Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Watermarking
biblio
Black-box System Identification of CPS Protected by a Watermark-based Detector
Submitted by aekwall on Tue, 03/09/2021 - 12:05pm
Networked Control System
Watermarking
System Identification
support vector regression
Support vector machines
sensors
security
pubcrawl
process control
Particle separators
CPS Modeling and Simulation
Metrics
Detectors
cyber-physical security
black-box
black box encryption
Predictive Metrics
composability
Resiliency
biblio
Hardware Implementation of Cancellable Biometric Systems
Submitted by aekwall on Tue, 03/09/2021 - 11:56am
FPGA model
Watermarking
Three-dimensional displays
security systems
security applications
Scalability
Resiliency
pubcrawl
one-way cancellable biometric template system
Metrics
Information encryption
Hardware Implementation
Hardware
biometric encryption
FPGA
fingerprint encryption
field programmable gate arrays
face encryption
encryption
Cryptography
Cancellable biometrics
biometrics (access control)
Biological system modeling
3D chaotic mapping
3D chaotic map
biblio
Adversarial multiple access channels and a new model of multimedia fingerprinting coding
Submitted by grigby1 on Tue, 02/23/2021 - 2:35pm
noise-like signals
linear combinations
malicious multiple access channels
Mathematical model
multi-access systems
Multimedia communication
multimedia computing
multimedia fingerprinting code
multiple access channel
network coding
Information systems
privacy
pubcrawl
Receivers
resilience
security
security of data
Watermarking
zero-error probability
broadcast channels
Metrics
Resiliency
composability
A-channel
adders
adversarial multiple access channels
arbitrary coefficients
binary adder channel
Binary codes
channel coding
collusion attack
compressed sensing
Conferences
digital fingerprint
digital fingerprinting code
digital fingerprinting coding problems
encoding
error statistics
biblio
Optimal Image Watermark Technique Using Singular Value Decomposition with PCA
Submitted by aekwall on Mon, 02/15/2021 - 4:43pm
Matrix converters
decomposition
wavelet transformation
tracing copyright infringements
principle component analysis
peak signal-to-noise ratio
optimum digital image watermark technique
intellectual property right
image compression
discrete wavelet transformation-singular value decomposition approach
banknote authentication
singular value decomposition
discrete wavelet transforms
principal component analysis
Matrix decomposition
Compositionality
Color
cyber physical systems
Watermarking
image watermarking
Image coding
data compression
PCA
Metrics
pubcrawl
biblio
Hardware Steganography for IP Core Protection of Fault Secured DSP Cores
Submitted by aekwall on Mon, 11/09/2020 - 1:40pm
DSP based IP cores
vendor defined signature
transient fault secured IP cores
signature size
signature free approach
multimedia cores
IP core protection
IP core
high level synthesis
hardware steganography
fault secured DSP cores
Fault secure
entropy value
entropy thresholding
encoding rule
Resiliency
colored interval graph
IP piracy
Steganography
DSP
logic design
digital signal processing chips
Watermarking
industrial property
digital signatures
Entropy
graph theory
policy-based governance
composability
pubcrawl
biblio
BLIC: A Blockchain Protocol for Manufacturing and Supply Chain Management of ICS
Submitted by aekwall on Mon, 11/09/2020 - 1:33pm
active IC transactions
distributed ledger
ICs
integrated circuit design
Watermarking
electronic engineering computing
blockchain protocol
IP piracy
split manufacturing
blockchain technology
advanced technologies
BLIC protocol
composite consensus protocol
deleterious design modification
huge paradigm shift
IC supply chains
passive IC transactions
blockchain
data privacy
Hardware
Protocols
Resiliency
pubcrawl
composability
policy-based governance
Peer-to-peer computing
Cryptography
Computer crime
supply chain management
supply chains
manufacturing
cryptocurrencies
smart contracts
integrated circuits
biblio
Providing Security for E-Government Document Images Using Digital Watermarking in the Frequency Domain
Submitted by grigby1 on Fri, 10/16/2020 - 11:10am
Human behavior
Watermarking
Transforms
singular value decomposition
Signal processing algorithms
security of data
Robustness
robust watermarking algorithm
Resiliency
resilience
pubcrawl
policy-based governance
information security measures
information security
image watermarking
Image coding
collaboration
government data processing
frequency domain
Electronic government
e-government platform
e-government document images
E-Government
DWT
document image processing
discrete wavelet transforms
discrete Wavelet transformation
digital watermarking
Cybersecurity
copyright protection
copyright
biblio
Toward attack-resilient state estimation and control of autonomous cyber-physical systems
Submitted by grigby1 on Tue, 10/06/2020 - 2:12pm
Kalman filters
watermarking approach
Watermarking
unmanned ground vehicle
UGV
state estimation
spoofing attack
sensor attacks
security of data
Robot sensing systems
Resiliency
resilience
replay attacks
pubcrawl
mobile robots
attack resiliency
kalman filtering technique
Kalman filter
defense techniques
cyber-physical systems
cyber physical systems
CubeSat
cube satellite
CPS Security
CPS resilience
CPS defense techniques
conjunction achieves
autonomous cyber-physical systems
attack-resilient state estimation
biblio
A blind watermarking technique using redundant wavelet transform for copyright protection
Submitted by grigby1 on Thu, 07/30/2020 - 2:05pm
redundant wavelet transform
copyright protection
digital images
digital watermarking technique
geometrical attacks
host image
hybrid blind watermarking technique
hybrid scheme RDWT-SVD
JPEG2000 compression
modified entropy
orthogonal matrix
blind watermarking technique
redundant weavelet transform
signal processing
singular value decomposition
Transform coding
watermark embedding locations
watermark extraction
watermark image
watermark insertion
wavelet transforms
Robustness
Human behavior
Human Factors
policy-based governance
resilience
Resiliency
intellectual property
Entropy
composability
Metrics
pubcrawl
Low pass filters
Image coding
data compression
image watermarking
Watermarking
copyright
copy protection
ip protection
Arnold chaotic map
biblio
Reusable intellectual property core protection for both buyer and seller
Submitted by grigby1 on Thu, 07/30/2020 - 2:05pm
intellectual property
seller watermark
scheduling phase
reusable intellectual property core protection
register allocation phase
latency overhead
IP seller
IP core protection
IP core design
design cost overhead
Consumer electronics
CE devices
buyer fingerprint
architectural synthesis process
ip protection
Watermarking
logic circuits
resource management
Metrics
Fingerprint recognition
Registers
composability
embedded systems
microprocessor chips
Resiliency
resilience
policy-based governance
Human Factors
Human behavior
pubcrawl
IP networks
logic design
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »