Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Euclidean distance
biblio
Multiplication-Free Biometric Recognition for Faster Processing under Encryption
Submitted by grigby1 on Fri, 03/31/2023 - 10:26am
biometric encryption
pubcrawl
biometrics (access control)
Euclidean distance
feature extraction
Metrics
Neural networks
Quantization (signal)
resilience
Resiliency
Runtime
Transforms
biblio
PHBio: A Pallier Homomorphic Biometric Encryption Scheme in Healthcare 4.0 Ecosystems
Submitted by grigby1 on Fri, 03/31/2023 - 10:25am
biometric encryption
pubcrawl
authentication
biometrics
biometrics (access control)
Ecosystems
Euclidean distance
Healthcare 4.0
Medical services
Metrics
paillier cryptosystem
privacy
privacy preservation
real-time systems
resilience
Resiliency
biblio
Dynamic Cat-Boost Enabled Keystroke Analysis for User Stress Level Detection
Submitted by grigby1 on Fri, 03/03/2023 - 4:18pm
Euclidean distance
Stress detection
Human-computer interface
Dynamic Computing
keystroke analysis
smart devices
Mice
affective computing
Keyboards
machine learning
Portable computers
real-time systems
Artificial Intelligence
Heuristic algorithms
Metrics
Human behavior
pubcrawl
biblio
Research on Filtering Feature Selection Methods for E-Mail Spam Detection by Applying K-NN Classifier
Submitted by grigby1 on Fri, 02/17/2023 - 4:38pm
spam detection
text categorization
human computer interaction
Euclidean distance
Feature Selection
unsolicited e-mail
Scalability
Filtering
robots
Metrics
Human behavior
pubcrawl
feature extraction
K-NN classifier
biblio
Improved Post-quantum-secure Face Template Protection System Based on Packed Homomorphic Encryption
Submitted by grigby1 on Thu, 06/09/2022 - 1:43pm
face recognition
packing method
biometric template protection
and squared Euclidean distance
Human Factors
Post-quantum cryptography
Facial features
Homomorphic encryption
Quantization (signal)
feature extraction
Euclidean distance
Metrics
Cryptography
Scalability
Resiliency
resilience
pubcrawl
biblio
Nearest Neighbor Search In Hyperspectral Data Using Binary Space Partitioning Trees
Submitted by grigby1 on Tue, 03/08/2022 - 1:52pm
Atmospheric measurements
vp-tree
Spectral Information Divergence
Spectral Angle Mapper
hellinger distance
binary space partitioning trees
Bhattacharyya Angle
Nearest neighbor methods
Particle measurements
pubcrawl
ball-tree
Measurement
nearest neighbor search
Euclidean distance
Force
Signal processing algorithms
Metrics
data structures
biblio
Efficient Privacy-Preserving Similarity Range Query based on Pre-Computed Distances in eHealthcare
Submitted by grigby1 on Thu, 02/10/2022 - 2:19pm
Servers
Medical services
Euclidean distance
encryption
Databases
data privacy
Cloud Computing
biblio
RNN-based Prediction for Network Intrusion Detection
Submitted by grigby1 on Tue, 02/23/2021 - 1:47pm
prediction model
sliding window
scoring function
RNN-based prediction
LSTM model
industrial IoT environments
data mining regression techniques
cosine similarity
anomaly detection methods
RNN
N-gram
LSTM
IDS
Euclidean distance
network intrusion detection
Internet of Things
regression analysis
composability
production engineering computing
recurrent neural nets
Data models
Resiliency
resilience
Metrics
pubcrawl
Intrusion Detection
Data mining
Anomaly Detection
Predictive models
security of data
biblio
Compositional Data Analysis with PLS-DA and Security Applications
Submitted by aekwall on Mon, 11/09/2020 - 12:13pm
Euclidean distance
Information Reuse and Security
spam filters
PLS-DA algorithm
partial least squares discriminant analysis
Least squares approximations
isometric log ratio transformation
information system security applications
ILR
data-based power transformation
data science models
compositional vectors
compositional data analysis
Compositional data
Aitchison transformation
Intrusion Detection
Loading
Compositionality
statistical analysis
data analysis
Mathematical model
spam filtering
unsolicited e-mail
standards
pubcrawl
Resiliency
Electronic mail
Data models
security of data
biblio
Trajectory Anonymity Based on Quadratic Anonymity
Submitted by grigby1 on Thu, 08/13/2020 - 4:33pm
adjacent anonymous area
trajectory anonymous algorithm
trajectory anonymity publishing
synchronous trajectory data
Synchronous trajectory
Sensitive region
quadratic anonymity
privacy information
original Regional anonymity
original location
Location mappings
location mapping
Location area division
K-anonymous
forged location
current sensitive region
Servers
k-anonymity
Trajectory
anonymity
Euclidean distance
Metrics
Perturbation methods
Data protection
computer science
composability
data privacy
privacy
Resiliency
resilience
Human behavior
pubcrawl
1
2
next ›
last »