Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Euclidean distance
biblio
Video Data Hierarchical Retrieval via Deep Hash Method
Submitted by grigby1 on Fri, 07/03/2020 - 1:15pm
key frame extraction
video signal processing
video retrieval
video hierarchical retrieval
video data hierarchical retrieval
VGG16
simHash
Scalability
Resiliency
resilience
pubcrawl
pattern clustering
Metrics
learning (artificial intelligence)
cluster-based method
high-level semantical features extraction
fine search
file organisation
feature extraction
Euclidean distance
deep video
deep hash method
deep convolutional neural network model
deep convolutional neural network
deep CNN
convolutional neural nets
coarse search
biblio
A Topology Based Differential Privacy Scheme for Average Path Length Query
Submitted by aekwall on Mon, 06/22/2020 - 11:19am
Erbium
topology based differential privacy scheme
query function
privacy control parameters
node privacy protection
network vertices
edge-weighted privacy protection
differential privacy security mechanism
data query
average path length query
APL query
network topology
Euclidean distance
Scalability
Perturbation methods
Sensitivity
privacy protection
differential privacy
query processing
data availability
privacy
composability
pubcrawl
Human behavior
Resiliency
data privacy
biblio
Indexing in k-Nearest Neighbor Graph by Hash-Based Hill-Climbing
Submitted by grigby1 on Fri, 05/22/2020 - 2:25pm
file organisation
nearest neighbor search
vector quantization
Upper bound
SIFT1M datasets
query assignment process
nearest neighbor graph
k-nearest neighbor graph
Inverted index
indexing
hill-climbing
hashing-based seed generation
hashing
hash-based hill-climbing
GIST1M datasets
pubcrawl
Euclidean distance
Binary codes
approximation theory
approximate nearest neighbor search
query processing
Clustering algorithms
principal component analysis
graph theory
Acceleration
search problems
nearest neighbour methods
Measurement
Metrics
Indexes
biblio
A Privacy Preserving Approach to Energy Theft Detection in Smart Grids
Submitted by grigby1 on Mon, 03/09/2020 - 2:58pm
Resiliency
Metrics
photovoltaics
policy-based governance
power system security
privacy
privacy preserving approach
pubcrawl
resilience
malicious activity
Scalability
Smart Grid
Smart Grid Privacy
Smart Grids
Smart Metering
smart meters
smart power grids
collaboration
Human Factors
Human behavior
Geospatial analysis
financial gain
Euclidean distance
energy theft detection
energy theft
energy measurement
energy generation measurements
distributed power generation
distributed energy resources
detection
DER generation measurements
Cryptography
composability
biblio
WristSpy: Snooping Passcodes in Mobile Payment Using Wrist-worn Wearables
Submitted by aekwall on Mon, 02/17/2020 - 2:57pm
financial data processing
wearables security
WristSpy
Wearable sensors
single wrist-worn wearable device
personal mobile devices
passcode input scenarios
passcode inference system
parallel PIN inference
parallel pattern inference
multidimensional feature extraction
mobile payment
machine-learning based classification
fine-grained hand movement trajectories
Euclidean distance
wearable computers
Scalability
Pins
Trajectory
Online banking
electronic money
parallel processing
privacy
Mobile handsets
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
feature extraction
mobile computing
authorisation
biblio
An Efficient Multi-User Searchable Encryption Scheme without Query Transformation over Outsourced Encrypted Data
Submitted by grigby1 on Tue, 01/07/2020 - 10:55am
repeated encryption
multiuser searchable encryption scheme
outsourced encrypted data
outsourcing
PS
pubcrawl
Public key
query processing
query transformation
multiple owners
resilience
Resiliency
SE schemes
search operation
secure proxy server approach
Servers
user queries
cyber physical systems
attribute-based encryption
authorisation
Broadcast Encryption
Cloud Computing
cloud data
composability
Cryptography
Cyber Physical System
abe
data privacy
document handling
efficient encryption
encryption
Euclidean distance
existing SE approaches
Indexes
biblio
Cross-Modal Style Transfer
Submitted by grigby1 on Mon, 11/19/2018 - 12:30pm
Predictive Metrics
visualization
Visual Re-ranking
style transfer
Semantics
Scalability
Resiliency
resilience
pubcrawl
convolutional neural networks
Pipelines
neural style transfer
Multi-Modal
Metrics
image retrieval
Euclidean distance
Data mining
Cross-Modal
biblio
Side-channel collision attack based on multiple-bits
Submitted by grigby1 on Wed, 02/21/2018 - 1:41pm
AES
Algorithm design and analysis
collision attack
composability
encryption
Euclidean distance
field programmable gate arrays
Hardware
Metrics
Microelectronic Security
pubcrawl
resilience
Resiliency
Side-channel attack
side-channel attacks
biblio
Geometric group key-sharing scheme using euclidean distance
Submitted by grigby1 on Wed, 01/10/2018 - 12:20pm
information theoretic security
wireless sensor networks
Wireless Sensor Network
sensor network
Scalability
Resiliency
pubcrawl
Policy
multicast communication
Metrics
Internet of Things
information-theoretic security
Broadcasting
human factor
Human behavior
group key sharing
geometric group key-sharing scheme
Euclidean distance
Elliptic curve cryptography
Cryptography
computational complexity
composability
collaboration
biblio
EARRING: Efficient Authentication of Outsourced Record Matching
Submitted by K_Hooper on Wed, 12/20/2017 - 11:31am
integrity
VO
verification object
third-party server
specific distance metrics
Servers
security
Resiliency
record matching
pubcrawl
outsourcing paradigm
outsourcing
outsourced record matching framework
outsourced dataset
Outsourced Database Integrity
Cloud Computing
Information Reuse
information integration
identifying matching records
Euclidean distance
Entity Resolution
design EARRING
data privacy
data management
authentication
Big Data
correct record matching results
data integrity
Big Data Analytics
big data security metrics
« first
‹ previous
1
2