Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
distortion
biblio
Influence of Deactivated Agents in Social Networks: Switching Between French-De Groot Models and Friedkin-Johnsen Model
Submitted by aekwall on Mon, 02/10/2020 - 12:07pm
control
Social Agents
social sciences
Remote control
geophysical techniques
Friedkin-Johnsen model
French-De Groot models
deactivation model
deactivated agents
De Groot
complex mechanism
Consensus
Scalability
Biological system modeling
Switches
Human Factors
distortion
network theory (graphs)
Mathematical model
Economics
social networks
social networking (online)
pubcrawl
biblio
Quantized Gaussian Embedding Steganography
Submitted by grigby1 on Mon, 02/10/2020 - 11:43am
multivariate Gaussian random variables
variance estimators
universal embedding scheme
testing
stego messages
steganography detection
Steganography
statistical framework
statistical analysis
Random variables
quantized Gaussian embedding steganography
pubcrawl
privacy
Payloads
optimal detector
composability
Metrics
Mathematical model
Image Steganography
Image Processing
Hypothesis testing
generalized adopted statistical model
Gaussian processes
Gaussian embedding method
Gaussian embedding
gaussian distribution
distortion
Detectors
detection error
cost-based steganography
biblio
A Differential Privacy-Based Protecting Data Preprocessing Method for Big Data Mining
Submitted by aekwall on Mon, 01/06/2020 - 10:35am
data privacy
Resiliency
privacy protection
privacy disclosure issue
privacy
precise clustering results
pattern clustering
Human behavior
distortion
distancebased clustering
distance-based clustering
differential privacy-based protecting data preprocessing method
differential privacy budget parameter
differential privacy
big data privacy
Data preprocessing
Data mining
data distortion technique
composability
Clustering algorithms
big data mining
adaptive privacy budget parameter adjustment mechanism
adaptive mechanism
Metrics
Scalability
resilience
Human Factors
pubcrawl
biblio
Joint Source-Channel Coding for the Transmission of Correlated Sources over Two-Way Channels
Submitted by aekwall on Mon, 11/25/2019 - 2:06pm
correlation-preserving coding scheme
two-way lossy transmission
two-way channels
source-channel system
rate-one separate source-channel coding
Propagation losses
Network information theory
lossy transmission
joint source-channel coding scheme
joint source-channel coding
hybrid digital-analog coding
hybrid coding
genie-aided argument
DM-TWC
discrete-memoryless two-way channels
Resiliency
channel noise
adaptive coding
adaptive codes
combined source-channel coding
channel coding
distortion
Indexes
channel capacity
Correlation
Decoding
Metrics
composability
pubcrawl
biblio
Joint Source Channel Coding with Bandwidth Compression
Submitted by aekwall on Mon, 11/25/2019 - 2:06pm
digital techniques
Wyner-Ziv coding
wireless channels
quantization scaling factor
Quantization (signal)
quantisation (signal)
memoryless bivariate Gaussian source
mean-squared error distortion
joint source channel coding
hybrid digital-analog coding system
hybrid digital-analog (HDA) coding
HDA schemes
Gaussian channels
Gaussian broadcast channel
digital-analog coding system
Resiliency
Costa coding
combined source-channel coding
channel coding
Broadcasting
Bandwidth compression
analog information
broadcast channels
distortion
Bandwidth
Mathematical model
Metrics
composability
pubcrawl
biblio
Adversarial Multimedia Forensics: Overview and Challenges Ahead
Submitted by aekwall on Wed, 05/08/2019 - 9:42am
information forensics
Transform coding
tools
tampering detection
Signal processing algorithms
Scalability
resilience
pubcrawl
multimedia forensics tools
multimedia documents
multimedia computing
Metrics
information retrieval
adversarial environment
Human behavior
game theory
Forensics
forensic techniques
forensic analysis
distortion
Digital Forensics
Detectors
counter-forensic tools
Cameras
adversarial multimedia forensics
biblio
Privacy Risks in Resource Constrained Smart Micro-Grids
Submitted by grigby1 on Thu, 03/28/2019 - 3:16pm
Metrics
unreliable nature
smart power grids
smart meters
Smart Grid Privacy
resource constrained smart microgrids
Resource Constrained Smart Micro Grids
RCSMG architectures
pubcrawl
privacy risks
privacy
power engineering computing
national power grid connections
microgrid architectures
anonymisation works
lossy networks
Intelligent sensors
Human behavior
Home appliances
distributed lossy networks
distortion
differential privacy
deliberate noise additions
data privacy
data perturbation work
cost-effective power management
composability
Communication networks
biblio
Mathematical Models of Blocks for Compensation Multipath Distortion in Spatially Separated Passive Time-Frequency Synchronization Radio System
Submitted by grigby1 on Fri, 03/15/2019 - 11:56am
Scalability
pubcrawl
Radio navigation
radio navigation systems
radio receivers
radio waves multipath propagation
radiofrequency interference
radiowave propagation
resilience
Resiliency
passive time-frequency synchronization radio system
security
signal-to-noise ratio
synchronisation
Synchronization
synchronization distortion
Telecommunications
time and frequency synchronization
Time Frequency Analysis
Time-frequency Analysis
interference-free signal
distortion
error statistics
Fourier transform
Frequency synchronization
frequency synchronization system
frequency synchronization tasks
Interference
interference component
interference suppression
correlation function
Mathematical model
mathematical models
Metrics
multi-position passive synchronization system
multipath compensation
multipath distortion
multipath interference suppressors
multipath signal propagation
biblio
A New Payload Partition Strategy in Color Image Steganography
Submitted by grigby1 on Fri, 02/22/2019 - 4:08pm
Color
composability
Correlation
distortion
Gray-scale
Image color analysis
Image Steganography
Metrics
modification probabilities
payload partition
Payloads
privacy
pubcrawl
RGB channels
security
steganography detection
biblio
A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks
Submitted by grigby1 on Fri, 02/22/2019 - 4:08pm
long-term confrontation
without embedding
Transform coding
Training
trained generator neural network model
traditional embedding-based steganography
steganography detection
Steganography
state-of-the-art image steganalysis algorithms
secret information
Resists
pubcrawl
privacy
noise vector
Metrics
machine-learning-based steganalysis algorithms
Brain modeling
learning (artificial intelligence)
image SWE method
image steganography method
image generation
Image coding
generative adversarial networks
Gallium nitride
feedforward neural nets
distortion
digital images
deep convolutional generative adversarial networks
data encapsulation
coverless
composability
carrier image
« first
‹ previous
1
2
3
4
5
6
next ›
last »