 293-331, 1997
A framework for evaluating client privacy leakages in federated learning
W Wei, L Liu, M Loper, KH Chow, ME Gursoy, S Truex, Y Wu
Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020
Deep neural network ensembles against deception: Ensemble diversity, accuracy and robustness
L Liu, W Wei, KH Chow, M Loper, E Gursoy, S Truex, Y Wu
2019 IEEE 16th international conference on mobile ad hoc and sensor systems …, 2019
Modeling and simulation in the systems engineering life cycle: core concepts and accompanying lectures
ML Loper
Springer, 2015
Live virtual constructive architecture roadmap (LVCAR) final report
AE Henninger, D Cutts, M Loper, R Lutz, R Richbourg, R Saunders, ...
Institute for Defense Analysis, 2008
Adversarial objectness gradient attacks in real-time object detection systems
KH Chow, L Liu, M Loper, J Bae, ME Gursoy, S Truex, W Wei, Y Wu
2020 Second IEEE International Conference on Trust, Privacy and Security in …, 2020
Multi-level modeling of complex socio-technical systems
T McDermott, W Rouse, S Goodman, M Loper
Procedia Computer Science 16, 1132-1141, 2013
History of combat modeling and distributed simulation
ML Loper, C Turnitsa
Engineering principles of combat modeling and distributed simulation, 329-355, 2012
Pre-sampling as an approach for exploiting temporal uncertainty
ML Loper, RM Fujimoto
Proceedings Fourteenth Workshop on Parallel and Distributed Simulation, 157-164, 2000
Adversarial examples in deep learning: Characterization and divergence
W Wei, L Liu, M Loper, S Truex, L Yu, ME Gursoy, Y Wu
arXiv preprint arXiv:1807.00051, 2018
Machine to Machine Trust in the IoT Era.
L Liu, M Loper, Y Özkaya, A Yasar, E Yigitoglu
TRUST@ AAMAS, 18-29, 2016
Distributed Orchestration in Large-Scale IoT Systems
E Yigitoglu, L Liu, M Loper, C Pu
2nd International Congress on Internet of Things, 2017
A case study in exploiting temporal uncertainty in parallel simulations
ML Loper, RM Fujimoto
International Conference on Parallel Processing, 2004. ICPP 2004., 161-168, 2004
Cross-layer strategic ensemble defense against adversarial examples
W Wei, L Liu, M Loper, KH Chow, E Gursoy, S Truex, Y Wu
2020 International Conference on Computing, Networking and Communications …, 2020
Fdk users guide
RM Fujimoto, S Ferenci, M Loper, T McLean, K Perumalla, G Riley, I Tacic
Georgia Institute of Technology, 2001
Relevance filtering for distributed interactive simulation
M Bassiouni, MH Chiu, M Loper
Computer Systems Science and Engineering 13 (1), 1998
Grand challenges in modeling and simulation: expanding our horizons
SJE Taylor, O Balci, W Cai, ML Loper, DM Nicol, G Riley
Proceedings of the 1st ACM SIGSIM Conference on Principles of Advanced …, 2013
Computational challenges in modeling & simulation of complex systems
RM Fujimoto, C Carothers, A Ferscha, D Jefferson, M Loper, M Marathe, ...
2017 Winter Simulation Conference (WSC), 431-445, 2017
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20