Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
ip protection
biblio
IPlock: An Effective Hybrid Encryption for Neuromorphic Systems IP Core Protection
Submitted by grigby1 on Wed, 08/11/2021 - 3:25pm
pubcrawl
policy-based governance
collaboration
resilience
Resiliency
composability
hybrid encryption
ECC
ip protection
SM4
IP core protection
neuromorphic systems
biblio
A Cellular Automata Guided Obfuscation Strategy For Finite-State-Machine Synthesis
Submitted by aekwall on Mon, 11/09/2020 - 1:41pm
reverse engineering
testable key-controlled FSM synthesis scheme
state-transition
reverse engineering attacks
nongroup additive cellular automata
finite-state-machine synthesis
digital system
D1*CAdual
D1*CA
cellular automata guided obfuscation strategy
ip protection
IP piracy
cellular automata
security
flip-flops
Additives
finite state machines
Silicon
automata
industrial property
Logic gates
policy-based governance
composability
pubcrawl
Resiliency
biblio
DeepAttest: An End-to-End Attestation Framework for Deep Neural Networks
Submitted by aekwall on Mon, 08/17/2020 - 11:36am
on-device DNN attestation method
hardware-software codesign
Human behavior
industrial property
intelligent devices
intelligent platforms
IP concern
ip protection
learning (artificial intelligence)
manufactured hardware
neural nets
hardware-level intellectual property
pubcrawl
queried DNN
Resiliency
Software/Hardware Codesign
target platform
TEE-supported platforms
Trusted Execution Environment
unregulated usage
usage control
device provider
application usage
attestation
attestation criterion
authorisation
authorized DNN programs
composability
deep learning frameworks
deep neural networks
DeepAttest overhead
DeepAttest provisions
application program interfaces
device-specific fingerprint
DNN applications
DNN benchmarks
DNN program
embedded fingerprint
end-to-end attestation framework
FP
hardware architectures
hardware-bounded IP protection impair
biblio
File Similarity Determination Based on Function Call Graph
Submitted by grigby1 on Thu, 07/30/2020 - 2:06pm
Plagiarism
static analysis methods
space-time efficiency
similarity detection method
similarity detection
large-scale software systems
graph isomorphism
function features
function call graph
file similarity determination
decision strategies
control flow features
ip protection
file organisation
information retrieval
feature extraction
intellectual property
graph theory
Syntactics
Measurement
Metrics
program diagnostics
static analysis
composability
Resiliency
resilience
policy-based governance
Human Factors
Human behavior
pubcrawl
biblio
Best of Both Worlds: Integration of Split Manufacturing and Camouflaging into a Security-Driven CAD Flow for 3D ICs
Submitted by grigby1 on Thu, 07/30/2020 - 2:06pm
pubcrawl
Layout
layout camouflaging
LC
malicious entities
manufacturing
manufacturing flow
manufacturing paradigm
Metrics
production engineering computing
ip protection
resilience
reverse engineering
security
security-driven CAD flow
SM
split manufacturing
supply chains
Three-dimensional displays
extensive security analysis
policy-based governance
composability
IP piracy
3D ICs
business models
CAD
Cryptography
DRC-clean layouts
Resiliency
Foundries
Human behavior
Human Factors
industrial property
integrated circuit design
integrated circuit manufacture
integrated circuits
IP networks
biblio
Design-Based Fingerprinting Using Side-Channel Power Analysis for Protection Against IC Piracy
Submitted by grigby1 on Thu, 07/30/2020 - 2:06pm
machine learning methods
integrated circuit modelling
integrated circuit testing
integrated circuits
Inverters
ip protection
IP/IC providers
learning (artificial intelligence)
Logic gates
machine learning
Integrated circuit modeling
Metrics
minimal design variations
modified netlist
pubcrawl
resilience
side-channel power analysis
supply chains
Trojan horses
fingerprinting scheme
policy-based governance
composability
IP piracy
Benchmark testing
circuit CAD
Computer crime
Cryptography
design-based fingerprinting
Fingerprinting
Resiliency
gate-level netlist changes
Hardware
Human behavior
Human Factors
IC design flow
IC piracy
industrial property
integrated circuit design
biblio
Trademark Image Retrieval Using a Combination of Deep Convolutional Neural Networks
Submitted by grigby1 on Thu, 07/30/2020 - 2:06pm
registered trademarks
ip protection
Combination of convolutional neural networks
content-based image retrieval
convolution
deep convolutional neural networks
feedforward neural nets
image recognition
industrial-intellectual property registration
METU database
Trademarks
Trademark Image Retrieval
trademark image retrieval task
trademark images
trademark protection
trademark registration applications
Trademarks Office
VGG19c
VGG19v
visual similarity
Task Analysis
Human behavior
Human Factors
policy-based governance
resilience
Resiliency
industrial property
composability
content-based retrieval
Metrics
pubcrawl
feature extraction
image classification
visualization
convolutional neural networks
image representation
image retrieval
Shape
patents
trademark registration
biblio
A blind watermarking technique using redundant wavelet transform for copyright protection
Submitted by grigby1 on Thu, 07/30/2020 - 2:05pm
redundant wavelet transform
copyright protection
digital images
digital watermarking technique
geometrical attacks
host image
hybrid blind watermarking technique
hybrid scheme RDWT-SVD
JPEG2000 compression
modified entropy
orthogonal matrix
blind watermarking technique
redundant weavelet transform
signal processing
singular value decomposition
Transform coding
watermark embedding locations
watermark extraction
watermark image
watermark insertion
wavelet transforms
Robustness
Human behavior
Human Factors
policy-based governance
resilience
Resiliency
intellectual property
Entropy
composability
Metrics
pubcrawl
Low pass filters
Image coding
data compression
image watermarking
Watermarking
copyright
copy protection
ip protection
Arnold chaotic map
biblio
Intellectual Property Protection of 3D Print Supply Chain with Blockchain Technology
Submitted by grigby1 on Thu, 07/30/2020 - 2:05pm
Intellectual Property Protection
three-dimensional printing
supply chains
supply chain management
spatially distributed
software area
safety-critical products
RFID
printing industry
licensing models
License Management
digital media
additive manufacturing
3D print supply chain
ip protection
copyright
risk management
Labeling
Three-dimensional displays
Plagiarism
Metrics
Law
composability
production engineering computing
Biological system modeling
blockchain technology
Resiliency
resilience
policy-based governance
Human Factors
Human behavior
pubcrawl
biblio
Machine Learning IP Protection
Submitted by grigby1 on Thu, 07/30/2020 - 2:05pm
learning (artificial intelligence)
Trusted Computing
system security architecture mechanisms
security of data
Resiliency
resilience
pubcrawl
proprietary machine learning models
policy-based governance
Metrics
Machine Learning IP protection
machine learning
application domains
ip protection
intellectual property security
intellectual property
Intellectual Properties (IP)
industrial property
Human Factors
Human behavior
deep learning
computer security
composability
« first
‹ previous
1
2
3
4
5
6
next ›
last »