Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Logistics
biblio
Protocols Over Things: A Decentralized Programming Model for the Internet of Things
Submitted by grigby1 on Fri, 09/17/2021 - 10:46am
Metrics
Science of Security
Scalability
Resiliency
resilience
pubcrawl
Protocols
programming
policy-based governance
autonomous systems
Logistics
Internet of Things
Intelligent systems
Human behavior
Decision Making
Correlation
composability
collaboration
biblio
CrypTFlow: Secure TensorFlow Inference
Submitted by aekwall on Mon, 03/15/2021 - 12:11pm
compiler security
TensorFlow inference code
semihonest security
semihonest MPC protocol
Secure TensorFlow inference
secure multiparty computation protocols
Porthos
plaintext TensorFlow
malicious security
malicious secure MPC protocols
inference accuracy
improved semihonest 3-party protocol
ImageNet dataset
end-to-end compiler
CrypTFlow
Aramis
Scalability
program compilers
Compositionality
inference mechanisms
Benchmark testing
public key cryptography
Logistics
Metrics
Cryptography
pubcrawl
Resiliency
Task Analysis
Protocols
Cryptographic Protocols
Hardware
data privacy
biblio
Phishing Attack Detection using Machine Learning Classification Techniques
Submitted by grigby1 on Thu, 03/04/2021 - 2:57pm
Metrics
Zero day attacks
Uniform resource locators
Training
Resiliency
resilience
pubcrawl
phishing attack detection
phishing attack
Phishing
Artificial Intelligence
machine learning
Logistics
defense
Decision Tree
Conferences
computer science
composability
Classification algorithms
biblio
A Reversible Meaningful Image Encryption Scheme Based on Block Compressive Sensing
Submitted by aekwall on Mon, 02/15/2021 - 4:48pm
encryption
secret image
reversible meaningful image encryption scheme
Resiliency
pubcrawl
plain image
meaningful image encryption
Logistics
least significant bit embedding
Image reconstruction
image compression
Image coding
final meaningful cipher image
ABCS
efficient image encryption scheme
efficient encryption
efficiency performance
cyber physical systems
Cryptography
Correlation
compressed sensing
composability
Ciphers
carrier image
Adaptive Block Compressive Sensing framework
adaptive block compressive sensing
biblio
A Review of Recent Trends on DNA Based Cryptography
Submitted by aekwall on Mon, 02/08/2021 - 1:53pm
Predictive Metrics
SHA
Multi Image Encryption
Medical Image
DNA encoding
DNA cryptography
image encryption
Biomedical imaging
AES
chaos
encoding
encryption
RSA
DNA
Entropy
privacy
Logistics
Cryptography
pubcrawl
Human behavior
Resiliency
security
biblio
An Image Encryption Schema Based on Hybrid Optimized Chaotic System
Submitted by grigby1 on Fri, 01/22/2021 - 1:50pm
hybrid optimized chaotic system
Security analysis
probability density
optimized henon mapping
optimized henon
optimisation
new 2d-logistic chaotic System
Lyapunov exponents
Logistics
image encryption schema
image encryption
image cryptosystem
Image coding
chaotic cryptography
Histograms
Henon mapping
henon chaotic system
encryption
Cryptography
Correlation
compounded chaotic system
chaotic image encryption algorithm
chaotic communication
chaos
2D logistic chaotic system
pubcrawl
biblio
Secure Data Packet in MANET Based Chaos-Modified AES Algorithm
Submitted by aekwall on Mon, 11/02/2020 - 2:40pm
chaotic communication
manet privacy
Wireless Ad-Hoc Networks
secure data packet
safety-sensitive applications
privacy conference meetings
passive attack
open architecture
MANET based chaos-modified AES algorithm
data packets payload
data packet
chaotic
dynamic topology
key generation
AES
Three-dimensional displays
Cryptography
Compositionality
chaos
military applications
telecommunication network topology
mobile ad hoc networks
MANET
Logistics
Metrics
privacy preservation
pubcrawl
Resiliency
telecommunication security
data privacy
encryption
biblio
Real-time Processing and Storage of Multimedia Data with Content Delivery Network in Vehicle Monitoring System
Submitted by grigby1 on Mon, 11/02/2020 - 12:10pm
MPEG-DASH standard
Videos
video streaming
vehicular ad hoc networks
vehicle monitoring system
Streaming media
Servers
Resiliency
resilience
real-time vehicle monitoring system
real-time systems
real-time processing
pubcrawl
multimedia data storage
multimedia computing
Big Data
MPD files
Monitoring
Metrics
Media
Logistics
Internet of Vehicles
Internet of Vehicle
Internet of Things
Human Factors
hidden trouble
DASH
content delivery network
CDN
Big Data curation
biblio
Triple-Layer Image Security Using a Zigzag Embedding Pattern
Submitted by aekwall on Mon, 09/21/2020 - 3:36pm
normal cross correlation
cover image
cryptographic nature
high capacity
histogram analysis
image fidelity
least significant bit-embedding
LSB steganography
mean square error
message security scheme
chaotic logistic map encryption
peak signal to noise ratio
secure layer
steganographic nature
structural similarity index metric
triple-layer image security
zigzag
zigzag embedding pattern
zigzag pattern
Cross Layer Security
AES
encryption
security
Resiliency
pubcrawl
Logistics
Image color analysis
Measurement
image colour analysis
chaotic communication
Cryptography
mean square error methods
secret data
Steganography
secret message
composability
2D image steganography technique
AES-128 encryption
chaotic logistic map
biblio
An Image Encryption Schema Based on Hybrid Optimized Chaotic System
Submitted by aekwall on Tue, 09/08/2020 - 10:12am
image encryption
probability density
optimized henon mapping
optimized henon
new 2d-logistic chaotic System
Lyapunov exponents
image encryption schema
image cryptosystem
hybrid optimized chaotic system
henon chaotic system
compounded chaotic system
chaotic image encryption algorithm
2D logistic chaotic system
Henon mapping
chaotic cryptography
Cryptography
Histograms
chaotic communication
chaos
Predictive Metrics
Security analysis
Image coding
Correlation
optimisation
Logistics
composability
pubcrawl
Resiliency
encryption
« first
‹ previous
1
2
3
4
5
6
next ›
last »