Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Fourier transforms
biblio
Improving Wireless Network Security Based On Radio Fingerprinting
Submitted by aekwall on Mon, 02/17/2020 - 2:34pm
security threats
Wireless Network Security
wireless device transmitters
transient signals
radio transmitters
Radio Frequency Fingerprints
radio frequency fingerprint extraction
radio fingerprinting
physical characteristics
fractional fourier transform
Fourier transforms
identity authentication
wireless networks
sensor security
authorisation
Signal to noise ratio
Transient analysis
Metrics
wireless devices
Communication system security
wireless sensor networks
composability
pubcrawl
Human behavior
Resiliency
feature extraction
security
telecommunication security
biblio
Automated Generation and Selection of Interpretable Features for Enterprise Security
Submitted by grigby1 on Fri, 03/22/2019 - 1:00pm
machine learning method
Training data
security of data
security
Scalability
Resiliency
resilience
pubcrawl
pattern clustering
Metrics
malware
malicious activity detection
big data security
learning (artificial intelligence)
Fourier transforms
fourier analysis
feature extraction
enterprise security logs
DNF formulas
cyber security
Clustering algorithms
classifiers
Boolean functions
biblio
Polyharmonic test signals application for identification of nonlinear dynamical systems based on volterra model
Submitted by grigby1 on Fri, 09/28/2018 - 3:18pm
Nonlinear dynamical systems
volterra model
Volterra kernels
Volterra kernel
Volterra equations
Transfer functions
Resiliency
resilience
pubcrawl
polyharmonic test signals application
polyharmonic signals
partial component
Nonlinear system
composability
multidimensional transfer functions
Metrics
Kernel
interpolations
Harmonic analysis
frequency-domain analysis
frequency limitations
frequency characteristics
Fourier-images
Fourier transforms
Dynamical Systems
biblio
Privacy-Preserving Aggregation of Smart Metering via Transformation and Encryption
Submitted by grigby1 on Wed, 02/21/2018 - 1:53pm
Scalability
Human behavior
Human Factors
power engineering computing
privacy
Privacy-preserving
privacy-preserving smart metering system
pubcrawl
resilience
Resiliency
Gaussian processes
Smart Grid Privacy
Smart Metering
smart meters
smart power grids
Transformation
wavelet perturbation algorithm
wavelet transformation
wavelet transforms
WPA
distributed processing
Aggregates
Australia
Cryptography
data aggregation
data privacy
DDP
differential privacy techniques
Distributed databases
distributed differential privacy
aggregate data queries
distributed smart meter data aggregation
ElGamal encryption mechanism
encryption
Fourier perturbation algorithm
Fourier transformation
Fourier transforms
FPA
Gaussian principles
biblio
Efficient and robust perceptual hashing using log-polar image representation
Submitted by BrandonB on Wed, 05/06/2015 - 12:02pm
key dependent noninvertible transform
Watermarking
Vectors
Transforms
Robustness
robust perceptual hashing
robust image hashing
registration technique
perceptual hashing
multimedia security
log-polar transformation
Log-Polar transform feature
log polar image representation
content authentication
image recognition technique
Image Processing
image indexing
Image coding
image authentication
Hamming distance
Fourier-Mellin transforms
Fourier transforms
feature extraction
database search
Cryptography
biblio
Accurate adaptive filtering in square-root Hann windowed short-time fourier transform domain
Submitted by BrandonB on Wed, 05/06/2015 - 9:38am
noise reduction
square-root Hann windowed STFT domain
square-root Hann window
speech processing
Speech
short-time Fourier transform
residual echo
Prototypes
prototype filter
nonlinear post filters
nonlinear filters
accurate adaptive filtering
linear convolution
frequency-domain analysis
Fourier transforms
echo suppression
Discrete Fourier transforms
convolution
audio signal processing
adaptive filters
Acoustics
acoustic echo cancellation
biblio
Parameter estimation for SAR moving target detection using Fractional Fourier Transform
Submitted by BrandonB on Tue, 05/05/2015 - 11:23am
geophysical techniques
Time-frequency Analysis
target moving
synthetic aperture radar
SAR moving target detection
radar antennas
Radar
parameter estimation
multichannel SAR ground algorithm
moving target echo
GMTI
Acceleration
FrFT
fractional fourier transform
Fourier transforms
Doppler radar
Doppler parameters
Doppler effect
displace phase center antenna
Clutter
Azimuth
Apertures
biblio
A Dynamic Matching Algorithm for Audio Timestamp Identification Using the ENF Criterion
Submitted by BrandonB on Fri, 05/01/2015 - 8:15am
frequency estimation
window size
timestamp identification
Time-frequency Analysis
STFT
signal-to-noise ratio
Signal to noise ratio
Signal resolution
short-time Fourier transform
short recording durations
reference data
MMSE
minimum mean squared error
mean square error methods
maximum correlation coefficient
frequency resolution problems
audio authentication
frequency estimates
Fourier transforms
extracted ENF signal
estimation
ENF criterion
electric network frequency criterion
Electric network frequency (ENF)
dynamic matching
correlation methods
Correlation
autocorrection process
audio timestamp identification
audio recording
audio forensics
biblio
Detection of duplicated regions in images using 1D-Fourier transform
Submitted by BrandonB on Fri, 05/01/2015 - 7:57am
frequency domain
user friendly image editing software
tampering technique
Resistance
overlapping blocks
JPEG compression attacks
image recognition
image modification techniques
Image coding
high quality imaging hardware
Gaussian blurring
frequency-domain analysis
1D-Fourier transform
Fourier transforms
Fourier transform
feature vector similarity
feature extraction algorithm
feature extraction
duplicated region detection
digital mediums
digital images
Copy move forgery
copy move forged region detection
authentication
« first
‹ previous
1
2