Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
diseases
biblio
Gait Phase Segmentation Using Weighted Dynamic Time Warping and K-Nearest Neighbors Graph Embedding
Submitted by aekwall on Mon, 02/22/2021 - 1:46pm
Dynamic Time Warping
weighted dynamic time warping algorithm
self-collected IMU gait signals
neural network-based graph embedding scheme
k-nearest neighbors graph embedding
k-nearest neighbors algorithm
k-nearest neighbors
inertial measurement units
gait phase segmentation method
gait phase estimates
gait information
gait cycle
nearest neighbour methods
nearest neighbor search
diseases
gait analysis
graph embedding
Predictive Metrics
image segmentation
Measurement
neural nets
graph theory
pubcrawl
biblio
Jekyll: Attacking Medical Image Diagnostics using Deep Generative Models
Submitted by aekwall on Mon, 02/01/2021 - 11:43am
DNN-based image translation attack
attacker-chosen disease condition
attacking medical image diagnostics
biomedical image
biomedical imagery
biomedical optical imaging
deep generative models
deep learning tools
defenses
neural style transfer
eye
healthcare domain
Jekyll
medical domain
medical image diagnostics
neural style transfer framework
patient healthcare
retinal fundus image modalities
image segmentation
learning (artificial intelligence)
machine learning
Resiliency
pubcrawl
deep learning
neural nets
image watermarking
attacks
Scalability
Generative Models
Predictive Metrics
deep neural networks
sensitive data
medical image processing
medical images
diseases
medical professionals
biblio
A secure three-factor authentication and biometrics-based key agreement scheme for TMIS with user anonymity
Submitted by grigby1 on Thu, 01/28/2021 - 2:03pm
Servers
medical servers
Medical services
message authentication
Metrics
password
pubcrawl
remote monitoring
resilience
Resiliency
medical information systems
Smart card
smart cards
telecare medical information systems
telemedicine
three factor user authentication
Three-factor authentication
TMIS
user anonymity
user/server communication security
e-health systems
authentication
authorisation
AVISPA
biometrics
biometrics (access control)
biometrics based key agreement
composability
diseases
e-health
anonymity
ECG
file servers
formal security verification tool AVISPA
formal verification
health care
health systems
healthcare services
Human behavior
biblio
De-identification and Privacy Issues on Bigdata Transformation
Submitted by grigby1 on Mon, 12/28/2020 - 12:39pm
ICT industry
t-closeness
Scalability
Resiliency
resilience
pubcrawl
privacy attacks
privacy
personal information
Metrics
l-Diversity
k-anonymity
Industries
Big Data
Human behavior
Guidelines
government sectors
diseases
de-identification processes
data privacy
Data models
data analysis
controllable privacy level
Big Data transformation
big data privacy
biblio
An Incentive Mechanism Using Shapley Value for Blockchain-Based Medical Data Sharing
Submitted by aekwall on Mon, 11/23/2020 - 11:28am
data miners
Compositionality
Incentive mechanism
Shapley value
diseases
Medical diagnostic imaging
blockchain-based medical data sharing
computational process
cooperation model
medical information systems
disease diagnosis
incentive schemes
medical data sharing
Shapley value revenue distribution
topological relationships
Intelligent Data Security
Intelligent Data and Security
Resiliency
Scalability
data owners
Big Data
data privacy
security
game theory
Data models
learning (artificial intelligence)
security of data
pubcrawl
blockchain
Business
machine learning techniques
cryptocurrencies
Distributed databases
Predictive models
biblio
Enhancing Security in Medical Image Informatics with Various Attacks
Submitted by aekwall on Mon, 10/19/2020 - 12:00pm
Metrics
medical data
Medical Expert biometric information
Medical Expert Communication
medical image authentication
Medical image compression
Medical image informatics
medical image processing
medical information systems
Kerberos
National Institute of Health
NIH
pubcrawl
Region of Interest and Non-Interest
Resiliency
reversible watermarking
surgery
telemedicine
electronic patient record
authorisation
authorized medical experts
Aycan sample digital images
Cryptography
digital signature
digital signatures
digital watermarking
diseases
Arnold’s Cat Map
EPR
extraction process
Human behavior
image archives
Image coding
image watermarking
internet
biblio
Improving Communication in Risk Management of Health Information Technology Systems by means of Medical Text Simplification
Submitted by aekwall on Mon, 10/12/2020 - 11:32am
communication problems
Expert Systems and Privacy
patient security
patient safety
nonclinical risk management
medical text simplification
medical terms
Medical Terminology Simplification
medical terminology
medical professionals
IEC 80001-1
HITS
health information technology systems
Scalability
communication problem
diseases
patient care
medical information systems
health care
Human Factors
risk management
text analysis
pubcrawl
Human behavior
data privacy
biblio
Assertion Detection in Clinical Natural Language Processing: A Knowledge-Poor Machine Learning Approach
Submitted by aekwall on Mon, 05/18/2020 - 10:54am
disease modeling
assertion modifiers
assertion status
bidirectional long short-term memory networks
clinical assertion
clinical context
clinical entities
clinical information
clinical natural language processing
clinical NLP systems
assertion detection
diseases
electronic health record
knowledge poor deep-learning system
knowledge-poor machine learning approach
Medical diagnostic imaging
Pain
patient diagnosis
word embedding
machine learning
electronic health records
Task Analysis
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
deep learning
Training
Scalability
natural language processing
Measurement
RNN
recurrent neural nets
attention mechanism
LSTM
Knowledge engineering
assertion assignment
biblio
HealthGuard: A Machine Learning-Based Security Framework for Smart Healthcare Systems
Submitted by grigby1 on Fri, 04/10/2020 - 12:53pm
nearest neighbour methods
healthguard
implantable medical devices
Internet-of-Things
k-nearest neighbor
machine learning-based detection techniques
machine learning-based security framework
malicious activities detection
malicious threats
medical emergency
Healthcare
patient monitoring
pervasive computing
Random Forest
SHS
Smart Healthcare System
smart healthcare systems
smart medical devices
Pervasive Computing Security
Human Factors
resilience
security
computer network security
Scalability
internet
health care
medical information systems
pubcrawl
Metrics
Resiliency
Internet of Things
Human behavior
random forests
neural nets
Anomaly Detection
artificial neural network
critical medical conditions
Decision Tree
Decision trees
diseases
biblio
Checkpoints Assignment on Cyber-Physical Digital Microfluidic Biochips for Early Detection of Hardware Trojans
Submitted by grigby1 on Wed, 02/26/2020 - 4:37pm
Resiliency
Hardware
hardware trojan
hardware Trojans attacks
invasive software
Lab-on-a-Chip
Microfluidics
piracy attacks
pubcrawl
resilience
frequent diseases detection
security
security concern
security study
Sequential analysis
supply chain security
tools
trojan horse detection
Trojan horses
cyber-physical digital microfluidic biochips
biochip design flow
biochips
biological techniques
bioprotocol manipulation attacks
checkpoint
checkpointing
checkpoints assignment
Computer crime
cyber physical systems
biochemical analysis
cyber-physical systems
denial-of-service attacks
digital microfluidic biochip
diseases
DMF biochip
Electrodes
error detection
error-recovery sensing systems
1
2
next ›
last »