Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
embedded systems
biblio
Deepfake Detection with Clustering-based Embedding Regularization
Submitted by grigby1 on Fri, 01/15/2021 - 12:01pm
Human behavior
video signal processing
video quality
social networking (online)
security of data
Scalability
Resiliency
resilience
Regularization
pubcrawl
pattern clustering
object detection
Metrics
learning (artificial intelligence)
Human Factors
AI-synthesized face swapping videos
feature extraction
false video
face swapping
face recognition
embedded systems
detection accuracy
deepfake video detection
deepfake detection competitions
deepfake detection
deepfake datasets
DeepFake
clustering-based embedding regularization
clustering-based
biblio
Design Considerations for Low Power Internet Protocols
Submitted by aekwall on Mon, 12/21/2020 - 1:29pm
interoperability
small maximum transfer unit
low-power wireless networks
low power Internet protocols
IPv6 connectivity
design considerations
code size
Resiliency
telecommunication network planning
IEEE 802.15 Standard
personal area networks
telecommunication network reliability
IoT
Bluetooth
embedded systems
Energy Efficiency
6LoWPAN
internet
energy conservation
composability
pubcrawl
power aware computing
Protocols
IP networks
biblio
RISC-V FPGA Platform Toward ROS-Based Robotics Application
Submitted by grigby1 on Thu, 12/17/2020 - 2:01pm
reduced instruction set computing
super computing field
security
ROS-based Robotics application
ROS
robots
robotics system
robot operating systems
Robot Operating System
RISC-V processor
RISC-V FPGA platform
RISC-V foundation
RISC-V CPU architecture
RISC-V
Resiliency
resilience
Cloud Computing
pubcrawl
policy-based governance
open standard instruction set architecture
open source operating system
open source community members
microprocessor chips
local FPGA platform
instruction set computer
Human Factors
Human behavior
FPGA
field programmable gate arrays
embedded systems
cloud-based FPGA environment
biblio
Design of Intelligent Home Security Monitoring System Based on Android
Submitted by aekwall on Mon, 11/23/2020 - 11:22am
MVP mode
Temperature distribution
intelligent devices
Android remote operation
domestic appliances
health status monitoring
intelligent electrical appliances
Intelligent home
intelligent home condition monitoring
intelligent home drivers development
intelligent home safety assessment
intelligent home security monitoring system
intelligent home-based remote monitoring system
Internet-based Internet-of-Things technology
remote monitoring
MVP model
network congestion
network data model
Operational Data
Power Line Communication
power line communication network
routing nodes
S3C2440A microcontrollers
safety monitoring
system data
Intelligent Data Security
Intelligent Data and Security
computerised monitoring
Scalability
Internet of Things
embedded systems
Linux
Resiliency
pubcrawl
neural nets
Neurons
internet
telecommunication network routing
condition monitoring
microcontrollers
network nodes
security
Logic gates
control engineering computing
home computing
internetworking
Neural networks
Android (operating system)
Compositionality
Androids
Humanoid robots
carrier transmission on power lines
Water heating
embedded Linux
biblio
Enhancing Internet of Battle Things using Ultrasonic assisted Non-Destructive Testing (Technical solution)
Submitted by grigby1 on Tue, 11/17/2020 - 3:00pm
IoMT
ultrasonic waves
ultrasonic materials testing
ultrasonic based nondestructive testing
testing
smart things
Scalability
Resiliency
resilience
pubcrawl
Probes
network technology
military equipment
military computing
materials defect analysis
machine intelligence
Acoustics
IoBT NDT and Machine Intelligence
iobt
Internet of Things
Internet of Military of Things
Internet of Battle of Things
internet
Intelligent sensors
Inspection
information technology
Human Factors
embedded technology
embedded systems
defence industry
computer architecture
biblio
DVFS as a Security Failure of TrustZone-enabled Heterogeneous SoC
Submitted by grigby1 on Tue, 11/17/2020 - 2:39pm
frequency regulator
Clocks
system-on-chip
Frequency modulation
ARM TrustZone
AXI bus
DVFS
Dynamic Voltage and Frequency Scaling
embedded system security
power aware computing
nonsecure ARM core
Regulators
secure ARM core
security failure
TrustZone-enabled heterogeneous SoC
TrustZone-enabled System-on-Chip
voltage regulator
Operating systems security
Instruction sets
IP networks
Trusted Computing
pubcrawl
Metrics
Resiliency
embedded systems
composability
computer architecture
security
hardware trojan
Receivers
resilience
energy consumption
operating systems (computers)
operating systems
operating system
electronic engineering computing
biblio
IC/IP Piracy Assessment of Reversible Logic
Submitted by aekwall on Mon, 11/09/2020 - 1:31pm
proper-size reversible functions
BDD
binary decision diagrams
embedded function
garbage outputs
IC-IP piracy assessment
IC/IP piracy
intellectual property piracy
Number of embeddings
ancillary inputs
QMDD
quantum multivalued decision diagrams
regular functions
Reversible logic
reversible logic circuits
reversible logic synthesis tools
IP piracy
IP networks
adiabatic computing
logic design
logic circuits
adders
Integrated circuit modeling
industrial property
Logic gates
quantum computing
Trojan horses
policy-based governance
composability
pubcrawl
Resiliency
embedded systems
security
biblio
Embedded Software Fault Prediction Based on Back Propagation Neural Network
Submitted by grigby1 on Wed, 11/04/2020 - 1:34pm
metrics testing
Training
statistical analysis
software testing activities
software metrics
software fault tolerance
Software
pubcrawl
program testing
nonlinear fitting ability
Neurons
neural nets
back propagation neural network
Metrics
Measurement
formal verification
filter metric set
fault prediction
embedded systems
embedded software fault prediction
embedded software
Correlation
Biological neural networks
Backpropagation
biblio
A Graph Theory Approach towards IJTAG Security via Controlled Scan Chain Isolation
Submitted by grigby1 on Mon, 11/02/2020 - 12:28pm
Registers
IJTAG network
IJTAG security
Instruments
intellectual property security
isolation signals
microprocessor chips
on-chip access
on-chip instruments
policy-based governance
power consumption
pubcrawl
IJTAG
resilience
Resiliency
scan chain
security
security of data
system-on-chip
system-on-chip designs
third party intellectual property providers
unauthorized user access
untrusted sources
Diagnosis
Clocks
Complexity theory
composability
controlled scan chain isolation
data integrity
Data Integrity Attacks
data manipulation
data protection scheme
data sniffing
debug
design for test
authorisation
electronic design automation
embedded instruments
embedded systems
graph coloring problem
graph colouring
graph theory approach
hidden test-data registers
IEEE standards
IEEE Std 1687
IEEE Std. 1687
biblio
A Multilayer Perceptron-Based Distributed Intrusion Detection System for Internet of Vehicles
Submitted by grigby1 on Mon, 11/02/2020 - 12:09pm
MultiLayer Perceptron neural network
wireless sensor networks
vehicular ad hoc networks
Vehicle to Vehicle communication
VANET
V2V communication
telecommunication security
telecommunication computing
sensors
security attacks
Roads
Resiliency
resilience
pubcrawl
multilayer perceptrons
Accidents
Multilayer Perceptron
MLP
Metrics
IoV network
Intrusion Detection
Internet of vehicles network
Internet of Vehicles (IoV)
Internet of Vehicles
Human Factors
embedded systems
distributed processing
distributed intrusion detection system
Ad hoc networks
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »