Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
image restoration
biblio
CleaNN: Accelerated Trojan Shield for Embedded Neural Networks
Submitted by grigby1 on Tue, 11/08/2022 - 10:51am
Training
Anomaly Detection
pubcrawl
resilience
Resiliency
Trojan horses
deep learning
Image reconstruction
discrete cosine transforms
Transforms
image restoration
embedded systems
sparse recovery
Trojan Attack
neural network resiliency
biblio
Poisoning Attack on Show and Tell Model and Defense Using Autoencoder in Electric Factory
Submitted by aekwall on Thu, 06/24/2021 - 10:49am
Training data
AI Poisoning
Toxicology
show and tell model
poisoning attack
defense
autoencoder
AI
Dogs
Scalability
image recognition
image restoration
Neural networks
pubcrawl
Human behavior
Resiliency
Data models
biblio
Deep Wavelet Architecture for Compressive sensing Recovery
Submitted by aekwall on Tue, 04/27/2021 - 12:19pm
composability
compressed sensing
compressive sampling
convolution
cyber-physical systems
Deep Compressive Sensing
deep learning
discrete wavelet transforms
Image reconstruction
image restoration
information technology
Market research
Multi-resolution
privacy
pubcrawl
Resiliency
biblio
An Approach to Embedding a Style Transfer Model into a Mobile APP
Submitted by aekwall on Mon, 02/01/2021 - 10:44am
pre-trained convolutional neural network model
Economic indicators
mobile users
deep learning models
neural style transfer
Mobile app
embedding CNN models
Perceptual Losses algorithm
photo processing apps
Feedforward neural networks
proceeding time
shorten waiting time
Style transfer model
TensorFlow Mobile library
time 2.0 s
time 2.8 s
traditional style transfer model
Scalability
feedforward neural network
image restoration
Predictive Metrics
feedforward neural nets
software libraries
mobile phone
convolutional neural nets
testing
machine learning
pubcrawl
Resiliency
learning (artificial intelligence)
mobile computing
Internet of Things
Big Data
biblio
Adversarial Perturbations Fool Deepfake Detectors
Submitted by grigby1 on Fri, 01/15/2021 - 11:02am
adversarial perturbations
Lipschitz regularization
image restoration
generative convolutional neural networks
fast gradient sign method
Deepfakes
deepfake image enhancement
deepfake detectors
Deep Image Prior
faces
DeepFake
image enhancement
generative adversarial networks
Detectors
feature extraction
Training
gradient methods
resilience
Electronics packaging
Perturbation methods
Scalability
Resiliency
Metrics
Human Factors
Human behavior
pubcrawl
Neural networks
convolutional neural nets
Unsupervised Learning
biblio
BlurNet: Defense by Filtering the Feature Maps
Submitted by grigby1 on Mon, 12/28/2020 - 11:48am
Scalability
malicious examples
Metrics
neural nets
Neural networks
Perturbation methods
pubcrawl
resilience
Resiliency
robust physical perturbations
Robustness
RP
malicious adversary
security of data
standard blur kernels
standard-architecture traffic sign classifiers
standards
stop signs
substitute model
targeted misclassification rates
traffic engineering computing
victim model
white stickers
white-box attacks
frequency analysis
adaptive attack evaluation
adaptive filtering
adversarial defense
adversarial images
Adversarial Machine Learning
Adversarial robustness
attack algorithms
black stickers
blackbox transfer attack
BlurNet
depthwise convolution layer
Adaptation models
gradient information
high frequency noise
image recognition
image restoration
input image
Kernel
layer feature maps
learning (artificial intelligence)
low-pass filters
lowpass filtering behavior
biblio
Reversible Data Hiding Based Key Region Protection Method in Medical Images
Submitted by aekwall on Mon, 03/30/2020 - 10:40am
open network environment
information loss
information-hiding
key region
key region protection method
lesion areas
medical image copyright
medical image data
medical image processing
medical images
image restoration
original image
original key regions
original lesion information
patient privacy
patient-sensitive information
reversible data hiding
reversible data-hiding algorithm
texture complexity
image segmentation
data privacy
Resiliency
pubcrawl
data encapsulation
data leakage
Image coding
image watermarking
cyber physical systems
Cryptography
image retrieval
QR code
QR codes
image encryption
privacy issues
Selective Encryption
encryption key
high-texture area
biblio
Spatial Resolution Enhancement of Optical Images Based on Tensor Decomposition
Submitted by grigby1 on Mon, 08/12/2019 - 2:23pm
spatial resolution enhancement
optical remote sensing images
Optical sensors
Optical signal processing
pansharpening
pubcrawl
remote sensing
spatial blurring filter
spatial blurring process
spatial characteristics
Spatial resolution
optical information processing
spectral blurring filter
spectral characteristics
spectral high resolution
spectral process
spectral resolutions
spectral response
Tensile stress
tensor decomposition
tensors
Image resolution
canonical polyadic decomposition
Compositionality
coupling
Cyber Physical System
data fusion techniques
decomposition
geophysical image processing
image enhancement
image filtering
image fusion
canonical polyadic (CP) decomposition
image restoration
Integrated optics
Matrix decomposition
Metrics
multimodal images
multiple optical image fusion
optical image retrieval
optical images
Optical imaging
biblio
Digital Image Self Restoration Based on Information Hiding
Submitted by aekwall on Mon, 03/25/2019 - 8:55am
Media
forensic evidence
hash algorithm
higher-quality reconstruction
Image reconstruction
image restoration
Information hiding
Jarvis
Jarvis half-tone change
discrete cosine transforms
multimedia information
quality assessment
quantization truncation
reference authentication system
reference data
self-embedding
self-healing images
self-healing networks
resilience
composability
social network
data compression
data encapsulation
Data mining
Image coding
image watermarking
Watermarking
pubcrawl
computer networks
digital image self restoration
digital images
digital media
Digital Watermark
digital watermarking
discrete cosine transform
biblio
Arabic handwritten document preprocessing and recognition
Submitted by grigby1 on Wed, 03/08/2017 - 1:46pm
image segmentation
Writing
Textline image Preprocessing
text-line level preprocessing
Text recognition
text detection
pubcrawl170115
Optical reflection
Optical imaging
OpenHaRT database
noise removal
noise effect reduction
line fragment removal
keystroke restoration
k-means
Arabic Handwriting Recognition
image restoration
image recognition
image denoising
Hidden Markov models
Handwritten Document preprocessing
handwritten character recognition
guideline removal preprocessing
Guideline removal
guideline detection approach
document image processing
document detection
deskewing
Arabic handwritten document recognition
Arabic handwritten document preprocessing
1
2
next ›
last »