Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
detection performance
biblio
On the Impact of SSDF Attacks in Hard Combination Schemes in Cognitive Radio Networks
Submitted by aekwall on Mon, 03/15/2021 - 11:05am
MAJORITY-rule
critical threats
CSS
different hard-decision fusion schemes
fusion center
hard combination schemes
hard data
hard data combining
hard-decision combination
hard-decision fusion scheme
licensed frequency bands
cooperative spectrum sensing
malicious user
miss detection
OR-rule
Primary User spectrum accessibility
PU
Spectrum Sensing Data Falsification reports
SSDF attacks
user performs Energy Detection
Cognitive Radio Security
cooperative communication
Resiliency
pubcrawl
Signal to noise ratio
probability
collaboration
Bandwidth
Interference
radio networks
sensors
telecommunication security
signal detection
Cascading style sheets
malicious users
radio spectrum management
cognitive radio
cognitive radio networks
detection performance
AND-rule
AYMU attacks
biblio
Anomalous IP Address Detection on Traffic Logs Using Novel Word Embedding
Submitted by aekwall on Mon, 02/22/2021 - 12:41pm
natural language processing
word embedding-based feature extraction
word embedding techniques
word embedding
vanilla word embeddings
telecommunication traffic
security of data
security
Scalability
Resiliency
representative features
pubcrawl
network traffic logs
anomalous IP address detection algorithm
machine learning-based anomaly detection
Log Mining
Linear programming
learning (artificial intelligence)
IP networks
IP addresses
Human behavior
feature extraction
detection performance
Clustering algorithms
Anomaly Detection
biblio
Deeply understanding graph-based Sybil detection techniques via empirical analysis on graph processing
Submitted by aekwall on Mon, 01/25/2021 - 12:01pm
Sensitivity
trust mechanism
target distributed systems
social structures
refined graph structure
prominent security problems
graph-based sybil detection
graph transformations
graph processing
graph preprocessing
detection performance
aerospace industry
attack graphs
heterogeneous devices
trust model
security of data
social networking (online)
Predictive Metrics
edge computing
network topology
Image edge detection
sybil attacks
graph theory
Sybil attack
composability
pubcrawl
Resiliency
Trusted Computing
security
distributed processing
biblio
OC-FakeDect: Classifying Deepfakes Using One-class Variational Autoencoder
Submitted by grigby1 on Fri, 01/15/2021 - 11:02am
detecting Deepfakes
Face
DeepFake
binary-classification based detection
binary-classification based methods
class-based approach
computer-generated image
data scarcity limitations
deepfakes data
deepfakes detection
deepfakes generation methods
Image reconstruction
detection performance
detects nonreal images
fake face images
image forgery method
OC-FakeDect
one-class anomaly detection problem
one-class variational autoencoder
person
sufficient fake images data
Support vector machines
Training
Anomaly Detection
pubcrawl
Human behavior
Human Factors
Metrics
Resiliency
data privacy
Scalability
privacy issues
learning (artificial intelligence)
Streaming media
Benchmark testing
resilience
Forensics
face recognition
feature extraction
image classification
pattern clustering
object detection
biblio
Skip Decision and Reference Frame Selection for Low-Complexity H.264/AVC Surveillance Video Coding
Submitted by BrandonB on Fri, 05/01/2015 - 8:31am
static camera surveillance video encoders
Motion detection
Motion segmentation
motion-compensated prediction
multiple frames
recognition performance
reference frame selection
reference frame selection algorithm
skip decision
motion compensation
Streaming media
surveillance
video codecs
video coding
video sequence
video surveillance
video surveillance data sets
floating point computations
Cache optimization
Cameras
coding uncovered background regions
compression complexity
data compression
detection performance
distortion
encoding
bit rate savings
foreground pixels
Gaussian mixture model
Gaussian processes
H.264/advanced video coding (AVC)
H.264/advanced video coding surveillance video encoders
low-complexity H.264/AVC surveillance video coding
mixture model