Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data compression
biblio
Dynamic data compression algorithm for wireless sensor networks based on grid deduplication
Submitted by aekwall on Tue, 03/08/2022 - 2:41pm
Resiliency
grid de-duplication
dynamic compression
data
named data networking
data compression
Data mining
component
Human behavior
Data models
pubcrawl
Distributed databases
feature extraction
Heuristic algorithms
Scalability
Wireless Sensor Network
wireless sensor networks
biblio
Development of an information-theoretical method of attribution of literary texts
Submitted by aekwall on Tue, 01/25/2022 - 3:57pm
Reliability
information technology
pubcrawl
Metrics
Human behavior
composability
Redundancy
control systems
information theory
attribution of literary texts
authorship
data compression
attribution
biblio
Morphological Filter Detector for Image Forensics Applications
Submitted by grigby1 on Thu, 04/08/2021 - 5:14pm
image filtering
Morphology
digital image forensics
binary image compression
binary level documents
deterministic approach
feature extractor
gray level documents
grayscale image compression
mathematical morphology
image forensic identification
image manipulations
media authentication
morphological filter detection
morphological filter detector
noise removal
nonlinear image operators
trained SVM classifier
image classification
Human behavior
Metrics
resilience
Resiliency
Scalability
Support vector machines
Kernel
feature extraction
pubcrawl
Detectors
image colour analysis
Image forensics
information forensics
Image coding
data compression
Transform coding
Gray-scale
biblio
Optimal Image Watermark Technique Using Singular Value Decomposition with PCA
Submitted by aekwall on Mon, 02/15/2021 - 4:43pm
Matrix converters
decomposition
wavelet transformation
tracing copyright infringements
principle component analysis
peak signal-to-noise ratio
optimum digital image watermark technique
intellectual property right
image compression
discrete wavelet transformation-singular value decomposition approach
banknote authentication
singular value decomposition
discrete wavelet transforms
principal component analysis
Matrix decomposition
Compositionality
Color
cyber physical systems
Watermarking
image watermarking
Image coding
data compression
PCA
Metrics
pubcrawl
biblio
Collaborative Distillation for Ultra-Resolution Universal Style Transfer
Submitted by aekwall on Mon, 02/01/2021 - 11:44am
linear embedding loss
compressed models
convolutional filters
deep convolutional neural network models
encoder-decoder based neural style transfer
encoder-decoder pairs
exclusive collaborative relationship
feature size mismatch
knowledge distillation method
leverage rich representations
collaborative distillation
student network
style transfer models
trained models
ultra-resolution images
ultra-resolution universal style transfer
universal style transfer
universal style transfer methods
VGG-19
Image coding
Task Analysis
learning (artificial intelligence)
Resiliency
pubcrawl
Decoding
convolutional neural nets
optimisation
data compression
Scalability
collaboration
Image resolution
Predictive Metrics
Knowledge engineering
encoding
graphics processing units
Image reconstruction
neural style transfer
biblio
Security Improvement of Cloud Data Using Hybrid Cryptography and Steganography
Submitted by aekwall on Mon, 01/25/2021 - 12:58pm
hashing functions
Steganography
cloud data
security issue
asymmetric cryptography
Asymmetric Encryption
AES symmetric encryption
compressed data
data encryption phase
data validation phase
symmetric cryptography
information concealment technology
LSB algorithm
LZW algorithm
mixed encryption
RSA asymmetric encryption
SHA hashing algorithm
Steganographic
strong data security
data compression
encrypted data
encryption
hybrid encryption
cloud storage
Resiliency
Human behavior
pubcrawl
composability
Metrics
Cloud Computing
public key cryptography
security improvement
Image coding
information technology
cloud environment
Software algorithms
Image Processing
data storage
biblio
Detecting Deepfakes with Metric Learning
Submitted by grigby1 on Fri, 01/15/2021 - 12:04pm
Scalability
learning (artificial intelligence)
metric learning approach
Metrics
MixBooth
neural texture dataset
pubcrawl
resilience
Resiliency
image texture
Snapchat
social media platforms
social networking (online)
Triplet Network
triplet network architecture
Video Forensics
work factor metrics
data compression
image classification
Human Factors
Human behavior
feature space distance
feature extraction
fake videos
FaceBlender
FaceApp
face-swapping applications
digital media content
deepfakes classification
Deepfakes
deepfake detection
DeepFake
deep learning approaches
biblio
Deep Learning with Feature Reuse for JPEG Image Steganalysis
Submitted by aekwall on Mon, 11/09/2020 - 1:12pm
J-UNIWARD
32-layer convolutional neural networks
bit per nonzero AC DCT coefficient
bottleneck layers
bpnzAC
conventional SCA-GFR method
detection error rate reduction
feature reuse
Gabor filters
Steganography
JPEG compressed image
JPEG image steganalysis
JPEG steganalysis methods
shared features
weak hidden information
XuNet method
Information Reuse and Security
computer architecture
CNN model
Compositionality
Transform coding
distortion
convolution
discrete cosine transforms
Image coding
data compression
convolutional neural nets
Training
deep learning
pubcrawl
Resiliency
learning (artificial intelligence)
feature extraction
biblio
Generating Digital Signature using Facial Landmlark Detection
Submitted by grigby1 on Fri, 08/28/2020 - 3:44pm
digital signature generation
biometric encryption
Facial features
Audio recognition
biometric identification
CDNU Algorithm
compressed textual signature
database storage overhead
Digital Security
data compression
facial landmark detection
facial landmarks
facial recognition
Huffman coding
real-time optimized encryption procedure
secure digital signature
security advisors
user account information database
information security
encryption
feature extraction
pubcrawl
Metrics
Resiliency
optimization
Scalability
Databases
Cryptography
resilience
social networking (online)
face recognition
digital signatures
image texture
confidential information
Image coding
biblio
Selective Jpeg2000 Encryption of Iris Data: Protecting Sample Data vs. Normalised Texture
Submitted by grigby1 on Fri, 08/28/2020 - 3:44pm
Iris recognition
selective jpeg2000 encryption
Selective Encryption
normalised texture data
low complexity selective encryption schemes
JPEG2000 compressed iris data
JPEG2000
Iris sample protection
cryptographic protection
biometric system security
biometric encryption
Cryptography
data compression
Image coding
image texture
image segmentation
resilience
biometrics (access control)
Scalability
Resiliency
Metrics
pubcrawl
1
2
3
4
5
next ›
last »