Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
optimization
biblio
Optimized Activation Function on Deep Belief Network for Attack Detection in IoT
Submitted by aekwall on Mon, 08/24/2020 - 1:37pm
optimisation
Proposed Feature Extraction
operational security
Lion Algorithm
higher-order statistical features
feature extraction process
feature classification process
DP management
attack detection system
activation function optimization
Deep Belief Network
belief networks
Attack detection
classification
statistical analysis
IoT
Training
pattern classification
Neurons
optimization
composability
pubcrawl
Resiliency
feature extraction
Classification algorithms
security
Internet of Things
Conferences
security of data
biblio
An Analytical Framework for Security-Tuning of Artificial Intelligence Applications Under Attack
Submitted by grigby1 on Thu, 08/13/2020 - 5:07pm
artificial intelligence applications
artificial intelligence security
signal classification
security-tuning
perturbation attack
parameters tuning
ML parameters
ML experts
ML algorithms
medical signal processing
k-nearest neighbors algorithm
input data perturbation attack
electroencephalography
electroencephalogram signals
EEG dataset
data classification
learning (artificial intelligence)
analytical framework
AI application
classification accuracy
tuning
testing
Prediction algorithms
Perturbation methods
machine learning algorithms
optimization
pubcrawl
Artificial Intelligence
security
machine learning
security of data
biblio
The Survey on Intellectual Property Based on Blockchain Technology
Submitted by grigby1 on Thu, 07/30/2020 - 1:50pm
bitcoin
ip protection
transaction throughput
transaction anonymity
Time delay
Tamper-Resistance
resource consumption
Proof of Stake
optimization mechanisms
encryption algorith
cross-chain
copyrights
copyright
consensus mechanism
blockchain system
cryptocurrencies
optimisation
composability
Industries
internet
blockchain technology
intellectual property
optimization
Resiliency
resilience
policy-based governance
pubcrawl
Distributed databases
blockchain
biblio
KP-ABE with Attribute Extension: Towards Functional Encryption Schemes Integration
Submitted by grigby1 on Fri, 07/24/2020 - 12:32pm
key policy attribute based encryption
Vectors
searchable encryption
Scalability
pubcrawl
Probabilistic logic
policy-based governance
optimization
optimisation
KP-ABE-AE scheme
KP-ABE
key-policy attribute-based encryption with attribute extension
key-policy attribute-based encryption
Access Control
Iron
IPE schemes
Identity-based encryption
functional encryption scheme integration
functional encryption
fine-grained access control
encryption
Cryptography
collaboration
authorisation
access policy
access policies
biblio
[Research Paper] Combining Obfuscation and Optimizations in the Real World
Submitted by aekwall on Mon, 07/20/2020 - 10:55am
Code Obfuscation
white box cryptography
white-box encryption calls
tool-specific countermeasures
sequential pass management techniques
scheduling code transformations
rewriting systems
reverse engineer
pass scheduling problem
pass ordering
pass combinations
multicriteria optimization problem
Job shop scheduling
industrial-strength obfuscator
code tangling techniques
code obfuscator
Cryptography
program compilers
reverse engineering
Virtualization
scheduling
obfuscation
Heuristic algorithms
optimisation
tools
optimization
Metrics
composability
pubcrawl
Resiliency
Kernel
biblio
An Algorithmic Approach to Highly Resilient SATCOM
Submitted by aekwall on Mon, 07/20/2020 - 10:32am
optimisation
time-varying systems
Throughput
theoretic game
satellite communication
SATCOM networks
resource optimization
Resiliency
resilience
predictive analysis
optimization
Bandwidth
pubcrawl
military communication
Jamming
highly resilient SATCOM
generic SATCOM control loop
generic multivector structure
Games
game theory
Control Theory and Resiliency
biblio
A Security-Constrained Islanding Feasibility Optimization Model in the Presence of Renewable Energy Sources
Submitted by grigby1 on Thu, 07/16/2020 - 11:57am
pubcrawl
off-line evaluation
optimal control
optimal control actions
optimization
possible islanding event
power distribution control
power distribution faults
power grids
power system security
power systems
Numerical models
renewable energy sources
representative HV subtransmission grid
RES available
resilience
Resiliency
security-constrained islanding feasibility optimization model
simulations
Smart Grids
supplied load
Wind farms
islanded operation feasibility
composability
CPS modeling
distributed power generation
dynamic simulations
frequency control
Generators
genetic algorithms
HV subtransmission level
integer programming
Islanded Operation
actual islanding
islanding conditions
load/generation shedding
loads
long-term security
Mathematical model
Metrics
mixed integer nonlinear problem
network operation
nonlinear programming
biblio
PGSM-DPI: Precisely Guided Signature Matching of Deep Packet Inspection for Traffic Analysis
Submitted by grigby1 on Fri, 07/03/2020 - 1:26pm
deep packet inspection
feature extraction
Forestry
Inspection
Mathematical model
optimization
Protocols
pubcrawl
resilience
Resiliency
Scalability
supervised learning
biblio
Adversarial Video Captioning
Submitted by grigby1 on Fri, 07/03/2020 - 1:15pm
targeted attacks
adversarial video captioning
cosine similarity
deep learning models
image captioning attack
image captioning attacks
image domain
Streaming media
target captions
targeted
adversarial machine learning techniques
video captioning
video captioning model
video captioning task
video domain
video playback quality
video stream
video streaming
deep video
machine learning
Scalability
computer architecture
Task Analysis
pubcrawl
Metrics
Resiliency
resilience
Force
learning (artificial intelligence)
security of data
deep learning
optimization
computer vision
Perturbation methods
video signal processing
adversarial
adversarial attack
Adversarial Machine Learning
biblio
Memory Efficient High-Performance Rotational Image Encryption
Submitted by grigby1 on Fri, 06/26/2020 - 12:44pm
real-time systems
optimisation
optimization
optimizations
parallel architectures
parallel rotational encryption technique
pubcrawl
Random access memory
real-time applications
memory efficient high-performance rotational image encryption
resilience
Resiliency
rotated encrypted images
rotational image encryption technique
shadow image
storage management
visual cryptography
gpu
composability
compute unified device architecture
Conferences
Cryptography
CUDA
cyber-physical systems
efficient encryption
encryption
coalesce
graphics processing units
high-performance
high-performance device
high-performance reformulations
Image Processing
improved global memory utilization
Instruction sets
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
…
next ›
last »