Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
industrial property
biblio
The correlation between intellectual property management and quality management in the modern knowledge-based economy
Submitted by grigby1 on Thu, 07/30/2020 - 2:05pm
Technological innovation
quality policy
quality policies
quality management
organization
Management
knowledge-based economy
knowledge based systems
knowledge based economy
intellectual property policies
intellectual property management
industrial knowledge-based organization
Economics
design activities
ip protection
Organizations
Metrics
knowledge management
Law
composability
Standards organizations
intellectual property
industrial property
Resiliency
resilience
policy-based governance
Human Factors
Human behavior
pubcrawl
organisational aspects
biblio
Attacks on Digital Watermarks for Deep Neural Networks
Submitted by grigby1 on Thu, 07/30/2020 - 1:54pm
deep learning models
watermark
statistical distribution
model prediction
Mobile app
intellectual property theft
fast response times.
Digital Watermarks
deep neural networks training
Deep Neural Network
At-tack
ip protection
copy protection
Watermarking
learning (artificial intelligence)
detection algorithms
neural nets
composability
standards
Computational modeling
industrial property
Mathematical model
Resiliency
resilience
policy-based governance
pubcrawl
Neural networks
Training
biblio
A New Pay-Per-Use Scheme for the Protection of FPGA IP
Submitted by grigby1 on Thu, 07/30/2020 - 1:53pm
complex FPGA designs
ip protection
reusable intellectual property design blocks
Physical Unclonable Function
pay-per-use
IP instance
IP infringement
FSM
FPGA IP vendor
FPGA IP protection
finite state machine
Field-Programmable Gate Arrays
Design methodology
copy protection
logic design
application specific integrated circuits
finite state machines
Licenses
composability
PUF
industrial property
field programmable gate arrays
Resiliency
resilience
policy-based governance
pubcrawl
IP networks
security
biblio
Protection of intellectual property as part of developing the skills of future engineers on their way to innovation
Submitted by grigby1 on Thu, 07/30/2020 - 1:53pm
curriculum
ip protection
innovative methods
innovation management
innovation
industrial economics
education
economy 4.0
diagnostic research methods
organisational aspects
teaching
composability
intellectual property
industrial property
Resiliency
resilience
policy-based governance
pubcrawl
biblio
Protecting the Intellectual Properties of Digital Watermark Using Deep Neural Network
Submitted by grigby1 on Thu, 07/30/2020 - 1:53pm
ip protection
Watermarking
watermark
Speech recognition
security
Resiliency
resilience
pubcrawl
policy-based governance
ownership verification
neural nets
natural language processing
machine learning
learning (artificial intelligence)
Artificial Intelligence
intellectual property security
intellectual property
industrial property
Image Processing
embedding watermarks
embedded
DNN algorithms
Digital Watermark
Deep Neural Network
deep learning models
counter-watermark attacks
composability
biblio
A hardware intellectual property protection scheme based digital compression coding technology
Submitted by grigby1 on Thu, 07/30/2020 - 1:50pm
Resiliency
intellectual property
intellectual property security
IP core watermark
IP networks
ip protection
policy-based governance
pubcrawl
resilience
industrial property
resource utilization
Robustness
security
surrounding circuit
Table lookup
watermark information
Watermarking
composability
image watermarking
hardware intellectual property protection
hardware circuit
Hardware
FPGA circuit
FPGA
field programmable gate arrays
encoding
embedding cost
Digital Watermark
digital compression coding technology
decoding function
data compression
Cryptography
Compression coding
biblio
Can Multi-Layer Microfluidic Design Methods Aid Bio-Intellectual Property Protection?
Submitted by grigby1 on Thu, 07/30/2020 - 1:48pm
biointellectual property protection
ip protection
skilled person-hour investment
significant fiscal person-hour investment
Product design
Multiplexing
multilayer microfluidic design methods
Mixers
Microfluidics
Lab-on-a-Chip
intellectual property rights
Foundries
biotechnology
bioMEMS
pubcrawl
bioassay implementation
bioassay developer
Three-dimensional displays
reverse engineering
Valves
Layout
Nonhomogeneous media
composability
industrial property
Resiliency
resilience
policy-based governance
biblio
Plagiarism Detection Using Semantic Knowledge Graphs
Submitted by grigby1 on Fri, 05/22/2020 - 2:44pm
pubcrawl
unstructured text
text analysis
string matching algorithms
Software
Semantics
semantic similarity
semantic knowledge graphs
Semantic
Scalability
Resiliency
resilience
relations
Data mining
plagiarism detection
Plagiarism
nip
natural language processing
named entity recognition
knowledgegraphs
intellectual property
industrial property
Human behavior
graph theory
Google
biblio
A Critical Evaluation of the Paradigm Shift in the Design of Logic Encryption Algorithms
Submitted by grigby1 on Fri, 04/03/2020 - 12:56pm
provable security
structural corruption
SAT attack
paradigm shift
modern logic encryption algorithms
low-cost countermeasures
logic encryption techniques
logic encryption
intellectual property piracy
integrated circuit supply chain
Hardware Trojans
computability
Boolean satisfiability attack
resilience
Logic gates
Compositionality
Metrics
invasive software
Computer crime
integrated circuits
industrial property
Hardware Security
Hardware
Resiliency
pubcrawl
encryption
Cryptography
biblio
Restricting Switching Activity Using Logic Locking to Improve Power Analysis-Based Trojan Detection
Submitted by grigby1 on Wed, 02/26/2020 - 4:38pm
pubcrawl
logic locking method
malicious circuits
million-gate circuits
outsourcing
PCA-based HT detection methods
power analysis-based Trojan detection
power consumption
power consumption analysis
Power demand
principal component analysis
Process Variations
logic locking
resilience
security
semiconductor companies
small sub-circuit collection
supply chain security
Switches
system-on-chip
trojan horse detection
Trojan horses
untrustworthy fabs
hardware Trojan detection
policy-based governance
composability
IP piracy
circuit block extraction
circuit power
cyber physical systems
design for hardware trust
fabrication foundries
gate level
Hardware
Hardware Security
Resiliency
hardware Trojan threat
HT activity
HT power
HT-infected circuits
industrial property
integrated circuit layout
intellectual properties
invasive software
IPS
Logic gates
« first
‹ previous
1
2
3
4
5
6
next ›
last »