Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
copy protection
biblio
A PUF-Based Data-Device Hash for Tampered Image Detection and Source Camera Identification
Submitted by grigby1 on Thu, 04/08/2021 - 5:12pm
invariant image features
Camera Identification
CASIA database
CMOS image sensor-based PUF
CMOS image sensors
digital content creation
digital image forensics
forgery content detection
geometric transformations
image acquisition timestamp
image hash
image processing operations
image tampering problems
Bernoulli random space
perceptual data-device hash
Perceptual Image Hash
PUF-based data-device hash
size 180.0 nm
source camera identification
standard content-preserving manipulations
tamper-resistant random PUF response
tampered image detection
TSMC technology
video footage
video watermarking
object detection
Digital Forensics
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
Forensics
Cameras
digital devices
Image forensics
information forensics
feature extraction
image watermarking
Watermarking
copy protection
Physical Unclonable Function
digital images
integrated circuit modelling
video coding
image capture
Forgery
acquisition device identification
benign content
biblio
Physical Unclonable Functions (PUFs) Entangled Trusted Computing Base
Submitted by aekwall on Mon, 12/07/2020 - 12:23pm
Predictive Metrics
trusted platform modules
trusted computing base
Trusted Computing
SW-PUF measurements
software measurement physical unclonable function
Software measurement
software instruction
Software
Semiconductor device measurement
Scalability
Resiliency
Reliability
pubcrawl
program execution
processor chip ALU silicon biometrics
Clocks
Pollution measurement
physical unclonable functions
particular program instruction
neural style transfer
microprocessor chips
logic design
logic circuits
field programmable gate arrays
digital signatures
delays
data-dependent delay
cyber-physical system security
copy protection
composability
biblio
A Novel PUF based Logic Encryption Technique to Prevent SAT Attacks and Trojan Insertion
Submitted by aekwall on Mon, 11/09/2020 - 1:33pm
intellectual property/IC
IP piracy
SAT attack
hardware obfuscation
Anti-Trojan insertion algorithm
Controllability
copy protection
design-for-trust
hardware Trojan insertion
HT insertion
hardware trojan
logic encryption methods
logic encryption techniques
logic locking
PUF based logic encryption technique
PUF-based encryption
Rare Signal
reverse engineering attack
unique encryption
Hardware Security
encryption
Hardware
invasive software
Resiliency
pubcrawl
composability
policy-based governance
Trojan horses
integrated circuits
Cryptography
Topology
Logic gates
industrial property
reverse engineering
integrated circuit design
logic circuits
Physical Unclonable Function
encryption key
biblio
An Orthogonal Algorithm for Key Management in Hardware Obfuscation
Submitted by grigby1 on Mon, 11/02/2020 - 12:28pm
member leakage attack
supply chain management
Supply Chain
semiconductor chips
security
reverse engineering
Resiliency
resilience
pubcrawl
Protocols
policy-based governance
partnership organization
orthogonal obfuscation algorithm
Orthogonal obfuscation
orthogonal matrix
microprocessor chips
authenticate obfuscation keys
Licenses
IP piracy attacks
IP piracy
IP networks
IP cores
intellectual property security
intellectual property piracy attacks
integrated circuits
integrated circuit design
industrial property
Hardware Security
Hardware
copy protection
composability
biblio
Physical Unclonable Function-Based Key Sharing via Machine Learning for IoT Security
Submitted by grigby1 on Fri, 10/30/2020 - 12:15pm
Protocols
lightweight security primitive
lookup table
LUT
machine learning
machine learning (ML)
one-to-one input-output mapping
Physical Unclonable Function
physical unclonable function (PUF)
physical unclonable function-based key sharing
private key cryptography
lightweight key sharing protocols
pubcrawl
PUF-based key sharing method
resource-constrained devices
Ring Oscillator
Scalability
security
security protocols
shared key
silicon physical unclonable function
Table lookup
I-O Systems
battery power
chip fabrication process
chip-unique key
computer network security
copy protection
crossover RO PUF
Cryptographic Protocols
Cryptography
delays
device authentication
authentication
i-o systems security
industry Internet of Things
Internet of Things
interstage crossing structure
Inverters
IoT security
key generation
Key-sharing
learning (artificial intelligence)
biblio
A blind watermarking technique using redundant wavelet transform for copyright protection
Submitted by grigby1 on Thu, 07/30/2020 - 2:05pm
redundant wavelet transform
copyright protection
digital images
digital watermarking technique
geometrical attacks
host image
hybrid blind watermarking technique
hybrid scheme RDWT-SVD
JPEG2000 compression
modified entropy
orthogonal matrix
blind watermarking technique
redundant weavelet transform
signal processing
singular value decomposition
Transform coding
watermark embedding locations
watermark extraction
watermark image
watermark insertion
wavelet transforms
Robustness
Human behavior
Human Factors
policy-based governance
resilience
Resiliency
intellectual property
Entropy
composability
Metrics
pubcrawl
Low pass filters
Image coding
data compression
image watermarking
Watermarking
copyright
copy protection
ip protection
Arnold chaotic map
biblio
Attacks on Digital Watermarks for Deep Neural Networks
Submitted by grigby1 on Thu, 07/30/2020 - 1:54pm
deep learning models
watermark
statistical distribution
model prediction
Mobile app
intellectual property theft
fast response times.
Digital Watermarks
deep neural networks training
Deep Neural Network
At-tack
ip protection
copy protection
Watermarking
learning (artificial intelligence)
detection algorithms
neural nets
composability
standards
Computational modeling
industrial property
Mathematical model
Resiliency
resilience
policy-based governance
pubcrawl
Neural networks
Training
biblio
A New Pay-Per-Use Scheme for the Protection of FPGA IP
Submitted by grigby1 on Thu, 07/30/2020 - 1:53pm
complex FPGA designs
ip protection
reusable intellectual property design blocks
Physical Unclonable Function
pay-per-use
IP instance
IP infringement
FSM
FPGA IP vendor
FPGA IP protection
finite state machine
Field-Programmable Gate Arrays
Design methodology
copy protection
logic design
application specific integrated circuits
finite state machines
Licenses
composability
PUF
industrial property
field programmable gate arrays
Resiliency
resilience
policy-based governance
pubcrawl
IP networks
security
biblio
Computational optical physical unclonable functions
Submitted by grigby1 on Thu, 08/23/2018 - 11:41am
light refraction
spatial light modulators
Resiliency
resilience
refracting optical polymer element
PUF life cycle
pubcrawl
privacy
Optical scattering
Optical refraction
optical PUF
optical polymers
optical information processing
Optical imaging
Optical detectors
calibration
image colour analysis
electrical PUF
double COPUF system
Detectors
cyber-physical systems
copy protection
COPUF inversion keys
computational optical PUF
computational optical physical unclonable functions
Computational Imaging
compressive sensing
compressive sampling
compressed sensing
composability
biblio
Scan chain based IP fingerprint and identification
Submitted by grigby1 on Mon, 06/11/2018 - 3:23pm
intellectual property
Silicon
security
scan chain
Scalability
Resiliency
resilience
pubcrawl
network on chip security
Metrics
ip protection
IP networks
IP identification
IP fingerprint
copy protection
integrated circuits
integrated circuit design
industrial property
identification technology
IC identification
fingerprinting techniques
Fingerprint recognition
fault coverage
fabrication
digital fingerprinting
digital fingerprint
delays
1
2
next ›
last »