Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
adaptive filtering
biblio
Coordinated Data-Falsification Attacks in Consensus-based Distributed Kalman Filtering
Submitted by aekwall on Mon, 08/03/2020 - 10:29am
false-data detectors
uncoordinated attacks
telecommunication security
state estimation
sensors
Scalability
Resiliency
pubcrawl
network-wide estimation error maximization
neighboring agents
naive attacks
Metrics
linear model
Kalman filters
honest agents
adaptive filtering
estimation error
Distributed databases
data-falsification attack
Covariance matrices
coordinated data-falsification attacks
consensus-based distributed Kalman filtering
Byzantine agents
Boolean relaxation
Boolean algebra
block-coordinate descent method
backward stepwise based subset selection method
attack strategy
attack sequences
biblio
A New Spatial Steganographic Scheme by Modeling Image Residuals with Multivariate Gaussian Model
Submitted by aekwall on Mon, 08/03/2020 - 10:29am
Steganography
adaptive filtering
steganographic methods
steganalysis
spatial steganographic scheme
spatial images
quantized multivariate Gaussian distribution
multivariate Gaussian model
image residuals modeling
high-pass filters
high-pass filtering
content-adaptive image steganographic schemes
approximated Fisher Information
Scalability
image filtering
Payloads
information processing
Media
gaussian distribution
Image coding
Metrics
Computational modeling
pubcrawl
Resiliency
feature extraction
security
biblio
Detection of False Data Injection Attacks in Cyber-Physical Systems using Dynamic Invariants
Submitted by aekwall on Mon, 08/03/2020 - 10:29am
Power system dynamics
Kalman filters
learning (artificial intelligence)
Meters
Metrics
National security
power engineering computing
Power measurement
power system
Kalman filter
power system security
pubcrawl
Resiliency
robust estimation
Scalability
security of data
state estimation
traditional anomaly detection approaches
data-driven temporal causal relationships
adaptive filtering
adaptive robust thresholding
Anomaly Detection
bad data detection
Bayesian filtering
complex cyber-physical systems
cyber-physical systems
data-driven functional relationships
False Data Detection
dynamic invariant network
false data injection attack detection
false data injection attacks
G-KART
Granger causality based Kalman filter
graph theory
invariant graph
Jacobian matrices
biblio
Adaptive MTD Security using Markov Game Modeling
Submitted by aekwall on Mon, 08/03/2020 - 10:29am
multistage attack scenario
Common Vulnerability Scoring System
computing elements
CVSS
distributed networking
expert knowledge
large scale cloud networks
Markov Game modeling
monitoring attacks
attack policy
network administrator
proactive security framework
reactive security mechanism
sub-optimal policy
target software vulnerabilities
transition probabilities
two-player zero-sum Markov Game
adaptive filtering
Markov processes
computer network security
Scalability
game theory
Resiliency
pubcrawl
Metrics
Computer crime
security experts
packet filtering
critical information
moving target defense
multistage attacks
Intrusion Detection Systems
security state
cloud network
adaptive MTD security
attack graphs
biblio
NETHCF: Enabling Line-rate and Adaptive Spoofed IP Traffic Filtering
Submitted by aekwall on Mon, 08/03/2020 - 10:28am
adaptive filters
adaptive filtering
Tofino switch
programmable switches
NETHCF
memory usage
memory resources
IP2HC
IP-to-Hop-Count mapping table
IP popularity
in-network system
HCF system
end-to-end routing
design adaptive mechanisms
adaptive spoofed IP traffic filtering
computer network security
telecommunication switching
Switches
Pipelines
Bandwidth
telecommunication network routing
internet
Metrics
pubcrawl
Resiliency
Kernel
telecommunication traffic
Servers
Scalability
IP networks
biblio
Replay Attack Detection Using Magnitude and Phase Information with Attention-based Adaptive Filters
Submitted by aekwall on Mon, 08/03/2020 - 10:28am
attention-based adaptive filters
adaptive filtering
voice activity detection
replay spoofed speech
replay attack detection
phase channel
original phase information
multichannel feature extraction method
magnitude information
magnitude channel complementary features
high discriminative information
frequency-domain analysis
frequency bands
conventional feature extraction techniques
automatic speech verification systems
Scalability
ASVspoof 2017
adaptive filters
Mel frequency cepstral coefficient
phase information
spoofing attacks
fast Fourier transforms
replay attacks
Databases
Metrics
pubcrawl
Resiliency
feature extraction
Task Analysis
telecommunication security
biblio
A Template Matching Background Filtering Method for Millimeter Wave Human Security Image
Submitted by aekwall on Mon, 08/03/2020 - 10:28am
bilateral filtering
adaptive filtering
traditional filtering method
template matching background filtering method
template matching
objects identification
Object recognition
millimetre wave imaging
millimeter wave security image
millimeter wave human security inspection
millimeter wave human security image
Level Set Segmentation
level set algorithm
image details
human body area
Scalability
background noise
background area
adaptive template
actual millimeter wave image
matched filters
set theory
image matching
image denoising
image segmentation
filtering theory
Metrics
pubcrawl
Resiliency
biblio
Research of Low-Quality Laser Security Code Enhancement Technique
Submitted by aekwall on Mon, 08/03/2020 - 10:28am
bilateral filter
adaptive filtering
Unsharp masking
mean square error methods
market circulation order
low-quality laser security code enhancement
Lasers
Laser security code
interference background
image enhancement algorithm
equalisers
contrast limited adaptive histogram equalization
Scalability
image enhancement
image colour analysis
image filtering
Interference
Filtering
filtering algorithms
Metrics
Image edge detection
pubcrawl
Resiliency
security
biblio
Removal of Powerline Interference from ECG Signal using FIR, IIR, DWT and NLMS Adaptive Filter
Submitted by aekwall on Mon, 08/03/2020 - 10:28am
ECG signal denoising
adaptive filtering
powerline interference removal
Power line Interference (PLI)
Normalized Least Mean Square filter
Normalized Least Mean Square Adaptive Filter(NLMS)
NLMS adaptive filter
Infinite Impulse Response(IIR)
infinite impulse response filter
IIR filters
IIR filter
FIR filters
FIR filter
Finite Impulse Response(FIR)
finite impulse response filter
Electrocardiogram (ECG)
Scalability
DWT
discrete wavelet transforms
Discrete Wavelet Transform (DWT)
discrete wavelet transform
adaptive filters
Electrocardiography
medical signal processing
interference (signal)
least mean squares methods
Finite impulse response filters
signal denoising
filtering algorithms
Metrics
pubcrawl
Resiliency
biblio
Intent-aware Item-based Collaborative Filtering for Personalised Diversification
Submitted by grigby1 on Mon, 01/21/2019 - 12:35pm
adaptive filtering
intent-aware diversification
item-based collaborative filtering
Metrics
pubcrawl
recommender systems
Resiliency
Scalability
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »