Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
hash algorithm
biblio
Making algorithm of improved key generation model and software
Submitted by grigby1 on Tue, 08/31/2021 - 12:10pm
primary key
standards
Software algorithms
Software
Scalability
Resiliency
resilience
random key generation
random key
pubcrawl
data integrity
nonlinear generator
Metrics
Linear generator
Linear congruent generator
information science
Human behavior
hash algorithm
Generators
Data models
biblio
Application of Improved Image Hash Algorithm in Image Tamper Detection
Submitted by grigby1 on Fri, 06/12/2020 - 12:09pm
image tamper detection
Transportation
smart cities
ROC curve
ring segmentation
ring segment
ring region
Resiliency
resilience
random vector
pubcrawl
measurement vector
improved image hashing algorithm
image tampering detection
Annular Segmentation
image segmentation
image hashing technique
image
hash value
hash algorithms
hash algorithm
feature extraction
detection
Cryptography
Conferences
compressed sensing
Compositionality
Big Data
biblio
Supervised Max Hashing for Similarity Image Retrieval
Submitted by grigby1 on Fri, 06/12/2020 - 12:08pm
resilience
hashing
image retrieval
k-ary base
labeled image datasets
learning (artificial intelligence)
mathematically differentiable approximation
nearest neighbor search
pubcrawl
Quantization (signal)
Hash functions
Resiliency
rich feature vectors
Semantics
similarity image retrieval
storage efficiency
supervised hashing methods
supervised max hashing
Training
feature vector generation
-Learning-to-Hash
-Winner-Take-All-Hash-Family
Approximation algorithms
argmax function
Compositionality
convolutional neural nets
convolutional neural networks
deep neural network architecture
feature extraction
-Convolutional-Neural-Networks
file organisation
gradient descent methods
gradient methods
hand-crafted feature vectors
hash algorithm
hash algorithms
hash code
Hash Function
biblio
Video Steganography by Neural Networks Using Hash Function
Submitted by grigby1 on Mon, 02/10/2020 - 11:44am
neural nets
video steganography
video signal processing
video content
video
telecommunication security
STEM
stego video
steganography detection
Steganography
steganographic techniques
pubcrawl
PSNR
privacy
Neural networks
Artificial Neural Networks
MSE
Metrics
Image Steganography
hybrid neural networks
Hash Function
hash algorithm
hash
discrete wavelet transforms
digital video
Data mining
Cryptography
computer science
composability
biblio
An Innovative Model for the Enhancement of IoT Device Using Lightweight Cryptography
Submitted by aekwall on Mon, 01/20/2020 - 12:01pm
Lightweight algorithms
Wireless Sensorȍ Networksȍ(WSN)
telecommunication security
security system
Scalability
Safety
resource constrained devices
Resiliency
RadioȍFrequency ȍIdentification (RFID)
pubcrawl
privacy
lightweight cryptography
Lightweight Ciphers
batteries
IoT device
InternetȍofȍThings(IOT)
Internet of Things
hash algorithm
data privacy
Cryptography
cryptographic algorithms
commutation layer
Cloud Computing
Ciphers
Block Cipher
biblio
Digital Image Self Restoration Based on Information Hiding
Submitted by aekwall on Mon, 03/25/2019 - 9:55am
Media
forensic evidence
hash algorithm
higher-quality reconstruction
Image reconstruction
image restoration
Information hiding
Jarvis
Jarvis half-tone change
discrete cosine transforms
multimedia information
quality assessment
quantization truncation
reference authentication system
reference data
self-embedding
self-healing images
self-healing networks
resilience
composability
social network
data compression
data encapsulation
Data mining
Image coding
image watermarking
Watermarking
pubcrawl
computer networks
digital image self restoration
digital images
digital media
Digital Watermark
digital watermarking
discrete cosine transform
biblio
HMAC based one t #x0131;me password generator
Submitted by BrandonB on Wed, 05/06/2015 - 11:51am
HMAC
standards
Signal processing algorithms
signal processing
Production
One Time Passwords
one time password production methods
one tıme password generator
message authentication
Keccak digest algorithm
Keccak
authentication
hashing-based message authentication code structure
Hash-Based Message Authentication Code
Hash functions
Hash Function
hash algorithm
fixed length strings
electronic media
Cryptography
Conferences