Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Plagiarism
biblio
Intellectual Property Right Confirmation System Oriented to Crowdsourced Testing Services
Submitted by grigby1 on Fri, 05/12/2023 - 9:27am
pubcrawl
codes
composability
Concurrency
Concurrent computing
crowdsourced testing
crowdsourcing
File systems
information security
intellectual property
Metrics
Plagiarism
resilience
Resiliency
Right Confirmation
security
biblio
Intrinsic Plagiarism Detection System Using Stylometric Features and DBSCAN
Submitted by grigby1 on Fri, 09/09/2022 - 1:28pm
Plagiarism
writing style
Segments
Intrinsic
Author
DBSCAN
Writing
stylometry
detection
tools
Web pages
Detectors
Databases
Metrics
Human behavior
pubcrawl
feature extraction
biblio
Deep Metric Learning for Code Authorship Attribution and Verification
Submitted by grigby1 on Fri, 09/09/2022 - 1:28pm
machine learning
pubcrawl
Human behavior
Metrics
deep learning
estimation
Measurement
Plagiarism
face recognition
stylometry
copyright protection
codes
authorship identification
authorship verification
malware recognition
metric learning
biblio
Stylometric Analysis of Writing Patterns Using Artificial Neural Networks
Submitted by grigby1 on Fri, 09/09/2022 - 1:27pm
Training
pubcrawl
Human behavior
Metrics
authentication
Computational modeling
natural language processing
artificial neural network
Artificial Neural Networks
Plagiarism
Technological innovation
stylometry
Writing
author authentication
biblio
Weaponizing Unicodes with Deep Learning -Identifying Homoglyphs with Weakly Labeled Data
Submitted by grigby1 on Tue, 10/12/2021 - 1:47pm
Cybersecurity
homoglyphs
Measurement
Metrics
Plagiarism
Predictive models
predictive security metrics
pubcrawl
security
software development management
unicode
visualization
Weapons
biblio
File Similarity Determination Based on Function Call Graph
Submitted by grigby1 on Thu, 07/30/2020 - 1:06pm
Plagiarism
static analysis methods
space-time efficiency
similarity detection method
similarity detection
large-scale software systems
graph isomorphism
function features
function call graph
file similarity determination
decision strategies
control flow features
ip protection
file organisation
information retrieval
feature extraction
intellectual property
graph theory
Syntactics
Measurement
Metrics
program diagnostics
static analysis
composability
Resiliency
resilience
policy-based governance
Human Factors
Human behavior
pubcrawl
biblio
Intellectual Property Protection of 3D Print Supply Chain with Blockchain Technology
Submitted by grigby1 on Thu, 07/30/2020 - 1:05pm
Intellectual Property Protection
three-dimensional printing
supply chains
supply chain management
spatially distributed
software area
safety-critical products
RFID
printing industry
licensing models
License Management
digital media
additive manufacturing
3D print supply chain
ip protection
copyright
risk management
Labeling
Three-dimensional displays
Plagiarism
Metrics
Law
composability
production engineering computing
Biological system modeling
blockchain technology
Resiliency
resilience
policy-based governance
Human Factors
Human behavior
pubcrawl
biblio
Plagiarism Detection Using Semantic Knowledge Graphs
Submitted by grigby1 on Fri, 05/22/2020 - 1:44pm
pubcrawl
unstructured text
text analysis
string matching algorithms
Software
Semantics
semantic similarity
semantic knowledge graphs
Semantic
Scalability
Resiliency
resilience
relations
Data mining
plagiarism detection
Plagiarism
nip
natural language processing
named entity recognition
knowledgegraphs
intellectual property
industrial property
Human behavior
graph theory
Google
biblio
AppDNA: App Behavior Profiling via Graph-Based Deep Learning
Submitted by grigby1 on Mon, 06/10/2019 - 12:59pm
malicious apps
Task Analysis
Resiliency
pubcrawl
privacy
Plagiarism
pattern classification
Neural networks
mobile computing
mobile applications behaviors
Metrics
malware detection
malware classification
Malware Analysis
malware
app behavior profiling
machine learning
learning (artificial intelligence)
invasive software
Human behavior
graph-encoding method
graph-based deep learning
graph theory
function-call-graph-based app profiling
feature extraction
encoding
benign apps
AppDNA
app recommendation
biblio
eAssessment by Using a Trustworthy System in Blended and Online Institutions
Submitted by grigby1 on Fri, 02/08/2019 - 3:36pm
keystroke dynamics
voice recognition
Trustworthy Systems
trustworthy system
trustworthiness
trust-driven solutions
TeSLA system
Technology-enhanced learning
Task Analysis
Speech recognition
Resiliency
resilience
pubcrawl
Plagiarism
online learning
online evaluation
assessment tasks
internet
Instruments
innovative solution
further education
Fingerprint recognition
face recognition
Educational institutions
eAssessment
cyber physical systems
computer aided instruction
composability
challenging problems
blended-learning
blended university
authentication
1
2
next ›
last »