Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Histograms
biblio
A Provable Secure Image Encryption Schema Based on Fractional Order Chaotic Systems
Submitted by aekwall on Mon, 09/23/2019 - 10:25am
Fractional order chaos
Compositionality
provable security
provable secure image encryption schema
Nonlinear signal processing
information security applications
Image Processing
image encryption
Histograms
fractional order chaotic systems
Cryptography
discrete time chaotic systems
continuous time chaotic systems
chaotic communication
chaos
Predictive Metrics
Signal processing algorithms
pubcrawl
Resiliency
encryption
biblio
A Data Reconstruction Method for The Big-Data Analysis
Submitted by grigby1 on Wed, 03/06/2019 - 4:27pm
Correlation-coefficient
SOM (Self-Organizing-Map)
SOM
self-organising feature maps
self organizing map
Reconstruction algorithms
privacy-preserving methods
privacy problems
privacy data
Histograms
Histogram
extreme value record elimination
privacy
correlation coefficient
big-data reconstruction method
big-data
Big Data approach
Big Data analysis tools
big data privacy
data analysis
ART
pubcrawl
Big Data
data privacy
biblio
Arbitrary Style Transfer in Real-Time with Adaptive Instance Normalization
Submitted by grigby1 on Mon, 11/19/2018 - 12:30pm
Metrics
Training
style features
Scalability
Resiliency
resilience
rendering (computer graphics)
real-time systems
pubcrawl
optimization
optimisation
neural style transfer
Neural networks
neural algorithm
AdaIN layer
iterative optimization process
Iterative methods
interpolation
Histograms
Gallium nitride
feedforward neural nets
feed-forward neural networks
feature extraction
content image rendering
arbitrary style transfer
approximation theory
adaptive instance normalization layer
biblio
Categorical Classification and Deletion of Spam Images on Smartphones Using Image Processing and Machine Learning
Submitted by grigby1 on Wed, 09/12/2018 - 11:18am
machine learning
whatsapp
unsolicited e-mail
spam images
social networking (online)
Smartphones
smart phones
Scalability
pubcrawl
privacy
Optical character recognition software
mobile device
mobile computing
media exchange
manual deletion
categorical classification
learning (artificial intelligence)
Image Processing
image classification
Histograms
feature extraction
Facebook
face recognition
Face
exponential rate
Electronic mail
data deletion
communication apps
classification
categorical deletion
biblio
A Gradient-Based Pixel-Domain Attack against SVM Detection of Global Image Manipulations
Submitted by grigby1 on Mon, 03/19/2018 - 1:51pm
Nonlinear distortion
image enhancement
image filtering
limited knowledge
LK
median filtering
median filters
Metrics
noise figure 50 dB to 70 dB
Histograms
PSNR
pubcrawl
resilience
Resiliency
Scalability
Support vector machines
SVM detection
adaptive filtering
histogram stretching
high-dimensional SPAM features
gradient-based pixel-domain attack
gradient methods
gradient estimation
gradient descent methodology
global image manipulations
Forensics
forensic techniques
feature extraction
estimation theory
equalisers
Detectors
computational complexity
adaptive histogram equalization
biblio
A novel image encryption scheme using chaos, hyper-chaos systems and the secure Hash algorithm SHA-1
Submitted by grigby1 on Wed, 12/27/2017 - 1:09pm
robust scheme
Hyper-chaos
hyper-chaos systems
image encryption
image encryption scheme
image sequences
Metrics
pubcrawl
Resiliency
Histograms
secure Hash algorithm SHA-1
Security analysis
Sensitivity
SHA-1
sub-vectors confusion
two-diffusion process
XOR operation
4D hyperchaotic system
highest security level
Entropy
encryption schemes
encryption process
encryption
digital image encryption
diffusion layers
Diffusion
Cryptography
Correlation
Confusion
composability
chaotic index sequence
chaotic cryptography
chaos
biblio
Quantum color image encryption based on multiple discrete chaotic systems
Submitted by grigby1 on Wed, 12/27/2017 - 1:09pm
logistic Chebyshev map
XOR operation
statistical attacks
Resiliency
quantum image encryption algorithm
quantum encryption algorithm
quantum cryptography
quantum controlled-NOT image
quantum color image encryption
pubcrawl
multiple discrete chaotic systems
Metrics
Logistics
Algorithm design and analysis
image colour analysis
Histograms
encryption process
encryption
differential attacks
composability
Color
Chebyshev approximation
chaotic logistic map
chaotic cryptography
chaos
asymmetric tent map
biblio
Shadow detection and removal for traffic sequences
Submitted by grigby1 on Mon, 11/20/2017 - 12:04pm
object detection
video surveillance
video signal processing
video sequences
vehicles
traffic vision analysis
traffic sequences
texture features
Texture and color features
shadow-free foreground segmentation image
shadow removal method
shadow detection method
Shadow detection and removal
road traffic
Resiliency
pubcrawl
automatic shadow removal model
morphology reconstruction algorithm
Metrics
Lead
Intelligent Transportation System
image sequences
image segmentation
Image reconstruction
image denoising
image colour analysis
Human Factors
Human behavior
Histograms
histogram shape
color features
background subtraction
biblio
Investigating the {Discriminative} {Power} of {Keystroke} {Sound}
Submitted by grigby1 on Wed, 03/08/2017 - 2:46pm
keystroke dynamics
virtual letters
virtual alphabet learning
user recognition
Training
text analysis
statistical features
statistical analysis
static text-based authentications
sound streams
score matching
pubcrawl170115
Presses
keystroke sound segments
Keystroke sound
keystroke dynamics modeling
Acoustics
keyboard typing
Keyboards
Histograms
free text-based authentications
feature extraction
discriminative power
directed graphs
digraph latency
continuous user authentication application
Continuous Authentication
authorisation
authentication decision
authentication
Acoustic signal processing
biblio
Evolutionary multi-view face tracking on pixel replaced image in video sequence
Submitted by grigby1 on Wed, 03/08/2017 - 2:13pm
Detectors
Face
genetic algorithms
Histograms
Image color analysis
privacy
pubcrawl170113
surveillance
« first
‹ previous
1
2
3
4
5
6
next ›
last »