Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Forensics
biblio
A Deep Learning Approach in the Discrete Cosine Transform Domain to Median Filtering Forensics
Submitted by grigby1 on Thu, 04/08/2021 - 4:14pm
maxout function
frequency-domain analysis
discrete cosine transforms
median filters
adaptive filtering layer
AFL
batch normalization operations
classification layer
convolutional stream
discrete cosine transform domain
main frequency range
signal classification
median filtering
median filtering forensics
median filtering manipulation
multiscale convolutional block
multiscale feature fusion strategy
multiscale manipulation features
operational traces
resultant features
Softmax function
Resiliency
Training
feature extraction
CNN
convolution
convolutional neural nets
pubcrawl
Human behavior
Metrics
resilience
learning (artificial intelligence)
Scalability
sensor fusion
deep learning
Kernel
Forensics
convolutional neural network
convolutional neural networks
Image forensics
information forensics
biblio
Forensic Similarity for Digital Images
Submitted by grigby1 on Thu, 04/08/2021 - 4:13pm
digital images
two-part deep-learning system
three-layer neural network
similarity network
multimedia forensics
manipulation parameter
image patches
forgery detection
forensic trace
forensic similarity decision
forensic similarity approach
editing operation
digital image forensics approach
database consistency verification
convolutional neural network-based feature extractor
camera model
deep learning
Forgery
information forensics
Image forensics
Cameras
Forensics
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
convolutional neural nets
feature extraction
Training
learning (artificial intelligence)
biblio
Minimal Information Exchange for Secure Image Hash-Based Geometric Transformations Estimation
Submitted by grigby1 on Thu, 04/08/2021 - 4:13pm
phase encoding framework
decoder estimate
distributed source coding
distributed source coding perspective
Fourier-Mellin transform
hash security
image hashing
minimal hash size
minimal information exchange
central server
Phase spectrum
reference image
rigid image registration
rigid image registration technique
secure image hash-based geometric transformations estimation
signal processing applications
transformation parameters
computational complexity
information security
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
Bandwidth
Cryptography
Forensics
image registration
source coding
information forensics
Image coding
secure communication
secure transmission
biblio
A PUF-Based Data-Device Hash for Tampered Image Detection and Source Camera Identification
Submitted by grigby1 on Thu, 04/08/2021 - 4:12pm
invariant image features
Camera Identification
CASIA database
CMOS image sensor-based PUF
CMOS image sensors
digital content creation
digital image forensics
forgery content detection
geometric transformations
image acquisition timestamp
image hash
image processing operations
image tampering problems
Bernoulli random space
perceptual data-device hash
Perceptual Image Hash
PUF-based data-device hash
size 180.0 nm
source camera identification
standard content-preserving manipulations
tamper-resistant random PUF response
tampered image detection
TSMC technology
video footage
video watermarking
object detection
Digital Forensics
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
Forensics
Cameras
digital devices
Image forensics
information forensics
feature extraction
image watermarking
Watermarking
copy protection
Physical Unclonable Function
digital images
integrated circuit modelling
video coding
image capture
Forgery
acquisition device identification
benign content
biblio
Media Forensics and DeepFakes: An Overview
Submitted by grigby1 on Thu, 04/08/2021 - 4:11pm
fake media
Media
multimedia computing
Deepfakes
Information integrity
data-driven forensic methods
deep learning tools
digital image forensics
elections
Videos
false multimedia content
forensic tools
Media Forensics
real media
realistic fake images
synthetic media
Video Forensics
visual media integrity verification
fraud
learning (artificial intelligence)
Digital Forensics
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
deep learning
security threats
neural nets
Forensics
software packages
public opinion
information forensics
generative adversarial networks
biblio
Inference of Suspicious Co-Visitation and Co-Rating Behaviors and Abnormality Forensics for Recommender Systems
Submitted by grigby1 on Thu, 04/08/2021 - 4:10pm
Scalability
Metrics
personalized collaborative recommender systems
pervasiveness
pubcrawl
rating intention
real-world data
recommender system
recommender systems
resilience
Resiliency
Measurement
security of data
spotting anomalies
structure-based property
suspicious co-visitation behavior
suspicious nodes
suspicious ratings
time series
Time series analysis
ubiquitous computing
unified detection framework
Forensics
Anomaly Detection
association rules
Attack detection
co-rating behaviors
co-rating graphs
collaboration
Couplings
Data mining
e-commerce services
electronic commerce
abnormality forensics
forensics metrics including distribution
fundamental vulnerabilities
graph theory
historical ratings
Human behavior
inference
information forensics
malicious attack
malicious attack behaviors
malicious users
biblio
Evading Deepfake-Image Detectors with White- and Black-Box Attacks
Submitted by grigby1 on Thu, 03/04/2021 - 1:35pm
security of data
neural nets
neural network
optimization
Perturbation methods
popular forensic approach
pubcrawl
resilience
Resiliency
Robustness
Metrics
significant vulnerabilities
social networking (online)
state- of-the-art classifier
synthesizer
synthetic content
synthetically-generated content
target classifier
Training
Twitter
fraudulent social media profiles
white box
security
attack case studies
AUC
black-box attack
composability
deepfake-image detectors
disinformation campaigns
Forensics
White Box Security
Generators
image area
image classification
Image forensics
image generators
image representation
image sensors
image-forensic classifiers
learning (artificial intelligence)
biblio
Data Provenance Assurance for Cloud Storage Using Blockchain
Submitted by grigby1 on Tue, 02/23/2021 - 1:26pm
Metrics
data record operations
Digital Forensics
Distributed databases
ethereum
Ethereum blockchain
Forensics
IPFS
metadata
Data Provenances
network accountability
privacy
pubcrawl
resilience
Resiliency
SLA-violations
storage management
storage privacy
cloud-based data provenance
AWS S3 storage
blockchain network
Cloud Computing
cloud data object
cloud forensics
cloud infrastructures
cloud storage
cloud storage forensics
AWS S3
composability
confidential files
contracts
Cryptography
data accountability
data integrity
data privacy
data provenance assurance
biblio
Investigating The Darknet
Submitted by grigby1 on Fri, 01/15/2021 - 11:24am
Human Factors
World Wide Web criminals
Virtual machining
tools
Servers
security
Research honeypots
pubcrawl
Organizations
investigation
Internet users
internet
Automated honeypots
Human behavior
honeypots
Forensics
drugs
detection
darknet
dark web
Cybercrime
computer security mechanisms
Computer crime
biblio
Detecting GAN-Generated Imagery Using Saturation Cues
Submitted by grigby1 on Fri, 01/15/2021 - 11:14am
social networking (online)
synthetic imagery
saturation cues
online disinformation campaigns
generating network
GAN-generated imagery
camera imagery
DeepFake
generative adversarial networks
Image forensics
GANs
Cameras
social media
Training
Gallium nitride
Forensics
Metrics
Scalability
Generators
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
convolutional neural nets
Support vector machines
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »