Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Transforms
biblio
Video Steganography using Curvelet Transform and Elliptic Curve Cryptography
Submitted by aekwall on Mon, 02/15/2021 - 4:55pm
Metrics
video steganography
Transforms
stego video
stego key encryption
Stego Key
Steganography
security
secure video steganography
secret data transmission
Scalability
Resiliency
public key cryptography
pubcrawl
carrier video file
Mathematical model
Image Steganography
Image coding
fast discrete curvelet transform
encryption
elliptic curve integrated encryption scheme
Elliptic curve cryptography
discrete wavelet transforms
curvelet transforms
Cryptography
cover video
color video
biblio
Multi-direction Edge Detection Operator
Submitted by grigby1 on Mon, 02/08/2021 - 2:02pm
noise rejection ability
wavelet transforms
Transforms
the shear transformation
standards
single-pixel edge images
shear transformation
Sensitivity
security
Scalability
Resiliency
resilience
pubcrawl
noisy images
composability
Noise measurement
multidirection edge detection operator
multi-direction edge detection operator
Metrics
mathematical operators
matched edges
Image edge detection
image denoising
false edges
edge extraction
edge detection
convolution
Computed tomography
biblio
Medical Image Compression and Encryption using Chaos based DNA Cryptography
Submitted by aekwall on Mon, 02/08/2021 - 1:51pm
encryption
Resiliency
Human behavior
pubcrawl
privacy
DNA
Image coding
Ciphers
Predictive Metrics
Transforms
Biomedical imaging
DNA cryptography
discrete wavelet transforms
Discrete Haar Wavelet Transform
lossless compression
medical image encryption
biblio
DeepFake Video Analysis using SIFT Features
Submitted by grigby1 on Fri, 01/15/2021 - 12:11pm
computer vision.
visual information
video clips
video analysis
still images
SIFT features
scale-invariant feature transform
Forgery
Deepfakes
DeepFake video analysis
deepfake analysis
DeepFake algorithms
DeepFake
learning (artificial intelligence)
Transforms
video signal processing
Metrics
neural nets
deep learning
Scalability
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
Artificial Intelligence
biblio
Orthogonal STBC Set Building and Physical Layer Security Application
Submitted by grigby1 on Tue, 12/15/2020 - 1:26pm
orthogonal codes
coding theory
Transforms
communication complexity
BER
brute force decoding complexity
communications link
complex orthogonal space-time block code
encodes data symbols
Monte Carlo simulations
transmitting antennas
orthogonal STBC matrix
orthogonal STBC set building
physical layer security application
physical layer security.
PLS
space-time block code
space-time block codes
transformation algorithms
Buildings
Metrics
resilience
Resiliency
telecommunication security
security
Cryptography
Wireless communication
network security
pubcrawl
Compositionality
Signal processing algorithms
Monte Carlo methods
Decoding
error statistics
information theory
Physical layer
Bit error rate
biblio
A Protecting Source-Location Privacy Scheme for Wireless Sensor Networks
Submitted by aekwall on Mon, 10/26/2020 - 11:54am
security architecture
Location Privacy in Wireless Networks
source location protection
Smart IoT
protecting source-location privacy scheme
Privacy Protections
multi-sinks
critical problems
CPSLP scheme
attack modes
source location privacy
cloud-based
Position measurement
daily activities
Transforms
Compositionality
Cloud Computing
probability
telecommunication network routing
Metrics
sensor nodes
Routing
privacy
wireless sensor networks
Wireless Sensor Network
pubcrawl
Human behavior
Resiliency
security
telecommunication security
data privacy
biblio
Providing Security for E-Government Document Images Using Digital Watermarking in the Frequency Domain
Submitted by grigby1 on Fri, 10/16/2020 - 11:10am
Human behavior
Watermarking
Transforms
singular value decomposition
Signal processing algorithms
security of data
Robustness
robust watermarking algorithm
Resiliency
resilience
pubcrawl
policy-based governance
information security measures
information security
image watermarking
Image coding
collaboration
government data processing
frequency domain
Electronic government
e-government platform
e-government document images
E-Government
DWT
document image processing
discrete wavelet transforms
discrete Wavelet transformation
digital watermarking
Cybersecurity
copyright protection
copyright
biblio
Improved Veron Identification and Signature Schemes in the Rank Metric
Submitted by grigby1 on Tue, 10/06/2020 - 1:51pm
probability
veron identification
Transforms
smallest signature
signature size
Security Metrics
secure signature scheme
rank metric
random oracle model
quantum cryptography
quantum computing
public key size
public key cryptography
pubcrawl
Protocols
cheating probability
Metrics
Measurement
linear codes
identification protocol
Fiat-Shamir transform
error-correcting codes
error correction codes
double circulant codes
digital signatures
Decoding
Cryptography
Computing Theory
code-based signature schemes
biblio
Symmetries and privacy in control over the cloud: uncertainty sets and side knowledge*
Submitted by aekwall on Mon, 09/21/2020 - 3:49pm
cloud
Control Theory and Privacy
uncertainty sets
transformation-based method
side knowledge
control algorithms
Cost function
Transforms
cyber physical systems
set theory
Trajectory
Cloud Computing
privacy protection
control engineering computing
cyber-physical systems
privacy
pubcrawl
Human behavior
Resiliency
data privacy
encryption
Scalability
biblio
A Lightweight Blockchain-Based Privacy Protection for Smart Surveillance at the Edge
Submitted by grigby1 on Fri, 07/03/2020 - 5:05pm
smart surveillance
privacy
privacy protection
pubcrawl
real-time video analytics
resilience
Resiliency
Scalability
secure privacy-preserving solution
policy-based enforcement
surveillance cameras
Transforms
video access sanctioning
video signal processing
video surveillance
video surveillance system security
VSS security
edge devices
blockchain technologies
Cryptography
data privacy
Data protection
Deterrence
Distributed databases
edge detection
edge device
blockchain security
federated blockchain network
Human behavior
Internet of Things
Lib-Pri system transforms
lightweight blockchain
lightweight privacy-preserving solution
Off-Site Storage
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »