Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Detectors
biblio
Drone Detection in Long-Range Surveillance Videos
Submitted by aekwall on Mon, 04/13/2020 - 9:27am
learning (artificial intelligence)
Videos
video surveillance
Training
tracking surveillance
Terrorism
SSD
single shot detector
security of data
security breaches
Resiliency
pubcrawl
Proposals
object detection
Metrics
long-range surveillance videos
deep video
Human behavior
high-security risks
Faster-RCNN
Faster R-CNN
drones
drone detection
Detectors
detection methods
deep learning-based object detection
deep learning
convolutional neural nets
CNN-based architectures
Birds
autonomous aerial vehicles
biblio
Incremental Abstraction for Diagnosability Verification of Modular Systems
Submitted by aekwall on Mon, 03/16/2020 - 9:39am
fault diagnosis
uncertain loops
simple detector automata
scalable production system
polynomial complexity
parallel lines
nonblocking
Modular systems
modular system
incremental abstraction
forbidden loops
Discrete-Event Systems
diagnosability verification
diagnosability
abstraction
scalable verification
Detectors
verification
formal verification
Compositionality
Predictive Metrics
Production systems
Scalability
automata
Complexity theory
computational complexity
control systems
feedback
Synchronization
pubcrawl
Resiliency
biblio
Malware Evasion Attack and Defense
Submitted by grigby1 on Tue, 02/18/2020 - 10:53am
malware detection systems
white-box evasion attacks
White Box Security
white box cryptography
Training data
Training
security
Resiliency
resilience
pubcrawl
Perturbation methods
pattern classification
ML-based malware detector
ML classifier
Metrics
malware evasion attack
adversarial example
malware
machine learning classifiers
learning (artificial intelligence)
invasive software
grey-box evasion attacks
Evasion Attack
Detectors
defense approaches
defense
Data models
composability
black-box attacks
Adversarial Machine Learning
adversarial examples
biblio
Combining Tensor Decompositions and Graph Analytics to Provide Cyber Situational Awareness at HPC Scale
Submitted by grigby1 on Mon, 02/17/2020 - 4:16pm
resilience
metadata
Metrics
multidimensional anomaly detection fusing HPC Analytics and Tensors
network topology
parallel processing
parallelized graph analysis
pattern clustering
pubcrawl
MADHAT
Resiliency
security of data
sensor fusion
situational awareness
structured network sensor logs
Tensile stress
tensors
tools
groupware
Security Metrics
clustering methods
composability
data structures
Detectors
Electronic mail
graph analytics
graph theory
Computing Theory
high-performance packages
HPC architecture for cyber situational awareness
HPC resources
HPC scale
integrated workflow
IP networks
large-scale sparse tensor decompositions
biblio
Dynamic Detection of False Data Injection Attack in Smart Grid using Deep Learning
Submitted by aekwall on Mon, 02/10/2020 - 11:05am
modern advances
bad data detection mechanisms
basic measurements
data measurements
deep learning algorithm
deep learning based framework
false data injection attack
FDI attacks
IEEE 39-bus system
injected data measurement
long short term memory network
communication technology
modern cyber threats
network level features
redundant measurements
smart grid applications
specific assumptions
system states
system variables
time-series anomaly detector
traditional state estimation bad data detection
Smart Grid Sensors
power system security
Detectors
learning (artificial intelligence)
Resiliency
pubcrawl
convolutional neural nets
convolutional neural network
smart power grids
power engineering computing
Smart Grids
power system
security of data
Power system dynamics
Recurrent neural networks
deep learning
Human Factors
electricity grid
power system measurement
power system state estimation
Compositionality
dynamic detection
power meters
biblio
Quantized Gaussian Embedding Steganography
Submitted by grigby1 on Mon, 02/10/2020 - 10:43am
multivariate Gaussian random variables
variance estimators
universal embedding scheme
testing
stego messages
steganography detection
Steganography
statistical framework
statistical analysis
Random variables
quantized Gaussian embedding steganography
pubcrawl
privacy
Payloads
optimal detector
composability
Metrics
Mathematical model
Image Steganography
Image Processing
Hypothesis testing
generalized adopted statistical model
Gaussian processes
Gaussian embedding method
Gaussian embedding
gaussian distribution
distortion
Detectors
detection error
cost-based steganography
biblio
Edge Based Image Steganography: Problems and Solution
Submitted by grigby1 on Mon, 02/10/2020 - 10:43am
Image edge detection
steganography schemes
steganography detection
Steganography
secrete messages bits
secrete message
Receivers
pubcrawl
privacy
Payloads
Metrics
LSB
Indexes
Color
image colour analysis
Image color analysis
Image coding
embedding scheme
edges positions
edge based image steganography
edge
Detectors
data encapsulation
composability
color images
Color image
biblio
Content Adaptive Image Steganalysis in Spatial Domain Using Selected Co-Occurrence Features
Submitted by grigby1 on Mon, 02/10/2020 - 10:42am
primary content adaptive stego algorithms
image classification
Image edge detection
image steganalysis
LBP features
local co-occurrence features
local image region
Metrics
microsoft windows
Histograms
privacy
pubcrawl
selected co-occurrence features
Spatial domain
Steganography
steganography detection
weak classifier
boosted classifiers
Haar transforms
generalization power
general content adaptive image steganography detector
final detector
feature selection procedure
Feature Selection
feature extraction
Detectors
Databases
content adaptive image steganalysis
content adaptive
composability
co-occurrence feature
Classification algorithms
candidate features
biblio
Comment Spam Detection via Effective Features Combination
Submitted by grigby1 on Mon, 02/10/2020 - 10:18am
Human behavior
Web sites
user experience
trees (mathematics)
spam detection
Scalability
pubcrawl
Metrics
internet
Human Factors
blog spam dataset
gradient boosting tree algorithm
feature extraction
feature combination
Detectors
Decision trees
comment spam detection
boosting
Blogs
biblio
Film Bulk Acoustic Wave Resonator for Trace Chemical Warfare Agents Simulants Detection in Micro Chromatography
Submitted by aekwall on Mon, 01/13/2020 - 11:08am
polymer films
Micro Gas chromatography
microchannel flow
microchromatography
microfabricated separation column
microfabrication
microfluidic channel
microsensors
polymer coated film bulk acoustic resonators
Human behavior
pubcrawl
Resiliency
Scalability
Silicon
Surface treatment
thin film sensors
trace chemical warfare agent simulant detection
CWA detection
acoustic resonators
acoustic transducers
bulk acoustic wave devices
Chemical warfare agents
Chemicals
chromatographic analysis
chromatography
Coatings
acoustic coupling
Detectors
FBAR sensor
Film bulk acoustic resonator
Film bulk acoustic resonators
film bulk acoustic wave resonator
Gas chromatography
gas sensors
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
next ›
last »