Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mobile phone
biblio
An Approach to Embedding a Style Transfer Model into a Mobile APP
Submitted by aekwall on Mon, 02/01/2021 - 10:44am
pre-trained convolutional neural network model
Economic indicators
mobile users
deep learning models
neural style transfer
Mobile app
embedding CNN models
Perceptual Losses algorithm
photo processing apps
Feedforward neural networks
proceeding time
shorten waiting time
Style transfer model
TensorFlow Mobile library
time 2.0 s
time 2.8 s
traditional style transfer model
Scalability
feedforward neural network
image restoration
Predictive Metrics
feedforward neural nets
software libraries
mobile phone
convolutional neural nets
testing
machine learning
pubcrawl
Resiliency
learning (artificial intelligence)
mobile computing
Internet of Things
Big Data
biblio
Privacy Preservation and Mandate Representation in Identity Management Systems
Submitted by grigby1 on Tue, 01/21/2020 - 10:36am
resilience
OpenID Connect framework
privacy
privacy enhanced solutions
privacy issues
privacy requirements yardstick
private data
protecting users identity
pubcrawl
redundant users data
requestors
mobile phone
Scalability
service provider
service providers
services identity management systems
User-centred
user-centred mandate representation system
users autonomous powers
users digital identities
users participation
web services
digital data
access token
authenticated entities
authentication
authentication process
authenticity
authorisation
authorisation service
authorization
data owner
data privacy
access rights
electronic services
electronic space
fine-grained access
Human behavior
identity data
Identity management
identity management systems
internet
Internet usage
Mandate representation
biblio
Classification for Authorship of Tweets by Comparing Logistic Regression and Naive Bayes Classifiers
Submitted by aekwall on Mon, 03/04/2019 - 9:46am
regression analysis
machine learning techniques
Metrics
mobile phone
Naive Bayes
naïve Bayes classifier
pattern classification
pre-processed data
privacy
pubcrawl
Python
machine learning model
security
social computing
social media
social networking (online)
text analysis
text classification
Training
tweets authorship
Twitter
Twitter account
fake news
attribution
authorisation
authorship attribution
authorship attribution techniques
Bayes methods
classification
composability
digital identities
dubious sources
Electronic mail
anonymity
feature extraction
feature vector
Human behavior
human-in-the-loop security center paradigm
learning (artificial intelligence)
logistic regression
logistic regression based classifier
Logistics
machine learning
biblio
SecTrans: Enhacing user privacy on Android Platform
Submitted by grigby1 on Wed, 02/21/2018 - 12:46pm
resilience
Metrics
MIT
mobile computing
mobile phone
PDA
personal digital assistant
privacy
pubcrawl
Humanoid robots
Resiliency
RSA
Scalability
SecTrans
smart phones
textual data transmission
Triple DES
user data privacy
cellular radio
android
Android (operating system)
android encryption
Android mobile application
Android operating system
Androids
Blowfish
cell phone
AES
Cryptography
data privacy
decryption
encrypted format
encryption
Google
Human behavior
Human Factors
biblio
Bluetooth technology: ApXLglevel end-to-end security
Submitted by BrandonB on Mon, 05/04/2015 - 12:22pm
NIST Guide
encryption
file transfer
framework compatibility
framework reliability
Indexes
Java
Java language
Mobile communication
mobile phone
MS-Windows 7 operating system
music streaming
embedded appliances
operating system
operating systems (computers)
PAN
personal area network
personal area networks
privacy concern
programming languages
Satellites
security concern
smart phones
strong mutual authentication
communication technologies
ANSI C language
application-layer framework
ApXLglevel end-to-end security
audio streaming
authentication
authorisation
Binary Payload
Bluetooth
Bluetooth security specification
Bluetooth technology
C language
Android operating system
computer network reliability
computer network security
computing technologies
confidentiality
configurable add-on devices
cryptographic service providers
Cryptography
customizable add-on devices
data confidentiality
data integrity
file
Redesigning Mobile Privacy – Quantitative Approach
Submitted by Katie Dey on Mon, 12/03/2012 - 5:54pm. Contributors:
Janne Lindqvist
Marco Gruteser
Huiqing Fu
Shubham Jain
ABSTRACT
SaTC Posters
location
mobile phone
privacy
Rutgers University
1223977
SaTC PI Meeting 2012
Academia
Poster
Science of Security Community Meeting, Nov '12