Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Generators
biblio
Separating Style and Content for Generalized Style Transfer
Submitted by aekwall on Mon, 12/07/2020 - 12:11pm
Gallium nitride
Training
style reference images
style encoder
Silicon
neural nets
multitask learning scenario
Mixers
learning (artificial intelligence)
learned model
image representation
Image coding
Generators
generalized style transfer network
neural style transfer
feature extraction
Decoding
decoder
convolution
content reference images
content encoder
Chinese Typeface transfer problem
bilinear model
pubcrawl
Predictive Metrics
Resiliency
Scalability
biblio
Classification of Optimal Ternary (r, δ)-Locally Repairable Codes Attaining the Singleton-like Bound
Submitted by grigby1 on Fri, 09/18/2020 - 1:46pm
Telecommunications
δ)-LRC classification
δ)-locally repairable codes
ternary codes
Singleton-like bound
r
q-ary LRC
optimal ternary LRC
optimal ternary (r
optimal ternary (n
linear code
k
code symbol
coding theory
information security
linear codes
human computer interaction
Upper bound
error correction codes
Compositionality
Metrics
Cryptography
Indexes
Generators
Resiliency
resilience
pubcrawl
security
biblio
Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks
Submitted by grigby1 on Fri, 09/04/2020 - 4:16pm
pseudo-random number generator (PRNG)
discrete-time chaotic maps
dynamics degradation
fixed point arithmetic
fixed-point arithmetic
floating point arithmetic
floating-point arithmetic
logistic map
Orbits
digital computer
pseudorandom number generators
Quantization (signal)
random number generation
randomness
SMN
state-mapping network
tent map
black box encryption
encryption
complex network
telecommunication security
Generators
pubcrawl
composability
Metrics
Resiliency
resilience
Cryptography
chaos
Degradation
chaotic communication
Logistics
black box
chaotic dynamics
chaotic map
communication securiy
biblio
Security Analysis of Improved One-Time Pad Cryptography Using TRNG Key Generator
Submitted by grigby1 on Fri, 09/04/2020 - 3:38pm
frequency monobit
brute force attacks
TRNG key generator
trng
ryptography
Refining
random keys
PRNG
Prediction algorithms
OTP
one-time pad cryptography
one-time pad
information security analysis
Ciphers
Fisher-Yates shuffling algorithm
cipher text mapping
avalanche effect
random number generation
Brute Force Attack
policy-based governance
Human Factors
cryptographic algorithms
pubcrawl
Generators
encryption
Cryptography
biblio
Parallelization of Brute-Force Attack on MD5 Hash Algorithm on FPGA
Submitted by grigby1 on Fri, 09/04/2020 - 3:37pm
32/34/26-instance parallelization
brute force attacks
single Virtex-7 FPGA device
pre-image brute-force attack
pipeline processing
MD5 hash generation
MD5 hash algorithm
LUT
IP core
HDL
Hardware design languages
guess password generation
Cryptography
field programmable gate arrays
gpu
policy-based governance
Human Factors
password
pubcrawl
Generators
Hardware
computer architecture
Hardware Implementation
biblio
Security and Performance Modeling and Optimization for Software Defined Networking
Submitted by grigby1 on Fri, 08/28/2020 - 3:54pm
Performance modeling
Web servers
telecommunication traffic
software defined networking
security optimization approach
Security Optimization
Security modeling
security constraints
security
SDN
Scalability
Resiliency
resilience
queueing theory
pubcrawl
Computing Theory
performance constraints
optimization
networking capabilities
network traffic
Measurement
graphical security models
genetic algorithms
genetic algorithm
Generators
Databases
computer network security
communication demands
big data security metrics
Security Metrics
biblio
Explaining Visual Models by Causal Attribution
Submitted by grigby1 on Fri, 08/28/2020 - 12:23pm
factor alteration
visualization
visual models
Rain
pubcrawl
Metrics
machine learning
learning
intervened causal model
image generative models
Human behavior
Generators
feature extraction
attribution
Face
explanation
deep
Data models
data handling
data distribution
counterfactuals
Computational modeling
composability
causal counterfactuals
causal attribution
Causal
biblio
Fast Generation Redispatch Techniques for Automated Remedial Action Schemes
Submitted by aekwall on Mon, 08/24/2020 - 12:41pm
IEEE 24-bus system
automated intrusion response
automated remedial action schemes
contingency analysis
fast generation redispatch techniques
fast greedy algorithm
generation cost
generation redispatch
IEEE 118-bus systems
greedy algorithms
online application
online RAS applications
optimal power flow
power system operational security
power system resiliency
power systems resiliency
remedial action scheme
resilience-oriented optimal power flow
Generators
security of data
Resiliency
pubcrawl
composability
internet
optimisation
Mathematical model
Automated Response Actions
cyberattack
power engineering computing
power system security
failure analysis
Load flow
power generation dispatch
power system stability
Linear programming
biblio
DP-CGAN: Differentially Private Synthetic Data and Label Generation
Submitted by grigby1 on Fri, 08/07/2020 - 3:48pm
generative adversarial networks
training dataset
spent privacy budget
single-digit epsilon parameter
research communities
Renyi differential privacy accountant
original sensitive datasets
label generation
GAN models
DP-CGAN
differentially private synthetic data
differentially private conditional GAN training framework
AI
MNIST dataset
learning (artificial intelligence)
Scalability
Gallium nitride
privacy
Data models
data privacy
Generators
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
Training
biblio
A Flexible Secure Key Delegation Mechanism for CP-ABE with Hidden Access Structure
Submitted by grigby1 on Fri, 07/24/2020 - 12:40pm
hidden access policy
unauthorized data access
storage management
specified access control
Scalability
Public key
pubcrawl
policy-based governance
Organizations
Logic gates
key delegation
hidden access structure
Access Control
Generators
flexible secure key delegation mechanism
fine grained access control
encryption
Cryptography
CP-ABE schemes
CP-ABE
collaboration
ciphertext policy attribute
authorisation
anonymity
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
…
next ›
last »