Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Iterative methods
biblio
Increasing the SAT Attack Resiliency of In-Cone Logic Locking
Submitted by grigby1 on Wed, 02/26/2020 - 3:48pm
Logic gates
security
satisfiability attack
SAT attack resiliency
SAT attack
Resiliency
resilience
removal attack
pubcrawl
MFFC based algorithm
maximum fanout free cones
manufacturing
logic locking
provable security
logic design
key gate selection
Iterative methods
integrated logic circuits
integrated circuits
in-cone techniques
in-cone logic locking
Hardware Security
Hardware
Electronics packaging
circuit netlist
biblio
Enforcing Optimal Moving Target Defense Policies
Submitted by grigby1 on Tue, 02/18/2020 - 11:06am
MDP model
value iteration
security
Scalability
Resiliency
resilience
pubcrawl
optimal security policies
optimal policy selection
optimal moving target defense policies
moving target defense
Metrics
Analytical models
Mathematical model
Markov processes
Markov Decision Process
Markov Decision
Iterative methods
Games
Decision Making
Control Theory
computer science
Bellman optimality equation
biblio
Security Risk Assessment and Management as Technical Debt
Submitted by aekwall on Mon, 02/17/2020 - 1:27pm
technical debt
technical debt management systems
software development organizations
software design
security risk assessment
security engineering techniques
security debt management approach
security debt
risk-based security engineering processes
risk-based extensions
portfolio-based technical debt management framework
iterative software development
Security Risk Management
information security
security of data
risk analysis
security management
software security
Unified modeling language
software engineering
risk management
Metrics
Iterative methods
pubcrawl
Resiliency
Software
Organizations
Scalability
biblio
Exact Sparse Signal Recovery via Orthogonal Matching Pursuit with Prior Information
Submitted by aekwall on Mon, 02/17/2020 - 1:23pm
exact recovery probability
Upper bound
sensing matrix
random matrix
prior information
prior distribution information
orthogonal matching Pursuit algorithm
orthogonal matching pursuit (OMP)
OMP
nonzero entries
Matching pursuit algorithms
linear model
K-sparse signals
greedy algorithms
exact sparse signal recovery
Resiliency
compressed sensing
Closed-form solutions
sensors
signal processing security
gaussian distribution
Indexes
probability
privacy
computer security
Metrics
matrix algebra
Iterative methods
composability
pubcrawl
biblio
Linear Precoding Design for Cache-aided Full-duplex Networks
Submitted by aekwall on Mon, 01/20/2020 - 11:12am
linear beamforming zero-forcing
edge node
FD mode
full-duplex
full-duplex transmission
future generation wireless networks
half-duplex counterpart
inner approximation method
Interference cancellation
iterative optimization algorithms
least mean squares methods
edge caching
linear codes
linear precoding design
minimum mean square error designs
optimization problems
precoding
radiofrequency interference
self-interference
spectral efficiency
zero trust
wireless networks
Resiliency
pubcrawl
policy-based governance
Iterative methods
optimization
array signal processing
radio networks
Human Factors
wireless channels
network coding
Scalability
approximation theory
cache storage
cache-aided FD system
cache-aided full-duplex networks
concave programming
data hungry
delivery time
delivery time analysis
delivery time optimization
biblio
Fixed Point Computation by Exponentiating Linear Operators
Submitted by aekwall on Mon, 01/20/2020 - 10:49am
linear operators
three-term control
set theory
Scalability
Resiliency
pubcrawl
piecewise linear techniques
PID controller
multivalued linear map
Linear systems
approximation
linear multivalued operators
Iterative methods
iterated functions
fixed point computation
fixed point arithmetic
exponentiation
control function
arbitrary time
approximation theory
biblio
Energy Management in an Islanded Microgrid: A Consensus Theory Approach
Submitted by aekwall on Mon, 01/20/2020 - 10:46am
lambda-iteration method
transmission losses
scalability test
Resiliency
renewables
renewable energy sources
renewable energy
pubcrawl
Propagation losses
optimization problem
optimization
optimisation
multiagent system
multi-agent systems
Microgrids
micro grid.
8-bus islanded microgrid
Iterative methods
Generators
expandability performance
expandability
energy management systems
energy management optimization algorithm
energy management
Economics
distributed power generation
distributed generation
DG energy managemen
consensus theory approach
Consensus
composability
biblio
APDPk-Means: A New Differential Privacy Clustering Algorithm Based on Arithmetic Progression Privacy Budget Allocation
Submitted by aekwall on Mon, 01/06/2020 - 9:36am
k-means algorithm
Sensitivity
security of data
Scalability
resource management
Resiliency
pubcrawl
privacy protection
privacy budgets
privacy budget allocation
privacy
pattern clustering
optimisation
network information security
network data mining
APDPk-means
iterative process
Iterative methods
Human behavior
differential privacy k-means
differential privacy clustering algorithm
differential privacy
Data protection
Data mining
data clustering
composability
Clustering algorithms
Big Data
arithmetic progression privacy budget allocation
biblio
Sybil Detection in Social-Activity Networks: Modeling, Algorithms and Evaluations
Submitted by aekwall on Mon, 02/18/2019 - 11:58am
malicious activities
Twitter
Sybil SAN
sybil detection
sybil defenses
sybil attacks
social-activity networks
social networking (online)
social activity network
security of data
pubcrawl
perturbation theory
online social networks
Metrics
matrix perturbation theory
matrix algebra
activity attacks
low detection accuracy
Iterative methods
iterative algorithm
Image edge detection
graph-based sybil detection
graph theory
friendship attacks
fake accounts
Facebook
detection metric
detection algorithms
convergence
Computational modeling
composability
Algorithms
biblio
Audio Adversarial Examples: Targeted Attacks on Speech-to-Text
Submitted by aekwall on Wed, 01/16/2019 - 1:10pm
automatic speech recognition
White Box Security
white-box iterative optimization-based attack
targeted audio adversarial examples
targeted attacks
speech-to-text
Probability distribution
neural network
Mozilla implementation DeepSpeech end
Iterative methods
Distortion measurement
distortion
security of data
audio waveform
adversarial example
Perturbation methods
Neural networks
Speech recognition
composability
Metrics
pubcrawl
resilience
optimisation
« first
‹ previous
1
2
3
4
5
6
next ›
last »