Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Face
biblio
Affect-preserving privacy protection of video
Submitted by grigby1 on Wed, 03/08/2017 - 2:12pm
pubcrawl170113
wireless networks
Visual privacy protection
video signal processing
video applications
Three-dimensional displays
social sciences computing
social behaviors
Skin
Skeleton
shape deformation
Shape
security of data
security
affect-preserving privacy protection
privacy
mobile computing
mobile cameras
linear blend skinning
Image color analysis
health information
facial expression
face recognition
face image editing
Face
entertainment
data privacy
biblio
"Reconstruction-free inference on compressive measurements"
Submitted by grigby1 on Tue, 02/21/2017 - 1:10pm
Image reconstruction
SWIR
subNyquist sampling rates
SPC
spatial-multiplexing cameras
single-pixel camera
signal-to-noise ratios
short-wave infrared region
reconstruction-free inference
pubcrawl170104
pseudorandom spatial masks
nonlinear feature extraction
inference mechanisms
imaging devices
action recognition
Image coding
high-level visual inference problems
high-dimensional signals
feature extraction
face recognition
Face
Databases
correlational features
Correlation
compressive measurements
compressive cameras
coded measurements
Cameras
biblio
"Stealthy attacks meets insider threats: A three-player game model"
Submitted by abfox on Tue, 02/14/2017 - 1:18pm
advanced persistent threat
Computational modeling
computer security
cyber security
Face
game theory
Games
Insider Threats
Numerical models
pubcrawl170101
real-time systems
security of data
stealthy attacks
three-player attacker-defender insider game
three-player game model
two-player FlipIt game model
biblio
Discrete Cosine Transform Locality-Sensitive Hashes for Face Retrieval
Submitted by BrandonB on Wed, 05/06/2015 - 11:54am
image querying
Vectors
retrieval efficiency
RaFD
Probes
multiPIE
Locality-Sensitive Hashing (LSH)
locality-sensitive hashes
Local Binary Patterns (LBP)
local binary patterns
linear search
LFW
Kernel
indexing
index structures
image retrieval
BioID
Image coding
hash suppression
FERET
FEI
face retrieval
face recognition
face indexing
face descriptors
face databases
Face
discrete cosine transforms
discrete cosine transform hashing
Discrete Cosine Transform (DCT) hashing
DCT hashing
Cryptography
biblio
Conceptual framework for high-end graphical password
Submitted by BrandonB on Tue, 05/05/2015 - 8:54am
graphical user interfaces
user performance experimental analysis
user authentication
usability
text-based alphanumerical passwords
secure password
Proposals
Human Factors
high-end graphical password
authentication
graphical password method
Graphical Password
Face
Databases
Complexity theory
Communications technology
authorisation
biblio
Delegated Authenticated Authorization for Constrained Environments
Submitted by BrandonB on Mon, 05/04/2015 - 2:54pm
Internet of Things
trusted host
symmetric cryptography
smart objects
resource-constrained node
Protocols
protocol
performance evaluation
Peer-to-peer computing
authentication
Face
delegated authenticated authorization
Cryptographic Protocols
cross-domain setting
constrained environments
client authentication
authorization
« first
‹ previous
1
2
3
4
5
6