Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
standards
biblio
Improving Style Transfer with Calibrated Metrics
Submitted by aekwall on Mon, 02/01/2021 - 11:45am
content image
universal style transfer
transferred image
style weights
quantitative evaluation procedure
Neural Style Transfer methods
histogram loss
Gatys' loss
Effectiveness statistic measures
EC scores
E statistics
Coherence statistic measures
style image
Coherence
Scalability
neural style transfer
rendering (computer graphics)
Covariance matrices
Predictive Metrics
integrated circuits
statistical analysis
optimisation
standards
calibration
optimization
pubcrawl
Resiliency
biblio
Establishing Trust in Binary Analysis in Software Development and Applications
Submitted by aekwall on Mon, 02/01/2021 - 11:41am
Binary codes
vulnerability reports
source security
software programmer trust
security vulnerability minimization
knowledge elicitations
knowledge acquisition
implementation risk assessment
binary release metadata
binary component
binary code components
binary code behavior
binary analysis tools
binary analysis techniques
human trust
security of data
binary code
data loss
trust
Binary Analysis
software development
software engineering
computer security
Libraries
tools
standards
pubcrawl
Human behavior
Trusted Computing
Software
biblio
Clustering Using a Similarity Measure Approach Based on Semantic Analysis of Adversary Behaviors
Submitted by grigby1 on Thu, 01/28/2021 - 1:10pm
similarity measure
security
security analysts
security of data
semantic analysis
semantic links
Semantics
shared information
similarity degree
Scalability
similarity measure approach
Software
standards
statistical characteristics
threat intelligence
three-layer model
tracking attacks
adversary behaviors
Resiliency
resilience
pubcrawl
pattern clustering
Metrics
Meta path
Knowledge engineering
Human behavior
complex networks
community groups
Community discovery
Biological system modeling
APT groups
Analytical models
Adversary Models
biblio
JCMathLib: Wrapper Cryptographic Library for Transparent and Certifiable JavaCard Applets
Submitted by grigby1 on Wed, 01/20/2021 - 4:21pm
proprietary manufacturer-specific APIs
low-level cryptographic primitives
memory footprint
nondisclosure agreements
open code sharing
open library
open systems
open-source development
open-source licenses
optimisation
optimization
proprietary APIs
low-level cryptographic operations
pubcrawl
public domain software
resilience
Resiliency
resource-constrained platforms
smart cards
smartcards
software libraries
standards
transparency
wrapper cryptographic library
Elliptic curves
APIs
application program interfaces
application programming interface
auditability
Big Integers
certification
certification transparency
Compositionality
Cryptography
data types
elliptic curve operations
API
generic library
Hardware
interoperability
Java
JavaCard
JavaCard API
JavaCard applets
JavaCard multiapplication platform
JCMathLib
Libraries
biblio
Embedding Fuzzy Rules with YARA Rules for Performance Optimisation of Malware Analysis
Submitted by aekwall on Mon, 01/18/2021 - 11:25am
optimisation
Fuzzy Cryptography
YARA rule conditions
rule optimisation process
Performance Optimisation
YARA rules
Fuzzy Hashing
fuzzy rules
Fuzzy sets
fuzzy set theory
Fuzzy logic
Malware Analysis
Scalability
pattern matching
optimization
standards
Metrics
Cryptography
Ransomware
pubcrawl
Resiliency
invasive software
malware
biblio
Improving Chaotic Image Encryption Using Maps with Small Lyapunov Exponents
Submitted by aekwall on Mon, 01/18/2021 - 11:20am
chaotic communication
small Lyapunov exponents
lower bound error
largest Lyapunov exponent
finite precision
chaotic image encryption
chaotic encryption scheme
chaos-based encryption
Shannon entropy
cryptography techniques
Chaotic systems
Lyapunov methods
chaotic cryptography
Scalability
Image Processing
chaos
correlation coefficient
Entropy
Mathematical model
standards
Metrics
pubcrawl
Resiliency
encryption
Cryptography
biblio
Additive and Subtractive Cuckoo Filters
Submitted by aekwall on Mon, 01/11/2021 - 1:32pm
ASCF
data deletion
subtractive cuckoo filter
subtraction operations
space-efficient data structures
space inflation
space efficiency
space cost
set membership queries
high-speed lookups
exclusive-OR operation
cuckoo hashing
cuckoo filters
bucket indexes
Bloom filters
Scalability
additive cuckoo filter
addition operations
Table lookup
Additives
Throughput
Fingerprint recognition
quality of service
Indexes
privacy
data structures
query processing
standards
pubcrawl
biblio
Improving Efficiency of Pseudonym Revocation in VANET Using Cuckoo Filter
Submitted by aekwall on Mon, 01/11/2021 - 1:31pm
Compression
CRLs
data deletion
Data models
data structures
filtering algorithms
Fingerprint recognition
Information filters
privacy
pseudonyms
pubcrawl
Scalability
standards
VANETs
vehicular ad hoc networks
biblio
BlurNet: Defense by Filtering the Feature Maps
Submitted by grigby1 on Mon, 12/28/2020 - 12:48pm
Scalability
malicious examples
Metrics
neural nets
Neural networks
Perturbation methods
pubcrawl
resilience
Resiliency
robust physical perturbations
Robustness
RP
malicious adversary
security of data
standard blur kernels
standard-architecture traffic sign classifiers
standards
stop signs
substitute model
targeted misclassification rates
traffic engineering computing
victim model
white stickers
white-box attacks
frequency analysis
adaptive attack evaluation
adaptive filtering
adversarial defense
adversarial images
Adversarial Machine Learning
Adversarial robustness
attack algorithms
black stickers
blackbox transfer attack
BlurNet
depthwise convolution layer
Adaptation models
gradient information
high frequency noise
image recognition
image restoration
input image
Kernel
layer feature maps
learning (artificial intelligence)
low-pass filters
lowpass filtering behavior
biblio
BIAS: Bluetooth Impersonation AttackS
Submitted by grigby1 on Mon, 12/28/2020 - 12:27pm
attacks
wireless communication pervasive technology
slave impersonation attacks
secure connection establishment
secure authentication procedure
mandatory mutual authentication
impersonation
Bluetooth version
Bluetooth standard
Bluetooth Impersonation AttackS
Bluetooth devices
Bluetooth chips
BIAS attacks
authentication procedure
bluetooth security
wireless security
authorisation
mobile radio
ubiquitous computing
composability
standards
Protocols
Cryptography
authentication
performance evaluation
telecommunication security
Resiliency
resilience
Human behavior
pubcrawl
Bluetooth
« first
‹ previous
…
8
9
10
11
12
13
14
15
16
…
next ›
last »