Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
image retrieval
biblio
Modified Feature Descriptors to enhance Secure Content-based Image Retrieval in Cloud
Submitted by aekwall on Mon, 11/16/2020 - 1:11pm
Outsourced Database Integrity
visual descriptors
visual databases
unencrypted images
texture descriptors
Secure kNN
secure CBIR scheme
searchable encryption
searchable encrypted index
retrieval precision
Resiliency
pubcrawl
outsourced images
outsourced encrypted images
color descriptors
modified feature descriptors
Metrics
locality sensitive hashing
image texture
image retrieval
image colour analysis
feature extraction
encrypted domain gain
data privacy
Cryptography
content-based retrieval
content-based image retrieval
composability
biblio
On the Investigation of Essential Diversities for Deep Learning Testing Criteria
Submitted by aekwall on Mon, 11/02/2020 - 2:47pm
Measurement
testing criteria
testing
test suites
test diversities
Task Analysis
system robustness
Reliability
pubcrawl
program testing
Neurons
neuron activities
Metrics
metamorphic testing
metrics testing
deep learning
learning (artificial intelligence)
image retrieval
fault diagnosis
fault detection ability
fault detection
essential metrics
essential diversities
erroneous behaviors
defined metrics
deep learning testing criteria
Deep Learning testing
deep learning systems
deep learning models
biblio
On the Design of Black-Box Adversarial Examples by Leveraging Gradient-Free Optimization and Operator Splitting Method
Submitted by grigby1 on Fri, 09/04/2020 - 4:10pm
distortion metrics
advanced AI platforms
alternating direction method of multipliers
Bayesian optimization
black-box adversarial attack generation methods
black-box adversarial examples
black-box attacks
BO-ADMM
competitive attack success rates
Convex functions
ADMM solution framework
gradient-free optimization
gradient-free regime
operator splitting method
query complexities
Robust machine learning
zeroth-order optimization
ZO-ADMM
Black Box Security
Complexity theory
optimisation
pubcrawl
composability
Metrics
Resiliency
resilience
learning (artificial intelligence)
optimization
security of data
distortion
Perturbation methods
image classification
Bayes methods
image retrieval
black-box adversarial attacks
Measurement
estimation
biblio
Trademark Image Retrieval Using a Combination of Deep Convolutional Neural Networks
Submitted by grigby1 on Thu, 07/30/2020 - 2:06pm
registered trademarks
ip protection
Combination of convolutional neural networks
content-based image retrieval
convolution
deep convolutional neural networks
feedforward neural nets
image recognition
industrial-intellectual property registration
METU database
Trademarks
Trademark Image Retrieval
trademark image retrieval task
trademark images
trademark protection
trademark registration applications
Trademarks Office
VGG19c
VGG19v
visual similarity
Task Analysis
Human behavior
Human Factors
policy-based governance
resilience
Resiliency
industrial property
composability
content-based retrieval
Metrics
pubcrawl
feature extraction
image classification
visualization
convolutional neural networks
image representation
image retrieval
Shape
patents
trademark registration
biblio
A Visual Similarity Recommendation System using Generative Adversarial Networks
Submitted by grigby1 on Fri, 06/12/2020 - 12:21pm
learning (artificial intelligence)
visualization
visual similarity recommendation system
Training
Scalability
Resiliency
resilience
recommender systems
recommendation system strategy
query item
pubcrawl
product image
neural nets
Metrics
content-based recommendation system
image similarity
image retrieval
Generators
generative adversarial networks
generative adversarial network based image retrieval system
Generative Adversarial Learning
Footwear
feature extraction
e-commerce platform
deep learning network
deep learning
Convolutional codes
content-based retrieval
biblio
Discrete Locally-Linear Preserving Hashing
Submitted by grigby1 on Fri, 06/12/2020 - 12:09pm
locally linear preserving
unsupervised methods
Unsupervised Learning
unsupervised hashing method
unsupervised hashing algorithms
unsupervised hashing
search problems
Resiliency
resilience
pubcrawl
nearest neighbour methods
nearest neighbor search
matrix algebra
locally linear structure
anchor embedding
local weight estimation
local anchor embedding algorithm
image retrieval
Image coding
hash algorithms
graph theory
discrete locally-linear preserving hashing
discrete hashing
Compositionality
Binary codes
approximate adjacent matrix
anchor graph construction algorithm
biblio
Supervised Max Hashing for Similarity Image Retrieval
Submitted by grigby1 on Fri, 06/12/2020 - 12:08pm
resilience
hashing
image retrieval
k-ary base
labeled image datasets
learning (artificial intelligence)
mathematically differentiable approximation
nearest neighbor search
pubcrawl
Quantization (signal)
Hash functions
Resiliency
rich feature vectors
Semantics
similarity image retrieval
storage efficiency
supervised hashing methods
supervised max hashing
Training
feature vector generation
-Learning-to-Hash
-Winner-Take-All-Hash-Family
Approximation algorithms
argmax function
Compositionality
convolutional neural nets
convolutional neural networks
deep neural network architecture
feature extraction
-Convolutional-Neural-Networks
file organisation
gradient descent methods
gradient methods
hand-crafted feature vectors
hash algorithm
hash algorithms
hash code
Hash Function
biblio
Reversible Data Hiding Based Key Region Protection Method in Medical Images
Submitted by aekwall on Mon, 03/30/2020 - 11:40am
open network environment
information loss
information-hiding
key region
key region protection method
lesion areas
medical image copyright
medical image data
medical image processing
medical images
image restoration
original image
original key regions
original lesion information
patient privacy
patient-sensitive information
reversible data hiding
reversible data-hiding algorithm
texture complexity
image segmentation
data privacy
Resiliency
pubcrawl
data encapsulation
data leakage
Image coding
image watermarking
cyber physical systems
Cryptography
image retrieval
QR code
QR codes
image encryption
privacy issues
Selective Encryption
encryption key
high-texture area
biblio
Intelligent monitoring of indoor surveillance video based on deep learning
Submitted by aekwall on Mon, 08/12/2019 - 9:46am
Streaming media
protection system
pubcrawl
recurrent neural nets
Resiliency
Scalability
Semantics
smart monitoring system
storage management
pose estimation
surveillance
surveillance cameras
Surveillance video
Training
video image
video signal processing
video surveillance
video surveillance system
indoor surveillance video
convolutional neural nets
deep learning
deep learning methods
deep video
fine-tuning network
high-quality segmentation mask
image retrieval
image segmentation
Cameras
information technology
Instance Segmentation
intelligent monitoring
intelligent video analytics technology
learning (artificial intelligence)
Mask R-CNN
Metrics
object detection
biblio
Managing Big Data in Visual Retrieval Systems for DHS Applications: Combining Fourier Descriptors and Metric Space Indexing
Submitted by grigby1 on Fri, 03/22/2019 - 12:59pm
Shape
metric-based balanced indexing tree
Metrics
National security
Performance Metrics
pubcrawl
resilience
Resiliency
rifle database
Scalability
metric space indexing
Shape Signatures
Similarity Indexing Methods
tree data structures
visual databases
visual retrieval systems
visualization
weapon images
Weapons
feature representation
Balanced Trees
Big Data
big data security
content-based retrieval
database indexing
Department of Homeland Security
DHS applications
feature extraction
balanced search
Fourier descriptors
gun database
image retrieval
image retrieval systems
indexing
invariance properties
M-tree
Measurement
« first
‹ previous
1
2
3
next ›
last »