Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mobile computing
biblio
Rethinking Authorization Management of Web-APIs
Submitted by grigby1 on Wed, 01/20/2021 - 3:20pm
Mobile Applications
web services
Web APIs
third party web
service providers
security policies
resource sharing
Resiliency
resilience
pubcrawl
mobile computing
API
data fragments
Compositionality
Cloud Computing
cloud applications
authorization management
authorisation
application programming interface
application program interfaces
APIs
biblio
Web APIs in Android through the Lens of Security
Submitted by grigby1 on Wed, 01/20/2021 - 3:19pm
network communication
web communication
Web APIs
Web API URLs
telecommunication security
security of data
security
Resiliency
resilience
public domain software
pubcrawl
open-source apps
network libraries
Android apps
mobile computing
Mobile Apps
JSON data schemas
internet
Compositionality
communication libraries
communication
application programming interface
application program interfaces
APIs
API service providers
API
biblio
IoT Based Smart Video Surveillance System Using Convolutional Neural Network
Submitted by grigby1 on Mon, 01/11/2021 - 12:59pm
Raspberry Pi
microprocessor chips
Mobile Application
mobile computing
MobileNetv2-SSDLite model
object detection
object detection model
police data processing
pubcrawl
Metrics
resilience
Resiliency
Scalability
Smart video surveillance
SMS notification
video signal processing
video surveillance
Web application
crime rate
captured video
client and server architecture
client-server systems
CNN
COCO dataset
common objects in context dataset
convolutional neural nets
convolutional neural network
camera
deep learning
deep video
fully automatic video surveillance systems
image capture
Internet of Things
IoT
IoT based smart video surveillance system
learning (artificial intelligence)
biblio
Application of Differential Privacy in Location Trajectory Big Data
Submitted by grigby1 on Mon, 12/28/2020 - 11:38am
differential privacy protection technology
social software
resilience
position trajectory
mobile Internet technology
mobile computing
Metrics
location trajectory privacy protection
location trajectory Big Data
location trajectory
location based services
internet
GPS technology
Global Positioning System
differential privacy
differential privacy protection
Data protection
data privacy
Big Data privacy protection
big data privacy
Big Data
Algorithm
Human behavior
Resiliency
Scalability
composability
pubcrawl
biblio
Security and Privacy Analysis of Wearable Health Device
Submitted by grigby1 on Mon, 12/28/2020 - 11:28am
security
mobile computing
mobile devices
mobile health
mobile wearable health devices
privacy
privacy breach
privacy features
Privacy Risk
pubcrawl
resilience
Resiliency
malicious attack
Security analysis
security risk
security vulnerability
sensitive data information
sensitive information
Servers
telecommunication security
user data security
user sleeping arrangements
Wearable devices
dieting formula
authorisation
Biomedical monitoring
Bluetooth
Bluetooth networking
Bluetooth pairing process
bluetooth security
composability
Computer crime
data privacy
Data Security
wearables security
eating constraint
fitbit
Google Glass
Hacker
health care
health monitor system
health tracker devices
Human behavior
human health parameter monitoring
Jawbone
biblio
Power Efficient Smart Home with Voice Assistant
Submitted by grigby1 on Thu, 12/17/2020 - 1:02pm
resilience
mobile robots
NodeMCU
policy-based governance
power efficient smart home
pubcrawl
public domain software
Raspberry Pi
real-time systems
mobile computing
Resiliency
robot operating systems
security
Smart Home
Smart homes
temperature sensor
Temperature sensors
voice assistant
Firebase realtime database
Android application
Arduino IDE
database management systems
domestic appliances
electrical appliances
Electrical products
Fans
fire alarm
Adafruit IO
flame sensor
Gas detectors
Google firebase application
Home appliances
home automation
Human behavior
Human Factors
IFTTT
biblio
Challenges in ROS Forensics
Submitted by grigby1 on Thu, 12/17/2020 - 12:36pm
robot hack acquistion
Peer-to-peer computing
policy-based governance
pubcrawl
RAT
remote administration tool
resilience
Resiliency
robot behavior
Robot hack
peer to peer application
Robot Operating System
robot operating systems
Robot sensing systems
ROS forensics
security
security attacks
Service robots
software tools
Transport Layer Security
Human behavior
communication link
computer network security
confidential security purposes
cyber-physical security threats
Denial-of-Service
Digital Forensics
Forensics
Forensics acquisition and data recovery
Gazbo Turtlebot simulator
availability attacks
Human Factors
integrity attacks
internet
mobile computing
mobile robots
Network connections
network system
operating systems
biblio
Deep Android Malware Classification with API-Based Feature Graph
Submitted by grigby1 on Fri, 12/11/2020 - 1:33pm
invasive software
structure analysis
Silicon
security
Resiliency
resilience
pubcrawl
privacy
mobile computing
Metrics
Mathematical model
malware class
malware apps
Malware Analysis
malware
Analytical models
Human behavior
hand-refined API-based feature graph
graph theory
Feature Selection
feature extraction
deep learning
CNN-based classifier
application program interfaces
API-based feature graph classification
API features
Android malware classification
Android malware apps
Android malware
Android (operating system)
biblio
MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis
Submitted by grigby1 on Fri, 12/11/2020 - 1:31pm
Robustness
Metrics
mobile computing
mobile malware scanning
privacy
program analysis
program diagnostics
pubcrawl
resilience
Resiliency
market-wide malware scanning
semantic features
Semantics
social networking (online)
social-network-based centrality analysis
static analysis
syntax-based features
transformation attacks
zero-day malware including malware samples
graph theory
Android (operating system)
Android malware
Android Malware Detection
API Centrality
fault-tolerant representation
feature extraction
Google-Play app market
graph semantics
Analysis of variance
Human behavior
invasive software
Lightweight feature
lightweight graph-based approach
MalScan
malware
Malware Analysis
Market-wide
biblio
MaeSTrO: A Mobile App for Style Transfer Orchestration Using Neural Networks
Submitted by aekwall on Mon, 12/07/2020 - 11:09am
non photorealistic rendering
manifold artistic styles
Mobile app
mobile artists
mobile computing
mobile expressive rendering
Mobile handsets
neural nets
Neural networks
neural style transfer techniques
MaeSTrO
Painting
particular style transfer
rendering (computer graphics)
style transfer
style transfer orchestration
tools
User control
user interfaces
user tests
creative expression
Scalability
Resiliency
Predictive Metrics
pubcrawl
adaptive neural networks
adaptive systems
casual creativity
core technology
creative editing process
neural style transfer
Creativity
generalized user interface
Image Processing
inherent limitations
Iterative methods
localized editing process
localized image stylization
low-level controls
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »