Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Histograms
biblio
Implementation of Two Factor Authentication based on RFID and Face Recognition using LBP Algorithm on Access Control System
Submitted by grigby1 on Thu, 07/08/2021 - 2:38pm
Access Control
authentication
face recognition
Histograms
Human behavior
Human Factors
LBP
photo attack
process control
Prototypes
pubcrawl
radiofrequency identification
RFID
security
spoofing detection
two factor authentication
biblio
DDoS Detection Algorithm Based on Fuzzy Logic
Submitted by grigby1 on Mon, 03/29/2021 - 1:03pm
Histograms
uncertainty
telecommunication traffic
service attacks
security
Resiliency
resilience
pubcrawl
nonattack traffic
Metrics
IP networks
IP
Intrusion Detection
Internet technologies
internet
Anomaly Detection
graphics-based features
graph based features
fuzzy relevance function
Fuzzy logic
fuzzy clustering
Entropy
detection stage
DDoS intrusion detection approach
DDoS detection algorithm
DDoS detection
Cyber Physical System
computer network security
Computer crime
attack traffic
biblio
The State of the Uniform: Attacks on Encrypted Databases Beyond the Uniform Query Distribution
Submitted by aekwall on Mon, 02/22/2021 - 12:43pm
range queries
uniformly distributed queries
uniform query distribution
support size estimator
skewed query distributions
search-pattern leakage
search tokens
range attack
plaintext values
leakage-abuse attacks
known value reconstruction attacks
known structured encryption schemes
k-NN attack
k-nearest-neighbor queries
first value reconstruction attacks
distribution-agnostic reconstruction attacks
Servers
nearest neighbor search
data distribution
Approximation algorithms
encrypted databases
Histograms
Predictive Metrics
estimation
database management systems
Measurement
Databases
query processing
pubcrawl
nearest neighbour methods
encryption
Cryptography
biblio
Chaos-based Image Encryption using Integer Wavelet Transform
Submitted by aekwall on Mon, 02/08/2021 - 12:52pm
wavelet transforms
key-dependent bit scrambling
IWT
Integer Wavelet Transform
image decryption algorithm
hyperchaotic mapping
global bit scrambling
GBS
feebler resistance
DNA-coding based encrypting methods
chaos-based image encryption techniques
bit scrambling
DNA cryptography
Cryptography
cryptanalysis
chaotic map
Image Processing
Histograms
Predictive Metrics
Signal processing algorithms
Entropy
privacy
pubcrawl
Human behavior
Resiliency
encryption
biblio
An Image Encryption Schema Based on Hybrid Optimized Chaotic System
Submitted by grigby1 on Fri, 01/22/2021 - 12:50pm
hybrid optimized chaotic system
Security analysis
probability density
optimized henon mapping
optimized henon
optimisation
new 2d-logistic chaotic System
Lyapunov exponents
Logistics
image encryption schema
image encryption
image cryptosystem
Image coding
chaotic cryptography
Histograms
Henon mapping
henon chaotic system
encryption
Cryptography
Correlation
compounded chaotic system
chaotic image encryption algorithm
chaotic communication
chaos
2D logistic chaotic system
pubcrawl
biblio
A Comparative Evaluation of Local Feature Descriptors for DeepFakes Detection
Submitted by grigby1 on Fri, 01/15/2021 - 11:13am
local image descriptors
altered faces
automated face identification systems
DeepFake Video
digital face manipulations
Face manipulation
face manipulation detection
face skin color
local feature descriptors
AFIS
manipulated faces
microtextural features
person identification
photographing devices
readily-available face image
synthetic manipulations
video editing software
Histograms
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
Scalability
Databases
Metrics
feature extraction
face recognition
Robustness
image colour analysis
image texture
Image color analysis
Face
DeepFake
biblio
Enhanced Style Transfer in Real-Time with Histogram-Matched Instance Normalization
Submitted by grigby1 on Fri, 12/11/2020 - 1:55pm
neural network
trustworthy quality
texture clarity
style-swap layer
style transfer method
style transfer
style feature maps
statistical information
statistical analysis
Scalability
Resiliency
resilience
real-time systems
pubcrawl
neural style transfer
Neural networks
AdaIN layer
Metrics
impedance matching
image texture
Image reconstruction
image matching
Histograms
histogram-matched instance normalization
histogram matching
Feedforward neural networks
feedforward neural nets
feature extraction
content feature maps
Conferences
adaptive normalization layer
adaptive normalization
biblio
Masked Neural Style Transfer using Convolutional Neural Networks
Submitted by aekwall on Mon, 12/07/2020 - 11:09am
feature extraction
visualization
visual perceptions
visual perception
visual experiences
VGG-19 model
Technological innovation
Semantics
object detection
masking
masked neural style transfer
Histograms
neural style transfer
face recognition
deep neural networks
convolutional neural networks
convolutional neural nets
content image
Biological neural networks
pubcrawl
Predictive Metrics
Resiliency
Scalability
biblio
A study to Understand Malware Behavior through Malware Analysis
Submitted by aekwall on Mon, 10/26/2020 - 11:11am
Zero-day attacks
signature based detection
obfuscated malware
mutated malware
Malware Signature
Malware Packer
malware features
behavioral based malware signature
Histograms
Predictive Metrics
computer science
malware behavior
malware
Malware Analysis
static analysis
privacy
tools
Metrics
pubcrawl
Human behavior
Resiliency
feature extraction
invasive software
malware detection
biblio
Speech encryption based on the synchronization of fractional-order chaotic maps
Submitted by aekwall on Tue, 09/08/2020 - 9:13am
chaotic cryptography
speech encryption
speech communication
key generation mechanism
input speech signal
Fractional-order chaotic systems
fractional-order chaotic map
exact synchronization
encryption system
encryption function
encrypting decrypting speech
Deadbeat observer
chaotic key matrix
chaotic key generator
speech processing
Chaotic systems
Cryptography
Histograms
chaotic communication
chaos
Predictive Metrics
Ciphers
Correlation
Robustness
matrix algebra
Synchronization
synchronisation
composability
pubcrawl
Resiliency
encryption
« first
‹ previous
1
2
3
4
5
6
next ›
last »