Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
visual databases
biblio
Securing Biometric Data with Optimized Share Creation and Visual Cryptography Technique
Submitted by grigby1 on Fri, 03/31/2023 - 10:23am
biometric encryption
pubcrawl
Aerospace electronics
Biological system modeling
biometrics
biometrics (access control)
encryption
Homomorphic encryption
Metrics
Optimal key generation
resilience
Resiliency
security
Share creation
visual databases
visualization
biblio
SEFlowViz: A Visualization Tool for SELinux Policy Analysis
Submitted by grigby1 on Fri, 11/18/2022 - 1:18pm
tools
security
pubcrawl
policy-based governance
collaboration
Data mining
visualization
Security Policies Analysis
Communication Systems
Neo4j
Readers-Writers Flow Model
seandroid
selinux
visual databases
biblio
Ready-IoT: A Novel Forensic Readiness Model for Internet of Things
Submitted by aekwall on Fri, 02/25/2022 - 9:47am
composability
synchronization attack
Network provenance
jamming attack
IoT dataset
forensic readiness
Provenance
Forensics
visual databases
security
Human behavior
Resiliency
Metrics
pubcrawl
feature extraction
Protocols
data privacy
Internet of Things
biblio
A Conversational Agent for Database Query: A Use Case for Thai People Map and Analytics Platform
Submitted by aekwall on Tue, 09/07/2021 - 10:15am
Artificial Intelligence
chatbot
Complexity theory
conversational agent
conversational agents
data analysis
Data Analytics
Data visualization
Engines
Human behavior
Metrics
Poverty alleviation
pubcrawl
Scalability
Transforms
visual databases
biblio
Info-Retrieval with Relevance Feedback using Hybrid Learning Scheme for RS Image
Submitted by grigby1 on Fri, 12/11/2020 - 2:01pm
Resiliency
multimedia computing
multimedia information retrieval
multitarget retrieval
pubcrawl
relevance feedback
remote sensing
remote sensing image
resilience
Metadata Discovery Problem
RS image
Scalability
Support vector machines
supported vector machine
symbolic image database
Training
visual databases
image metadata
Compositionality
content-based image retrieval
content-based retrieval
exception maximization algorithm
geophysical image processing
Hybrid Learning
hybrid learning scheme parameter
image library
CBIR
image retrieval
image segmentation
info-retrieval
interactive query
learning (artificial intelligence)
Learning systems
Libraries
biblio
Modified Feature Descriptors to enhance Secure Content-based Image Retrieval in Cloud
Submitted by aekwall on Mon, 11/16/2020 - 12:11pm
Outsourced Database Integrity
visual descriptors
visual databases
unencrypted images
texture descriptors
Secure kNN
secure CBIR scheme
searchable encryption
searchable encrypted index
retrieval precision
Resiliency
pubcrawl
outsourced images
outsourced encrypted images
color descriptors
modified feature descriptors
Metrics
locality sensitive hashing
image texture
image retrieval
image colour analysis
feature extraction
encrypted domain gain
data privacy
Cryptography
content-based retrieval
content-based image retrieval
composability
biblio
Facial Expression Recognition using Discrete Cosine Transform Artificial Neural Network
Submitted by grigby1 on Fri, 06/19/2020 - 11:03am
Human behavior
visual databases
seven universal expressions
Resiliency
resilience
recognition rates
pubcrawl
person independent methods
nonverbal gestures
neural nets
Metrics
K-fold cross validation
Japanese female facial expression
JAFFE
Human Factors
ANN
frequency-domain analysis
feature extraction
facial recognition
facial expression recognition
face recognition
face gestures
Face
emotion recognition
discrete cosine transforms
discrete cosine transform
DCT
Databases
automatic facial expression recognition framework
Artificial Neural Networks
biblio
Defense Against Adversarial Images Using Web-Scale Nearest-Neighbor Search
Submitted by grigby1 on Fri, 05/22/2020 - 1:34pm
adversarial image
Web-scale nearest-neighbor search
Web-scale image database
Visual Reasoning
visual databases
representation learning
nearest-neighbor defense settings
Large Scale Methods
ImageNet
image representation
image manifold
Datasets and Evaluation
data distribution
security of data
nearest neighbor search
convolutional networks
adversarial perturbations
nearest neighbour methods
Measurement
Metrics
deep learning
Big Data
internet
pubcrawl
convolutional neural nets
biblio
Managing Big Data in Visual Retrieval Systems for DHS Applications: Combining Fourier Descriptors and Metric Space Indexing
Submitted by grigby1 on Fri, 03/22/2019 - 11:59am
Shape
metric-based balanced indexing tree
Metrics
National security
Performance Metrics
pubcrawl
resilience
Resiliency
rifle database
Scalability
metric space indexing
Shape Signatures
Similarity Indexing Methods
tree data structures
visual databases
visual retrieval systems
visualization
weapon images
Weapons
feature representation
Balanced Trees
Big Data
big data security
content-based retrieval
database indexing
Department of Homeland Security
DHS applications
feature extraction
balanced search
Fourier descriptors
gun database
image retrieval
image retrieval systems
indexing
invariance properties
M-tree
Measurement
biblio
A privacy-aware query authentication index for database outsourcing
Submitted by BrandonB on Wed, 05/06/2015 - 10:07am
encryption
visual databases
verification object transmission overhead
unsophisticated data grouping strategy
Spatial databases
spatial database
spatial data distribution
service provider
range query answering
query result integrity
query processing
privacy-aware query authentication index
periodic function-based data grouping scheme
outsourcing
Indexes
group signature
authentication
Encrypted database
digital signatures
database outsourcing
database management system
database indexing
data storage
Data Security
data privacy
data maintenance
data integrity
data confidentiality
Data authentication index
cost reduction
Cloud Computing
bucket-based data authentication methods
1
2
next ›
last »