Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data compression
biblio
Hybrid Encryption Algorithm Based on Wireless Sensor Networks
Submitted by aekwall on Mon, 08/10/2020 - 9:49am
Compositionality
wireless sensor networks(WSNs)
hybrid encryption algorithm
encryption standard
data compression technology
cipher block
asymmetric/symmetric encryption algorithm
Asymmetric Encryption
elliptic curve encryption
AES
advanced encryption standard
ECC
public key cryptography
data compression
Metrics
wireless sensor networks
pubcrawl
Human behavior
Resiliency
private key cryptography
biblio
A blind watermarking technique using redundant wavelet transform for copyright protection
Submitted by grigby1 on Thu, 07/30/2020 - 1:05pm
redundant wavelet transform
copyright protection
digital images
digital watermarking technique
geometrical attacks
host image
hybrid blind watermarking technique
hybrid scheme RDWT-SVD
JPEG2000 compression
modified entropy
orthogonal matrix
blind watermarking technique
redundant weavelet transform
signal processing
singular value decomposition
Transform coding
watermark embedding locations
watermark extraction
watermark image
watermark insertion
wavelet transforms
Robustness
Human behavior
Human Factors
policy-based governance
resilience
Resiliency
intellectual property
Entropy
composability
Metrics
pubcrawl
Low pass filters
Image coding
data compression
image watermarking
Watermarking
copyright
copy protection
ip protection
Arnold chaotic map
biblio
A hardware intellectual property protection scheme based digital compression coding technology
Submitted by grigby1 on Thu, 07/30/2020 - 12:50pm
Resiliency
intellectual property
intellectual property security
IP core watermark
IP networks
ip protection
policy-based governance
pubcrawl
resilience
industrial property
resource utilization
Robustness
security
surrounding circuit
Table lookup
watermark information
Watermarking
composability
image watermarking
hardware intellectual property protection
hardware circuit
Hardware
FPGA circuit
FPGA
field programmable gate arrays
encoding
embedding cost
Digital Watermark
digital compression coding technology
decoding function
data compression
Cryptography
Compression coding
biblio
A Simultaneous Approach for Compression and Encryption Techniques Using Deoxyribonucleic Acid
Submitted by aekwall on Mon, 03/16/2020 - 9:42am
channel medium
time consumption
standard compression techniques
simultaneous technique
simultaneous compression
simultaneous approach
sequential technique
scientific concepts
DNA nucleotides
different scientific studies
deoxyribonucleic acid
creative skill
Compression
compacted information
compact form
Cryptography
secret data
Encryption technique
Scientific Computing Security
Compositionality
Predictive Metrics
resilience
Data Transmission
DNA
Image coding
data compression
pubcrawl
security
encryption
biblio
Image Analysis and Processing in the Encrypted Domain
Submitted by grigby1 on Wed, 03/04/2020 - 3:14pm
image encryption
Transform coding
theoretical cryptography
social networking (online)
signal processing in the encrypted domain
secret image sharing
research project
pubcrawl
privacy
noisy encrypted images
Noise measurement
multimedia security
composability
Image coding
Image analysis
Entropy
encryption phase
encrypted domain
data hiding
data encapsulation
data compression
Cryptography
crypto-compressed image recompression
Compositionality
biblio
Evaluating Fault Resiliency of Compressed Deep Neural Networks
Submitted by grigby1 on Wed, 02/26/2020 - 3:48pm
Hardware
VGG16
storage faults
software mitigation techniques
Resiliency
resilience
Quantization (signal)
pubcrawl
Predictive models
neural nets
LeNet-5
learning (artificial intelligence)
inference mechanisms
hardware mitigation techniques
Analytical models
fault tolerant computing
fault tolerance
Fault resiliency
Fault Resilience
Fault Attacks
Efficient and secure inference engines
Deep neural network model compression
deep learning
Data models
data compression
Computational modeling
compressed DNN models
compressed deep neural networks
biblio
Real-Time Proof of Violation with Adaptive Huffman Coding Hash Tree for Cloud Storage Service
Submitted by aekwall on Mon, 02/24/2020 - 9:56am
file access patterns
Repudiation
violation scheme
tree structure
tree nodes
tree construction algorithm
service-level agreement
real-time proof
proof of violation
PoV scheme
non-repudiation
Huffman coding
Huffman codes
hash tree
file system
Cloud Computing
cryptographic proofs
cloud storage service
adaptive Huffman coding hash tree
service provider
tree data structures
storage management
data compression
trees (mathematics)
Metrics
composability
pubcrawl
Human behavior
Resiliency
Cryptography
biblio
The Method of Raising Numbers, Represented in the System of Residual Classes to an Arbitrary Power of a Natural Number
Submitted by aekwall on Mon, 01/20/2020 - 10:48am
multiplication
Task Analysis
subtraction
Scalability
Resiliency
residual classes
residual class system
Redundancy
pubcrawl
positive number
number theory
no-fault operations
negative number
natural redundancy
natural number
addition
Mathematical model
integer arithmetic operations
exponentiation
digital arithmetic
Data processing
data compression
Conferences
computer systems and components
computer systems
Complexity theory
artificial redundancy
arithmetic operations
arbitrary power
biblio
Compressive Sensing and Hyper-Chaos Based Image Compression-Encryption
Submitted by grigby1 on Tue, 12/10/2019 - 10:21am
Hyper-chaos
Two dimensional displays
Sparse matrices
sparse coefficients
security
Resiliency
resilience
pubcrawl
privacy
matrix algebra
Logistics
linear measurements
Image reconstruction
Image coding
hyper-chaos based image compression-encryption algorithm
hyper-chaos based diffusion
2D-Compressive Sensing
encryption
data compression
cyber physical systems
Cyber Physical System
Cryptography
compressive sensing
compressive sampling
compression-encryption algorithm
Compression
compressed sensing
composability
cipher image
chaotic communication
chaos based measurement matrix construction
chaos
biblio
Data Compression Scheme Based on Discrete Sine Transform and Lloyd-Max Quantization
Submitted by grigby1 on Tue, 12/10/2019 - 10:20am
Common Public Radio Interface
composability
compressive sampling
Cyber Physical System
cyber physical systems
data compression
Discrete Sine Transform
Lloyd-Max
privacy
pubcrawl
resilience
Resiliency
« first
‹ previous
1
2
3
4
5
next ›
last »