Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
optimisation
biblio
Implementation of Fuzzy Logic Control in Predictive Analysis and Real Time Monitoring of Optimum Crop Cultivation : Fuzzy Logic Control In Optimum Crop Cultivation
Submitted by grigby1 on Mon, 03/29/2021 - 2:03pm
fuzzy set theory
Temperature distribution
Temperature control
Soil
security
Resiliency
resilience
pubcrawl
predictive analysis
optimum crop cultivation
optimisation
Monitoring
Metrics
Agriculture
fuzzy logic set
fuzzy logic network
fuzzy logic control
Fuzzy logic
fuzzy control
data science
Cyber Physical System
crops
Crop Production
Conferences
Cloud Computing
biblio
Residual Energy Analysis with Physical-Layer Security for Energy-Constrained UAV Cognitive Radio Systems
Submitted by aekwall on Mon, 03/15/2021 - 12:03pm
cognitive radio
Cognitive Radio Security
sensing performance
secrecy outage
secondary link performance
residual energy analysis
energy-constraint
energy-constrained UAV cognitive radio systems
energy harvesting drone
Unmanned Aerial Vehicles
telecommunication security
energy harvesting
autonomous aerial vehicles
constrained optimization problem
secure communication
physical-layer security
residual energy
optimisation
pubcrawl
Resiliency
biblio
Computational Intelligence Towards Trusted Cloudlet Based Fog Computing
Submitted by grigby1 on Tue, 03/09/2021 - 3:06pm
Scalability
optimisation
popular trust
pubcrawl
quality of service
Reliability
reputation
required trusted platform module
resilience
Resiliency
multiple cloudlets
security
security of data
tpm
trust
trust value
trust-based reputation
trusted cloudlet-based fog platform
uncertainty
Fog computing
BIOS
Cloud Computing
cloud-based services
cloudlet
cloudlet trustworthy
cloudlet-based fog computing
computational intelligence
computationally intelligent approaches
edge computing
Bio-inspired Intelligent
Fuzzy logic
fuzzy logic-based inference
Human behavior
Internet of Things
IoT user
Mathematical model
Metrics
mobile computing
biblio
GeoDA: A Geometric Framework for Black-Box Adversarial Attacks
Submitted by aekwall on Tue, 03/09/2021 - 12:05pm
image classification
Robustness
Resiliency
query processing
queries
pubcrawl
Perturbation methods
pattern classification
optimisation
Neural networks
natural image classifiers
minimal perturbation
Metrics
Measurement
mean curvature
Iterative methods
adversarial examples
geometric framework
gaussian distribution
estimation
effective iterative algorithm
Deep Networks
decision boundary
data samples
Covariance matrices
composability
carefully perturbed images
black-box settings
black-box perturbations
black-box attack algorithm
black-box adversarial attacks
black box encryption
biblio
Evolving Dynamically Reconfiguring UAV-hosted Mesh Networks
Submitted by aekwall on Mon, 03/01/2021 - 4:45pm
quick temporary networked communications capabilities
MESH network
bandwidth requirements
different user distributions
evolutionary adaptive network deployment algorithm
evolving dynamically reconfiguring UAV-hosted mesh networks
flying network base stations
initial deployment
overwatch
potential field parameters
potential fields
remotely operated vehicles
remote areas
reposition UAVs
scouting
tuned potential fields
UAV network
Unmanned Aerial Vehicles
unmanned aerial vehicles networks
user bandwidth coverage
user bandwidth needs
Wireless Mesh Network Security
mobile radio
Resiliency
pubcrawl
composability
batteries
wireless sensor networks
Metrics
mobile robots
Training
optimisation
network lifetime
security
genetic algorithm
genetic algorithms
Bandwidth
Mesh networks
control engineering computing
Path Planning
autonomous aerial vehicles
Base stations
distributed control
biblio
SDN-based multi-controller optimization deployment strategy for satellite network
Submitted by grigby1 on Tue, 02/16/2021 - 12:46pm
load difference
satellite network
Satellites
network delay
network performance
adjacent low load controller
high load state
high-load state
high-load switch
idle state
satellite communication
low-load controller
multicontroller optimized deployment strategy
network topology high dynamic changes
normal state
optimize deployment
overload state
SDN-based multicontroller optimization deployment strategy
SDN-based satellite network controllers
dynamic networks
telecommunication traffic
Metrics
resilience
Resiliency
computer network security
Heuristic algorithms
security
Topology
composability
delays
pubcrawl
network security
telecommunication control
software defined networking
Switches
network topology
Software Defined Network
optimisation
telecommunication network topology
biblio
Application of Optimized Bidirectional Generative Adversarial Network in ICS Intrusion Detection
Submitted by grigby1 on Wed, 02/03/2021 - 12:56pm
optimal model
Training
supervised control
single variable principle
security of data
Scalability
SCADA systems
SCADA
Resiliency
resilience
pubcrawl
parameter optimization
optimized BiGAN
optimized bidirectional generative adversarial network
optimization
optimisation
network intrusion detection
neural nets
massive network traffic data
Intrusion Detection
integrated circuits
Industrial Control Systems
industrial control system
industrial control
ICS intrusion detection method
high-dimensional network traffic data
generative adversarial networks
data acquisition
control system security
control engineering computing
Computational modeling
BiGAN
biblio
Improving Style Transfer with Calibrated Metrics
Submitted by aekwall on Mon, 02/01/2021 - 11:45am
content image
universal style transfer
transferred image
style weights
quantitative evaluation procedure
Neural Style Transfer methods
histogram loss
Gatys' loss
Effectiveness statistic measures
EC scores
E statistics
Coherence statistic measures
style image
Coherence
Scalability
neural style transfer
rendering (computer graphics)
Covariance matrices
Predictive Metrics
integrated circuits
statistical analysis
optimisation
standards
calibration
optimization
pubcrawl
Resiliency
biblio
Collaborative Distillation for Ultra-Resolution Universal Style Transfer
Submitted by aekwall on Mon, 02/01/2021 - 11:44am
linear embedding loss
compressed models
convolutional filters
deep convolutional neural network models
encoder-decoder based neural style transfer
encoder-decoder pairs
exclusive collaborative relationship
feature size mismatch
knowledge distillation method
leverage rich representations
collaborative distillation
student network
style transfer models
trained models
ultra-resolution images
ultra-resolution universal style transfer
universal style transfer
universal style transfer methods
VGG-19
Image coding
Task Analysis
learning (artificial intelligence)
Resiliency
pubcrawl
Decoding
convolutional neural nets
optimisation
data compression
Scalability
collaboration
Image resolution
Predictive Metrics
Knowledge engineering
encoding
graphics processing units
Image reconstruction
neural style transfer
biblio
Research on Automatic Generation and Analysis Technology of Network Attack Graph
Submitted by aekwall on Mon, 01/25/2021 - 1:02pm
Network Security Reinforcement
security of data
Resiliency
pubcrawl
Probability-based Network Vulnerability Measurement
probability
Predictive Metrics
optimization
optimisation
network vulnerability index
network security reinforcement algorithm
Microelectronics
network security metrics
network attack graph
graph theory
edge authority attack graph
dependence attack graph
composability
automatic generation
attack target asset value
attack graphs
security
1
2
3
4
5
6
7
8
9
…
next ›
last »