Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
optimization
biblio
An Efficient Recommender System by Integrating Non-Negative Matrix Factorization With Trust and Distrust Relationships
Submitted by grigby1 on Mon, 10/05/2020 - 1:11pm
recommender system
user-item ratings
trust relationships
Task Analysis
Sparse matrices
social trust information
Social trust
social regularization method
security
Scalability
Resiliency
resilience
recommender systems
collaborative filtering
pubcrawl
optimization
nonnegative matrix factorization framework
MF-based recommenders
matrix factorization
Matrix decomposition
Linear programming
Human Factors
distrust relationships
convergence
computer theory
Complexity theory
biblio
Optimizing Spectrum Pooling for Multi-Tenant C-RAN Under Privacy Constraints
Submitted by aekwall on Mon, 09/28/2020 - 11:09am
participating operators
finite-capacity backhaul links
finite-capacity fronthaul links
fronthaul/backhaul compression strategies
inter-onerator privacy
inter-operator cooperation
inter-tenant privacy constraints
multi-tenant
multitenant C-RAN
multitenant Cloud Radio Access Network system
downlink transmission
privacy constraint
private shared subbands
proprietary radio units
RAN sharing
shared subband
spectrum pooling
user equipments
CPS Privacy
radio access networks
Cloud Computing
data privacy
Human behavior
pubcrawl
privacy
optimization
cyber physical systems
Bandwidth
computer network security
Downlink
Interference
Human Factors
Quantization (signal)
bandwidth allocation
precoding
C-RAN
cloud processor
biblio
Recycled ADMM: Improve Privacy and Accuracy with Less Computation in Distributed Algorithms
Submitted by aekwall on Mon, 09/28/2020 - 10:55am
iterative process
Scalability
Resiliency
recycled ADMM
R-ADMM
pubcrawl
privacy-utility tradeoff
privacy analysis
privacy
Perturbation methods
optimization
local data
linear approximation
alternating direction method of multiplier
Iterative methods
Human behavior
distributed algorithms
differential privacy
decentralized convex optimization problems
data privacy
convex programming
Convex functions
convergence
Computing Theory and Privacy
approximation theory
biblio
Failure Disposal by Interaction of the Cross-Layer Artificial Intelligence on ONOS-Based SDON Platform
Submitted by aekwall on Mon, 09/21/2020 - 2:36pm
Artificial Intelligence
Cross Layer Security
software defined optical network
Open Network Operating System
ONOS-based SDON platform
failure disposal
cross-layer artificial intelligence
control layer
AI engines
composability
telecommunication control
software defined networking
Engines
optical fibre networks
Optical fiber networks
data layer
Databases
optimization
pubcrawl
Resiliency
feature extraction
biblio
Optimization Strategy of Flow Table Storage Based on “Betweenness Centrality”
Submitted by aekwall on Tue, 09/08/2020 - 9:15am
policy governance
virtualisation
telecommunication switching
telecommunication network topology
telecommunication control
Switches
software defined networking
Software Defined Network
SDN switch
SDN Flow table optimization
Roads
Resiliency
pubcrawl
Protocols
betweenness centrality
optimization
optimisation
network virtualization
network technology
network architecture
Metrics
Human behavior
flow table storage
Flow Table Optimization
Cloud Computing
clean slate
Big Data
biblio
On the Design of Black-Box Adversarial Examples by Leveraging Gradient-Free Optimization and Operator Splitting Method
Submitted by grigby1 on Fri, 09/04/2020 - 3:10pm
distortion metrics
advanced AI platforms
alternating direction method of multipliers
Bayesian optimization
black-box adversarial attack generation methods
black-box adversarial examples
black-box attacks
BO-ADMM
competitive attack success rates
Convex functions
ADMM solution framework
gradient-free optimization
gradient-free regime
operator splitting method
query complexities
Robust machine learning
zeroth-order optimization
ZO-ADMM
Black Box Security
Complexity theory
optimisation
pubcrawl
composability
Metrics
Resiliency
resilience
learning (artificial intelligence)
optimization
security of data
distortion
Perturbation methods
image classification
Bayes methods
image retrieval
black-box adversarial attacks
Measurement
estimation
biblio
Privacy Against Brute-Force Inference Attacks
Submitted by grigby1 on Fri, 09/04/2020 - 2:37pm
concave programming
brute force attacks
utility measure
privacy-preserving data release
privacy-leakage budget
piecewise linear techniques
piece-wise linear function
Mutual information
Linear programming
linear program
guessing leakage
f-information
data privacy
concave function
brute-force inference attacks
Markov processes
probability
policy-based governance
Entropy
Human Factors
sensitive data
optimization
pubcrawl
privacy
biblio
A New Approach to Double I/O Performance for Ceph Distributed File System in Cloud Computing
Submitted by grigby1 on Fri, 09/04/2020 - 2:15pm
local file system
distribute storage systems
Engines
faster IO performance
fault tolerant computing
hard disk
Hard disks
infrastructure-as-a-service
IO operations
cloud computing system
network operating systems
persistent storage service
storage engine
storing virtual machines
virtual machine
virtual machines
Virtual machining
BIOS Security
performance evaluation
Scalability
storage management
pubcrawl
Metrics
Resiliency
resilience
optimization
Human Factors
Cloud Computing
Throughput
Distributed databases
backend block storage service
block devices
block storage resources
block storage services
Ceph distributed file system
biblio
Security and Performance Modeling and Optimization for Software Defined Networking
Submitted by grigby1 on Fri, 08/28/2020 - 2:54pm
Performance modeling
Web servers
telecommunication traffic
software defined networking
security optimization approach
Security Optimization
Security modeling
security constraints
security
SDN
Scalability
Resiliency
resilience
queueing theory
pubcrawl
Computing Theory
performance constraints
optimization
networking capabilities
network traffic
Measurement
graphical security models
genetic algorithms
genetic algorithm
Generators
Databases
computer network security
communication demands
big data security metrics
Security Metrics
biblio
Generating Digital Signature using Facial Landmlark Detection
Submitted by grigby1 on Fri, 08/28/2020 - 2:44pm
digital signature generation
biometric encryption
Facial features
Audio recognition
biometric identification
CDNU Algorithm
compressed textual signature
database storage overhead
Digital Security
data compression
facial landmark detection
facial landmarks
facial recognition
Huffman coding
real-time optimized encryption procedure
secure digital signature
security advisors
user account information database
information security
encryption
feature extraction
pubcrawl
Metrics
Resiliency
optimization
Scalability
Databases
Cryptography
resilience
social networking (online)
face recognition
digital signatures
image texture
confidential information
Image coding
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
…
next ›
last »