Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Image edge detection
biblio
Detection and Incentive: A Tampering Detection Mechanism for Object Detection in Edge Computing
Submitted by grigby1 on Mon, 07/10/2023 - 3:35pm
reliability theory
tampering detection
feature insertion
Resiliency
edge detection
edge computing security
game theory
Interference
object detection
Image edge detection
Adaptation models
Streaming media
composability
Scalability
resilience
Metrics
pubcrawl
security
feature extraction
biblio
Overview of edge detection algorithms based on mathematical morphology
Submitted by grigby1 on Mon, 07/10/2023 - 3:34pm
Image edge detection
multiscale and multidirectional
Resiliency
Morphology
mathematical morphology
machine vision
structural elements
edge detection
Market research
deep learning
composability
Industries
Scalability
resilience
Metrics
pubcrawl
security
feature extraction
biblio
Network Anomaly Detection based on Domain Adaptation for 5G Network Security
Submitted by grigby1 on Mon, 07/10/2023 - 3:34pm
Metrics
transfer learning
taxonomy
Scalability
Resiliency
resilience
pubcrawl
Proposals
network security
network anomaly detection
dynamic networks
Intelligent networks
Image edge detection
edge detection
domain adaptation
composability
5G mobile communication
5G Edge security
security
biblio
Dual Graphs of Polyhedral Decompositions for the Detection of Adversarial Attacks
Submitted by grigby1 on Thu, 06/22/2023 - 1:44pm
adversarial attack
polyhedral decomposition
Hamming graph
Firing
ensemble voting
dual graph
DAmageNet
convex polyhedra
bit vectors
decomposition
digital images
ResNet
Neural networks
FGSM
Hamming distance
Image edge detection
Detectors
network architecture
composability
Big Data
Metrics
Human behavior
pubcrawl
biblio
Parasite Chain Attack Detection in the IOTA Network
Submitted by grigby1 on Fri, 04/14/2023 - 4:05pm
distributed ledger
Tangle
Parasite Chain
IOTA
Double-spend Attack
directed acyclic graph
dynamic graph
blockchains
Resiliency
Chained Attacks
Internet of Things
mobile computing
Image edge detection
Wireless communication
Scalability
resilience
pubcrawl
blockchain
Anomaly Detection
biblio
Research on Setting of Two Firewall Rules Based on Ubuntu Linux System
Submitted by grigby1 on Fri, 03/03/2023 - 9:22am
Compositionality
Ubuntu Linux System
Tcp\_Wrappers
Iptable
Linux Operating System Security
firewall
Image edge detection
Firewalls (computing)
resilience
Logic gates
Linux
composability
Filtering
Software
Resiliency
Metrics
pubcrawl
IP networks
biblio
Advanced Analysis of Email Sender Spoofing Attack and Related Security Problems
Submitted by grigby1 on Mon, 02/13/2023 - 2:59pm
Mail spoofing attack
Social engineering attack
Sender source security check
security
Scalable Security
Scalability
pubcrawl
Phishing
Mail spoofing detection method
scalable verification
Image edge detection
Email ecosystem
Electronic mail
Ecosystems
Conferences
Cloud Computing
Anti-Spam
biblio
An Edge Detection Based Reversible Data Hiding Scheme
Submitted by grigby1 on Fri, 02/03/2023 - 5:03pm
Information hiding
steganography detection
Steganography
SSIM
reversible steganography
pubcrawl
privacy
Metrics
LSB method
edge detection
Image quality
Image edge detection
Image coding
IEEE Sections
Detectors
Conferences
composability
security
biblio
When Deep Learning Meets Steganography: Protecting Inference Privacy in the Dark
Submitted by grigby1 on Fri, 02/03/2023 - 4:58pm
deep learning
pubcrawl
Metrics
privacy
data privacy
Cloud Computing
composability
Perturbation methods
edge computing
Image edge detection
Weapons
adversarial attacks
Steganography
steganography detection
inference privacy
biblio
Cryptography using Affine Hill Cipher Combining with Hybrid Edge Detection (Canny-LoG) and LSB for Data Hiding
Submitted by grigby1 on Fri, 02/03/2023 - 4:58pm
Image edge detection
steganography detection
Steganography
Receivers
pubcrawl
PSNR
privacy
Metrics
LSB
edge detection
Embbedding
Detectors
Cry[ptography
Conferences
composability
Ciphers
security
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »