Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Media
biblio
A New Spatial Steganographic Scheme by Modeling Image Residuals with Multivariate Gaussian Model
Submitted by aekwall on Mon, 08/03/2020 - 10:29am
Steganography
adaptive filtering
steganographic methods
steganalysis
spatial steganographic scheme
spatial images
quantized multivariate Gaussian distribution
multivariate Gaussian model
image residuals modeling
high-pass filters
high-pass filtering
content-adaptive image steganographic schemes
approximated Fisher Information
Scalability
image filtering
Payloads
information processing
Media
gaussian distribution
Image coding
Metrics
Computational modeling
pubcrawl
Resiliency
feature extraction
security
biblio
Reproducibility of artificial multiple scattering media
Submitted by aekwall on Mon, 07/20/2020 - 10:45am
quantum-secure authentication
nanoparticles
nanophotonics
opacity
opaque scattering media
optical communication
Optical device fabrication
Optical diffraction
physical keys
QSA
nanoparticle size
random arrangement
Scattering
secret duplication
speckle
speckle pattern
teeth
white paint
white box cryptography
physical unclonable functions
composability
Metrics
quantum cryptography
Media
pubcrawl
Adaptive optics
quantum communication
biomedical optical imaging
Resiliency
artificial multiple scattering media
coherent light illumination
complex interference
exact position
ideal optical PUF
light coherence
light interference
light scattering
biblio
Per-File Secure Deletion for Flash-Based Solid State Drives
Submitted by grigby1 on Fri, 07/10/2020 - 11:41am
Per-file
SSD
solid state drives
Solid State Drive
Security-TRIM command
secure deletion
Scalability
resource management
real-time systems
pubcrawl
PSD-MLC scheme
programming crosstalk
programming
privacy
Per-File Secure Deletion scheme
Crosstalk
nonreal-time secure deletion
MultiLevel Cell flash memory
Media
invalid flash pages
Invalid Data Block
Hardware
GUID
globally unique identifier
flash-based solid state drives
flash memories
flash media
File update operations
data deletion
biblio
Trustworthy Misinformation Mitigation with Soft Information Nudging
Submitted by aekwall on Mon, 04/13/2020 - 10:22am
social networking (online)
misinformation mitigation techniques
news sources
nudge theory
Organizations
pubcrawl
recommendation
recommender systems
Resiliency
Social network services
misinformation
social recommendation algorithms
soft information nudging
technological solutions
technology solutions
trust nudging
Trusted Computing
trusted sources
trustworthy misinformation mitigation
Trustworthy Systems
cyber physical systems
trust
cognition
Companies
composability
Compositionality
computer science
Computer Theory and Trust
conspiracy news consumers
conspiracy theories
Computing Theory
Decision support systems
disinformation
Economics
Feeds
information consumption
information decisions
information sources
information trust
Media
biblio
Misbehavior Detection Using Machine Learning in Vehicular Communication Networks
Submitted by grigby1 on Mon, 03/02/2020 - 1:37pm
misbehavior detection system
vehicular networks
vehicular network system
vehicular ad hoc networks
Task Analysis
sybil attacks
Sybil attack
service attack
Resiliency
resilience
realistic vehicular network environment
pubcrawl
Neural networks
mobile computing
composability
Metrics
Media
machine learning
learning (artificial intelligence)
insider attacks
Generators
false alert generation attack
Databases
Data mining
Cryptography
cryptographic methods
Context modeling
biblio
An Improved Video Steganography: Using Random Key-Dependent
Submitted by grigby1 on Mon, 02/10/2020 - 11:42am
privacy
video signal processing
video recording
video frames RGB channels
steganography performance criteria
steganography detection
Steganography
security
secret text
secret data hiding
Robustness
Random Key -Dependent Data
quality assessment
pubcrawl
composability
nonsecret digital carrier
Metrics
Media
information technology
information insurance
improved video steganography
Image edge detection
image colour analysis
Hiding information and Key-Dependent Data Technique
Exact Matching Algorithm
current communications channels insurance advancements
cover media
biblio
Achieving Fast Sanitization with Zero Live Data Copy for MLC Flash Memory
Submitted by aekwall on Mon, 12/16/2019 - 1:47pm
multilevel-cell flash memories
zero live-data-copy overhead
zero live data copy
security of data
sanitization
resilience
pubcrawl
programming
privacy
page programming
one-shot sanitization design
Compositionality
MLC flash memory
Micromechanical devices
Media
Human behavior
flash memory
flash memories
fast sanitization scheme
Data Security
Data Sanitization
Cryptography
biblio
Understanding Transition and Remanence Noise in HAMR
Submitted by aekwall on Mon, 09/30/2019 - 10:07am
Jitter
Writing
transition noise
spatial splitting
Signal to noise ratio
remanence noise
remanence
pubcrawl
principal components analysis (PCA)
principal components analysis
principal component analysis
media noise
Media
magnetic recording noise
Magnetic Remanence
Heat-assisted magnetic recording (HAMR)
Heat-assisted magnetic recording
grain pitch
GP
Computational modeling
composability
bit length
applied field
cyber physical systems
Internet of Things
Compositionality
Resiliency
biblio
Digital Image Self Restoration Based on Information Hiding
Submitted by aekwall on Mon, 03/25/2019 - 9:55am
Media
forensic evidence
hash algorithm
higher-quality reconstruction
Image reconstruction
image restoration
Information hiding
Jarvis
Jarvis half-tone change
discrete cosine transforms
multimedia information
quality assessment
quantization truncation
reference authentication system
reference data
self-embedding
self-healing images
self-healing networks
resilience
composability
social network
data compression
data encapsulation
Data mining
Image coding
image watermarking
Watermarking
pubcrawl
computer networks
digital image self restoration
digital images
digital media
Digital Watermark
digital watermarking
discrete cosine transform
biblio
PACMAN: Personal Agent for Access Control in Social Media
Submitted by grigby1 on Wed, 05/30/2018 - 4:11pm
personal agent
standards
social networking (online)
social media
social context
Social Agents
Scalability
recommender systems
pubcrawl
privacy
personalized access control decisions
personal assistant agent
personal agent for access control
Access Control
PACMAN
multi-agent systems
Media
machine learning
Internet/Web technologies
internet
Human Factors
Human behavior
friend network
Facebook
authorisation
appropriate audience selection
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »