Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
encoding
biblio
A Novel Approach of Image Encryption Using Chaos and Dynamic DNA Sequence
Submitted by aekwall on Mon, 06/22/2020 - 11:28am
Human behavior
two dimension Sine-Henon alteration map
two dimension logistic map
reversible DNA operations
Resiliency
random processes
pubcrawl
pseudorandom sequences
privacy
Predictive Metrics
plain image pixel
Logistics
logistic map
image encryption scheme
Image coding
Cryptography
Histograms
Heuristic algorithms
encryption of image
encryption
encoding
dynamic DNA sequence
DNA sequence
DNA operations cipher image
DNA cryptography
DNA converted pixel
DNA
distorted image
Different types of attacks and Statistical Analysis
biblio
A Dual Layer Image Encryption using Polymerase Chain Reaction Amplification and DNA Encryption
Submitted by aekwall on Mon, 06/22/2020 - 11:27am
encoding
unauthorized data access
polymers
polymerase chain reaction amplification
image protection
dual layer image encryption
DNA encryption
digital image security
biological sequences
binary encoding
biocomputing
DNA cryptography
cryptographic algorithms
image encryption
authorisation
Predictive Metrics
digital images
DNA
privacy
Image coding
Data protection
pubcrawl
Human behavior
Resiliency
encryption
Data Security
Cryptography
biblio
A Review on DNA based Cryptography for Data hiding
Submitted by aekwall on Mon, 06/22/2020 - 11:27am
encryption
Conferences
Resiliency
Human behavior
pubcrawl
Decoding
privacy
DNA
Predictive Metrics
encoding
DNA cryptography
Biological information theory
DNA Steganography
biblio
A Novel Encryption Algorithm based on DNA Cryptography
Submitted by aekwall on Mon, 06/22/2020 - 11:27am
encoding
plain-text
DNA symmetric cryptography
DNA computing
biocomputing
DNA cryptography
confidential data
encryption algorithm
cryptographic algorithm
encryption process
Cryptography
Predictive Metrics
Ciphers
DNA
privacy
pubcrawl
Human behavior
Resiliency
information security
encryption
biblio
Digital-Domain Dual Encryption Key-Based Phase Shift Symbol Masking with Cascaded Encoder/Decoder for Secure Coherent Optical Systems
Submitted by grigby1 on Fri, 06/19/2020 - 11:33am
forward error correction
telecommunication security
SSMF transmission
secure coherent optical systems
Resiliency
resilience
quadrature phase shift keying
pubcrawl
optical modulation
optical fibre communication
Metrics
cascaded decoder
FEC limit
error statistics
encoding
dual encryption-key-based digital-domain symbol masking
digital-domain dual encryption key-based phase shift symbol masking
Decoding
Cryptography
composability
coherent QPSK system
cascaded encoder
biblio
Evolving AL-FEC Application Towards 5G NGMN
Submitted by aekwall on Mon, 06/15/2020 - 11:01am
mobile multicast services
arbitrary packet losses
deterministic algorithms
error control
error protection schemes
FEC error control method
feedback free error recovery method
fifth generation mobile technology
forward error correction codes
Application Layer FEC codes
mobile multicast standards
mobile users
multicast communication
Multimedia communication
next generation mobilenetwork
online algorithms
randomized online algorithms
redundant data
source data
pubcrawl
composability
Metrics
Decoding
5G mobile communication
ultra-high reliability
next generation networks
encoding
Resiliency
telecommunication network reliability
forward error correction
Packet loss
5G Next Generation Mobile Networks
5G NGMN
AL-FEC policy online problem
AL-FEC protection
biblio
Enhanced Homomorphic Encryption Scheme with PSO for Encryption of Cloud Data
Submitted by aekwall on Mon, 06/08/2020 - 11:35am
Homomorphic encryption
PSO algorithms
Nature Inspired
metaheuristic algorithms
key organization
key allocation
homomorphic encryption approach
homomorphic encoding scheme
homomorphic algorithm
Homomorphic
encoding technique
encoding procedure
cloud data
resource utilization
homomorphic encryption scheme
Cloud Computing
encoding
Human Factors
cloud server
key management
particle swarm optimization
particle swarm optimisation
Metrics
resource management
pubcrawl
Resiliency
encryption
Cryptography
Scalability
biblio
Composable, Unconditionally Secure Message Authentication without any Secret Key
Submitted by grigby1 on Tue, 06/02/2020 - 11:55am
message authentication
secure message authentication
Scalability
Resiliency
resilience
pubcrawl
Protocols
probability
policy-based governance
Noise measurement
Metrics
authentication
information theoretic security
Human Factors
Human behavior
error correction codes
error correction
encoding
Decoding
Cryptography
Cryptographic Protocols
channel coding
biblio
Distributed and Private Coded Matrix Computation with Flexible Communication Load
Submitted by grigby1 on Tue, 06/02/2020 - 11:54am
resilience
master server
matrix multiplication
Metrics
multiple workers
nonsecure versions
policy-based governance
private coded matrix computation
pubcrawl
recovery threshold
learning (artificial intelligence)
Resiliency
Scalability
secret sharing
secure generalized PolyDot codes
security
security constraint
Servers
telecommunication security
tensor operations
encoding
colluding workers
computational delay
convolution
data privacy
delays
distributed computing platform
Distributed databases
distributed learning
distributed platforms
Coded distributed computation
flexible communication load
flexible trade-off
Human behavior
Human Factors
information theoretic security
information theoretic security.
input data matrices
large-scale machine learning applications
biblio
Computer network intrusion detection using sequential LSTM Neural Networks autoencoders
Submitted by aekwall on Mon, 05/11/2020 - 11:12am
Unsupervised Learning
variable length data sequence
sequential LSTM Neural Networks autoencoders
sequential intrusion detection
sequential data
sequential autoencoder
network data sequence
long short term memory neural network
GRU
fixed length data sequence
computer network intrusion detection
computer network data
Bi-LSTM
autoencoders
encoding
LSTM
computer network security
computer networks
Payloads
Intrusion Detection
Training
network intrusion detection
Neural networks
neural nets
Decoding
Metrics
Iterative methods
composability
pubcrawl
Resiliency
feature extraction
« first
‹ previous
…
11
12
13
14
15
16
17
18
19
…
next ›
last »