Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Approximation algorithms
biblio
Resilient Vector Consensus in Multi-Agent Networks Using Centerpoints
Submitted by aekwall on Tue, 07/27/2021 - 1:12pm
Computing Theory
resilience
Approximation algorithms
centerpoint
composability
Compositionality
computational geometry
computer science
Computing Theory and Resilience
convergence
fault tolerant networks
Partitioning algorithms
pubcrawl
resilient consensus
Robustness
Two dimensional displays
biblio
PAM PAL: Policy-Aware Virtual Machine Migration and Placement in Dynamic Cloud Data Centers
Submitted by grigby1 on Thu, 07/08/2021 - 1:26pm
Approximation algorithms
virtual machine security
virtual machine
virtual machine migration
Policy-Aware Data Centers
Algorithms
virtual machine placement
optical switches
data centers
Cyber Physical System
Cryptography
Virtual machining
composability
Heuristic algorithms
Resiliency
resilience
pubcrawl
security
Cloud Computing
biblio
On Design of Optimal Smart Meter Privacy Control Strategy Against Adversarial Map Detection
Submitted by grigby1 on Wed, 06/02/2021 - 11:17am
process control
stochastic optimal control
smart meters
smart meter privacy
Signal processing algorithms
Scalability
Resiliency
resilience
pubcrawl
Approximation algorithms
privacy
optimal control
Markov processes
Markov Decision Process
MAP detection
Human behavior
Control Theory
biblio
An Implementation and Evaluation of a Pairing on Elliptic Curves with Embedding Degree 14
Submitted by aekwall on Mon, 03/22/2021 - 12:15pm
exponentiation
pseudo7-sparse algorithm
pairing-based cryptography
multiplication algorithm bases
multiple devices
generation cryptography
Finite filed arithmetic
efficient curves
computer architecture technology
advanced cryptography
Approximation algorithms
Scalability
elliptic curve
Elliptic curves
Elliptic curve cryptography
public key cryptography
pubcrawl
Resiliency
Protocols
Cryptographic Protocols
encryption
biblio
Substitute Model Generation for Black-Box Adversarial Attack Based on Knowledge Distillation
Submitted by aekwall on Tue, 03/09/2021 - 11:04am
deep convolutional neural network
black-box models
adversarial attack perturbation
attacking success rate
black-box adversarial attack
black-box adversarial samples
black-box CNN models
classification mechanism
compact student model
adversarial samples
DenseNet121
knowledge distillation
multiple CNN teacher models
ResNet18
substitute model
substitute model generation
white-box attacking methods
convolutional neural networks
learning (artificial intelligence)
Resiliency
pubcrawl
composability
Computational modeling
Metrics
Training
convolutional neural nets
Task Analysis
black box encryption
image classification
Predictive models
computer vision
Perturbation methods
Approximation algorithms
computer vision tasks
biblio
Fast Scalable Approximate Nearest Neighbor Search for High-dimensional Data
Submitted by aekwall on Mon, 02/22/2021 - 12:45pm
load balancing
Load management
high-dimensional data
graph-based sequential approximate k-NN search algorithm
hierarchical navigable small world
HNSW
k-d tree-based solution
k-nearest neighbor search
K-NN search
nearest neighbor search
MPI one-sided communication
MPI-OpenMP solution
Nearest neighbor methods
parallel algorithms
similarity search
Vantage Point Tree
vantage point trees
Measurement
learning (artificial intelligence)
machine learning
pubcrawl
graph theory
Big Data
query processing
trees (mathematics)
Data mining
machine learning algorithms
application program interfaces
Predictive Metrics
Partitioning algorithms
approximation theory
Approximation algorithms
message passing
search problems
biblio
The State of the Uniform: Attacks on Encrypted Databases Beyond the Uniform Query Distribution
Submitted by aekwall on Mon, 02/22/2021 - 12:43pm
range queries
uniformly distributed queries
uniform query distribution
support size estimator
skewed query distributions
search-pattern leakage
search tokens
range attack
plaintext values
leakage-abuse attacks
known value reconstruction attacks
known structured encryption schemes
k-NN attack
k-nearest-neighbor queries
first value reconstruction attacks
distribution-agnostic reconstruction attacks
Servers
nearest neighbor search
data distribution
Approximation algorithms
encrypted databases
Histograms
Predictive Metrics
estimation
database management systems
Measurement
Databases
query processing
pubcrawl
nearest neighbour methods
encryption
Cryptography
biblio
Development of Decomposition Methods for Empirical Modes Based on Extremal Filtration
Submitted by aekwall on Mon, 02/15/2021 - 3:45pm
decomposition methods
decomposition
time-frequency feature
Spectral analysis
simple mathematical basis
signal decomposition
rapid analysis of signals
method distribution
method development
known components
extremal filtration method
extremal filtration
empirical modes decomposition
Empirical mode decomposition
Conferences
alternating components
filtration
wavelet transforms
Approximation algorithms
signal processing
Compositionality
Time-frequency Analysis
Signal processing algorithms
Manganese
cyber physical systems
Metrics
pubcrawl
biblio
Pitfalls in Machine Learning-based Adversary Modeling for Hardware Systems
Submitted by grigby1 on Thu, 01/28/2021 - 12:12pm
machine learning
Scalability
Root-of-trust
Resiliency
resilience
pubcrawl
Picture archiving and communication systems
physically unclonable functions
Metrics
machine learning-based attacks
machine learning-based adversary model
Adversary Models
logic locking
learning (artificial intelligence)
Human behavior
Hardware
Cryptography
cryptographic scheme
cryptanalysis attacks
Composed Hardware
Boolean functions
Approximation algorithms
biblio
Detection of Sybil Attack on Tor Resource Distribution
Submitted by aekwall on Mon, 12/14/2020 - 11:42am
Approximation algorithms
tor resource distribution
tor anonymous communication system
suspicious malicious users
resource distribution process
resource distribution
minimum malicious user
Integer Linear Program
enumeration attacks
Distribution strategy
computer program
anonymous communication system
Bipartite graph
Linear programming
detection method
Bridges
computer network security
Communication Systems
integer programming
Relays
Web sites
sybil attacks
Metrics
resource management
graph theory
Sybil attack
detection
composability
pubcrawl
Resiliency
network security
« first
‹ previous
1
2
3
4
5
next ›
last »