Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Filtering
biblio
B-DCT based Watermarking Algorithm for Patient Data Protection in IoMT
Submitted by grigby1 on Tue, 05/25/2021 - 2:23pm
internet
Watermarking
sensors
Scalability
Resilient
resilience
pubcrawl
Metrics
Medical diagnostic imaging
internet of medical things
collaboration
Human Factors
Human behavior
Filtering
discrete wavelet transforms
discrete cosine transforms
discrete cosine transformation
Data protection
cryptology
composability
biblio
Scalable and Accurate Binary Code Search Method Based on Simhash and Partial Trace
Submitted by grigby1 on Wed, 05/05/2021 - 11:21am
Binary Code Search
Binary codes
distortion
Filtering
malware
Malware Homology Analysisi
Partial Trace
pubcrawl
Scalability
Scalable Security
security
simHash
Syntactics
tools
biblio
Composition of Visual Feature Vector Pattern for Deep Learning in Image Forensics
Submitted by grigby1 on Thu, 04/08/2021 - 4:13pm
pubcrawl
information forensics
learning (artificial intelligence)
Least squares approximations
least-squares solution
machine learning
median filter residual
median filtering detection
median filters
Metrics
inception module
residual block
resilience
Resiliency
Scalability
suspicious image
visual feature vector pattern
visualization
visualized feature vector patterns
window size
feature vector
CNN deep learning
CNN hybrid model
CNN net layer
CNN structure
convolution
convolutional neural nets
deep learning
extraction method
feature extraction
CNN
Filtering
Forgery
forgery image
forgery images
Human behavior
image classification
Image forensics
image forensics detection scheme
biblio
A Novel Personalized Recommendation Algorithm Based on Trust Relevancy Degree
Submitted by aekwall on Mon, 11/23/2020 - 10:39am
recommender systems
trust relevancy degree
Social trust
social network information
personalized recommendation technology
personalized recommendation
personal characteristics
novel personalized recommendation algorithm
matrix factorization
ecommerce
Dianping datasets
human trust
Human behavior
Matrix decomposition
electronic commerce
Trusted Computing
data sparsity
data science
collaboration
trust
Data mining
Filtering
Training
Prediction algorithms
internet
social networking (online)
Social network services
collaborative filtering
pubcrawl
biblio
A Test Cases Generation Technique Based on an Adversarial Samples Generation Algorithm for Image Classification Deep Neural Networks
Submitted by aekwall on Mon, 11/02/2020 - 1:47pm
Measurement
test cases generation technique
test cases generation
Software algorithms
Software
pubcrawl
program testing
Neural networks
neural nets
Metrics
metrics testing
adversarial samples
learning (artificial intelligence)
image classification deep neural networks
image classification
Filtering
DNN
deep learning
coverage metric
Classification algorithms
artificial intelligence tasks
adversarial samples generation algorithm
biblio
Collaborative Filtering Algorithm Based on Trust and Information Entropy
Submitted by grigby1 on Mon, 10/05/2020 - 1:10pm
Prediction algorithms
weighted information entropy
trust similarity
trust relationship
trust
time decay function
time decay
security
Scalability
robots
Resiliency
resilience
recommender systems
recommendation system
pubcrawl
collaboration
Pearson similarity
information entropy theory
information entropy
human trust
Human Factors
human computer interaction
Human behavior
filtering algorithms
Filtering
Entropy
computer theory
collaborative filtering algorithm
collaborative filtering
biblio
Research of Low-Quality Laser Security Code Enhancement Technique
Submitted by aekwall on Mon, 08/03/2020 - 9:28am
bilateral filter
adaptive filtering
Unsharp masking
mean square error methods
market circulation order
low-quality laser security code enhancement
Lasers
Laser security code
interference background
image enhancement algorithm
equalisers
contrast limited adaptive histogram equalization
Scalability
image enhancement
image colour analysis
image filtering
Interference
Filtering
filtering algorithms
Metrics
Image edge detection
pubcrawl
Resiliency
security
biblio
DoS attack mitigation in SDN networks using a deeply programmable packet-switching node based on a hybrid FPGA/CPU data plane architecture
Submitted by aekwall on Mon, 06/29/2020 - 11:57am
deeply programmable packet-switching node
SDN
Firewalls (computing)
DoS
Software-Defined Networks
5G
data plane
denial-of-service attack
denial-of-service attacks
architectural model
deep network programmability
software-defined networking
DoS attack mitigation
DoS attack redirection
DoS attacks mitigation
DoS traffic
DPN
packet switching
packet-switching nodes
switches price
DDoS attack mitigation
computer network management
DDoS
field programmable gate arrays
FPGA
firewall
telecommunication traffic
authorisation
Hardware
Software
computer architecture
computer network security
SDN network
software defined networking
Resiliency
Human behavior
pubcrawl
composability
Metrics
internet
Filtering
biblio
Word Embedding Method of SMS Messages for Spam Message Filtering
Submitted by aekwall on Mon, 05/18/2020 - 9:55am
SMS Filtering
machine learning method
classification methods
binary classification
CBOW
deep learning method
feedforward neural network
Feedforward neural networks
popular machine learning method
deep learning
SMS messages
spam message filtering
SVM light
word embedding
word embedding method
word embedding technique
Word Vector
security of data
feedforward neural nets
natural language processing
information filtering
Filtering
electronic messaging
SVM
unsolicited e-mail
pattern classification
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
feature extraction
Support vector machines
Scalability
biblio
Neural Network Spam Filtering Technology
Submitted by grigby1 on Fri, 05/08/2020 - 2:01pm
neural nets
unsolicited e-mail
Training
spam filtering
security of data
Resiliency
resilience
pubcrawl
policy-based governance
pattern classification
neural network technology development
neural network spam filtering technology
Neural Network Security
neural network
artificial neural network model
Metrics
information security
information filtering
Filtering
e-mail spam filtering
e-mail messages filtration
e-mail messages classification
databases knowledge discovery technology
Data mining
collaboration
Biological neural networks
Artificial Neural Networks
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »