Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
object detection
biblio
An Effencient Improvement of RFID Authentication Protocol Using Hash Function ZKP
Submitted by aekwall on Mon, 03/23/2020 - 1:33pm
elliptical curve cryptographic solutions
RFIDs
Schnorr identification protocol
RFID security
RFID privacy
RFID authentication protocol
RFID Authentication
radio frequency identification technology
MITM
Keccak hash function
Hash function ZKP
Hash Function
Elliptical Curve Cryptography
data privacy
RFID system
RFID technology
radiofrequency identification
privacy protection
object detection
man-in-the-middle attack
public key cryptography
privacy attacks
pubcrawl
Human behavior
Resiliency
Cryptographic Protocols
biblio
Detection of the Information Hidden in Image by Convolutional Neural Networks
Submitted by grigby1 on Mon, 02/10/2020 - 11:45am
hidden information
steganography detection
Steganography
steganalysis
pubcrawl
privacy
object detection
Metrics
information protection
Image Processing
high probability
basic data
hidden communication
Data mining
convolutional neural networks
convolutional neural network
convolutional neural nets
convolution
computer architecture
composability
Brightness
biblio
Probing Image and Video Steganography Based On Discrete Wavelet and Discrete Cosine Transform
Submitted by grigby1 on Mon, 02/10/2020 - 11:43am
least significant bit method
visualization
video steganography
steganography detection
Steganography
secured communication
pubcrawl
privacy
object tracking
object detection
multiple object tracking algorithmic programs
Multiple Object Tracking
motion object detection
Metrics
message embedding
LSB
composability
Kalman filters
Image Steganography
image motion analysis
file transformation
error correcting codes
Embedding potency
embedding payload
DWT
discrete wavelet transforms
discrete wavelet transform
discrete cosine transforms
discrete cosine transform
DCT
data encapsulation
Conferences
biblio
Abnormal Item Detection Based on Time Window Merging for Recommender Systems
Submitted by grigby1 on Tue, 10/15/2019 - 2:41pm
Resiliency
low false alarm rate
MovieLens
object detection
partition rating time series
pubcrawl
rating distribution characteristics RAR
ratio of abnormal rating
recommender systems
resilience
Human Factors
Scalability
security
security of data
shilling attacks
suspicious intervals
time overhead
time series
time window merging
Conferences
abnormal item detection method
ATIAR
average time interval of abnormal rating
Big Data
CFRS
collaborative filtering
collaborative filtering recommendation system
computational cost
abnormal item detection
DAR
data privacy
deviation of time interval of abnormal rating
distribution characteristics
DTIAR
false user profile recognition
Handheld computers
high detection rate
biblio
YOLO Approach in Digital Object Definition in Military Systems
Submitted by aekwall on Mon, 08/12/2019 - 9:46am
object detection
YOLO approach
visual surveillance
Videos
video surveillance
video processing
two-dimensional videos
traffic monitoring
surveillance
Scalability
Resiliency
real-time generation detection
pubcrawl
Pattern recognition
outdoor monitoring applications
object tracking
Big Data
multimedia content-based indexing
military systems
military computing
military applications
Metrics
information acquisition
indoor monitoring applications
human tracking
distributed cross-camera surveillance systems
digital object definition
deep video
deep learning
cyber terrorism
Cameras
biblio
Intelligent monitoring of indoor surveillance video based on deep learning
Submitted by aekwall on Mon, 08/12/2019 - 9:46am
Streaming media
protection system
pubcrawl
recurrent neural nets
Resiliency
Scalability
Semantics
smart monitoring system
storage management
pose estimation
surveillance
surveillance cameras
Surveillance video
Training
video image
video signal processing
video surveillance
video surveillance system
indoor surveillance video
convolutional neural nets
deep learning
deep learning methods
deep video
fine-tuning network
high-quality segmentation mask
image retrieval
image segmentation
Cameras
information technology
Instance Segmentation
intelligent monitoring
intelligent video analytics technology
learning (artificial intelligence)
Mask R-CNN
Metrics
object detection
biblio
Malware Classification Using Deep Convolutional Neural Networks
Submitted by grigby1 on Mon, 06/10/2019 - 2:01pm
privacy
learning models
machine learning
malware
malware binaries
malware classification
malware images
Metrics
neural network
object detection
Pattern recognition
learning (artificial intelligence)
pubcrawl
resilience
Resiliency
support vector machine
support vector machine classifier training
Support vector machines
transfer learning
visual patterns
visualization
feature extraction
classification
classifier
convolutional neural nets
convolutional neural network
convolutional neural networks
Correlation
DCNN classification
deep convolutional neural networks
deep learning techniques
accuracy levels
Gray-scale
Hamming distance
Human behavior
image classification
image features
image representation
image type
improved image representation
invasive software
biblio
Drone Detection and Identification System Using Artificial Intelligence
Submitted by grigby1 on Fri, 02/08/2019 - 4:14pm
drone imagery
surveillance
robot vision
Resiliency
pubcrawl
OpenCV library
object detection
Metrics
machine learning
learning (artificial intelligence)
Image Processing
Human behavior
feature extraction
drones
drone industry
approaching drone
drone identification system
Detectors
detection
deep learning
control engineering computing
comprehensive drone detection system
composability
classifier
Cameras
camera images
autonomous aerial vehicles
artificial intelligence security
Artificial Intelligence
biblio
Mixed Gaussian Model Based Video Foreground Object Detection
Submitted by grigby1 on Thu, 01/31/2019 - 12:25pm
Human behavior
Metrics
Mixed Gaussian model
object detection
Object separation
pubcrawl
Resiliency
video surveillance
biblio
Machine Learning Based Human Activity Detection in a Privacy-Aware Compliance Tracking System
Submitted by grigby1 on Wed, 11/14/2018 - 1:18pm
local nursing home
Support vector machines
Skeleton
Scalability
real-time systems
pubcrawl
privacy-aware compliance tracking system
privacy
patient care
PACTS
object detection
nursing staffs baseline
neural network
Microsoft Kinect
machine learning techniques
machine learning
Back
lifting-pulling tasks
learning (artificial intelligence)
Injuries
human skeleton data
Human Factors
Human activity prediction
human activity detection
high-level bending activities
field data acquisition
expert systems
expert rules
data privacy
data acquisition
body mechanics
back-bending activities detection
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »