Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Watermarking
biblio
Attacks on Digital Watermarks for Deep Neural Networks
Submitted by grigby1 on Thu, 07/30/2020 - 1:54pm
deep learning models
watermark
statistical distribution
model prediction
Mobile app
intellectual property theft
fast response times.
Digital Watermarks
deep neural networks training
Deep Neural Network
At-tack
ip protection
copy protection
Watermarking
learning (artificial intelligence)
detection algorithms
neural nets
composability
standards
Computational modeling
industrial property
Mathematical model
Resiliency
resilience
policy-based governance
pubcrawl
Neural networks
Training
biblio
Protecting the Intellectual Properties of Digital Watermark Using Deep Neural Network
Submitted by grigby1 on Thu, 07/30/2020 - 1:53pm
ip protection
Watermarking
watermark
Speech recognition
security
Resiliency
resilience
pubcrawl
policy-based governance
ownership verification
neural nets
natural language processing
machine learning
learning (artificial intelligence)
Artificial Intelligence
intellectual property security
intellectual property
industrial property
Image Processing
embedding watermarks
embedded
DNN algorithms
Digital Watermark
Deep Neural Network
deep learning models
counter-watermark attacks
composability
biblio
A hardware intellectual property protection scheme based digital compression coding technology
Submitted by grigby1 on Thu, 07/30/2020 - 1:50pm
Resiliency
intellectual property
intellectual property security
IP core watermark
IP networks
ip protection
policy-based governance
pubcrawl
resilience
industrial property
resource utilization
Robustness
security
surrounding circuit
Table lookup
watermark information
Watermarking
composability
image watermarking
hardware intellectual property protection
hardware circuit
Hardware
FPGA circuit
FPGA
field programmable gate arrays
encoding
embedding cost
Digital Watermark
digital compression coding technology
decoding function
data compression
Cryptography
Compression coding
biblio
Perceptually Transparent Robust Audio Watermarking Algorithm Using Multi Resolution Decomposition Cordic QR Decomposition
Submitted by grigby1 on Fri, 07/03/2020 - 4:54pm
information security
Watermarking
Signal to noise ratio
Signal resolution
Signal processing algorithms
Robustness
robust audio watermarking algorithm
pubcrawl
perceptual transparency
Payloads
multiresolution decomposition
Multi Resolution Decomposition
Metrics
audio coding
embedded watermark
digital watermarking
decomposition
data hiding
cyber physical systems
cordic QR decomposition
Compositionality
binary data embedding capacity
AWGN
audio watermarking
audio signal processing attacks
biblio
Suitability of Singular Value Decomposition for Image Watermarking
Submitted by grigby1 on Fri, 07/03/2020 - 4:53pm
image security
watermarking techniques
Watermarking
Transforms
singular value decomposition
pubcrawl
Metrics
Matrix decomposition
image watermarking
Compositionality
Image reconstruction
Image coding
False positive problem
digital images
Digital Image Watermarking
decomposition
cyber physical systems
cover image
biblio
Zero Knowledge Authentication for Reuse of IPs in Reconfigurable Platforms
Submitted by aekwall on Mon, 01/20/2020 - 12:13pm
field programmable gate arrays
Scalability
Hardware
Resiliency
pubcrawl
policy-based governance
Watermarking
authentication
delays
Human Factors
zero knowledge proof
field programmable gate array
intellectual property
zero trust
biblio
Mechanism and Implementation of Watermarked Sample Scanning Method for Speech Data Tampering Detection
Submitted by grigby1 on Tue, 12/10/2019 - 11:19am
composability
compressive sampling
Cyber Physical System
cyber physical systems
privacy
pubcrawl
resilience
Resiliency
sample scanning
speech data
tampering detection
Watermarking
biblio
A Survey of Return-Oriented Programming Attack, Defense and Its Benign Use
Submitted by grigby1 on Mon, 11/04/2019 - 12:34pm
ROP Defense
programming
pubcrawl
Randomization
Registers
resilience
return-oriented programming
return-oriented programming attack
rop attacks
OS
Scalability
security mechanisms
security of data
Software
software watermarking
Steganography
Watermarking
defense mechanisms
Compositionality
Resiliency
Benign Use of ROP
code integrity verification
code reuse attack
composability
computer security
Control Flow Integrity
Information Reuse and Security
extended ROP attack
frequency control
Human behavior
Human Factors
Layout
operating system
operating systems (computers)
biblio
Digital Watermarking for Relational Database Security Using mRMR Based Binary Bat Algorithm
Submitted by aekwall on Mon, 11/04/2019 - 11:22am
mRMR based binary bat algorithm
data protection issues
data tempering attacks
Database-security
deletion attacks
evolutionary computation
evolutionary technique
feature-subset-selection
insertion attacks
data accuracy
mRMR based feature subset selection technique
numerical relational database
relational data
relational database security
reversible watermarking
security protection
watermark creation
security of data
constraints optimization technique
Constraint optimization
binary-bat-algorithm
alteration attacks
relational databases
digital watermarking
Watermarking
Clustering algorithms
Robustness
Metrics
composability
pubcrawl
Human behavior
Resiliency
data integrity
biblio
Secured graphic QR code with infrared watermark
Submitted by aekwall on Mon, 09/23/2019 - 10:46am
implicit QR code information
Watermarking
security of data
secured graphic QR code
Resiliency
QR codes
QR code
pubcrawl
optical characteristics
Mobile handsets
mark scanning equipment
Ink
infrared watermarking
infrared watermark
infrared QR code information
infrared detectors
anticounterfeiting feature
image watermarking
image enhancement
image colour analysis
Image color analysis
Image coding
Graphics
general QR code reader
explicit graphic QR code information
error diffusion
data hiding
data encapsulation
cyber physical systems
Cryptography
CMYK printed ink colors
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »