Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
feature extraction
biblio
Objection!: Identifying Misclassified Malicious Activities with XAI
Submitted by grigby1 on Thu, 12/01/2022 - 5:09pm
feature extraction
machine learning
security
pubcrawl
resilience
Resiliency
Conferences
Scalability
Object recognition
malware
malware detection
Cyberspace
malicious website detection
xai
biblio
Wi-SUN Device Authentication using Physical Layer Fingerprint
Submitted by aekwall on Thu, 12/01/2022 - 4:24pm
frequency shift keying
Wi-SUN
Resiliency
pubcrawl
physical layer security
physical layer fingerprint
Physical layer
Metrics
IoT
authentication
frequency estimation
Focusing
Fingerprint recognition
feature extraction
device authentication
composabiloity
composability
biblio
A Fully-integrated Gesture and Gait Processing SoC for Rehabilitation with ADC-less Mixed-signal Feature Extraction and Deep Neural Network for Classification and Online Training
Submitted by grigby1 on Tue, 11/08/2022 - 11:50am
Training
feature extraction
pubcrawl
resilience
Resiliency
system-on-chip
Biological neural networks
Deep Neural Network
Edge Processing
inter-chip communication
mixed-signal feature extraction
Nonlinear distortion
on-chip learning
voltage-controlled oscillators
neural network resiliency
biblio
Malicious Flows Generator Based on Data Balanced Algorithm
Submitted by grigby1 on Wed, 11/02/2022 - 12:59pm
Generators
IDS datasets
Anomaly Traffic Detection
Malware Analysis
Generative Adversarial Learning
generative adversarial networks
sandbox
Computational modeling
Scalability
Computer hacking
Resiliency
resilience
Metrics
pubcrawl
Intrusion Detection
machine learning
feature extraction
biblio
Learn Travel Time Distribution with Graph Deep Learning and Generative Adversarial Network
Submitted by grigby1 on Wed, 11/02/2022 - 12:57pm
deep learning
Predictive models
feature extraction
pubcrawl
Metrics
resilience
Resiliency
Analytical models
Scalability
Data models
estimation
generative adversarial networks
Generative Adversarial Learning
biblio
Image Style Transfer Based on Generative Adversarial Network
Submitted by grigby1 on Wed, 11/02/2022 - 12:56pm
generative adversarial networks
Variational Auto-encoder
encoder
Deconvolution
style transfer
automation
Image coding
Generative Adversarial Learning
generative adversarial network
feature extraction
Force
deep learning
Scalability
Resiliency
resilience
Metrics
pubcrawl
convolution
biblio
An Adaptive Image Steganographic Scheme Using Convolutional Neural Network and Dual-Tree Complex Wavelet Transform
Submitted by grigby1 on Thu, 10/20/2022 - 4:24pm
Image edge detection
steganography detection
dual-tree complex wavelet transform
canny edge-detection
Adaptive steganography
discrete wavelet transforms
Steganography
singular value decomposition
Image color analysis
Training
convolutional neural networks
convolutional neural network
Matrix decomposition
composability
privacy
Metrics
pubcrawl
feature extraction
biblio
Reference-free Detection of LSB Steganography Using Histogram Analysis
Submitted by grigby1 on Thu, 10/20/2022 - 4:23pm
feature extraction
pubcrawl
Metrics
Correlation
privacy
Cryptography
composability
Classification algorithms
Histograms
Image coding
Steganography
Communications technology
LSB steganography
steganalysis
image tampering
steganography detection
biblio
Automatic Detection of Android Steganography Apps via Symbolic Execution and Tree Matching
Submitted by grigby1 on Thu, 10/20/2022 - 4:01pm
feature extraction
pubcrawl
Metrics
Conferences
privacy
composability
malware
network security
Steganography
frequency-domain analysis
codes
steganography detection
biblio
High capacity coverless image steganography method based on geometrically robust and chaotic encrypted image moment feature
Submitted by grigby1 on Thu, 10/20/2022 - 4:00pm
feature extraction
pubcrawl
Metrics
Conferences
privacy
composability
chaotic communication
Robustness
Watermarking
Steganography
Harmonic analysis
steganography detection
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »