Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cameras
biblio
Protecting Personal Information using Homomorphic Encryption for Person Re-identification
Submitted by aekwall on Mon, 12/30/2019 - 12:35pm
Cameras
personal information protection
personal information
Person re-identification
people matching
linear quantization
image matching
Quantization (signal)
quantisation (signal)
Homomorphic encryption
Human Factors
Scalability
authentication
Data protection
Metrics
pubcrawl
Resiliency
feature extraction
decryption
encryption
Cryptography
Servers
biblio
YOLO Approach in Digital Object Definition in Military Systems
Submitted by aekwall on Mon, 08/12/2019 - 9:46am
object detection
YOLO approach
visual surveillance
Videos
video surveillance
video processing
two-dimensional videos
traffic monitoring
surveillance
Scalability
Resiliency
real-time generation detection
pubcrawl
Pattern recognition
outdoor monitoring applications
object tracking
Big Data
multimedia content-based indexing
military systems
military computing
military applications
Metrics
information acquisition
indoor monitoring applications
human tracking
distributed cross-camera surveillance systems
digital object definition
deep video
deep learning
cyber terrorism
Cameras
biblio
Zynq FPGA Based System Design for Video Surveillance with Sobel Edge Detection
Submitted by aekwall on Mon, 08/12/2019 - 9:46am
Surveillance systems and ARM processor
learning (artificial intelligence)
live traffic analysis
Metrics
pubcrawl
Reconfigurability
Resiliency
Scalability
security
Sobel edge detection
Streaming media
surveillance
input composite video surveillance
Thermal Imaging
VGA
video coding
video interface
video streaming
video surveillance
Xilinx ZC702 platfor
ZC702
Zynq FPGA based system design
Zynq-7000
field programmable gate arrays
analog composite video interface
analog CVBS
camera
Cameras
computer architecture
computer vision
Decoding
deep learning
deep video
edge detection
edge detection filter
ADAS
FPGA
Hardware
HDMI-MIPI CSI
high speed serial interfaces
image classification
Image edge detection
image filtering
Image resolution
industrial automation
input composite video decoding
biblio
Intelligent monitoring of indoor surveillance video based on deep learning
Submitted by aekwall on Mon, 08/12/2019 - 9:46am
Streaming media
protection system
pubcrawl
recurrent neural nets
Resiliency
Scalability
Semantics
smart monitoring system
storage management
pose estimation
surveillance
surveillance cameras
Surveillance video
Training
video image
video signal processing
video surveillance
video surveillance system
indoor surveillance video
convolutional neural nets
deep learning
deep learning methods
deep video
fine-tuning network
high-quality segmentation mask
image retrieval
image segmentation
Cameras
information technology
Instance Segmentation
intelligent monitoring
intelligent video analytics technology
learning (artificial intelligence)
Mask R-CNN
Metrics
object detection
biblio
Amazon Echo Enabled IoT Home Security System for Smart Home Environment
Submitted by aekwall on Mon, 08/05/2019 - 10:34am
internet
wireless sensor networks
Web server
user voice commands
ultralow-power wireless sensor network
Speech recognition
smart home environment
Smart Home
sensors
Resiliency
pubcrawl
IoT
Internet-connected system
Internet of Things
Internet accessible configuration page
Amazon Echo
Home Security System
home computing
home automation
Flowcharts
file servers
expandability
computer network security
composability
Cameras
bluetooth low energy
Bluetooth 4
Bluetooth
BLE
Amazon Echo enabled IoT home security system
biblio
Adversarial Multimedia Forensics: Overview and Challenges Ahead
Submitted by aekwall on Wed, 05/08/2019 - 9:42am
information forensics
Transform coding
tools
tampering detection
Signal processing algorithms
Scalability
resilience
pubcrawl
multimedia forensics tools
multimedia documents
multimedia computing
Metrics
information retrieval
adversarial environment
Human behavior
game theory
Forensics
forensic techniques
forensic analysis
distortion
Digital Forensics
Detectors
counter-forensic tools
Cameras
adversarial multimedia forensics
biblio
Dynamic Traffic Control System Using Edge Detection Algorithm
Submitted by grigby1 on Wed, 05/01/2019 - 11:33am
Traffic congestion
road traffic control
road vehicles
Roads
Scalability
security
smart city-smart travel
smart phone applications
smart phones
Resiliency
traffic engineering computing
Traffic light
traffic monitoring
traffic signal lights
transport network
vehicles
vehicular queuing
Workstations
Image edge detection
Communication networks
composability
congestion frequency detection
digital image processing techniques
dynamic traffic control system
edge detection
edge detection algorithm
electronic sensors
Cameras
Image Processing
image sequence
image sequences
magnetic coils
Metrics
pubcrawl
queueing theory
resilience
biblio
Screen watermarking for data theft investigation and attribution
Submitted by aekwall on Mon, 03/04/2019 - 10:46am
investigation
digital camera
digital cameras
external cyber attackers
human eye
Image coding
Image color analysis
image watermarking
infiltration
data theft investigation
malicious insiders
malicious members
recovered leaked pictures
screen watermarking
screen watermarks
symbol shape
text documents
Watermarking
Cameras
Organizations
Human behavior
pubcrawl
composability
Metrics
Computer crime
computer security
attribution
human-in-the-loop security center paradigm
cropped compressed pictures
data compression
data encapsulation
data leakage
Data mining
data theft
data theft attribution
biblio
Drone Detection and Identification System Using Artificial Intelligence
Submitted by grigby1 on Fri, 02/08/2019 - 4:14pm
drone imagery
surveillance
robot vision
Resiliency
pubcrawl
OpenCV library
object detection
Metrics
machine learning
learning (artificial intelligence)
Image Processing
Human behavior
feature extraction
drones
drone industry
approaching drone
drone identification system
Detectors
detection
deep learning
control engineering computing
comprehensive drone detection system
composability
classifier
Cameras
camera images
autonomous aerial vehicles
artificial intelligence security
Artificial Intelligence
biblio
xLED: Covert Data Exfiltration from Air-Gapped Networks via Switch and Router LEDs
Submitted by grigby1 on Thu, 01/31/2019 - 12:13pm
Resiliency
malware
Metrics
Network
networking equipment
optical
Optical sensors
optical signals
Protocols
pubcrawl
remote cameras
resilience
malicious code
router LED
security cameras
sensitive information
smart phones
smartphone cameras
status LED
switch LED
telecommunication security
transmission protocol
xLED
Ezfiltration
air-gap
air-gapped network
bit rate 1.0 bit/s
bit rate 2000.0 bit/s
Cameras
composability
Computer crime
covert channel (key words)
covert data exfiltration
covert-channel
Air gaps
hermetic isolation
Human behavior
internet
invasive software
IT network
LAN routers
LAN switches
light emitting diodes
Local area networks
low-level control
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
next ›
last »