Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Decoding
biblio
Real-Time Arbitrary Style Transfer with Convolution Neural Network
Submitted by grigby1 on Fri, 12/11/2020 - 1:52pm
Metrics
Training
style transferred image
style transfer
Scalability
Resiliency
resilience
real-time systems
real-time arbitrary style transfer convolution neural network
pubcrawl
neural style transfer
Neural networks
ASTCNN
feature extraction
deep learning
Decoding
convolutional neural nets
convolution neural network
convolution
content features
content feature extraction
computer vision
computer architecture
biblio
Separating Style and Content for Generalized Style Transfer
Submitted by aekwall on Mon, 12/07/2020 - 11:11am
Gallium nitride
Training
style reference images
style encoder
Silicon
neural nets
multitask learning scenario
Mixers
learning (artificial intelligence)
learned model
image representation
Image coding
Generators
generalized style transfer network
neural style transfer
feature extraction
Decoding
decoder
convolution
content reference images
content encoder
Chinese Typeface transfer problem
bilinear model
pubcrawl
Predictive Metrics
Resiliency
Scalability
biblio
Two-Stage Architectures for Resilient Lightweight PUFs
Submitted by aekwall on Mon, 11/16/2020 - 1:59pm
reverse engineering
Resilient Security Architectures
Product codes
physical unclonable function (PUF)
Maximum likelihood decoding
integrated circuit reliability
Differential Comparator PUF
Current Mirror PUF
arbiter PUF
Transistors
Threshold voltage
Binary codes
security of data
resilience
Decoding
program testing
machine learning
pubcrawl
Resiliency
invasive software
security
Internet of Things
field programmable gate arrays
biblio
Variational Encoder-Decoder Recurrent Neural Network (VED-RNN) for Anomaly Prediction in a Host Environment
Submitted by aekwall on Mon, 11/09/2020 - 12:20pm
Hidden Markov models
Information Reuse and Security
VED-RNN
variational encoder-decoder recurrent neural network
System-calls
system-call traces
sequence to sequence model
sequence to sequence
security tools
prediction model input data representation
HIDS
anomaly prediction
one-class classification
NIDS
security of data
Compositionality
Intrusion Detection Systems
Recurrent neural networks
recurrent neural nets
Predictive models
Anomaly Detection
Prediction algorithms
pattern classification
Decoding
pubcrawl
Resiliency
Classification algorithms
biblio
Improved Veron Identification and Signature Schemes in the Rank Metric
Submitted by grigby1 on Tue, 10/06/2020 - 12:51pm
probability
veron identification
Transforms
smallest signature
signature size
Security Metrics
secure signature scheme
rank metric
random oracle model
quantum cryptography
quantum computing
public key size
public key cryptography
pubcrawl
Protocols
cheating probability
Metrics
Measurement
linear codes
identification protocol
Fiat-Shamir transform
error-correcting codes
error correction codes
double circulant codes
digital signatures
Decoding
Cryptography
Computing Theory
code-based signature schemes
biblio
Straggler Resilient Serverless Computing Based on Polar Codes
Submitted by grigby1 on Tue, 10/06/2020 - 12:40pm
Resiliency
hybrid computing framework
linear algebra
matrix multiplication
optimisation
polar codes
pubcrawl
Random access memory
resilience
gradient methods
sequential decoding
serverless computing mechanism
serverless platforms
Servers
straggler resilient serverless computing
straggler-resilience
Task Analysis
channel coding
encoding
emerging cloud based computation model
distributed computation
Decoding
Computing Theory
computationally expensive tasks
computationally effective manner
Computational modeling
computational burden
Complexity theory
coding theory
coding methods
coded computation technique
coded computation scheme
Cloud Computing
biblio
A Hierarchy-to-Sequence Attentional Neural Machine Translation Model
Submitted by grigby1 on Mon, 10/05/2020 - 1:01pm
semantic compositionality modeling
neural nets
optimal model parameters
parameter learning
pubcrawl
recurrent neural nets
Recurrent neural networks
segmented clause sequence
segmented clauses
neural machine translation
Semantics
sequence-to-sequence attentional neural machine translation
short clauses
Speech
speech processing
text analysis
Training
translation prediction
hierarchical neural network structure
Chinese-English translation
clause level
Compositionality
Context modeling
conventional NMT model
Decoding
English-German translation
grammars
attention models
Hierarchy-to-sequence
hierarchy-to-sequence attentional neural machine translation model
hierarchy-to-sequence attentional NMT model
language translation
learning (artificial intelligence)
long parallel sentences
natural language processing
biblio
Security Analysis for Cognitive Radio Network with Energy Scavenging Capable Relay over Nakagami-m Fading Channels
Submitted by grigby1 on Fri, 09/18/2020 - 12:56pm
Cognitive Radio Network
Cognitive Radio Security
underlay cognitive network
SOP
secrecy outage
relay networks (telecommunication)
power constraints
Nakagami-m fading channels
Nakagami-m
energy scavenging capable relay
energy scavenging
closed-form expression
secrecy outage probability
relaying
Nakagami channels
security
cognitive radio
information processing
energy harvesting
Relays
fading channels
telecommunication network reliability
probability
Decoding
Security analysis
telecommunication security
Resiliency
resilience
pubcrawl
biblio
Flexible Design of Finite Blocklength Wiretap Codes by Autoencoders
Submitted by grigby1 on Fri, 09/18/2020 - 12:46pm
leakage tradeoff
wiretap code
wireless devices
vanishing leakage
traditional codes
telecommunication security
security
Resiliency
resilience
radiocommunication
pubcrawl
physical layer security
Neural networks
neural network autoencoders
Metrics
legitimate receiver
autoencoder
information theory
Gaussian wiretap channels
Gaussian channels
flexible wiretap code design
flexible design
finite blocklength wiretap codes
finite blocklength
error statistics
error rate
decoding error probability
Decoding
Cryptography
Compositionality
coding theory
channel coding
biblio
The LDPC Code and Rateless Code for Wireless Sensor Network
Submitted by aekwall on Tue, 09/08/2020 - 9:06am
pubcrawl
WSN environment
WSN
wireless sensor networks
Sparse matrices
Resiliency
Rayleigh channels
rayleigh channel
rateless code
Raptor code
channel coding
parity check codes
Metrics
LT code
LDPC code
encoding algorithm
encoding
decoding algorithm
Decoding
composability
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »