Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Hamming distance
biblio
Dual Graphs of Polyhedral Decompositions for the Detection of Adversarial Attacks
Submitted by grigby1 on Thu, 06/22/2023 - 1:44pm
adversarial attack
polyhedral decomposition
Hamming graph
Firing
ensemble voting
dual graph
DAmageNet
convex polyhedra
bit vectors
decomposition
digital images
ResNet
Neural networks
FGSM
Hamming distance
Image edge detection
Detectors
network architecture
composability
Big Data
Metrics
Human behavior
pubcrawl
biblio
U-CAN: A Convolutional Neural Network Based Intrusion Detection for Controller Area Networks
Submitted by grigby1 on Fri, 05/12/2023 - 10:13am
Human Factors
Software
security
Resiliency
resilience
pubcrawl
Neural networks
Intrusion Detection
in-vehicle network security
automotive
Human behavior
Hamming distance
Gears
Data models
convolutional neural networks
controller area network
CAN bus
biblio
Big Data Nearest Neighbor Similar Data Retrieval Algorithm based on Improved Random Forest
Submitted by grigby1 on Tue, 03/08/2022 - 2:53pm
Training
feature extraction
pubcrawl
Data models
Big Data
computer science
Decision trees
Metrics
nearest neighbor search
Hamming distance
Measurement
search algorithm
improve random forest
similar data
biblio
In-Memory Nearest Neighbor Search with FeFET Multi-Bit Content-Addressable Memories
Submitted by grigby1 on Tue, 03/08/2022 - 2:52pm
pubcrawl
Software
Hardware
delays
Metrics
Measurement
Task Analysis
nearest neighbor search
Hamming distance
Nearest neighbor methods
content-addressable memory
ferroelectric FET
multi-bit design
biblio
Design and Implementation of a Secure Physical Unclonable Function In FPGA
Submitted by aekwall on Mon, 06/28/2021 - 12:40pm
Hamming distance
intellectual property security
Ring oscillators
Ring Oscillator PUF
Physical Unclonable Function
Intellectual Property Protection
Hardware Trojans
Challenge Response Pair
Inverters
field programmable gate arrays
Temperature measurement
Semiconductor device measurement
delays
policy-based governance
composability
pubcrawl
Resiliency
biblio
Efficient Auto key based Encryption and Decryption using GICK and GDCK methods
Submitted by aekwall on Mon, 02/15/2021 - 4:51pm
GICK
Statistics
Sociology
Resiliency
pubcrawl
primary key
Key Genetic Algorithm
key generation
Heuristic algorithms
Hamming distance
artificial intelligence techniques
genetic algorithms
GDCK
encryption keys
efficient encryption
cyber physical systems
Cryptography
Conferences
composability
Biological cells
biblio
Efficient Reed-Muller Implementation for Fuzzy Extractor Schemes
Submitted by aekwall on Mon, 01/18/2021 - 11:34am
medium-range FPGA device
attack models
area constraints
delay constraints
efficient Reed-Muller implementation
fuzzy extraction scheme
fuzzy extractor schemes
fuzzy-extractor
immunity
intrinsic hardware security
Hamming distance
physical tampering
PUF circuits
PUF implementations
Reed-Muller
Reed-Muller codes
Reed-Muller ECC design
responses stability
Fuzzy Cryptography
counterfeiting
FPGA
Scalability
Cryptography
Internet-of-Things
security
Table lookup
Resiliency
pubcrawl
Metrics
field programmable gate arrays
Decoding
fuzzy set theory
security problem
electronic devices
error correction codes
PUF
physical unclonable functions
Distributed Applications
biblio
A Novel Logical Locking Technique Against Key-Guessing Attacks
Submitted by grigby1 on Fri, 09/04/2020 - 3:24pm
Observability
intellectual property piracy
ISCAS'85 benchmark circuits
key guessing attacks
Key-gates
key-guessing attacks
logical locking
logical locking technique
logically locked design
intellectual property
path sensitization attacks
Secret key
secured hardware
secured locking mechanism
system analysis and design
Testability measures
Trojan insertion
brute force attacks
integrated circuits
Hardware
private key cryptography
Hamming distance
pubcrawl
collaboration
Computer crime
Human Factors
policy-based governance
invasive software
added logics
Brute Force Attack
embedded computing
hardware attacks
hill climbing attack
illegal integrated circuit overproduction
industrial property
biblio
Template Protection based on Homomorphic Encryption: Computationally Efficient Application to Iris-Biometric Verification and Identification
Submitted by grigby1 on Fri, 08/28/2020 - 3:42pm
IITD database
Template Protection
secure systems
Scalability
Resiliency
resilience
Recognition accuracy
pubcrawl
Probes
privacy issues
permanent protection
Metrics
iris-coding
iris-biometric verification
Iris recognition
Image coding
biometric encryption
identification mode
Homomorphic encryption
Hamming distance
feature extraction
encryption domain scheme
encryption
early decision making strategy
Decision Making
Cryptography
computationally efficient application
computational overload
block-wise comparison
biometrics (access control)
biometric recognition systems
biblio
Whitenoise encryption implementation with increased robustness to side-channel attacks
Submitted by aekwall on Mon, 07/20/2020 - 10:46am
design techniques
white box cryptography
whitenoise encryption algorithm implementation
White noise
static power consumption
shift registers
quadratic cost
power analysis attacks
linear cost
Hamming distance
dynamic power consumption
Cryptography
side-channel attacks
Power demand
pubcrawl
Heuristic algorithms
Robustness
Metrics
composability
Resiliency
encryption
1
2
next ›
last »