Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
image classification
biblio
Hyperspectral Image Classification Based on Generative Adversarial Networks with Feature Fusing and Dynamic Neighborhood Voting Mechanism
Submitted by grigby1 on Mon, 02/10/2020 - 11:31am
Hyperspectral imaging
SSL Trust Models
spectral-spatial classification
Semisupervised learning
semi-supervised learning (SSL)
Scalability
Resiliency
resilience
pubcrawl
multilayer features fusion
Metrics
learning (artificial intelligence)
Indian Pines dataset
image fusion
image classification
CNN spectral classifier
Hyperspectral images classification
hyperspectral image classification
Human Factors
Human behavior
HSI classification
geophysical image processing
generative adversarial networks (GAN)
generative adversarial networks
Gallium nitride
feature extraction
dynamic neighborhood voting mechanism
deep learning
convolutional neural nets
biblio
Document Typist Identification by Classification Metrics Applying Keystroke Dynamics Under Unidealised Conditions
Submitted by grigby1 on Tue, 01/28/2020 - 2:36pm
keystroke analysis
Typist identification
text detection
text analysis
rhythm
pubcrawl
password
Minkowski metric
Minkowski distance
Metrics
Measurement
keystroke dynamics
Chebyshev approximation
Keyboards
image classification
Human Factors
Human behavior
feature extraction
document typist identification
document image processing
Distance metrics
Databases
classification metrics
biblio
C2P2: Content-Centric Privacy Platform for Privacy-Preserving Monitoring Services
Submitted by grigby1 on Tue, 01/21/2020 - 11:28am
Monitoring service
Wth-privacy-preserving monitoring service
ubiquitous surveillance cameras
town and country planning
surveillance
Smart City
smart cities
security
Scalability
Resiliency
resilience
pubcrawl
privacy-preserving monitoring services
privacy preservation
privacy leakage
privacy
C2P2
information-centric networking
Information Centric Networks
Information Centric Networking (ICN)
Information Centric Network
image recognition
image classification model
image classification
encryption
data privacy
data aggregation
content-centric privacy platform
cloud-based services
Cloud Computing
Cameras
biblio
Emotion Recognition from 2D Facial Expressions
Submitted by aekwall on Mon, 12/30/2019 - 12:12pm
CNN model
facial recognition
SVM classifier
span texture
shape features
overfitting problem
informative representations
image texture
handcrafted features
gray-level images
facial expression recognition application
Face
2d facial expressions
facial expression recognition
face recognition
Support vector machines
emotion recognition
deep learning
image classification
convolutional neural network
convolutional neural nets
Training
Databases
Metrics
Computational modeling
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
feature extraction
biblio
Zynq FPGA Based System Design for Video Surveillance with Sobel Edge Detection
Submitted by aekwall on Mon, 08/12/2019 - 9:46am
Surveillance systems and ARM processor
learning (artificial intelligence)
live traffic analysis
Metrics
pubcrawl
Reconfigurability
Resiliency
Scalability
security
Sobel edge detection
Streaming media
surveillance
input composite video surveillance
Thermal Imaging
VGA
video coding
video interface
video streaming
video surveillance
Xilinx ZC702 platfor
ZC702
Zynq FPGA based system design
Zynq-7000
field programmable gate arrays
analog composite video interface
analog CVBS
camera
Cameras
computer architecture
computer vision
Decoding
deep learning
deep video
edge detection
edge detection filter
ADAS
FPGA
Hardware
HDMI-MIPI CSI
high speed serial interfaces
image classification
Image edge detection
image filtering
Image resolution
industrial automation
input composite video decoding
biblio
A light-weight malware static visual analysis for IoT infrastructure
Submitted by aekwall on Mon, 06/24/2019 - 2:41pm
large-scale malware
visualization
Resiliency
pubcrawl
MICS
Microwave integrated circuits
microsoft windows
Metrics
malware image classification system
malware family classification
malware attacks
Malware Analysis
malware
light-weight malware static visual analysis
classification
large-scale IoT malware
IoT infrastructure
invasive software
Internet of Things
image representation
image classification
hybrid local malware features
hybrid global malware features
Human behavior
gray-scale image
Gray-scale
feature extraction
Cloud Computing
biblio
Malware Classification with Deep Convolutional Neural Networks
Submitted by grigby1 on Mon, 06/10/2019 - 2:01pm
learning (artificial intelligence)
Support vector machines
Resiliency
resilience
pubcrawl
privacy
Microsoft malware
Metrics
malware classification
malware binaries
malware
Malimg malware
machine learning approaches
machine learning
Learning systems
challenging malware classification datasets
invasive software
image classification
Human behavior
grayscale images
Gray-scale
feedforward neural nets
deep learning framework
deep learning approach
deep learning
deep convolutional neural networks
convolutional neural networks
convolution
computer architecture
CNN
biblio
Malware Classification Using Deep Convolutional Neural Networks
Submitted by grigby1 on Mon, 06/10/2019 - 2:01pm
privacy
learning models
machine learning
malware
malware binaries
malware classification
malware images
Metrics
neural network
object detection
Pattern recognition
learning (artificial intelligence)
pubcrawl
resilience
Resiliency
support vector machine
support vector machine classifier training
Support vector machines
transfer learning
visual patterns
visualization
feature extraction
classification
classifier
convolutional neural nets
convolutional neural network
convolutional neural networks
Correlation
DCNN classification
deep convolutional neural networks
deep learning techniques
accuracy levels
Gray-scale
Hamming distance
Human behavior
image classification
image features
image representation
image type
improved image representation
invasive software
biblio
A Cross Correlation Approach for Breaking of Text CAPTCHA
Submitted by aekwall on Mon, 04/01/2019 - 10:07am
challenge-response test
text CAPTCHA
Segmentation
Optical character recognition software
online web service providers
OCR
Noise measurement
image denoising
image classification
distorted text
cross correlation approach
character recognition
security of data
captcha images
CAPTCHA
image segmentation
captchas
Correlation
web services
standards
composability
pubcrawl
Human behavior
biblio
Adversarial Examples for Generative Models
Submitted by grigby1 on Mon, 01/21/2019 - 12:38pm
learning (artificial intelligence)
variational techniques
VAE-GAN architecture attacks
vae gan
vae
Training
target generative network
target generative model
Scalability
Resiliency
Receivers
pubcrawl
neural net architectures
neural net architecture
Metrics
machine learning
adversarial example
input data distribution model
image representation
Image reconstruction
Image coding
image classification
Human behavior
Generative Models
deep learning architectures
deep generative models
Decoding
Data models
classifier
classification-based adversaries
Adversary Models
adversarial examples
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »